Wednesday, August 02, 2006

Another freebie!

Free Movies, Documentaries, Cartoons, Music & Comedy

100% handpicked content chosen to inform, educate, shock and entertain you.

One way or another, the machines will know you...

UCSD Biometric Vending Machine

Posted by ScuttleMonkey on Tuesday August 01, @06:19PM from the tracking-your-soda-habits dept.

dice writes to tell us that grad students at the University of California, San Diego (UCSD) are creating the first biometric vending machine. The current machine comes equipped with a barcode scanner, a fingerprint reader, and a web cam for facial recognition. One student dubbed it the "most over-designed soda machine in the world." The project, code-named "SodaVision" is the brainchild of associate professor Stefan Savage, but it was the students who really made it come to life. And yes, it runs Linux.

2006/08/01 20:11 KST

Personal data of over 95,000 S. Koreans leaked via Google

SEOUL, Aug. 1 (Yonhap) -- The personal data of around 95,000 South Koreans remains vulnerable to abuse and misuse at Google Inc., the world's largest online search engine, the Information Ministry said Tuesday.

According to the ministry, which conducted the screening for a week from July 24, the citizen registration numbers of 95,219 people were found to have been compromised on Google's database.

The registration number is one of the most important pieces of identification data, as it can confirm a person's birth date, gender and place of birth.

The ministry said that it will ask for Google to remove the personal data immediately.

The move comes amid rising concern that personal information is not well protected in cyberspace in South Korea, which boasts the world's highest Internet penetration rate.

The ministry said that it screened Google's database and confirmed that those in their 20s were most vulnerable to having their information misused.

The age group accounted for 29.7 percent of the confirmed cases, followed by those in their 30s and 40s, and teenagers, the ministry said.

Bluetooth Security

by Colleen Rhodes on 01/08/06

In the past, the only way to connect computers together for the purpose of sharing information and/or resources was to connect them via cables. This can be not only cumbersome to set up, but it can get messy real quick. Bluetooth provides a solution to this problem by providing a cable-free environment. According to the official Bluetooth website,, Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/ore fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other.

... This document is in PDF format. To view it click here.

Tools & Techniques

Privacy-protected web search with Ixquick

Posted on Monday, July 31st, 2006 at 10:21 pm

In response to growing concerns over search engine privacy, the metasearch engine Ixquick has announced it will permanently delete all personal search details gleaned from its users from their log files.

Think of it as an “Is our e-business being screwed” test.

Researcher creates net neutrality test

Software can tell if computers are treating some types of TCP/IP traffic better than others

By Robert McMillan, IDG News Service August 02, 2006

A Seattle-based security researcher has devised a way to test for net neutrality. Dan Kaminsky will share details of this technique, which will eventually be rolled into a free software tool, on Wednesday at the Black Hat USA security conference in Las Vegas. The software can tell if computers are treating some types of TCP/IP traffic better than others -- dropping data that is being used in VOIP (voiceover Internet Protocol) calls, or treating encrypted data as second class, for example.

If I read this right, it will also be a way to identify commercial software/documents and filter them from all the data captured as part of e-discovery...,1558,1997512,00.asp?kc=ETRSS02129TX1K0000532

Update: Altnet Collecting 'File Fingerprints' In Anti-Piracy Database

August 1, 2006 By Mark Hachman

Altnet, a peer-to-peer distributor of licensed content, is expected to announce on Wednesday a global database of "unique identifiers" designed to help bust piracy.

The "Global File Registry" will contain a list of unique identifiers, a sort of digital fingerprint, that the company will apparently make open to others hoping to look for an autmoated way to detect copyrighted files. The tool will even allow content owners to disconnect specific users of GFR-subscribed peer-to-peer networks without input from either the user or the network.

August 01, 2006

GPO New Electronic Titles Now Available for July 2006

New Electronic Titles (NET) are now available for July 2006. These files are accessible from the New Titles section of the Catalog of U.S. Government Publications (CGP).

This is worth a look. I can see lots of uses for governments.

August 01, 2006

San Diego County Regional Crime MAPS Online

To look for incidents, "use this select a jurisdiction (city, unincorporated area in the county, neighborhood, or political district) and a location of interest. The location can be a school, hospital, ZIP code, tourist attraction, major shopping center, neighborhood, address, or intersection."

You might need to wait for the rush to end...

Free book: The Easiest Linux Guide You’ll Ever Read

jrepin submitted by jrepin 1 day 5 hours ago (via

The author Scott Morris says: "After several months of writing and revising, I have made available the Easiest Linux Guide You ’ll Ever Read. It is a book geared towards people who are competent with using Windows, who have never attempted to use Linux but are interested in giving it a try."

No comments: