Tuesday, June 16, 2009

Asymmetric revolution? The lessons learned in Estonia.

http://www.wired.com/dangerroom/2009/06/activists-launch-hack-attacks-on-tehran-regime/

Activists Launch Hack Attacks on Tehran Regime

By Noah Shachtman Email Author June 15, 2009 11:07 am

While demonstrators gather in the streets to contest Iran’s rigged election, online backers of the so-called “Green Revolution” are looking to strike back at the Tehran regime — by attacking the government’s websites.

Pro-democracy activists on the web are asking supporters to use relatively simple hacking tools to flood the regime’s propaganda sites with junk traffic. “NOTE to HACKERS - attack www.farhang.gov.ir - pls try to hack all iran gov wesites [sic]. very difficult for us,” Tweets one activist. The impact of these distributed denial of service (DDOS) attacks isn’t clear. But official online outlets like leader.ir, ahmadinejad.ir, and iribnews.ir are currently inaccessible. “There are calls to use an even more sophisticated tool called BWraep, which seems to exhaust the target website out of bandwidth by creating bogus requests for serving images,” notes Open Society Institute fellow Evgeny Morozov.


Related

http://www.wired.com/threatlevel/2009/06/iran_numbers/

Crunching Iranian Election Numbers For Evidence of Fraud

By Kim Zetter Email Author June 15, 2009 3:59 pm

… Despite the fact that Iran uses paper ballots nationwide that have to be counted by hand, only two hours after the polls closed the state-run news agency was already claiming that Ahmadinejad won 69 percent of the vote to Moussavi’s 28 percent.

The speed with which the results were certified and the wide margin of victory, coupled with some statistical anomalies, have led many to believe the vote was rigged.

Experts say the results are suspicious but not conclusive.



Computer Law figure 20 years for the technology to spread then add another 20 for the courts to understand how people use technology. The timing on these rulings sound about right.

http://torrentfreak.com/court-rules-that-ip-address-alone-insufficient-to-identify-infringer-090615/

IP Address Alone Insufficient To Identify Pirate, Court Rules

Written by enigmax on June 15, 2009

… Although anyone with a basic knowledge of the Internet could come to the same conclusion given 30 seconds in a quiet room, the Tribunale Ordinario di Roma has now ruled that an IP address alone does not identify an infringer. According to a Punto Informatico report, on this basis the court kicked out a complaint against an individual accused of copyright infringement.

The District Attorney and judge said that the mere ownership of a connection from where an infringement took place is not sufficient to establish the identity of an infringer or liability of a defendant, especially since other people could have committed the alleged infringement.


Related. WWND (What Would Napoleon Do?)

http://www.foxnews.com/story/0,2933,525993,00.html

Top French Court Declares Internet Access 'Basic Human Right'

Friday, June 12, 2009

The Constitutional Council declared access to the internet to be a basic human right, directly opposing the key points of Mr Sarkozy's law, passed in April, which created the first internet police agency in the democratic world



A very impressive collection of free and paid Excel templates and add-ins. Great for heavy users and may even come in handy when I teach Spreadsheets.

http://www.makeuseof.com/dir/vertex42-download-free-excel-templates/

Vertex42: Download Free Excel Templates, Calculators & Calendars

… The site has variety of free calculators, calenders and excel templates such as timesheets, budgets, dashboard reports, games and more for personal use.

www.vertex42.com

Similar websites: DocStoc and some other in earlier published article about websites offering free document templates.



Many sites like this are coming online. Quality (and quantity) varies greatly but that will change over time. Right now, you have to hunt for good videos.

http://www.makeuseof.com/dir/lectr-educational-video-sharing/

Lectr: Educational Video Sharing Website

Lectr.com is a new educational video sharing site that focuses primarily on educational content. It provides videos of lectures given by various teachers and professors on a variety of topics and subjects that could prove helpful for college students.

www.lectr.com

Similar website: AcademicEarth and MBAvid.



Of course I'll warn my students not to hack. Specifically they shouldn't:

http://www.makeuseof.com/tag/how-to-strip-mobi-and-prc-ebooks-of-encryption/

How To Strip MOBI and PRC eBooks Of Encryption

Jun. 16th, 2009 By Simon Slangen


...and they should never, ever:

http://it.slashdot.org/story/09/06/16/0017221/Hackers-Find-Remote-iPhone-Crack?from=rss

Hackers Find Remote iPhone Crack

Posted by kdawson on Tuesday June 16, @08:13AM from the jailbreaking-via-mortar dept. security cellphones apple

Al writes

"Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas."

The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.



Everything you expect from weird Al (unfortunately)

http://news.cnet.com/8301-13577_3-10265362-36.html?part=rss&subj=news&tag=2547-1_3-0-5

Weird Al takes on Craigslist, the Doors

by Caroline McCarthy June 16, 2009 5:55 AM PDT

No comments: