Adobe has released an emergency security update for its widely used Flash media player to patch a vulnerability being actively exploited on the Internet. The company is advising Windows and Mac users to install it in the next 72 hours.
Get your update
here
Posts tonen met het label internet. Alle posts tonen
Posts tonen met het label internet. Alle posts tonen
woensdag 27 februari 2013
vrijdag 15 februari 2013
http://dabblet.com
dabblet is an interactive playground for quickly testing snippets of CSS and HTML code. It uses -prefix-free, so that you won't have to add any prefixes in your CSS code. You can save your work in Github gists, embed it in other websites and share it with others.
It currently only supports modern versions of Chrome, Safari and Firefox but I'm hoping to expand browser support soon.
It’s handcoded by Lea Verou with care but some other nice folks helped too. Special thanks go to Roman Komarov who helped tremendously with his tips & thorough QA and to David Storey that came up with the name “dabblet”.
HERE
HERE
Munchausen by Internet
The first academic review article on ‘Munchausen by Internet‘ – where people fake the identity of an ill person online – has just been published in the Journal of Medical Internet Research.
Munchausen syndrome is a common name forfacticious disorder where people consciously fake illnesses for their own gain.
This is distinguished from malingering – where the gain would be something obvious like money, drugs or missing military service – and instead the gain from factitious illness typically includes the indirect benefits of faking – like being cared for, avoiding family conflict and so on.
The person is deliberately faking but they may not be fully conscious of all the emotional benefits – they might just say ‘it feels right’ or ‘it helps me’.
Obviously, this has been a problem for millennia but there has been an increasing recognition that the phenomenon happens online. People take up the identity of someone with an illness that gives them a special place in an online community.
This could be a standard online community where their ‘illness’ becomes a point of social concern, or their pretence could allow them to participate in an online community for people with certain disorders or conditions.
The article gives lots of example and some ways of spotting Munchausen fakers that also gives an insight into their thinking:
Posts consistently duplicating material in other posts, books, or health-related websites. Characteristics of the supposed illness emerging as caricatures. Near-fatal bouts of illness alternating with miraculous recoveries. Fantastical claims, contradicted by subsequent posts, or flatly disproved. Continual dramatic events in the person’s life, especially when other group members have become the focus of attention. Feigned blitheness about crises that will predictably attract immediate attention. Others apparently posting on behalf of the individual having identical patterns of writing.
The piece gets quite wordy at times (well, it is an academic article) but it’s an interesting insight into a motivations of people who ‘fake sick’ on the internet.
Labels:
academic paper,
article,
internet
Cavemen Used ‘Facebook’ Already

Scientists claim to have discovered a “prehistoric version of Facebook” used by ancient tribes to communicate with each other. After analyzing over 3000 rock art images in Sweden and Russia, Mark Sapwell and his team from Cambridge University concluded that the sites functioned like an “archaic related stories version” of social networks where users shared thoughts and emotions and gave stamps of approval to other contributions – very similar to today’s Facebook like.
HERE
Labels:
facebook,
internet,
media history,
technology
woensdag 13 februari 2013
Anti - Social
Anti-Social is a productivity application for Macs that turns off the
social parts of the internet. When Anti-Social is running, you’re locked
away from distracting social media sites, including Facebook, Twitter
and other sites you specify. With Anti-Social, you’ll be amazed how much
you get done when you turn off your friends.
http://anti-social.cc
vrijdag 18 januari 2013
dinsdag 18 december 2012
....
"the rewards of becoming "unplugged" were more rich & varied than any cyber reality could ever be"
via
via
Labels:
book excerpt,
book presentation,
cyber,
internet,
internet culture,
link,
quotes
The Cloud, the State, and the Stack: Metahaven in Conversation with Benjamin Bratton
…
MH
We agree. Isn’t Anonymous itself an example, if not the clearest one, of this? All their videos are on YouTube. Anonymous, as opposed to the cyber-vegetarians of yesterday’s “critical media,” are the biggest all-you-can-eat omnivores of the internet… Otherwise your point is very clear.
