Another freebie!
http://www.jonhs.net/freemovies/
Free Movies, Documentaries, Cartoons, Music & Comedy
100% handpicked content chosen to inform, educate, shock and entertain you.
One way or another, the machines will know you...
http://hardware.slashdot.org/article.pl?sid=06/08/01/2124246&from=rss
UCSD Biometric Vending Machine
Posted by ScuttleMonkey on Tuesday August 01, @06:19PM from the tracking-your-soda-habits dept.
dice writes to tell us that grad students at the University of California, San Diego (UCSD) are creating the first biometric vending machine. The current machine comes equipped with a barcode scanner, a fingerprint reader, and a web cam for facial recognition. One student dubbed it the "most over-designed soda machine in the world." The project, code-named "SodaVision" is the brainchild of associate professor Stefan Savage, but it was the students who really made it come to life. And yes, it runs Linux.
http://english.yna.co.kr/Engnews/20060801/660000000020060801201147E2.html
2006/08/01 20:11 KST
Personal data of over 95,000 S. Koreans leaked via Google
SEOUL, Aug. 1 (Yonhap) -- The personal data of around 95,000 South Koreans remains vulnerable to abuse and misuse at Google Inc., the world's largest online search engine, the Information Ministry said Tuesday.
According to the ministry, which conducted the screening for a week from July 24, the citizen registration numbers of 95,219 people were found to have been compromised on Google's database.
The registration number is one of the most important pieces of identification data, as it can confirm a person's birth date, gender and place of birth.
The ministry said that it will ask for Google to remove the personal data immediately.
The move comes amid rising concern that personal information is not well protected in cyberspace in South Korea, which boasts the world's highest Internet penetration rate.
The ministry said that it screened Google's database and confirmed that those in their 20s were most vulnerable to having their information misused.
The age group accounted for 29.7 percent of the confirmed cases, followed by those in their 30s and 40s, and teenagers, the ministry said.
http://www.infosecwriters.com/texts.php?op=display&id=483
Bluetooth Security
by Colleen Rhodes on 01/08/06
In the past, the only way to connect computers together for the purpose of sharing information and/or resources was to connect them via cables. This can be not only cumbersome to set up, but it can get messy real quick. Bluetooth provides a solution to this problem by providing a cable-free environment. According to the official Bluetooth website, www.bluetooth.com, Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/ore fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other.
... This document is in PDF format. To view it click here.
Tools & Techniques
http://michaelzimmer.org/2006/07/31/privacy-protected-web-search-with-ixquick/
Privacy-protected web search with Ixquick
Posted on Monday, July 31st, 2006 at 10:21 pm
In response to growing concerns over search engine privacy, the metasearch engine Ixquick has announced it will permanently delete all personal search details gleaned from its users from their log files.
Think of it as an “Is our e-business being screwed” test.
Researcher creates net neutrality test
Software can tell if computers are treating some types of TCP/IP traffic better than others
By Robert McMillan, IDG News Service August 02, 2006
A Seattle-based security researcher has devised a way to test for net neutrality. Dan Kaminsky will share details of this technique, which will eventually be rolled into a free software tool, on Wednesday at the Black Hat USA security conference in Las Vegas. The software can tell if computers are treating some types of TCP/IP traffic better than others -- dropping data that is being used in VOIP (voiceover Internet Protocol) calls, or treating encrypted data as second class, for example.
If I read this right, it will also be a way to identify commercial software/documents and filter them from all the data captured as part of e-discovery...
http://www.extremetech.com/article2/0,1558,1997512,00.asp?kc=ETRSS02129TX1K0000532
Update: Altnet Collecting 'File Fingerprints' In Anti-Piracy Database
August 1, 2006 By Mark Hachman
Altnet, a peer-to-peer distributor of licensed content, is expected to announce on Wednesday a global database of "unique identifiers" designed to help bust piracy.
The "Global File Registry" will contain a list of unique identifiers, a sort of digital fingerprint, that the company will apparently make open to others hoping to look for an autmoated way to detect copyrighted files. The tool will even allow content owners to disconnect specific users of GFR-subscribed peer-to-peer networks without input from either the user or the network.
http://www.bespacific.com/mt/archives/012002.html
August 01, 2006
GPO New Electronic Titles Now Available for July 2006
New Electronic Titles (NET) are now available for July 2006. These files are accessible from the New Titles section of the Catalog of U.S. Government Publications (CGP).
This is worth a look. I can see lots of uses for governments.
http://www.bespacific.com/mt/archives/012003.html
August 01, 2006
San Diego County Regional Crime MAPS Online
To look for incidents, "use this screen...to select a jurisdiction (city, unincorporated area in the county, neighborhood, or political district) and a location of interest. The location can be a school, hospital, ZIP code, tourist attraction, major shopping center, neighborhood, address, or intersection."
You might need to wait for the rush to end...
http://digg.com/linux_unix/Free_book_The_Easiest_Linux_Guide_You_ll_Ever_Read
Free book: The Easiest Linux Guide You’ll Ever Read
jrepin submitted by jrepin 1 day 5 hours ago (via http://www.suseblog.com/?p=141)
The author Scott Morris says: "After several months of writing and revising, I have made available the Easiest Linux Guide You ’ll Ever Read. It is a book geared towards people who are competent with using Windows, who have never attempted to use Linux but are interested in giving it a try."
No comments:
Post a Comment