Skip to main content

Home/ Indie Nation/ Group items tagged site

Rss Feed Group items tagged

John Lemke

A Social Networking Site For Criminals Lands Two Teens In Jail « The Blade by... - 0 views

  •  
    Most of us are familiar with Facebook, but has anyone heard of 'Crimebook'? The novel social networking site was set up by two British teens to entertain the criminal element of society. These teens were raking in the money to the tune of some $26M with some 8,000 crooks using the social site to exchange stolen credit card information. The teens also shared the bank accounts of some 65,000 customers who had their accounts hacked by the thieves.
John Lemke

U.S. Court Grants Order to Wipe Pirate Sites from the Internet | TorrentFreak - 0 views

  • A U.S. federal court in Oregon has granted a broad injunction against several streaming sites that offer pirated content. Among other things, the copyright holder may order hosting companies to shut down the sites' servers, ask registrars to take away domain names, and have all search results removed from Google and other search engines.
  • ABS-CBN requested power to take the sites offline before the owners knew that they were getting sued, and without a chance to defend themselves. While that may seem a lot to ask, Judge Anna Brown granted the request.
  • The preliminary injunction is unique in its kind, both due to its broadness and the fact that it happened without due process. This has several experts worried, including EFF’s Intellectual Property Director Corynne McSherry.
John Lemke

Feathered dinosaur death site is an "animal Pompeii" | Ars Technica - 0 views

  • The fossils of the Jehol Biota are from the Early Cretaceous period, about 130 million years ago, and they comprise a wide variety of animals and plants. So far, about 60 species of plants, 1,000 species of invertebrates, and 140 species of vertebrates have been found in the Jehol Biota.
  • One of the most remarkable discoveries to arise from these fossils came in 2010, when Michael Benton of the University of Bristol found color-banding preserved in dinosaur fossils. These stripes of light and dark are similar to stripes in modern birds, and they provided further evidence that dinosaurs evolved into birds. Benton also found that these fossils had intact mealnosomes—organelles that make pigments. This discovery allowed paleontologists to tell the colors of dinosaurs' feathers for the first time.
John Lemke

Mega Goes Legal, Issues Ultimatum Over Cyberlocker Report | TorrentFreak - 0 views

  • Mega was founded by Kim Dotcom but the site bears little resemblance to his now defunct Megaupload. Perhaps most importantly, Mega was the most-scrutinized file-hosting startup ever, so every single detail simply had to be squeaky clean. As a result the site took extensive legal advice to ensure that it complies with every single facet of the law. Nevertheless, NetNames took the decision to put Mega in its report anyway, bundling the site in with what are described as some of the market’s most dubious players. This was not received well by Mega CEO Graham Gaylard. In a TorrentFreak article he demanded a full apology from NetNames and Digital Citizens Alliance and for his company to be withdrawn from the report. Failure to do so would result in “further action”, he said.
  • “Mega’s legal counsel has written to NetNames, Digital Citizens Alliance and The Internet Technology & Innovation Foundation (ITIF) stating that the report is clearly defamatory,” Mega CEO Graham Gaylard told TorrentFreak this morning.
  • Firstly, Mega’s legal team are now demanding the removal of the report, and all references to it, from all channels under the respondents’ control. They also demand that further circulation of the report must be discontinued and no additional references to it should be made in public.
  • ...3 more annotations...
  • also demanding a list of everyone who has had a copy of the report made available to them along with details of all locations where the report has been published.
  • Finally, Mega is demanding a full public apology “to its satisfaction” to be published on the homepages of the respondents’ websites.
  • Mega has given the companies seven days to comply with the above requests.
John Lemke

RapidGator Wiped From Google by False DMCA Notices | TorrentFreak - 0 views

  • File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. “If it happens to us, it can happen to MediaFire or Dropbox tomorrow,” they state.
  • Thus far this has resulted in more than 200 million URLs being removed from Google’s search engine. While many of these takedown claims are legit, some are clearly false, censoring perfectly legitimate webpages from search results. File-hosting service RapidGator.net is one site that has fallen victim to such overbroad takedown requests. The file-hosting service has had nearly all its URLs de-listed, including its homepage, making the site hard to find through Google. Several other clearly non-infringing pages, including the FAQ, the news section, and even the copyright infringement policy, have also been wiped from Google by various takedown requests.
  • “Our robots.txt forbids search engines bots to index any file/* folder/ URLs. We only allow them to crawl our main page and the pages we have in a footer of the website. So most of the URLs for which Google gets DMCA notices are not listed in index by default,” RapidGator’s Dennis explains.
  •  
    Quoting the article: "File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. "If it happens to us, it can happen to MediaFire or Dropbox tomorrow," they state." This is, sooner or later, going to have to be addressed... It totally works against the concept of the cloud. I can not believe that more people are using the cloud for illegal uses than legit.
John Lemke

