Google Hands Out Web Security Scanner
Posted by Soulskill on Sunday March 21, @10:36AM
An anonymous reader writes
"Apparently feeling generous this week, Google has released for free another of their internally developed tools: this time, a nifty web security scanner dubbed skipfish. A vendor-sponsored study cited by InformationWeek discovered that 90% of all web applications are vulnerable to security attacks. Are Google's security people trying to change this?"
For my Network Security students. The video shows what you can learn from network logs.
Machine Hunt: User Forensics at Salt Lake Community College
[The video: http://www.etelemetry.com/resources/demos/demo_locate2.aspx
If I send records out of a HIPAA protected environment, are there penalties?
Medical Professionals Aren't Leaping For E-Medicine
Posted by timothy on Sunday March 21, @06:40PM
theodp writes
"Despite all the stimulus money being directed toward developing electronic medical records, surprisingly few doctors, hospitals and insurers are using Google Health and other sites like it. One reason, Newsweek suggests, may be that Web-based personal-health records like the ones being compiled on Google Health don't appear to be covered under HIPAA, which requires that health care providers and health plans protect patient confidentiality. 'We don't connect that information to other aspects of Google,' explains Dr. Roni Zeiger, product manager for Google Health. Still, the federal government is in the process of drafting privacy recommendations that would apply to Google Health, as well as the makers of consumer apps that perform tasks like monitoring blood pressure."
Another fun one to watch. Not bad enough they can't figure out a viable business model, they can't even develop a consistent strategy for the one they have.
Dueling Summary Judgment Motions In Viacom v. YouTube
Posted by timothy on Monday March 22, @05:27AM
I Don't Believe in Imaginary Property writes
"Eric Goldman, an Associate Professor of Law at Santa Clara University School of Law, has an excellent analysis of the dueling summary judgment motions in Viacom v. YouTube. Basically, both sides have been trotting out the most damning things they can find and asking the judge to rule against the other party. Viacom is mad that Chad Hurley, one of YouTube's co-founders, lost his email archive and couldn't remember some old emails. Worse, YouTube founder Karim once uploaded infringing content. But then Google points out that only a very small percentage of the users are engaged in infringing activity (some 0.016% of all YouTube accounts have been deleted for infringement), one of the clips Viacom is suing over is only one second long (what about fair use?), and most of YouTube's content is non-infringing, including the campaign videos which all major US presidential candidates posted to YouTube."
"But the worst thing they found is that Viacom can't make up their mind. They spent $1M advertising on YouTube and tried to buy it. And even though they demanded that YouTube remove videos containing Viacom property on sight, Viacom had a complex internal policy authorizing some clips, including ones disguised as 'leaks' and put out by their marketers. Viacom was so conflicted internally that their very expensive lawyers couldn't figure out what Viacom had authorized to be uploaded even after doing extensive research as required by court rules, only to discover that some of the clips Viacom was suing over were ones Viacom uploaded themselves. The lawyers then had to go to court and drop those clips from their case — twice. They missed some the first time."
Not something I use much in my Math classes, but it has potential.
http://www.makeuseof.com/dir/preceden-make-a-timeline-online
Preceden: Make A Timeline Online & Share
Similar tools: TimeToast, Circavi, Timetube and TimeRime.
April First is fast approaching! NOTE: Still feel your password is adequate protection?
http://www.makeuseof.com/tag/konboot-computer-prank-passwordbypass-tool/
KON-BOOT – A Computer Prank Password-Bypass Tool
by Mike Fagan on Mar. 21st, 2010
Pranks are fun and rewarding.
… But getting onto someone’s computer when they are not around can be a tall task. Most people have passwords on their machines, thwarting any would-be pranksters.
Well, this problem can be solved with a small tool called KON-BOOT. Rather than cracking a Windows password, KON-BOOT bypasses it and lets you into the computer without typing one in. Then, when you restart, everything is back to normal, that is, everything you didn’t change for the computer prank.
… To get KON-BOOT, go to their website here.
Now this could be useful. I'll have to work up some generalized process... (If you didn't think XKCD's author was a geek, this might come as a shock.)
http://venturebeat.com/2010/03/19/data-mining-google-xkcd/
Now you can data mine with Google queries too
March 19, 2010 | Kim-Mai Cutler
Geek comic artist Randall Munroe, better known as XKCD’s creator, revealed a little-known Google Spreadsheets secret yesterday. You can plot out the estimated volume of Google search results against different queries.
How do you do it? Alex Chitu at Google Operating System says:
If you are familiar with Google Spreadsheets, try to create a sheet that lets you enter a query like “My IQ is X”, a variable name and the values for that variable. The result should be a graph that shows the number of Google search results for each instance of your query. Use importXML and an XPath expression to find the number of Google search results: “//p[@id='resultStats']/b[3]“. Here’s an example.
No comments:
Post a Comment