Jump to content

Search the Community

Showing results for tags 'internet'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 172 results

  1. visualbuffs

    How fast is your internet speed?

    I wonder what is the plan on other country dsl they have... i got upgraded to 8mb
  2. Google makes billions from its cloud platform. Now it’s using those billions to buy up the internet itself — or at least the submarine cables that make up the internet backbone. Above: An operator works during the mooring of an undersea fiber optic cable near the Spanish Basque village of Sopelana on June 13, 2017. In February, the company announced its intention to move forward with the development of the Curie cable, a new undersea line stretching from California to Chile. It will be the first private intercontinental cable ever built by a major non-telecom company. And if you step back and just look at intracontinental cables, Google has fully financed a number of those already; it was one of the first companies to build a fully private submarine line. Google isn’t alone. Historically, cables have been owned by groups of private companies — mostly telecom providers — but 2016 saw the start of a massive submarine cable boom, and this time, the buyers are content providers. Corporations like Facebook, Microsoft, and Amazon all seem to share Google’s aspirations for bottom-of-the-ocean dominance. I’ve been watching this trend develop, being in the broadband space myself, and the recent movements are certainly concerning. Big tech’s ownership of the internet backbone will have far-reaching, yet familiar, implications. It’s the same old consumer tradeoff; more convenience for less control — and less privacy. We’re reaching the next stage of internet maturity; one where only large, incumbent players can truly win in media. Consumers will soon need to decide exactly how much faith they want to place in these companies to build out the internet of tomorrow. We need to decide carefully, too; these are the same companies that are gaining access to a seemingly ever-increasing share of our private lives. Walling off the garden If you want to measure the internet in miles, fiber-optic submarine cables are the place to start. These unassuming cables crisscross the ocean floor worldwide, carrying 95-99 percent of international data over bundles of fiber-optic cable strands the diameter of a garden hose. All told, there are more than 700,000 miles of submarine cables in use today. While past cable builders leveraged cable ownership to sell bandwidth, content providers are building purposefully private cables. The internet is commonly described as a cloud. In reality, it’s a series of wet, fragile tubes, and Google is about to own an alarming number of them. The numbers speak for themselves; Google will own 10,433 miles of submarine cables internationally when the Curie cable is completed later this year. The total shoots up to 63,605 miles when you include cables it owns in consortium with Facebook, Microsoft, and Amazon. Including these part-owned cables, the company has enough submarine infrastructure to wrap around the earth’s equator two-and-a-half times (with thousands of cable miles to spare). The impetus for Google’s submarine projects This submarine cable boom makes more sense when you look at the growth of traffic that’s taken place in the past decade. In the Atlantic and Pacific, content providers accounted for over half of total demand in 2017. Content provider data use has skyrocketed from less than eight percent to near 40 percent in the past 10 years. It should be noted here that stats are significantly lower in Africa and the Middle East, suggesting that developed nations hunger for video content and cloud apps are a driver of the trend. This is supported by overall international bandwidth use between countries. In 2017, India only used 4,977 Mbps of international bandwidth. The U.S. used a staggering 4,960,388 Mbps that same year. The cost of privatized infrastructure Like the removal of Net Neutrality, privatizing internet infrastructure has only reduced prices for consumers. The problem we now face is a moral one: Do we want a private internet? Or do we want to preserve the “Wild West” web that we’ve had to this point? Unfortunately, the question isn’t as simple as drawing a line between “good” and “bad” network optimizations. Practices like edge networking and zero-rating are critical to the business models of companies like Netflix and AT&T — they also don’t technically violate the rules, and ultimately deliver much better services to consumers. As we look to the future, we need to start asking ourselves what the internet is really going to look like whenever the content services that already command so much of our attention are in control of the internet backbone as well. Privatized infrastructure may bring untold benefits for consumers in the short run, but is there a cost we aren’t considering? Source
  3. Russia is considering whether to disconnect from the global internet briefly, as part of a test of its cyber-defences. The test will mean data passing between Russian citizens and organisations stays inside the nation rather than being routed internationally. A draft law mandating technical changes needed to operate independently was introduced to its parliament last year. The test is expected to happen before 1 April but no exact date has been set. Major disruption The draft law, called the Digital Economy National Program, requires Russia's ISPs to ensure that it can operate in the event of foreign powers acting to isolate the country online. Nato and its allies have threatened to sanction Russia over the cyber-attacks and other online interference which it is regularly accused of instigating. The measures outlined in the law include Russia building its own version of the net's address system, known as DNS, so it can operate if links to these internationally-located servers are cut. Currently, 12 organisations oversee the root servers for DNS and none of them are in Russia. However many copies of the net's core address book do already exist inside Russia suggesting its net systems could keep working even if punitive action was taken to cut it off. The test is also expected to involve ISPs demonstrating that they can direct data to government-controlled routing points. These will filter traffic so that data sent between Russians reaches its destination, but any destined for foreign computers is discarded. Eventually the Russian government wants all domestic traffic to pass through these routing points. This is believed to be part of an effort to set up a mass censorship system akin to that seen in China, which tries to scrub out prohibited traffic. Russian news organisations reported that the nation's ISPs are broadly backing the aims of the draft law but are divided on how to do it. They believe the test will cause "major disruption" to Russian internet traffic, reports tech news website ZDNet. The Russian government is providing cash for ISPs to modify their infrastructure so the redirection effort can be properly tested. Source
  4. Wilson Drake

    Happy Safer Internet Day 2019

    This year lets all raise our hands to make Internet a safer place on Safer Internet Day
  5. What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common? Alex is a software security engineer at Mozilla, where he works on sandboxing and anti-exploitation for Firefox. Previously he was a software engineer with the United States Digital Service, and served as a member of the board of directors of both the Python and Django Software Foundations. One bug affects iPhones, another affects Windows, and the third affects servers running Linux. At first glance these might seem unrelated, but in reality all three were made possible because the software that was being exploited was written in programming languages which allow a category of errors called "memory unsafety." By allowing these types of vulnerabilities, languages such as C and C++ have facilitated a nearly unending stream of critical computer security vulnerabilities for years. Imagine you had a program with a list of 10 numbers. What should happen if you asked the list for its 11th element? Most of us would say an error of some sort should occur, and in a memory safe programming language (for example, Python or Java) that's what would happen. In a memory unsafe programming language, it'll look at wherever in memory the 11th element would be (if it existed) and try to access it. Sometimes this will result in a crash, but in many cases you get whatever happens to be at that location in memory, even if that portion of memory has nothing to do with our list. This type of vulnerability is called a “buffer-overflow,” and it's one of the most common types of memory unsafety vulnerabilities. HeartBleed, which impacted 17 percent of the secure web servers on the internet, was a buffer-overflow exploit, letting you read 60 kilobytes past the end of a list, including passwords and other users’ data. There are other types of memory unsafety vulnerabilities with C/C++, though. Other examples are “type confusion,” (mixing up what type of value exists at a place in memory) “use after free,” (using a piece of memory after you told the operating system you were done with it) and “use of uninitialized memory” (using a piece of memory before you’ve stored anything in it). Together, these form some of the most common vulnerabilities across widely used software such as Firefox, Chrome, Windows, Android, and iOS. I've been tracking the security advisories for these projects for more than a year and in almost every release for these products, more than half of the vulnerabilities are memory unsafety. More disturbingly, the high and critical severity vulnerabilities (generally