BB
As someone who very much appreciates a lot of what the two groups do, let me speak somewhat critically of Anonymous and WikiLeaks. My points are somewhat obvious and not meant to heap scorn. Anonymous does some interesting things, but the 4chan angry teenager roots also steer them off into predictable dead-ends. Their YouTube videos seem straight out of a 1999 videogame about “Hackers in Cyberspace vs. The Man.” Nevertheless, they are a clear example of what a Cloud Polis might look like, and to me much of what they do is about clearing the way for something more substantial to emerge. Hopefully their model of Cloud Polis is one among many, because in the constitution of deep alternatives, it’s not only about subverting and liquifying Oedipalized power, it’s also about knowing what to do with power once you have it, how to compose with it. WikiLeaks is a method and ethos raised to the level of an ideology—Assange’s interview in e-flux with Hans Ulrich Obrist is great, by the way—but it’s not clear what the next move might be, even if Assange were free to move about. Open it all up? OK. Everyone will see what’s really happening? OK. This is a basic Enlightenment aspiration, but the idea that once the primal evil is exposed the public will not tolerate it is insufficient to say the least. Even as they evade and escape legal harrassment, I don’t see alternative architectures other than an anarchist tabula rasa, and some fragile and absolutist paranoias. Building what is next is perhaps not Assange’s job, I understand. But I am sorry, it’s obvious that a world without authority and opacity is entropic; it would have no music (or very bad music). It’s not only not possible, it’s not desirable. A field without solid lines cannot sustain interesting forms of tension for very long. I am more interested in the very long expanse of composable time than in any purifying first principles regarding the legitimacy of authority. By the way, apropos of nothing, “cyber-vegetarianism” is always a great phrase. Thank you.
MORE!
MH
We agree. Isn’t Anonymous itself an example, if not the clearest one, of this? All their videos are on YouTube. Anonymous, as opposed to the cyber-vegetarians of yesterday’s “critical media,” are the biggest all-you-can-eat omnivores of the internet… Otherwise your point is very clear.
BB
As someone who very much appreciates a lot of what the two groups do, let me speak somewhat critically of Anonymous and WikiLeaks. My points are somewhat obvious and not meant to heap scorn. Anonymous does some interesting things, but the 4chan angry teenager roots also steer them off into predictable dead-ends. Their YouTube videos seem straight out of a 1999 videogame about “Hackers in Cyberspace vs. The Man.” Nevertheless, they are a clear example of what a Cloud Polis might look like, and to me much of what they do is about clearing the way for something more substantial to emerge. Hopefully their model of Cloud Polis is one among many, because in the constitution of deep alternatives, it’s not only about subverting and liquifying Oedipalized power, it’s also about knowing what to do with power once you have it, how to compose with it. WikiLeaks is a method and ethos raised to the level of an ideology—Assange’s interview in e-flux with Hans Ulrich Obrist is great, by the way—but it’s not clear what the next move might be, even if Assange were free to move about. Open it all up? OK. Everyone will see what’s really happening? OK. This is a basic Enlightenment aspiration, but the idea that once the primal evil is exposed the public will not tolerate it is insufficient to say the least. Even as they evade and escape legal harrassment, I don’t see alternative architectures other than an anarchist tabula rasa, and some fragile and absolutist paranoias. Building what is next is perhaps not Assange’s job, I understand. But I am sorry, it’s obvious that a world without authority and opacity is entropic; it would have no music (or very bad music). It’s not only not possible, it’s not desirable. A field without solid lines cannot sustain interesting forms of tension for very long. I am more interested in the very long expanse of composable time than in any purifying first principles regarding the legitimacy of authority. By the way, apropos of nothing, “cyber-vegetarianism” is always a great phrase. Thank you.
MORE!
zondag 9 december 2012
woensdag 5 december 2012
Are We Becoming Cyborgs?
SINCE broadband began its inexorable spread at the start of this millenium, Internet use has expanded at a cosmic rate. Last year, the number of Internet users topped 2.4 billion — more than a third of all humans on the planet. The time spent on the screen was 16 hours per week globally — double that in high-use countries, and much of that on social media. We have changed how we interact. Are we also changing what we are?
