…What does it mean, and more importantly how can and does it affect you?
This last year has seen the defeat of PIPA and SOPA in the US, but what seem like huge victories are actually only minor wins.
Across the world censorship on the Internet is rapidly turning the information super highway into a desolate place. People tend to think of China when they think of Internet Censorship, but it’s not the only place. It’s happening here and now in almost every place on the globe, even the United States.
Know how much of a pain it can be to find them? Well, we ran across an awesome device that will be available soon. The product StickNFind, which we found on the crowdsourcing site Indiegogo, uses bluetooth tags and your iOS or Android based phone to locate them.
The tags can be pinged to make noise and light up, in addition to showing up on the application’s “radar” screen. The application lets you see approximate distances from your phone or tablet but unfortunately not direction.
The company promises that the applications are more far reaching than simply finding lost keys or remotes (though in all fairness that’s what we are sure most people will use them for).
They posit that their stickers can be attached to your luggage when traveling to assist in finding it at the baggage pickup; attached to children’s backpacks (your kids only please) to help keep track of their stuff; or even possibly your wife’s car so you can have some advanced warning when she pulls in. (more…)
As some of you might know domains with active directory are a great way to make sure that your users are able to have a consistent experience across any machine they login to, while also providing adequate security. If you didn’t know that, well now you do.
You might also know that a copy of the Microsoft products to do the job aren’t cheap, and aren’t cost effective if you have a small business or want to set up a domain at your home.
Well the open source community has your solution, it is possible with just about any flavor of Linux, to create a fully functional domain complete with roaming profiles and active directory. I am not going to detail exactly how to go about doing that in this post, but I will be posting a decent how to in the near future.
By now, everyone’s heard of “those hacker conventions”, DEFCON, Black Hat, and others.
Some folks have wildly wrong ideas about what goes on at hacker conventions, but in general, they are an opportunity for security researchers (hackers) to share what they have learned, with other security researchers (hackers).
The researchers (hackers)? They do it because they enjoy teasing apart how things work, understanding the implications, interactions and potential hazards they embody.