those which can result in remote code execution, where an attacker can run any code they want on your computer; this is usually the most severe type of vulnerability) are almost always memory unsafety. From my own security research into the widely used open source image processing libraries ImageMagick and GraphicsMagic, in the last year I've found more than 400 memory unsafety vulnerabilities. If these vulnerabilities are so prevalent, can cause so much damage, and there are languages that don't have these pitfalls, then why are these languages still so common? First, while there are now good choices for languages that prevent memory unsafety vulnerabilities, this wasn’t always the case. C and C++ are decades-old and enormously popular languages, while memory-safe languages that are usable for low-level programming like web browsers and operating systems, such as Rust and Swift, are only just starting to achieve popularity. A bigger issue is that when developers sit down to choose a programming language for a new project, they're generally making their decision based on what languages their team knows, performance, and ecosystem of libraries that can be leveraged. Security is almost never a core consideration. This means languages which emphasize security, at the cost of ease of use, are at a disadvantage. Furthermore, many of the most important software projects for internet security are not new, they were started a decade or more ago, for example Linux, OpenSSL, and the Apache webserver are all more than twenty years old. For massive projects like these, simply rewriting everything in a new language isn't an option; they need to be incrementally migrated. This means that projects will need to be written in two languages, instead of one, which increases complexity. It can also mean needing to retrain a huge team, which takes time and money. Finally, the largest problem is that many developers don't believe there's a problem at all. Many software engineers believe the problem is not that languages like C/C++ facilitate these vulnerabilities, it's that other engineers write buggy code. According to this theory, the problem isn't that trying to get the 11th item in a 10 item list can result in a critical vulnerability, the problem is that someone wrote code which tries to get the 11th item in the first place, that they either weren't a good enough engineer or weren't disciplined enough. In other words, some people think that the problem isn't with the programming language itself, only that some people don't know how to use it well. Many developers find this position compelling, despite the mountain of competing evidence—these vulnerabilities are omnipresent, and effect even companies with the largest security budgets and the most talented developers! It's one thing to discuss the tradeoffs and how we can make memory-safe languages easier to learn, but after thousands upon thousands of vulnerabilities that are preventable with a better programming language, the evidence makes it clear that "try harder not to have bugs" is not a viable strategy. However, there is some good news. Not everyone is in denial about this problem. Rust (disclosure: Rust’s primary sponsor is my employer, Mozilla) is a relatively new programming language which aims to be usable for every problem C and C++ are used for, while being memory safe and thus avoiding these security pitfalls. Rust is gaining adoption, it’s now used by Mozilla, Google, Dropbox, and Facebook, and I believe this demonstrates that many people are starting to look for systemic solutions to the memory unsafety problem. Further, Apple’s Swift programming language is also memory safe, while its predecessor, Objective-C, was not. There are a number of things we can do to accelerate the search for a comprehensive solution to the ongoing security disaster that is memory unsafety. First, we can get better at quantifying how much damage memory safety causes. While I've been performing rudimentary statistics for a few projects, there is an opportunity for more rigorous tracking. The CVE project, an industry-wide database of known vulnerabilities, could track for every vulnerability whether it was a memory unsafety issue, and whether a memory safe language would have prevented it. This will help us answer questions like, "Which projects would benefit most from a programming language that is memory safe?" Second, we should invest in research into how to best migrate existing large software projects to memory safe languages. Currently the idea of migrating something like the Linux kernel to a different programming language is a task almost too large to imagine. Dedicated research into what sort of tools could facilitate this, or how programming languages could be designed to make it easier, would dramatically reduce the cost of improving older, larger, projects. Finally, we can shift the culture around security within software engineering. When I first learned C++ in college, it was expected that sometimes your program would crash. No one ever told me that many of those crashes were also potential security vulnerabilities. A lack of awareness about the connection between the bugs and crashes developers encounter and security issues, from early on in a developer’s career, is emblematic of how security is a secondary concern in software engineering and how we teach it. When creating new projects it should be accepted that one of the criteria when choosing a programming language should be "How will this choice impact security?" Memory unsafety is currently a scourge for our industry. But it doesn't have to be the case that every Windows or Firefox release fixes dozens of avoidable security vulnerabilities. We need to shift ourselves from treating each memory unsafety vulnerability as an isolated incident, and instead treat them as the deeply rooted systemic problem they are. And then we need to invest in engineering research into how we can build better tools to solve this problem. If we make that change and that investment we can make a dramatic improvement to computer security for all users, and make HeartBleed, WannaCry, and million dollar iPhone bugs far less common. Source
  6. The internet is an amazing place where you can find more than 1 billion websites. Along with some fantastic sites there are some weird ones too. It’s impossible for a person to visit every website. Therefore we have gathered some strange websites on the internet. Some of them are funny, some are really boring and a few are like you can’t answer why they exist. We haven’t included adult site here, so you can click on all link without any hesitation. Enjoy the list! 1. Iloveyoulikeafatladylovesapples: Feel the hunger of the fat lady until you let her eat enough apples. The website is completely useless still you can enjoy the graphics and background music. 2. Thenicestplaceontheinter.net: The really sweet website that offers free hugs. Go get it. 3. SciencevsMagic.net/Tes: You can mix the words amazing and weird to describe this one. Also, the website gave AIDS to my eyes. 4. Michaeljfoxnews: Feel the earthquake on your computer. 5. Pointerpointer: I don’t know where did they find these pictures but this is how you get to the specific point. 6. Heeeeeeeey: Just click on link and get the heeey hooo party feel. 7. wwwdotcom: A serious tip for you. 8. Rainymood: Rain makes everything better. So just sit back and enjoy the sound effect to enlighten your mood. 9. Isitchristmas: The name suggests all. May be the website has been designed for people suffering from short term memory loss. 10. Cat-bounce: And that’s how humans play with emotions of cats. 11. 111111111111111111111111111111111111111111111111111111111111: Believe me; I have no idea what the exact purpose of website. But it seems like website owner is not really a fan of Arnold Schwarzenegger. 12. Heyyeyaaeyaaaeyaeyaa: A catchy music with special cartoon characters for our special readers. 13. Thisman: This is the height of weirdness! The website says that hundreds of people dream about this face. No, I don’t. 14. Breakglasstosoundalarm: The thing you wanted to do once in your life is here. 15. Internetlivestats: I don’t think this is a live data, however you will get an idea of few internet stats. 16. Simonpanrucker: No words to explain this useless thing. Kindly decide yourself how weird it is. 17. Ilooklikebarackobama: You might wanna reply this website, “No you don’t, not even a bit”. 18. Corgiorgy: The cute dog army. 19. Haneke: If you like complicated things and pay too much attention into details, you won’t regret after visiting this website. 20. Fearthegaychicken: The question is what makes you think that this chicken is gay. Is it background color or the sound? 21. Koalastothemax: An amazing creativity and fun with pixels. 22. Procatinator: Cats popularity is increasing day by day and somehow this website is the reason behind it. 23. Youfellasleepwatchingadvd: If your mom doesn’t allow you to watch TV, you could spend some time here. 24. Essaytyper: This is the place where you become a professional typist in no time. 25. Feedthehead: My advice is, don’t just feed the head, play with the whole face. 26. Nooooooooooooooo: If your boss gives you extra workload, you can reply him this link. 27. Zoomquilt: The weirdness tends to infinity. Even a telescope can’t look so far. 28. Staggeringbeauty: Just shake the mouse and see the snake’s reaction. 29. Anasomnia: This is how dreams become nightmare. 30. Eelslap: Slap tight as many times as you want. He won’t mind. Source
