Skip to main content

Home/ Internetni praktikum/ Group items tagged accounts

Rss Feed Group items tagged

inesmag

Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts > Password Sniffing and Accoun... - 0 views

  • Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
  • Password sniffing and account hijacking have become more prevalent in recent years because of Wi-Fi and software that make these hacking techniques so easy
  • Both of the methods we're discussing require the eavesdropper to be connected to the same network as you.
  • ...1 more annotation...
  • These hacking techniques can still be used by other users on private networks using the Personal/Pre-Shared Key (PSK) mode of WPA/WPA2 encryption or the older WEP encryption. However, they can't be used on networks using the Enterprise/EAP mode of WPA/WPA2 encryption, which is usually used only by businesses and requires a separate 802.1X server.
Nuša Gregoršanec

BBC News - Child safety measures to protect against internet threats - 0 views

  • Child safety measures to protect against internet threats
  • In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.
  • Even more worryingly, 30% (39% worldwide) said they had suffered a "serious" negative experience. This included, among other things, invitations to meet online "friends" in real life and exposure to indecent pictures of someone they did not know.
  • ...7 more annotations...
  • The ever-growing adoption of social networks, instant messages and mobile communication leaves the door open to more subtle attacks - both of a technological and psychological nature.
  • "Parents must realise that technology alone can't keep children safe online," Deborah Preston, the company's internet security advocate.
  • "To be truly safe it requires not only technology, but also a combination of open and ongoing dialogue and education between parents and children."
  • On social networks, account hijacking - where a child's account is accessed for a practical joke or more sinister purposes - can cause considerable distress.
  • A poll by Virgin Media suggests that 38% of parents whose children have suffered from cyberbullying feel unable to protect them due to a lack of knowledge and understanding of how the online world works.
  • This, Mr Abdul argued, could only be solved through greater education and a more honest understanding from parents about how real and damaging the effects of online bullying could be.
  • Mr Abdul added, the correct software, education and parental supervision means children can also be protected both at home and away.
Katja Kotnik

Me and my data: how much do the internet giants really know? | Technology | The Guardian - 0 views

  • Google is not only the world's largest search engine, it's one of the top three email providers, a social network, and owner of the Blogger platform and the world's largest video site, YouTube. Facebook has the social contacts, messages, wallposts and photos of more than 750 million people.
  • The site also lists my most recent sent and received emails (in both cases a "no subject" conversation thread with a colleague).
  • The big relief comes when I note Google isn't tracking the internet searches I've made on my work account
  • ...12 more annotations...
  • only around 29% of the information Facebook possesses on any given user is accessible through the site's tools.
  • The Facebook extended archive is a little creepier, including "poke info", each instance of tracking cookies they possess, previous names, and full login and logout info
  • Looking through anyone's list of searches gives a distressing degree of insight into odder parts of their personality.
  • how much do the internet giants really know?
  • sell us stuff
  • picked up by hackers
  • how much the internet giants know about us.
  • Google isn't totally unhelpfu
  • Every event to which I've ever been invited is neatly listed, alongside its location, time, and whether I said I would attend .
  • One piece of information – a supposed engagement to a schoolfriend, Amy Holmes – stands out. A Facebook "joke" that seemed faintly funny for about a week several years ago was undone by hiding it from any and all Facebook users, friends or otherwise (to avoid an "… is now single!" status update). The forgotten relationship helpfully explains why Facebook has served me up with badly targeted bridalwear adverts for several years, and reassures me that Facebook doesn't know quite everything.
  • This is the core of the main comfort
  • despite their mountain of data, Google and Facebook seem largely clueless, too – they've had no more luck making any sense out of it than I have. And that, for now, is a relief.
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
petra funtek