We put that question to three people who have written extensively on the subject, and brought them together to discuss it with Serge Schmemann, the editor of this magazine. The participants: Susan Greenfield, professor of synaptic pharmacology at Oxford. She has written and spoken widely on the impact of new technology on users’ brains. Maria Popova, the curator behind Brain Pickings, a Web site of “eclectic interestingness.” She is also an M.I.T. Futures of Entertainment Fellow and writes forWired and The Atlantic. Evgeny Morozov, the author of The Net Delusion: The Dark Side of Internet Freedom . He is a contributing editor to The New Republic .
here
We put that question to three people who have written extensively on the subject, and brought them together to discuss it with Serge Schmemann, the editor of this magazine. The participants: Susan Greenfield, professor of synaptic pharmacology at Oxford. She has written and spoken widely on the impact of new technology on users’ brains. Maria Popova, the curator behind Brain Pickings, a Web site of “eclectic interestingness.” She is also an M.I.T. Futures of Entertainment Fellow and writes forWired and The Atlantic. Evgeny Morozov, the author of The Net Delusion: The Dark Side of Internet Freedom . He is a contributing editor to The New Republic .
here
dinsdag 4 december 2012
Sir Tim Berners-Lee flags UN net conference concerns
Sir Tim Berners-Lee - inventor of the world wide web - is the latest voice to raise concerns about a meeting of communication tech regulators in Dubai.
He spoke of concerns that some attendees would push for a UN agency to "run the internet" rather than leaving it to groups already "doing a good job".
Internet pioneer Vint Cerf has also highlighted the issue on Google's site.
But the UN agency itself is playing down suggestions of a power-grab.
MORE
He spoke of concerns that some attendees would push for a UN agency to "run the internet" rather than leaving it to groups already "doing a good job".
Internet pioneer Vint Cerf has also highlighted the issue on Google's site.
But the UN agency itself is playing down suggestions of a power-grab.
MORE
maandag 26 november 2012
donderdag 15 november 2012
dinsdag 6 november 2012
Current prices on the Russian underground market
* Hacking corporate mailbox: $500
* Winlocker ransomware: $10-20
* Unintelligent exploit bundle: $25
* Intelligent exploit bundle: $10-$3,000
* Basic crypter (for inserting rogue code into a benign file): $10-$30
* SOCKS bot (to get around firewalls): $100
* Hiring a DDoS attack: $30-$70/day, $1,200/month
* Botnet: $200 for 2,000 bots
* DDoS botnet: $700
* ZeuS source code: $200-$500
* Windows rootkit (for installing malicious drivers): $292
* Hacking Facebook or Twitter account: $130
* Hacking Gmail account: $162
* Email spam: $10 per one million emails
* Email spam (using a customer database): $50-$500 per one million emails
* SMS spam: $3-$150 per 100-100,000 messages
* Winlocker ransomware: $10-20
* Unintelligent exploit bundle: $25
* Intelligent exploit bundle: $10-$3,000
* Basic crypter (for inserting rogue code into a benign file): $10-$30
* SOCKS bot (to get around firewalls): $100
* Hiring a DDoS attack: $30-$70/day, $1,200/month
* Botnet: $200 for 2,000 bots
* DDoS botnet: $700
* ZeuS source code: $200-$500
* Windows rootkit (for installing malicious drivers): $292
* Hacking Facebook or Twitter account: $130
* Hacking Gmail account: $162
* Email spam: $10 per one million emails
* Email spam (using a customer database): $50-$500 per one million emails
* SMS spam: $3-$150 per 100-100,000 messages
Labels:
cyber attacks,
hacktivism,
internet
dinsdag 9 oktober 2012
woensdag 19 september 2012
On Automation
The Tyranny of Algorithms
Do we want a world where a software program
picks the next pop-music star and legals system
run on opaque pieces of code?
By EVGENY MOROZOV
In "Player Piano," his 1952 dystopian novel, Kurt Vonnegut rebelled against automation. For Vonnegut, the metaphor of the player piano—where the instrument plays itself, without any intervention from humans—stood for all that was wrong with the cold, mechanical and efficiency-maximizing environment around him. MORE HERE
donderdag 13 september 2012
Abonneren op:
Reacties (Atom)