  7. Internet Download Manager 6.31 Build 9 Changelog: http://internetdownloadmanager.com/news.html Changes: (Released: Oct 18, 2018) Fixed problems with downloading for several types of video streams Fixed the problems with Firefox and Google Chrome integration caused by some security applications Fixed bugs Download: http://mirror2.internetdownloadmanager.com/idman631build9.exe Retail: http://download.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman631build9f.exe http://mirror2.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman631build9f.exe
  8. For years, the number of Americans who have reported using the internet, social media, and smartphones has been on a meteoric rise. But that rate has slowed to a near-stall. New data published this week by the Pew Research Center show that, since 2016, that number has plateaued, indicating those technologies have reached a saturation point among many groups of people. The percentage of Americans using smartphones (77%), the internet (88% to 89%), and social media (69%) has remained virtually unchanged during the last two years. “Put simply, in some instances there just aren’t many non-users left,” the report states. More than 90% of adults younger than 50 report they use the internet or own a smartphone. This number squares with some of the trends noticed earlier this year by Gartner, a global research firm. The fourth quarter of 2017 marked the first time since 2004 that the market for smartphones declined globally compared to the prior year. People are less frequently buying new phones. “While demand for high quality, 4G connectivity and better camera features remained strong, high expectations and few incremental benefits during replacement weakened smartphone sales,” the firm reported. That’s already posed significant challenges for foreign companies looking to break into the US market. The Chinese brand Xiaomi is the fourth-largest seller of smartphones in the world. But as CNBC reported earlier this year, any goals it has for getting its products into American hands will be tough, with market saturation being a big reason why. Of course, there are segments of the US population that represent room in which to expand the use of smartphones and the internet. About 60% of Americans living in rural zones complain they have internet speeds so slow that it inhibits use. There’s also the population over 50 years old, which often complains that learning a new technology isn’t worth their time, according to the Pew report. In 2015, a Pew survey showed 34% of people over 65 said they had no confidence in their ability to perform tasks online. So for companies looking to make inroads, some of the challenges are clear: Invent products that make usability improvements to what’s already offered by Apple or Samsung that can be applied across a broad age range of people. It’s a tall order, but a tighter market could just pave the way for a newer, better wave of technology. Source
  9. Eric Schmidt, who has been the CEO of Google and executive chairman of its parent company, Alphabet, predicts that within the next decade there will be two distinct internets: one led by the U.S. and the other by China. Village Global VC. The firm enlists tech luminaries — including Schmidt, Jeff Bezos, Bill Gates and Diane Green — as limited partners, then invests their money into early-stage tech ventures. At the event, economist Tyler Cowen asked, “What are the chances that the internet fragments over the years?” Schmidt said: BRI is an economic development strategy of the Chinese government that aims to connect and facilitate all kinds of trade, including digital trade, between China and countries in Europe, Africa, the Middle East and Southeast Asia. Schmidt’s predictions come at a time when his successor at Google, CEO Sundar Pichai, has stirred up controversy around the company’s strategy in China. Reportedly, Google has been developing “Project Dragonfly,” a censored version of its search engine that could appease authorities in China. The project allegedly included a means to suppress some search results, booting them off the first page, and a means to fully block results for sensitive queries, for example, around “peaceful protests.” In recent weeks, hundreds of Google employees lobbied Pichai for more transparency and signed a letter saying that the reported plans raised “urgent moral and ethical issues.” Pichai has said that Google has been “very open about our desire to do more in China,” and that the team “has been in an exploration stage for quite a while now,” and considering “many options,” but is nowhere near launching in China. In a separate discussion last night between Schmidt and several start-up founders, he lauded Chinese tech products, services and adoption, especially in mobile payments. He noted that Starbucks in China don’t feature a register. Customers order ahead online and pay with their phones before picking up their lattes. A business development leader with Facebook, Ime Archebong, asked Schmidt if large tech companies are doing enough good in the world. Schmidt replied: “The judge of this is others, not us. Self-referential conversations about ‘Do I feel good about what I’m doing?’ are not very helpful. The judge is outside.” At several points in the private discussion, Schmidt urged entrepreneurs to build products and services that are not merely addictive, but valuable. He also said not enough companies “measure the right things.” Too many focus on short-term revenue growth and satisfying shareholders, rather than what’s best for their users, society and the long-term health of their companies. Schmidt was the CEO of Google from 2001, when he took over from co-founder Larry Page, through 2011, when Page reclaimed the reins. He remained as executive chairman of Google and then Alphabet until earlier this year. Source
  10. Benin has joined a growing list of African states imposing levies for using the internet. The government passed a decree in late August taxing its citizens for accessing the internet and social-media apps. The directive, first proposed in July, institutes a fee (link in French) of 5 CFA francs ($0.008) per megabyte consumed through services like Facebook, WhatsApp, and Twitter. It also introduces a 5% fee, on top of taxes, on texting and calls, according to advocacy group Internet Sans Frontières (ISF). The new law has been denounced, with citizens and advocates using the hashtag #Taxepamesmo (“Don’t tax my megabytes”) to call on officials to cancel the levy. The increased fees will not only burden the poorest consumers and widen the digital divide, but they will also be “disastrous” for the nation’s nascent digital economy, says ISF’s executive director Julie Owono. A petition against the levy on Change.org has garnered nearly 7,000 signatures since it was created five days ago. The West African nation joins an increasing number of African countries that have introduced new fees for accessing digital spaces. Last month, Zambia approved a tax on internet calls in order to protect large telcos at the expense of already squeezed citizens. In July, Uganda also introduced a tax for accessing 60 websites and social-media apps, including WhatsApp and Twitter, from mobile phones. Officials in Kampala also increased excise duty fees on mobile-money transactions from 10% to 15%, in a bid to reduce capital flight and improve the country’s tax-to-GDP ratio. Digital-rights advocates say these measures are part of wider moves to silence critics and the vibrant socio-political, cultural, and economic conversations taking place online. The adoptions of these taxes, they say, could have a costly impact not just on democracy and social cohesion, but on economic growth, innovation, and net neutrality. Paradigm Initiative, a Nigerian company that works to advance digital rights, has said it was worried Nigeria would follow Uganda’s and Zambia’s footsteps and start levying over-the-top media services like Facebook and Telegram that deliver content on the internet. But taxing the digital sector might have a negative impact in the long run. Research has already shown that Uganda’s ad hoc fees could cost its economy $750 million in revenue this year alone. “These governments are killing the goose that lays the golden egg,” Owono said. Source
  11. With the peak of the Internet more and more people are getting their business and personal stuff online. But that also has it consequences: it is the privacy and security, or more importantly, lack of. Here are some basic tips to make your life more private and secure: Don’t open shady links. Now that’s an obvious one but often forgotten. ‘X tagged you in this’ or ‘look at this cute photo’ should always be taken with the grain of salt. Especially if you don’t often communicate with that person or that link doesn’t look too good like www.asdgsdg.com/photo.exe' Use quality antivirus software. Use something free like Avast or Microsoft Security Essentials or if you are willing to pay: Eset NOD32. Don’t skimp on this, it could save your digital life. Use a premium VPN. Nowadays you can barely trust your ISP to not log or use your data for potential gains. Especially in the US where they can sell your data to the advertisers. Pretty scary right? Pick something like NordVPN and get military grade security with respect to your privacy. I’ve dug out this coupon code earlier (USENORD60) which gets you 1 year of VPN for $60. A pretty good value I think. Use social media conservatively. Even if you take all the necessary precautions but post on Facebook that you aren’t home right now, it isn’t really safe, is it? Even more, I recommend not using social media, because they track you. Everybody tracks you online. Limit yourself of Google, use Duck Duck Go for searching, Privacy Badger for tracking cookies and HTTPS Everywhere extensions for security, ProtonMail for securely encrypted mail. Also, you could get one of the safest OS out there, Tails. Here are my 2 cents. Hope these tips are useful to someone. If you have any questions do let me know.