After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 1 views

  • After Leveson: the internet needs regulation to halt 'information terrorism'
  • We are heading into a future of no regulation with the internet where its monoliths will have plenty of clout, pretty well unfettered by democratic national governments (but not totalitarian ones, like China).
  • How does information terrorism work?What's coming in the future could be far more deadly, involving widespread smears, character assassinations and the destruction of companies and maybe even institutions. And by then we may not have a vigorous press to hold it to account.
  • ...4 more annotations...
  • it is no longer reasonable for the big players - the Googles, Facebooks, YouTubes and Twitters - to say: "Nothing to do with us, guv, we only provide the pipes. What goes through them, that's up to the folk who put it there."
  • To illustrate an example of information misuse, it's worth recounting the alarming experience of a work colleague at the hands of Facebook. Someone he did not know took his name and set up a Facebook page purporting to be his, along with a photo and several intimate details, some true, some false.
  • Citing "freedom of expression", which like motherhood and apple pie is impossible to attack, they will host their anonymous contributors' bullying, lies, smears, breathtaking invasions of privacy
  • An entirely new information world is rising in which each of us can be readers and editors, contributors and subscribers, and maybe even proprietors, at the same time.
Rebeka Aščerič

Social media followers: Beware the tweeting crowds | The Economist - 0 views

  • IF YOU think money can't buy you friends, think again. In the online world, it’s possible to purchase a crowd of fans.
  • To decide whether a follower is human, Mr Camisani Calzolari used various criteria, including the number of posts from a fan’s Twitter account and the use of correct punctuation in tweets. According to this research, by June 2011 nearly half of Twitter followers of computer maker Dell—about 700,000—were bots.
  • On close inspection, a significant proportion of Mr Romney’s followers appeared to be fake profiles.
  • ...2 more annotations...
  • There is no indication that any of the companies mentioned in Mr Camisani Calzolari’s paper have bought followers—rogue bots often attach themselves to people and brands without payment. But some firms do buy a social media following.
  • For now, the trick works. “Normal people don't know yet that there is this black market. Most have total trust that a brand's followers are real,” says Mr Camisani Calzolari.
Rebeka Aščerič

BBC News - Children 'switching from TV to mobile internet' - 0 views

  • Television is being pushed aside by mobile internet gadgets, a UK survey of young people's technology suggests.
  • Among seven to 16 year olds, 61% have a mobile phone with internet access.
  • Talking, texting and accessing the internet are now reached through the mobile - with more than three-quarters of secondary-age pupils now using mobiles to get online.
  • ...2 more annotations...
  • When children are reading at home, it is more likely to be through a screen rather than a book or a magazine.
  • Mobile phones and the internet each occupy about an hour and a half on average per day - but television viewing on average still accounts for two and half hours.
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Miha Naprudnik

The Future by Google's Eric Schmidt: Cyber wars, terrorism and ethnic cleansing - RT News - 0 views

  • Cyber-terrorists targeted by government drone strikes, online identities, which are taken hostage and held for ransom, and parents, who explain online privacy to their children long before the subject of sex. That’s how Google’s boss sees the future.
  • ome hackers already take over a user's computer and encrypt its hard drive, locking them out.
  • By hacking more and more e-mail accounts, cyber-criminals expose the online life of others.
  • ...3 more annotations...
  • Online communication between terrorists could make it hard for them to hide.
  • Speaking about online IDs, Schmidt underlined the growing importance of online privacy. Parents would have to speak to their children about the perils of digital life much earlier than any conversation about the birds and the bees.
  • Schmidt also shared his views on the good side of being online in future, saying that the rise of the connected world, especially through mobile phones with data services, would reduce corruption and undermine repressive regimes.
donnamariee

BBC News - O2's Tu Go aims to challenge Skype and other Voip apps - 0 views

  • O2 has launched an app which lets users make and receive phone calls and texts via a tablet, computer or smartphone. Tu Go is available for Android, Apple's iOS devices and Windows 7 PCs but limited to "pay monthly" subscribers - so excludes corporate accounts.
  • Users can be logged into the service on up to five devices at once - meaning all will ring if they receive a call - including handsets using Sim cards associated with different networks and internet enabled gadgets such as iPods.
  • The effort represents the telecom industry's latest attempt to tackle competition from Skype and other third-party Voip services. These typically do not charge for app-to-app calls, but do require the user to buy credit if they want to call or send a text to a standard mobile or landline number.
  • ...2 more annotations...
  • But the scale of the threat was highlighted earlier this week when the chairman of China Mobile - the world's largest telecom carrier - said his firm was now more concerned about the challenge posed by Microsoft's Skype and Tencent's WeChat services than it was about competition from China's rival mobile networks.
  • There are already dozens of Voip apps on the market including lesser-known names such as Tango, Fring, Bria and Zerofone as well as manufacturer's own services including BlackBerry BBM and Apple's Facetime.
sintija

