Skip to main content

Home/ ITGS-SIS/ Group items tagged internet

Rss Feed Group items tagged

dec_burke

Robbins v. Lower Merion School District - Wikipedia, the free encyclopedia - 4 views

  • Covert surveillance capability
  •  
    Covert surveillance capability The school loaded each student's computer with LANrev's remote activation and tracking software. This included the now-discontinued "TheftTrack".[17][25][26][27] While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to enable whichever of TheftTrack's surveillance options the school desired.[8] The school elected to enable TheftTrack to allow school district employees to secretly and remotely activate a tiny camera webcam embedded in the student's laptop, above the laptop's screen.[17][25][26][27] That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server.[8][17] The system snapped and sent a new photo every 15 minutes when the laptop was on, and TheftTrack was activated, though school employees could adjust the timeframe to as low as one-minute intervals.[8][28][29] LANrev disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed that their webcams did not work at all.[30] In addition, TheftTrack allowed school officials to take screenshots (pictures of whatever was on the laptop's screen), and send them to the school's server.[8][17] Furthermore, a locating device would record the laptop's Internet (IP) address, enabling district technicians to discover which city the laptop was located and its internet service provider. (A subpoena to the provider would be required to pinpoint the exact location.) [29] In addition, LANrev allowed school officials to take snapshots of instant messages, web browsing, music playlists, and written compositions.[17][31] After sending the image to the school's server, the laptop was programmed to erase the "sent" file created on the laptop. That way, there would not be any trace by which students might realize that they were being watche
dec_burke

Geolocation software - Wikipedia, the free encyclopedia - 0 views

  • Internet movie vendors, online broadcasters who serve live streaming video of sporting events, or certain TV and music video sites that are licensed to broadcast their videos of episodes/music videos are permitted to serve viewers only in their licensed territories. By geolocating viewers, they can be certain of obeying licensing regulations.[16] Online casinos must also know where their customers are or risk violating national laws against Internet gambling. Jim Ramo, chief executive of movie distributor Movielink, said studios were aware of the shortcomings going in and have grown more confident now that the system has been shown to work.[17]
Conan Cheng

Ways to Watch BBC iPlayer Abroad - 1 views

  • iPlayer service by checking the physical location of the Internet provider you are using to connect to the Net
    • dec_burke
       
      How does this work? What are the technical terms. (CT)
    • ChunTing Yip
       
      The iPlayer service is able to detect you're IP address or ISP through your network and track down your location. As every area has a different IP, it would be easy to locate. There are IP locaters that allow systems to track physical locations around the world.  Unless you use a proxy server, it would be harder to track down your physical location, as it has no direct route back to your computer.
  • f you've got access to a PC back in the United Kingdom you can make a virtual private network tunnel back to that PC and connect to the iPlayer web site thru that PC, this can cause it to look like you are in the United Kingdom.
    • dec_burke
       
      How does this work? Use some technical terms to describe. (WK)
  • Firstly should you pick substitute or VPN options,
    • dec_burke
       
      What is substitute? What is VPN? Use technical terms. (Conan)
    • Conan Cheng
       
      A VPN is a private network that uses a public network to connect remote sites or users together. A key feature of a VPN is its ability to work over both private networks as well as public networks like the Internet. 
    • Conan Cheng
       
      TOR and Foxyproxy are examples of alternatives for VPN. TOR(The Onion Router), is an online anonymity system keeping user's internet activities from being monitored. Foxyproxy is a a firefox plugin that allows you to add proxies, keeping your ip hidden when you use it. 
  • ...1 more annotation...
  • so it is reallly a bargain for those among us who need to watch iPlayer abroad!
    • dec_burke
       
      Who are the stakeholders and how are they affected by this technology? (WL)
    • jawwanling
       
      The stakeholders would be the users of BBC iPlayer. Though they are users of BBC iPlayer, but they only can watch the TV at restricted areas. If they want to have access to BBC abroad they would have to search through the internet for TOR or Foxyproxy to provide them with a VPN. This may cause BBC iPlayer to slow down as there are many free users who are using the website too, therefore users of BBC iPlayer may not be able to watch the TV consistently.
dec_burke

The Hindu : Sci-Tech / Internet : Google CEO on online privacy: Change your name - 0 views

  • I don’t believe society understands what happens when everything is available, knowable and recorded by everyone all the time,” he told the paper.
  •  
    I don't believe society understands what happens when everything is available, knowable and recorded by everyone all the time
dec_burke

BBC - BBC Internet Blog: iPlayer Doesn't Require A TV Licence... Yet - 1 views

  • At the moment, the legal position is that you don't need a licence to watch TV purely on-demand, but you do if you are watching TV live (through any receiving device in the home).
Conan Cheng

Hackers release vast amounts of US police information - Telegraph - 0 views

  •  
    Hackers release vast amounts of US police information.
dec_burke

US credit cards outdated, less useful abroad, as 'chip and PIN' cards catch on - 1 views

  • Smart card transactions can be quicker, because the terminal and card communicate with each other -- the terminal verifying that the card is authentic and vice versa -- instead of the terminal having to communicate via Internet or wireless with the card issuer to verify that the card is real and hasn't been reported lost or stolen, says Randy Vanderhoof, executive director of the Smart Card Alliance, a nonprofit organization that works to promote the adoption of smart card technology.
  • Also, when a card leaves the cardholder's physical presence, it can be compromised, using a hand-held information-stealing device called a skimmer,
  • in which information is encoded into a magnetic stripe on the back of the card, and the newer so-called smart cards, which contain a computer chip that holds information.
  • ...1 more annotation...
  • So-called card cloning also can be easier with magnetic stripe cards. Vanderhoof says: "With chip-and-PIN, it's nearly impossible to create a fake card."   
1 - 16 of 16
Showing 20 items per page