  12. selesn777

    NetSetMan Pro 3.7.3 Retail

    NetSetMan Pro 3.7.3 Retail NetSetMan is a network settings manager which can easily switch between 6 different, visually structured profiles including IP addresses, gateways (incl. Metric), DNS servers, WINS servers, IPv4 and IPv6, extensive WiFi managment, computer name, workgroup, DNS domain, default printer, network drives, NIC status, SMTP server, hosts and scripts. NetSetMan offers you a powerful, easy-to-use interface to manage all your network settings at a glance. Main features: Management for network settings (LAN & WLAN)Tray-Info for all current IP settingsNSM Service to allow the use without admin privilegesAdministration for defining usage permissionsQuick switch from the tray iconAuto-saving of all settingsCommand line activationQuick access to frequently used Windows locationsTwo different user interfaces (Full & Compact)3.7. - 2014-06-03 Free vs Pro Website: http://www.netsetman.com/ OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: Ml Medicine: Keygen Size: 3,66 Mb.
  13. tao

    Traceability

    At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated. The bad behaviors range from social network bullying and misinformation to email spam, distributed denial of service attacks, direct cyberattacks against infrastructure, malware propagation, identity theft, and a host of other ills requiring a wide range of technical and legal considerations. That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. In other columns, I have argued for better software development tools to reduce the common mistakes that lead to vulnerabilities that are exploited. Here, I want to focus on another aspect of response related to law enforcement and tracking down perpetrators. Of course, not all harms are (or perhaps are not yet) illegal, but discovering those who cause them may still be warranted. The recent adoption and implementation of the General Data Protection Regulation (GDPR) in the European Union creates an interesting tension because it highlights the importance and value of privacy while those who do direct or indirect harm must be tracked down and their identities discovered. In passing, I mention that cryptography has sometimes been blamed for protecting the identity or actions of criminals but it is also a tool for protecting privacy. Arguments have been made for "back doors" to cryptographic systems but I am of the opinion that such proposals carry extremely high risk to privacy and safety. It is not my intent to argue this question in this column. What is of interest to me is a concept to which I was introduced at the Ditchley workshop, specifically, differential traceability. The ability to trace bad actors to bring them to justice seems to me an important goal in a civilized society. The tension with privacy protection leads to the idea that only under appropriate conditions can privacy be violated. By way of example, consider license plates on cars. They are usually arbitrary identifiers and special authority is needed to match them with the car owners (unless, of course, they are vanity plates like mine: "Cerfsup"). This is an example of differential traceability; the police department has the authority to demand ownership information from the Department of Motor Vehicles that issues the license plates. Ordinary citizens do not have this authority. In the Internet environment there are a variety of identifiers associated with users (including corporate users). Domain names, IP addresses, email addresses, and public cryptography keys are examples among many others. Some of these identifiers are dynamic and thus ambiguous. For example, IP addresses are not always permanent and may change (for example, temporary IP addresses assigned at Wi-Fi hotspots) or may be ambiguous in the case of Network Address Translation. Information about the time of assignment and the party to whom an IP address was assigned may be needed to identify an individual user. There has been considerable debate and even a recent court case regarding requirements to register users in domain name WHOIS databases in the context of the adoption of GDPR. If we are to accomplish the simultaneous objectives of protecting privacy while apprehending those engaged in harmful or criminal behavior on the Internet, we must find some balance between conflicting but desirable outcomes. This suggests to me that the notion of traceability under (internationally?) agreed circumstances (that is, differential traceability) might be a fruitful concept to explore. In most societies today, it is accepted that we must be identifiable to appropriate authorities under certain conditions (consider border crossings, traffic violation stops as examples). While there are conditions under which apparent anonymity is desirable and even justifiable (whistle-blowing, for example) absolute anonymity is actually quite difficult to achieve (another point made at the Ditchley workshop) and might not be absolutely desirable given the misbehaviors apparent anonymity invites. I expect this is a controversial conclusion and I look forward to subsequent discussion. Author Vinton G. Cerf is vice president and Chief Internet Evangelist at Google. He served as ACM president from 2012–2014. < Here >
  14. The service will roll out nationwide by year-end, in Cuba, one of the least connected countries. People record videos with their mobile phones of a street musician's performance in Cuba. Communist-run Cuba has started providing internet on the mobile phones of select users as it aims to roll out the service nationwide by year-end, in a further step toward opening one of the Western Hemisphere’s least connected countries. Journalists at state-run news outlets were among the first this year to get mobile internet, provided by Cuba’s telecoms monopoly, as part of a wider campaign for greater internet access that new president Miguel Diaz-Canel has said should boost the economy and help Cubans defend their revolution. Analysts said broader web access will also ultimately weaken the government’s control of what information reaches people in the one-party island state that has a monopoly on the media. Cuba frowns on public dissent and blocks access to dissident websites. “It’s been a radical change,” said Yuris Norido, 39, who reports for several state-run news websites and the television. “I can now update on the news from wherever I am, including where the news is taking place.” Certain customers, including companies and embassies, have also been able to buy mobile data plans since December, according to the website of Cuban telecoms monopoly ETECSA, which has not broadly publicized the move. ETECSA has said it will expand mobile internet to all its 5 million mobile phone customers, nearly half of Cuba’s population, by the end of this year. ETECSA did not reply to a request for more details for this story. Whether because of a lack of cash, a long-running US trade embargo or concerns about the flow of information, Cuba has lagged behind in web access. Until 2013, internet was largely only available to the public at tourist hotels in Cuba. But the government has since then made increasing connectivity a priority, introducing cybercafes and outdoor Wi-Fi hotspots and slowly starting to hook up homes to the web. Long before he took office from Raul Castro in April, 58-year-old Diaz-Canel championed the cause. “We need to be able to put the content of the revolution online,” he told parliament last July as vice president, adding that Cubans could thus “counter the avalanche of pseudo-cultural, banal and vulgar content.” Cuba could use subsidies to encourage the use of government-sponsored applications, analysts said. Last month, ETECSA launched a free Cuba-only messaging application, Todus, while Cuba’s own intranet with a handful of government-approved sites and email is much cheaper to access than the wider internet. In a 2015 document about its internet strategy that leaked, the Cuban government said it aimed to connect at least half of homes by 2020 and 60 percent of phones. But many Cubans are skeptical. ETECSA president Mayra Arevich told state-run media in December it had connected just 11,000 homes last year. “I’ve been many times to the ETECSA shop to ask if they can give us home access,” said Yuneisy Galindo, 28, at a Wi-Fi hotspot on one of Havana’s thoroughfares. “But they tell us they still aren’t ready and will call us.” Most mobile phone owners have smartphones, although Cuba is only now installing 3G technology, even as most of Latin America has moved onto 4G, with 5G in its final testing phase. “This rollout will expand slowly at first and then more quickly, if the government is increasingly confident that it can control any political fallout,” said Cuba expert Ted Henken at Baruch College in the United States. The price could prove the biggest restriction for many, though. Hotspots currently charge $1 an hour, compared with an average state monthly wage of $30. It was not clear what most Cubans will pay for mobile internet, but ETECSA is charging companies and embassies $45 a month for four gigabytes. Source
  15. The site’s head claims that the policy of not collecting personal information allows people to be “more true to themselves. Steven Huffman, the co-founder and CEO of Reddit Reddit, the self-described “front page of the internet,” may have a key tool in its arsenal as Americans begin to question their relationship with social media: anonymity. According to Steve Huffman, the site’s co-founder and CEO, “privacy is built into Reddit.” All that’s required to create an account and post on any of Reddit’s 1.2 million forums is an email address, a username, and a password. You don’t need to tell the company your birthday, your gender, or even your real name. As Huffman put it on Thursday at the Aspen Ideas Festival, which is co-hosted by the Aspen Institute and The Atlantic, “Reddit doesn’t want the burden of personal information ... and is not selling personal information.” Huffman argued that anonymity on Reddit actually makes using the site “more like a conversation one has in real life” than other exchanges on the internet. “When people detach from their real-world identities, they can be more authentic, more true to themselves,” he claimed. Huffman gave as an example a subreddit called StillTrying, a forum for couples who have had trouble conceiving children. He posited that such a community wouldn’t exist on other platforms. At least one such group does, in fact, exist on Facebook—or at least did in 2015—but, unlike StillTrying, it was visible only to members. Everything on Reddit is visible to anyone with an internet connection, so it’s conceivable that Reddit could be a resource to a greater number of people than groups on other sites. Unlike many other anonymous social networks, including Whisper and the now-defunct Yik Yak, the namelessness of Reddit does have its limits. Redditors maintain one consistent identity through their usernames, with an associated score called “karma” that tells other users how often they’ve been upvoted or downvoted—essentially a proxy for how informative, trustworthy, and civil the community has found them in the past. “People care about their reputations on Reddit,” Huffman said on Thursday. “There’s some stake to it.” He said that, in general, these reputations motivate Redditors to keep their posts more civil than the comment sections of other sites, which he called “toxic,” “agro,” and “off-putting.” Reddit’s favoring of aliases over actual personal information could help it avoid data-breach scandals like those that have befallen Facebook, Yahoo, and Equifax in recent years, or tap into users’ most sensitive identities. But it also undeniably introduces vulnerabilities into the site. Reddit is notorious for hosting trolls and bullies. (Huffman himself once told The New Yorker, “I consider myself a troll at heart.”) A subpar Reddit karma score may not be enough to deter some would-be harassers, especially those posting mostly in groups filled with like-minded users who are happy to upvote offensive content. “We are extremely proud to have created this enriching experience where people can be themselves,” Huffman said. The question is whether these anonymous online personas are really the selves we want to be. Source
  16. There have long been warnings that tough anti-piracy measures will eventually 'break the Internet'. While that catastrophe is yet to happen, meddling in any piece of complex machinery is likely to lead to unexpected consequences. Like the hobbyist tuner trying to squeeze the last bit of performance out of an already perfectly good car, exhilaration - or catching fire - is always around the corner. Back in the 80s, I fancied myself as a half-decent 8-bit coder but of course, there was always someone who did it outrageously better. Like my idols in the C64 demo scene, for example, whom I eventually rubbed shoulders with. They made computers do things they weren’t supposed to, like displaying graphics in places the machine didn’t natively allow or playing music on the heads of disc drives. The aim, at least in part, was to push software and hardware to breaking point. What they didn’t need, however, was help from self-professed experts. Unfortunately for them, my clearly superior teenage coding knowledge (and access to their machines) allowed me to quietly ‘improve’ some of their work in progress, ‘fixing’ it here and there without needing to ask permission or mention what I’d done. Luckily for the shape of my face, nothing broke down immediately and development on the ‘improved’ software mostly continued as if nothing had happened. And then people began swearing. A lot. I’m still sorry for that. I imagine the cursing that went on back then, in the wake of my efforts to ‘fix’ problems that were none of my business, was similar to that recently uttered by Internet pioneer Vint Cerf and the inventor of the World Wide Web, Tim Berners-Lee, in response to the Article 13 controversy. These men, who were there at the very beginning, also had a vision for their creations that didn’t involve smart-asses interfering with their work. Just like my unwanted efforts to ‘improve’ perfectly good parallax scrolling, web-blocking and content filtering are added complications that don’t easily fit with the original vision for an open web. No one wants complications. Most people – the vast majority of people – go on, 99% of people – do not want web-blocking, they don’t want filtering, and they don’t want expanded liabilities for intermediaries. But they’re mainly not being obtuse or pro-piracy, it’s just that their Internet (like a certain group’s scrolling) doesn’t need fixing because it’s just fine as it is. Of course, this call for the status quo is easily countered by the pro-blocking and pro-filtering movement who claim that the measures they want implementing globally have shown to work thus far, without any serious collateral damage. On this basis alone, why should anyone object to more of the same? Well, why shouldn’t they? None of these restrictions improve Internet users’ lives and there’s a dramatically reduced chance that the “Internet will break” if it’s left alone. So why not leave it? It’s not as if the public is being offered an incentive to welcome restrictions with open arms – price reductions on movies and music alongside a promise to increase quality if restrictions are put in place perhaps? Hardly. The point is this: it’s easy to frame this argument as one between those in favor of protecting copyright and those who want to pirate everything. In truth, it’s actually more fundamental. This is a clash between people who believe the Internet shouldn’t be tampered with – period – and those who believe that, because they’re potentially losing money, they should be allowed to tinker under everyone’s hood. People should, of course, be allowed to protect their rights but not at any cost. In the same way the Internet has grown and developed beyond all expectations, we should expect that the movement to block, filter, delete, divert and otherwise meddle in the net’s inner workings will grow too, probably in ways we’d never envisioned 10 years ago. That being said, it’s unlikely that any single filtering, blocking or liability-increasing effort will “break the Internet” and even a couple combined won’t herald the online apocalypse. After all, censorship machines are attacking as we speak, and most of us are still online with decent amounts of freedom. But in the same way that the famous Doomsday Clock ticks and tocks inexorably towards midnight, it’s not one event under consideration here, but the interplay between many. A restriction or web-block here, a content filter or a long-forgotten scrolling adjustment there. None of it really matters until that moment when history catches up with us and we wished we’d have been more careful over who was given control. Should we really be letting people who don’t know what they’re doing mess around with something so important, even when they’re doing it for reasons they genuinely believe in? If something really is properly broken, then perhaps we should consider sensible ways to fix it. However, when all the fixes become the very reason everything breaks down, we will have clearly gotten our priorities wrong and it will be too late. The big question is how long we’ll have to wait to find out. Will it be ‘never’ as we’re reliably informed by the entertainment industries or ‘sooner or later’ as the technologists suggest? The truth is, none of us really knows. The Internet experts don’t know there will be a meltdown next decade and copyright holders can’t promise that everything will be just fine in 20 years’ time. What we can say, however, is that our beloved Internet has served us pretty well up to now and despite much complaining and the existence of piracy, most people are doing very well out of it. No matter what happens it’s unlikely to break completely but there is a chance, at some point in the future, it will find itself being suffocated into submission. So, the simple challenge for us today is to find ways to protect rightsholders without affecting the vision for the open Internet. Answers on a postcard, please. Written by Andy at TF