BBC News - Online advertising breaks through £4bn barrier - 0 views

  • Online advertising breaks through £4bn barrier
  • value of online advertising grew by 12.8% in 2010, breaking through the £4bn barrier.
  • A study by the Internet Advertising Bureau (IAB) and the accountants PwC found that online advertising spending grew three times as rapidly as in 2009
  • ...4 more annotations...
  • Online video advertising also nearly doubled in 2010, with £54m spent on adverts that appeared before, during or after video clips.
  • Facebook has made big advances in the last year in persuading advertisers to see social networks as a place to promote their wares
  • Search advertising, still dominated by Google, remains the biggest earner
  • The IAB expects online spending to continue to grow, as faster broadband makes new formats increasingly attractive.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Blaž Gobec

Why Facebook's new Open Graph makes us all part of the web underclass | Technology | gu... - 1 views

  • ou're not paying for your presence on the web, then you're
  • just a product being used by an organisation bigger than you
  • When you use a free web service you're the underclass. At best you're a guest. At worst you're a beggar, couchsurfing the web and scavenging for crumbs. It's a cliché but worth repeating: if you're not paying for it, you're aren't the customer, you're the product.
  • ...10 more annotations...
  • Your individual account is probably worth very little to the service provider, so they'll have no qualms whatsoever with tinkering with the service or even making radical changes in their interests rather than yours. If you don't like it you're welcome to leave. You may well not be able to take your content and data with you, and even if you can, all your URLs will be broken.
  • if you really care about your site you need to run it on your own domain. You need to own your URLs. You'll have total control and no-one can take it away from you. You don't need anyone else. If you put the effort in up front it'll pay off in the long run.But it's no longer that simple.
  • Anyone who's ever run a website knows that building the site is one thing, but getting people to use it is quite another. The smaller your real-world presence the harder it is. If you're a national newspaper or a Hollywood star you probably won't have much trouble getting people to visit your website. If you're a self-employed plumber or an unknown blogger writing in your spare time, it's considerably harder.
  • Social networks have changed all that. Facebook and Twitter now wield enormous power over the web by giving their members ways to find and share information using tools that work in a social context.
  • Either way, your social network presence is more important than your own website.
  • But increasingly that freedom is just the freedom to be ignored, the freedom to starve.
  • es, that's nearly 34,000 new Facebook apps created in one day by customers of just one hosting company.
  • What Facebook is doing is very different. When it records our activity away from the Facebook site it's a third party to the deal. It doesn't need this data to run its own services.
  • orst o
  • all, the way Facebook collects and uses our data is both unpredictable and opaque. Its technology and policies move so quickly you'd need to be a technical and legal specialist and spend an inordinate amount of time researching Facebook's activities on an ongoing basis to have any hope of understanding what they're doing with your data.
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • once a request has been deemed valid, Google will notify users when possible.
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Maj Krek

