Skip to main content

Home/ Internetni praktikum/ Group items tagged code

Rss Feed Group items tagged

Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
Gabrijela Vrbnjak

Brain-to-brain interface lets rats share information via internet | Science | The Guardian - 0 views

  • News Science Neuroscience Brain-to-brain interface lets rats share information via internet Rats thousands of miles apart collaborate on simple tasks with their brains connected through the internet Share 9893 inShare61 Email Ian Sample, science correspondent The Guardian, Friday 1 March 2013 jQ(document).ready(function(){ jQ.ajax({ url : 'http://resource.guim.co.uk/global/static/file/discussion/5/fill-comment-counts-swimlaned.js', dataType : 'script', type : 'get', crossDomain : true, cache: true }); }); Jump to comments (449) A rat with a brain-to-brain implant responds to a light (circled) by pressing a lever. Its motor cortex was connected to that of another rat. Photograph: Scientific Reports Scientists have connected the brains of a pair of animals and allowed them to share sensory information
  • US team fitted two rats with devices called brain-to-brain interfaces that let the animals collaborate on simple tasks to earn rewards
  • experiments showed that we have established a sophisticated, direct communication linkage between brains
  • ...10 more annotations...
  • In one radical demonstration of the technology, the scientists used the internet to link the brains of two rats separated
  • If the receiving rat failed at the task, the first rat was not rewarded with a drink, and appeared to change its behaviour to make the task easier for its partner.
  • an organic computer
  • we are creating
  • Even though the animals were on different continents
  • they could still communicate
  • we could create a workable network of animal brains distributed in many different locations
  • you could imagine that a combination of brains could provide solutions that individual brains cannot achieve by themselves
  • the work was "very important" in helping to understand how brains encode information
  • Very little is known about how thoughts are encoded and how they might be transmitted into another person's brain – so that is not a realistic prospect any time soon
Jan Majdič

Boot up: China's Android worry, Microsoft's new browser fine, PC decline forecast and m... - 1 views

  • is strictly controlled by Google."
  • to allow European users of its Windows operating system to choose among competing browsers, according to a Reuters report citing three anonymous sources.
  • A recently discovered flaw in the HTML 5 coding language could allow websites to bombard users with gigabytes of junk data, with a number of popular browsers being open to the vulnerability
Maj Krek

Kill the Internet-and Other Anti-SOPA Myths | The Nation - 0 views

  • in the wake of protests by dozens of websites and large numbers of their users, as well as a virtually unanimous chorus of criticism from leading progressive voices and outlets, including Michael Moore, Cenk Uygur, Keith Olbermann, Alternet, Daily Kos, MoveOn and many people associated with Occupy Wall Street. Judging by the fervor of the anti-SOPA/PIPA protests, a casual observer might think the advocates of the anti-piracy bills were in the same moral league as the torturers at Abu Ghraib.
  • But before we celebrate this “populist” victory, it’s worth remembering that the defeat of SOPA and PIPA was also a victory for the enormously powerful tech industry, which almost always beats the far smaller creative businesses in legislative disputes. (Google alone generated more than $37 billion in 2011, more than double the revenue of all record companies, major and indie combined.)
  • One example of anti-SOPA rhetorical over-reach was a tendency by some to invent sinister motives for the sponsors. On his usually brilliant show The Young Turks, Uygur said that SOPA’s sponsors were “pushing for a monopoly for the MPAA and to kill their competition on the Internet.” This is untrue. They wanted to kill those entities that steal their movies and make money off them, either directly or indirectly. There really is a difference
  • ...8 more annotations...
  • that stopped allowing children to put up their own drawings of characters like Mickey Mouse because of fear of copyright lawsuits. Examples such as this, or of a theoretical risk of parents being charged for the right to have kids sing “Happy Birthday”, are demagogic. The underlying issue is scale. There is a profound moral difference between loaning a friend a book and posting, without permission, the content of bestsellers for commercial gain—and people and legislators ought to take that distinction into account.
  • since iTunes and Amazon and are surviving, Napster’s original model was legally killed and Kim Dotcom was apprehended, no new laws are needed. The status quo may be what we end up with, but that doesn’t make it inevitable or right. Human beings have created the piracy problem and although, like any kind of crime, society can’t eliminate it entirely, we can decide whether or not to seriously try.  
  • What is good for Google and Facebook is not always going to be what’s best for the 99 percent. (And of course Microsoft and Apple et al. are extremely aggressive when it comes to protecting their intellectual property rights).
  • on the content of some of the Kool-Aid that has recently been served and help swing the pendulum back, if only a little, in a direction in which intellectual property can be nourished. Otherwise, we will be complicit in accelerating the trend of the last decade, in which those who write code get richly rewarded, while those who write the music, poetry, drama and journalism that are being encoded have to get day jobs.
  • To be sure, the legislators who crafted the ill-fated bills and the film industry lobbyists who supported them have little to be proud of.
  • In a widely viewed anti-SOPA/PIPA speech on Ted.com, Internet philosopher Clay Shirky similarly attributed dark motives to the studios. The targets are not Google and Yahoo
  • If he means a friend sharing Marianne Faithfull’s version of “Visions of Johanna” with me on Facebook, then the accusation is absurd.
  • ek in his 25,000-square-foot compound surrounded by a fleet of Merced
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • as a way of consolidating their strictly neoliberal economic policy.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Janja Petek

Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views

  • The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
  • he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
  • highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet. 
  • ...6 more annotations...
  • xpanding the Internet into developing nations.
  • Many countries will come to reaffirm their desire to see freedom of expression embedded in this conference,
  • The gathering is also powerless to force nations to change their Internet policies, such as China's notorious "Great Firewall" and widespread blackouts of political opposition sites in places including Iran and the Gulf Arab states.
  • That opens the door ... to content censorship
  • t is clear that some governments have an interest in changing the rules and regulations of the Internet,"
  • Over the decades, it has expanded to include telephone, satellite and other advances in communications.
anonymous

Small Business Cloud Apps That Make Work Easier | Inc.com - 0 views

  • Protect yourself against data loss, security blunders, and--that real productivity killer--inefficiency.
  • For small businesses, cloud storage is affordable and frees you up from maintaining expensive physical servers that need upkeep. And it also makes accessing, updating, and sharing files—usually from any device—simple and fast.
  • And unlike Dropbox or SugarSync that back up only the files you tell them to, Code 42's CrashPlan software automatically backs up everything on your hard drive—as much as once a minute—and encrypts it all before it leaves your computer. It also lets you back up to other computers and attached external hard drives as well as access, update, and share your files from mobile devices.
  • ...4 more annotations...
  • Another useful feature is that CrashPlan keeps copies of all versions of your files and even those you have deleted.  This means, for example, that you can go back and retrieve a version of a PowerPoint presentation you were using last year if you decide you liked it better than a more recent one.  And if you've ever accidentally deleted or lost a file you know how aggravating and time-consuming it is to recreate it. That's not a worry with CrashPlan.
  • Many cloud storage services claim to offer online collaboration features but Mindjet Connect is different because helping people get work done together regardless of their locations is its forte, not some add-on function.
  • Huddle Sync, Huddle's enterprise file synchronization platform, is different from consumer sync tools because it was built to meet enterprise security and compliance requirements and uses learning algorithms and predictive technology to fully sync only certain files. Not only that but it keeps track of where company data is stored and who has synced what files, as well as provides full audit trails for every single file.
  • Huddle Sync is currently in private beta but you can register at the site if you want to try it out.
Jan Keček

Microsoft fined €561m for 'browser choice' error | Technology | guardian.co.uk - 0 views

  • Microsoft has been fined €561m by the European commission for failing to give users a choice of web browser when they logged into Windows computers in Europe between May 2011 and July 2012 – breaking a binding commitment it had made in 2009.
  • Microsoft made a five-year commitment in 2009 to offer users a choice of different browsers, after the EC's competition commission determined that the combination of its dominance on the desktop – where Windows runs around 95% of machines – gave the pre-installed Internet Explorer browser an unfair advantage over rivals
  • The commission implemented the "browser choice" system to create a level playing field - and said that once in use, it was very effective: "The choice screen was very successful with users," Joaquín Almunia, the competition commissioner, said in a statement. "For example, until November 2010, 84 million browsers were downloaded through it."
  • ...3 more annotations...
  • Microsoft said it took "full responsibility" for the technical error that caused the problem and that it had apologised for it.
  • "We provided the commission with a complete and candid assessment of the situation, and we have taken steps to strengthen our software development and other processes to help avoid this mistake – or anything similar – in the future."
  • ource close to Microsoft explained: "It was a single line in the code that triggered the browser choice program. It had a list of versions of Windows to test against: if the version was found in that list, the program would run. They didn't include Service Pack 1, which is effectively a different version of Windows, in that list. And so the program didn't run.
alja polajžer

BBC News - Google cookies 'bypassed Safari privacy protection' - 0 views

  • Google cookies 'bypassed Safari privacy protection'
  • The Wall Street Journal said Google and other companies had worked around privacy settings designed to restrict cookies
  • Cookies are small text files stored by browsers which can record information about online activity, and help some online services work
  • ...8 more annotations...
  • The Safari browser is produced by Apple, and is the browser used by the iPhone.
  • y default Safari only allows cookies to be stored by the web page a user is visiting, not from third parties such as advertisers
  • esearcher Jonathan Mayer found that advertisers were still able to store cookies on the computers of internet users browsing with Safari.
  • We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it”
  • The Wall Street Journal reported that Google "disabled the code after being contacted by the paper".
  • Online privacy advocates were highly critical of Google's actions.
  • The Electronic Frontier Foundation wrote: "It's time for Google to acknowledge that it can do a better job of respecting the privacy of web users."
  • An Apple spokesman said in a statement: "We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it."
1 - 11 of 11
Showing 20 items per page