  17. Almost every night, I sit in bed and stare at my phone. Then I fall asleep and dream about the internet. I send friends imaginary iMessages and hear the woo-Oop sound and then the ding when they reply. I scroll through nonsensical tweets and read Slack messages from my boss. Since I bought my first smartphone in 2008, the internet has oozed its way into the subterranean parts of my consciousness. Maybe it feels like the same thing has happened to you too. Plenty of research has looked at how smartphones and social media sites affect our habits, our relationships, our brains, and attention spans. There are also plenty of studies documenting how excessive use of these new technologies may lead to poorer sleep. But there’s little research on how our constantly internet-connected lives may alter the content and quality of our dreams. That's partially due to the fact that studying the phenomenon of dreaming is incredibly difficult. Researchers are almost always forced to rely on what people remember about their dreams, rather than directly observable data. "The only way for researchers to be sure that someone is dreaming is by awakening the sleeper, thus terminating the dream," says Raphael Vallat, a postdoctoral fellow at the University of California Berkeley who studies sleep and dreaming. So dreams remain mysterious; we don't yet know what purpose they serve, or exactly how to interpret them. But that doesn't mean research about media consumption and dreaming is nonexistent. In one study published in the journal Consciousness and Cognition in 2008, older participants who grew up watching black and white television reported dreaming more in grayscale than those who had consumed color TV, suggesting that access to media might have some sort of effect. What the Research Says Many dream researchers support an idea called the "continuity hypothesis," which says we tend to dream about the people and issues that preoccupy our waking thoughts. This doesn't mean that dreams reflect our waking lives necessarily, just that they tend to be about the same people and issues that concern us when we're awake. "Dreams really rarely replay a memory exactly as it was experienced, but rather integrate some of its elements into a broader, distorted narrative," Vallat adds. If you're obsessing over your friend’s Instagram comments or your own conversations on Twitter, the continuity hypothesis would suggest that it's reasonable for those things to appear in your dreams in some form as well. And people are definitely dreaming about the internet, at least according to anecdotal reports. Plenty of individuals say they experience social media-themed dreams, or dreams about apps they use for work, like the messaging service Slack. "I have dreams about Google Docs constantly. It really bothers me when I can’t remember what I was working on," says Caroline Haskins, an intern at news site The Outline. But is constantly being on the internet or consuming other new forms of media changing how we dream? Researchers like Jayne Gackenbach are trying to find out. Gackenbach, a psychology professor at MacEwan University, has been studying dreams and digital media since the 1990s. She acknowledges that her work is often based on what people self-report. "How much do you trust what someone says? That's a longstanding issue in any kind of dream research," she says. With that caveat, though, her research has found that playing videogames for a significant amount of time can alter both the content and the quality of a person's dreams. She’s conducted a number of studies that observed an association between playing videogames and an increase in lucid dreaming—a phenomenon where a person becomes aware they’re dreaming and can potentially control their actions. A follow-up analysis in 2013 proposed that “gaming may be associated with dream lucidity because of the enhanced problem-solving quality of gamer’s dreams.” Gackenbach has also found that playing videogames may provide a "protection" against nightmares, at least for some male gamers. That might be because videogames often simulate "fighting back" against threats, a scenario which is mimicked in the gamers' dreams. What About Social Media? But playing videogames is not the same as scrolling on Facebook or sending messages on Snapchat. It's possible that these activities impact our dreams in a different way—and Gackenbach is keen to learn how. Recently, she polled 481 university students about their dreams and media habits. Specifically, she asked them to recall a dream that involved some sort of electronic media—such as television, videogames, or social media—and what electronic media they had consumed the previous day. Students who used interactive media, like playing videogames or chatting with friends online, reported higher-quality dreams than those who, say, passively consumed TV shows. "Those that used interactive media reported more control over their dream," Gackenbach says. She presented her findings at the International Dream Conference in Arizona earlier this month. Gackenbach's findings—that the type of media we consume may affect the kind and quality of dreams we have—feel intuitively correct. More than one person has blamed their nightmares on watching a scary movie late at night. Yet other researchers dispute the idea that what we do during our waking hours has much impact on what we dream about. In which case, you could terror-scroll through Twitter all you want before bed—the bad tweets won’t attack you in your sleep because of it. "Generally, outside influences have little or no influence on dreams," says G. William Domhoff, a professor emeritus in psychology and sociology at the University of California at Santa Cruz and the author of The Emergence of Dreaming. "But since the dominant view is stimulus and response in psychology, and more generally in terms of American can-do [there’s the notion that] we can shape anything, everyone denies that dreams are spontaneous thoughts that appear under certain conditions." Domhoff points to a number of studies that in his view support the idea that daily events don't have much of an effect on our dreams. In one, 50 participants learned how to navigate a virtual maze on a computer and then were asked to take a nap. Only four reported having dreams related to the task. So don't swear off the internet forever just because you keep dreaming about accidentally liking your ex's Facebook post. The truth is we don't really know what it means. Just take comfort in the fact that you're not alone. Source
  18. This week the EU's controversial "upload filter" plans moved ahead. Opponents of the plans warn that this could "ban memes" and "destroy the Internet" as we know it. If that rhetoric is true, the Internet is actually already being destroyed right under our noses, with surprisingly little pushback. Online censorship has always been a hot topic and with the EU’s proposed “upload filters” hitting the headlines, it’s at the top of the agenda once again. The fear of losing the ability to share ‘memes’ plays well on social media. Similarly, many journalists happily use ‘censorship’ in their headlines as, apparently, the fate of the Internet is at stake. A common theme is that, if the plans are implemented, powerful corporations may soon decide whether you can share something online – fair use or not. While to a degree this fear is warranted, it’s also nothing new. The ‘censorship machines’ are already up and running as we speak. YouTube, to give an example, regularly takes down videos for dubious reasons. Some are pulled manually after rightsholders file complaints, while many more are targeted by YouTube’s automated piracy filters. It’s not clear how many ‘memes’ are killed in the process, but what many people describe as the ‘censorship’ that will ‘destroy the Internet,’ is already fully operational on the largest video sharing platform of all. But the problem goes even further. Aside from copyright issues, YouTube also demonetizes certain accounts because their content isn’t advertiser-friendly. There is still free speech, to a certain degree, but not all speech can be monetized. Mind you, this policy is not forced by the EU. It’s regular business practice on the same platform where people are currently sharing their EU censorship warnings. Let that sink in for a minute… Meme killers These issues are not limited to YouTube of course. Many other sites have automated filters or approve questionable takedowns. This week, for example, Twitter removed a video of a cheering kid, because the World Cup was playing on a TV in the background. Also, accounts – including prominent ones – are frequently suspended for alleged copyright infringements which may be fair use. Similarly, Facebook is known to police its network for possibly infringing content. Like YouTube and others, they use automated filters to spot possibly infringing content, which it takes down before asking questions. Given the above, there is some irony to the fact that sites like YouTube, Facebook and Twitter are the main venues used by people protesting the EU’s looming censorship machines. Yes, the EU plans will force smaller companies to spend money on anti-piracy measures, above and beyond what they do now. They will potentially increase liability and uncertainty for startups too. That’s a legitimate concern. But censorship machines are nothing new. If we use the same rhetoric seen in various “upload filter” protests, the Internet is already being ‘destroyed’ by the Twitters, Facebooks, and YouTubes of this world. In the current climate, many large platforms will resort to filtering tools or other measures to stop copyright infringements. Their aim is to protect rightsholders, which is understandable, but unfortunately, that can also lead to collateral damage. The good news is that YouTube, or Facebook, or Twitter, are not the Internet. The Internet will be totally fine. If history has shown us anything, it’s that clever people will come up with new ways to defeat censorship attempts. While it may sound alien to many, there are alternatives for all these platforms – alternatives that people can host and control themselves. Not to pirate, but to ensure that people can share their legal work without having to worry about overzealous censorship machines. The real question is, perhaps, if the broader public will ever be ready for these kinds of tools. Twenty years ago the Internet was a place where a lot of people built stuff, but today it’s mostly a place to consume. There are still plenty of creators and contributors, but these mostly rely on large platforms over which they have no control themselves. These platforms are convenient, have a broad audience, and even allow some people to make a living. However, they also have power and control over what people are allowed to do and share, memes included. And many (ab)use that power, whether the EU tells them to or not. Instead of resorting to Twitter activism and YouTube outrage people can also take matters into their own hands, of course, but that would require some work… Perhaps someone can start a campaign for that? Source