Kill the Internet-and Other Anti-SOPA Myths | The Nation - 0 views

  • in the wake of protests by dozens of websites and large numbers of their users, as well as a virtually unanimous chorus of criticism from leading progressive voices and outlets, including Michael Moore, Cenk Uygur, Keith Olbermann, Alternet, Daily Kos, MoveOn and many people associated with Occupy Wall Street. Judging by the fervor of the anti-SOPA/PIPA protests, a casual observer might think the advocates of the anti-piracy bills were in the same moral league as the torturers at Abu Ghraib.
  • But before we celebrate this “populist” victory, it’s worth remembering that the defeat of SOPA and PIPA was also a victory for the enormously powerful tech industry, which almost always beats the far smaller creative businesses in legislative disputes. (Google alone generated more than $37 billion in 2011, more than double the revenue of all record companies, major and indie combined.)
  • One example of anti-SOPA rhetorical over-reach was a tendency by some to invent sinister motives for the sponsors. On his usually brilliant show The Young Turks, Uygur said that SOPA’s sponsors were “pushing for a monopoly for the MPAA and to kill their competition on the Internet.” This is untrue. They wanted to kill those entities that steal their movies and make money off them, either directly or indirectly. There really is a difference
  • ...8 more annotations...
  • that stopped allowing children to put up their own drawings of characters like Mickey Mouse because of fear of copyright lawsuits. Examples such as this, or of a theoretical risk of parents being charged for the right to have kids sing “Happy Birthday”, are demagogic. The underlying issue is scale. There is a profound moral difference between loaning a friend a book and posting, without permission, the content of bestsellers for commercial gain—and people and legislators ought to take that distinction into account.
  • since iTunes and Amazon and are surviving, Napster’s original model was legally killed and Kim Dotcom was apprehended, no new laws are needed. The status quo may be what we end up with, but that doesn’t make it inevitable or right. Human beings have created the piracy problem and although, like any kind of crime, society can’t eliminate it entirely, we can decide whether or not to seriously try.  
  • What is good for Google and Facebook is not always going to be what’s best for the 99 percent. (And of course Microsoft and Apple et al. are extremely aggressive when it comes to protecting their intellectual property rights).
  • on the content of some of the Kool-Aid that has recently been served and help swing the pendulum back, if only a little, in a direction in which intellectual property can be nourished. Otherwise, we will be complicit in accelerating the trend of the last decade, in which those who write code get richly rewarded, while those who write the music, poetry, drama and journalism that are being encoded have to get day jobs.
  • To be sure, the legislators who crafted the ill-fated bills and the film industry lobbyists who supported them have little to be proud of.
  • In a widely viewed anti-SOPA/PIPA speech on Ted.com, Internet philosopher Clay Shirky similarly attributed dark motives to the studios. The targets are not Google and Yahoo
  • If he means a friend sharing Marianne Faithfull’s version of “Visions of Johanna” with me on Facebook, then the accusation is absurd.
  • ek in his 25,000-square-foot compound surrounded by a fleet of Merced
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Neža Zidanič

Why doesn't everyone 'social media stalk' a potential date? - Telegraph - 0 views

  • A new study has found that two thirds of single people ‘social media stalk’ before agreeing to go a date.
  • There have also been countless accounts in recent years of people not being able to even get a job because of a negative online identity prejudicing the interviewer.
  • as digital communication can be easily misconstrued
  • ...7 more annotations...
  • Brilliantly the study also broke down what specific things during a good old social media stalk could break a date: an ugly mug shot, lack of humour, aggressive online behaviour, excessive flirting with others online and, my favourite one, oversharing
  • However, this light-hearted poll provides further proof of how we are increasingly judged every single day by our online personas.
  • Of those honest souls, 77 per cent claimed they had turned down a date as a result of something they found out about the said babe or hunk through social media.
  • However, while it’s important for both professional and increasingly personal reasons to be conscientious about what you post online, we do also need to remember that societal attitudes are still playing catch-up with the web.
  • All it takes is for one negative comment, or silly photo to be shared by someone else, and then a digital identity can be marred – giving a falsely negative impression of somebody.
  • The web can be unforgiving and is often out of our control.
  • he internet can do many things – but it simply cannot tell you whether you will get those unexplainable stomach butterflies when you meet your date in person.
nikasvajncer

Addicted! Scientists show how internet dependency alters the human brain - Science - Ne... - 0 views

  • Internet addiction
  • changes in the brain similar to those seen in people addicted to alcohol, cocaine and cannabis.
  • We are doing it because modern life requires us to link up over the net in regard to jobs, professional and social connections – but not in an obsessive way.
  • ...9 more annotations...
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations. I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game."
  • spent many hours on the internet,
  • you know they have a problem
  • "The limitations [of this study] are that it is not controlled, and it's possible that illicit drugs, alcohol or other caffeine-based stimulants might account for the changes. The specificity of 'internet addiction disorder' is also questionable."
  • emotional processing, attention, decision making and cognitive control.
  • "internet addiction disorder"
  • In a groundbreaking study, researchers used MRI scanners to reveal abnormalities in the brains of adolescents who spent many hours on the internet, to the detriment of their social and personal lives.
  • An estimated 5 to 10 per cent of internet users are thought to be addicted – meaning they are unable to control their use.
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations.
1 - 20 of 25 Next ›
Showing 20 items per page