Pirate Bay Docks in Peru: New System Will Make Domains "Irrelevant" | TorrentFreak - 0 views

  • Currently under development is a BitTorrent-powered browser that will enable users to store and distribute The Pirate Bay and other sites without need for central hosting. This means sites will be able to exist in a new and decentralized form with no reliance on a public-facing website. In a message to “BREIN and friends,” The Pirate Bay cautions that while closing down domains may be an irritant today, that loophole won’t be open forever.
  • “They should wait for our new PirateBrowser, then domains will be irrelevant,” an insider told TorrentFreak.
John Lemke

Japan may send chatty humanoid tweet-bot to space - Yahoo! Finance - 0 views

  •  
    Japan's space agency is considering putting a talking humanoid robot on the International Space Station to watch the mission while astronauts are asleep, monitor their health and stress levels and communicate to Earth through the microblogging site Twitter. Japan's space agency JAXA announced this week that it is looking at a plan to send a humanoid robot to the space station in 2013 that could communicate with the ground through Twitter -- primarily feeding photos, rather than original ideas -- and provide astronauts with "comfort and companionship."
John Lemke

CRIA Watches Massive Music Piracy Crisis Devastate Unknown Band | TorrentFreak - 0 views

  •  
    "The Canadian Recording Industry Association (CRIA) states that, to achieve Platinum status, an album must achieve sales of 100,000 copies/downloads of an album. Sales…that's the key. A random polling of several torrent site's downloads-ILLEGAL downloads-has shown that 1ST, the debut cd by ONE SOUL THRUST has been downloaded over 100,000 times," he wrote. Now, 100,000 downloads is a lot, especially for a band like One Soul Thrust who have just 176 Twitter followers and a single short, non-musical video on their YouTube channel which at the time of writing has 79 views. Incidentally, the video is quite nice, since they have actually taken the time out to thank a radio station for playing one of their songs. However, the band are less pleased that people are apparently sampling their music using newer methods, i.e BitTorrent. "We paid to create that album totally out of our own pockets. People think of illegal downloading not hurting anyone, but we're real people too- with real mortgages, real family to feed and real bills to pay," said lead-vocalist Salem Jones. "By downloading our album from pirate sites, people have stolen from us, our families, everyone involved in the production of our album, and their families."
John Lemke

Little red lawsuit: Prince sues 22 people for pirating his songs | The Verge - 0 views

  • The case, filed as Prince v. Chodera in the Northern District of California, reads, "The Defendants in this case engage in massive infringement and bootlegging of Prince's material." Only two defendants are named in the suit, however — the rest are listed as John Does, though eight do have the distinction of being regarded by their online handles. Nevertheless, Prince, based on "information and belief," alleges that each of the individuals worked together on Facebook and Blogger to conduct infringing activity, and lists extensively the mirror sites and blogs each used to distribute copies of his work. He has thus demanded $1 million with interest in damages from each of the defendants, along with a permanent injunction to prevent all of them from doing further harm.
John Lemke

Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views

  • First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
    • John Lemke
       
      The two asumptions
  • One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
    • John Lemke
       
      Seems not many of the documents were actually NSA documents.
  • assume
  • ...10 more annotations...
  • DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We
  • that Snowden, everything that he touched, we assume that he took, stole.”
  • The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we
  • assume
  • he zipped up the files and left,” this official said.
  • Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to
  • assume
  • that lest some of Snowden’s documents could wind up in the hands of a foreign government.
  • In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
    • John Lemke
       
      He is not willing to release stuff he felt that journalist should not publish...
  • Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
John Lemke

Brazil looks to protect privacy and net neutrality with internet bill of rights | The V... - 0 views

  • "The internet you want is only possible in an environment of respect for human rights," Rousseff said in a statement on her website, "especially privacy and freedom of expression."
  •  
    ""The internet you want is only possible in an environment of respect for human rights," Rousseff said in a statement on her website, "especially privacy and freedom of expression.""
John Lemke

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
John Lemke

Online Community Building and the Secret Sauce | Spin Sucks - 0 views

  • the real juice is in the content.
  • I read a blog post he wrote about community. He said (I’m paraphrasing) that you don’t have a community until people begin talking to one another without your participation. Until then, it’s just comments. And he’s right. You know you’ve hit community mecca when people come to your site to talk to one another, with your content as the conversation starter.
1 - 13 of 13
Showing 20 items per page