  19. Workers lay fiber optic lines for high speed internet in Cary in December 2015. The city is the third-best internet-connected municipality in the U.S., according to a new survey. Travis Long Cary No, just because Netflix is buffering doesn't make your internet connection "literally the worst ever." In fact, if you live in the Raleigh area, your connection is probably pretty good, in the grand scheme of things. A report released June 6, lists Cary as the third most internet-connected municipality in the U.S. Raleigh follows closely, at No. 15. Yeah, really. The report, based on data collected as part of the U.S. Census Bureau’s 2016 American Community Survey, ranks all 186 municipalities in the U.S. with more than 50,000 residents. In Cary, only 11 percent of households lack a fixed high-speed internet connection, and in Raleigh, that figure is 18 percent. Across all surveyed households, 31 percent lack such a connection. The survey does not distinguish between households that do not have access to such a connection, and those who cannot afford or choose not to purchase such a connection. It includes all forms of cable, DSL and fiber-optic wired internet connections, as well as satellite and other fixed wireless connections, but not dial-up or cellular data connections. So while everyone loves to complain about their internet connection, it turns out it could be worse. Much worse. In North Carolina, Greensboro is the 35th worst-connected municipality, with 39 percent of households lacking a fixed high-speed connection. The worst on the list (which admittedly doesn't include rural areas) is Brownsville, Texas. There, only one in three households have a qualifying connection. The report comes from the National Digital Inclusion Alliance, or NDIA, a nonprofit that works toward digital equity, which they consider to be when everyone has the internet access necessary to participate in our increasingly digital society. Looking at the list, it's pretty easy to see why Cary and Raleigh rank so high: money and business. With large tech companies in the two cities and nearby Research Triangle Park drawing a large number of well-paid, tech savvy residents, it's no wonder major internet providers including Google Fiber, Spectrum and AT&T followed. The most connected major metropolis on the list is Seattle, Wash., home of tech giants Microsoft and Amazon. Not far behind are San Francisco, Calif., and the rest of the Silicon Valley area. On the other end of the spectrum, Detroit, Mich., and Cleveland, Ohio, each lack internet connections in about half of their households. Both former manufacturing hubs were hit hard by the Great Recession, and still have yet to fully recover. The report’s release came just in advance of the death of the Obama-era net neutrality regulations. The Federal Communications Commission voted to repeal the regulations in December, and the decision took effect Monday, June 11. "Under my proposal, the federal government will stop micromanaging the Internet," said FCC chairman Ajit Pai in a statement. "Instead, the FCC would simply require Internet service providers to be transparent about their practices so that consumers can buy the service plan that’s best for them." Pai’s reasoning shows why reliable access to high speed internet and net neutrality are intimately related issues, said Angela Seifer, executive director of NDIA. "Choosing the internet service plan that is best for one’s household assumes there is a choice of internet service providers with multiple speed and price offerings. This is not always the case, particularly in rural and inner city neighborhoods," Seifer said, referring to the lack of investment in internet infrastructure often faced by low-income communities, a problem frequently noted by NDIA. So, the next time you get frustrated that the Wi-Fi isn't strong enough to load Instagram in your bedroom, remember: In many cities, you still can't use a landline and the computer at the same time. Source
  20. North Korea has opened a new internet connection with the outside world, this time via Russia, a move which cybersecurity experts say would strengthen the country’s internet and its ability to conduct cyberattacks. North Korea has been blamed for several major cyberattacks in recent years, including against banks and Sony Pictures, as well as the WannaCry ransomware attack. Pyongyang has routinely denied any involvement. Dyn Research, a company which monitors internet connectivity, said it had seen Russian telecommunications company TransTeleCom routing North Korean traffic since about 0900 GMT on Sunday. Previous traffic was handled via China Unicom. TransTeleCom could not be immediately reached to comment on the report. North Korea’s internet is limited to a few hundred connections. But these connections are vital for coordinating the country’s cyber attacks, said Bryce Boland, FireEye’s chief technology office for the Asia-Pacific region. Boland also confirmed the new connection, which was first reported by 38 North, a project of the U.S.-Korea Institute at Johns Hopkins School of Advanced International Studies (SAIS). Boland said the Russian connection would enhance North Korea’s ability to command future cyberattacks. Many of the cyber attacks conducted on behalf of Pyongyang came from outside North Korea, using hijacked computers, he said, while those ordering and controlling the attacks remained inside, communicating to hackers and hijacked computers from computers within North Korea. “This will improve the resiliency of their network and increase their ability to conduct command and control over those activities,” Boland said. The Washington Post reported earlier that the U.S. Cyber Command has been carrying out denial of service attacks against hackers from North Korea. The operation was due to end at the weekend.(wapo.st/2yRbg8w) < Here >
  21. Google is speeding up its internet services in Asia once again. Fresh from expanding its data centers in the region — which are located in Singapore and Taiwan — last year, the company said today that it has switched on a new undersea cable that will quicken services like YouTube and its cloud computing platform. The cable connects Google’s facility in Taiwan with a location in Japan, which itself is connected to the U.S. via an undersea cable from the FASTER Consortium which has the honor of being the planet’s fastest fiber optic undersea cable. Google said the Japan-Taiwan cable supports speeds of up to 26 terabits per second. The search giant is particularly keen to increase data speeds in Asia because of the vast numbers of people from the region who are coming online for the first time. In a recent report co-authored with Singapore sovereign wealth fund Temasek, Google said that 3.8 million people go on the internet for the first time each month in Southeast Asia alone — that’s not even including India or other places. “You may not notice right away, but this new cable should help Google products and services load more quickly across the region. It should also improve the reliability and consistency of this speedier experience, since the cable was strategically built outside of tsunami zones to help prevent network outages related to natural disasters,” Google said in a blog post. Google said last year it has spent more than $1 billion constructing and staffing its two data centers in Asia, and no doubt there is a lot more investment to come. “With more people coming online every day in Asia than anywhere else in the world, we’ve been working hard to invest in the infrastructure needed to make the Internet work for all of us who live in the region,” it added. Article source
  22. mona

    KNOW  YOUR  MEME

    KNOW YOUR MEME About Memes are broadly defined as culturally transmitted information, or ideas and beliefs that can be spread from one organism, or group of organisms, to another.[2] A key component to the meme concept is that the information is able to self-replicate, and in turn undergoes a type of natural selection, much like biological genes and viruses. Origin The word was coined by evolutionary biologist Richard Dawkins in his 1976 book The Selfish Gene (shown below). The book focused on the importance of self-replication in evolution, and pointed to the gene as the unit of biological information that is subject to selection pressures.[1]He postulated that perhaps not only biological information undergoes natural selection, and that anything that is capable of replicating itself would also be susceptible to selection pressures, like ideas and beliefs. The word “meme” was used to label this type of self-replicating cultural information, and it was derived from the Greek word mimema, which translates to “something imitated”. Spread With the commercialization of the internet in 1995,[6] modern memes gradually became more strongly associated with internet memes. Internet memes are associated with media, catchphrases, and more general trends that spread throughout various outlets on the World Wide Web like chat clients, blogs, social networking sites, email, forums and image boards. They’re often used to point out how trends online evolve and change over time, creating various new derivatives.[5] Russian Anti-Meme Law The Russian Anti-Meme Law refers to the Russian government’s ban on impersonating or sharing doctored image macros of public figures that are deemed out-of-context in relation to their personality or reputation in real life. The policy was introduced in early April 2015 as a direct result of a court decision in Moscow which ruled the unauthorized use of Russian singer Valeri Syutkin’s images as an internet meme to be an infringement of his privacy. However in other areas of the world, the ban showed a Streisand Effect as satire and memeification towards Russia’s President Vladimir Putin showed an increase. #MemeGate #MemeGate refers to an online feud between YouTubers LeafyIsHere and Ethan Klein of h3h3productions starting in late March 2016. The primary causes of the disagreement centered on accusations that LeafyIsHere cyberbullyied young and disabled vloggers and that Klein was hypocritical and preached sanctimonious views. Various Examples Related Sites KnowYourMeme Know Your Meme is a database style website run by the Cheezburger Network. Although the site has a small support team, the site is largely dependent on crowdsourcing for the documentation of memes as they develop and for the submission of viral media as it spreads. Encyclopedia Dramatica Encyclopedia Dramatica (or ED) is a satirical internet-culture based wiki created in late 2004 dedicated to documenting and categorizing internet memes and other cultural phenomenon. It is famous for having NSFW content that is largely uncensored. Originally hosted at encyclopediadramatica.com, it was turned into the “safe for work” Semantic Mediawiki OhInternet. Most of the articles were salvaged from the website and are available for download, and a new wiki EncyclopediaDramatica.se (previously EncyclopediaDramatica.es, .se, and .ch) has been set up containing most of the old articles, and is constantly being updated with new articles. TV Tropes TV Tropes is a wiki devoted to the documentation of “tropes”, which are tools of the trade for storytelling in movies, television shows, literature, memes, and other forms of media. These conventions and devices are used in all forms of fiction, and should not be confused with clichés. Related Subcultures The Internet The Internet is a system of interconnected computer networks linking billions of machines worldwide using the TCP/IP Internet protocol suite. Use of the Internet in the West expanded rapidly throughout the 1990s, growing over 100x within two decades. The Internet is the source of internet memes and is naturally the subject of numerous memes. Fandoms A fandom is a social group based around a particular interest and comprised of individuals who share that interest. On the internet, the term is typically used to refer to the fans of media franchises. It is often associated with fanfiction, as well as fan-made art and music. Fandoms are known for spawning large varieties of memes and in-jokes. Meme Elitism Meme Elitisim is an online ideology rooted in the opposition to the popularization of memes among non-underground communities and the mainstream media. While elitism has been a staple element of online communities since the days of Usenet newsgroups, such disdain for the promulgation of meme culture can be seen as a countermovement to the growing influence of social media in the Internet culture which began in the late 2000s. Those who pertain to this belief tend to have ties with online communities that thrived before the arrival of Web 2.0 and view themselves as arbitrators of what a meme can be and cannot be. Ironic Memes Ironics Memes is a subculture surrounding memes that are used satirically, usually by being deliberately humorless, crude, or overused, as a way to both criticize meme or meme elitism cultures, which has been considered by some to have become overused and unfunny with time, usually due to The Family Guy Effect, as well as to catch those with less Internet experience off guard. The use of ironic memes often includes intentional overuse of older Internet phenomena, such as 1337 speak or rage comics, as well as the use of the word “meme” as a replacement for some parts of speech, usually nouns or verbs. Related Memes Various meta memes exist that make use of the word meme or memes within their own memes. Meme Lord / Meme Master Meme Lord is an internet slang term used to refer to someone who shows a strong passion for memes.[9] The alternate term Meme Master is often used as a synonym.[10] Meme Master was first used on March 2nd, 2006, by user Duffergeek on his blog.[11] In his post titled C’est la même meme he posts various facts about himself and near the end says “1. Leslie – Go Go Meme Master!” Memeing Memeing is an internet slang verb that means to create or spread a meme. In 2013, the verb evolved to also mean communicating through memes.[7] On May 3rd, 1996, Matthew Aaron Taylor first used the term memeing in the title Fiction, AL, and the Memeing of Life for an online article about memes on the site Telepolis.[8] Meme Overload Meme Overload is internet slang which indicates that multiple internet meme references have been made. It often refers to images and videos, but can also be seen as a subgenre of online remix culture largely driven by the hyperinflation of online media and in-jokes in general. Meme Magic Meme Magic is a slang term used to describe the hypothetical power of sorcery and voodoo supposedly derived from certain internet memes that can transcend the realm of cyberspace and result in real life consequences. Since its coinage on the imageboard 8chan, the fictitious concept has gained popularity on 4chan’s /pol/ (politically incorrect) board and been heavily associated with several in-jokes and shitposting fads on the site, including Ebola-chan, Baneposting, and Donald Trump. Dank Memes Dank Memes is an ironic expression used to mock online viral media and in-jokes that have exhausted their comedic value to the point of being trite or cliché. In this context, the word “dank,” originally coined as a term for high quality marijuana, is satirically used as a synonym for “cool.” External References [1] Wikipedia – Richard Dawkins; Fathering the meme [2] Dictionary – Meme [3] KnowYourMeme – Internet Meme Database [4] Encyclopedia Dramatica – Main Page [5] Wikipedia – Internet meme [6] FAQs – Internet – The 1970s, The 1980s, Birth of the Internet [7] Urban Dictionary – Memeing [8] Telepolis – Fiction, AL, and the Memeing of Life [9] Urban Dictionary – memelord [10] Urban Dictionary – meme master [11] Duffergeek – Duffergeek March 2006 SOURCE and much more on the subject Special thanks goes to @SnakeMasteR who posted somewhere else the link to the site Hey @fl0ppyd1scours3, you might be interested, as you are the starter of nsane general meme thread.
  23. Hi I have a broadband connection and a 4G mobile data service as internet service to my laptop (Windows). The broadband data speed is high but the internet service goes off often and resumes. To manage that I got a 4G mobile data service - internet connection which has lower data speed while is having a daily limit. I always connect both my broadband and 4G mobile data service with my laptop. When both services are up, how to know which internet service (broadband or 4G mobile) is being utilized by system (alternatively, how to assign broadband as preferred internet connection for the system?) Looking for a (internet service / connection fail-over mechanism) software or any internet network configuration such that the internet for laptop works mainly on broadband and should switch AUTOMATICALLY to mobile data service, in case of broadband service failure and switch BACK automatically to broadband, once the broadband service resumes Thank you
  24. Firefox Portable Latest Build Online Installer by demon.devin (Softables.tk/) Built using the latest version of my PortableApps Compiler; Installer code included as well. Thanks to @Geez for pointing me in the right direction for adding the version selection custom install page. I had to heavily rewrite and debug anyway but I got it and it looks sweet.. To upgrade Firefox Portable, simply rerun the installer and enter your desired version of Firefox that you would like to download and install. New In Rev. 2: When installing this PAF, there's a page where it asks you to enter the version you want to install. To install the latest, stable build enter: latest To install the latest, Beta build enter: beta To install the latest, DevEdition build enter: devedition To install the latest, ESR build enter: esr To install any other version, enter the version number of that build and install as normal. HASHES: CRC32: 3288851D MD5: B5148B93B1ADAA4719B747B12EE1559C DOWNLOADS: Mirrors: http://softables.tk/depository/internet/firefox Site: https://www.upload.ee Sharecode[?]: /files/7601871/FirefoxPortable_x86_x64_Latest_Builds_Rev._2_online.paf.exe.html
  25. Last Friday, someone in Google fat-thumbed a border gateway protocol (BGP) advertisement and sent Japanese Internet traffic into a black hole. The trouble began when The Chocolate Factory “leaked” a big route table to Verizon, the result of which was traffic from Japanese giants like NTT and KDDI was sent to Google on the expectation it would be treated as transit. Since Google doesn't provide transit services, as BGP Mon explains, that traffic either filled a link beyond its capacity, or hit an access control list, and disappeared. The outage in Japan only lasted a couple of hours, but was so severe that Japan Times reports the country's Internal Affairs and Communications ministries want carriers to report on what went wrong. BGP Mon dissects what went wrong here, reporting that more than 135,000 prefixes on the Google-Verizon path were announced when they shouldn't have been. Since it leaked what the monitors call “a full table” to Verizon, the fat-thumb error also provided a “peek into what Google's peering relationships look like and how their peers traffic engineer towards Google”. For example, BGP Mon explains how the mistake hit ISP Jastel (Jasmine Telecom) in Thailand: “If we take a closer look at the AS paths involved starting at the right side, we see the prefix was announced by 45629 (Jastel) as expected. Since Jastel peers with Google (15169) that’s the next AS we see. The next AS in the path is 701 (Verizon) and this is where it is getting interesting as Verizon has now started to provide transit for Jastel via Google. “Verizon (701) then announced that to several of it’s customers, some of them very large such as KPN (286) and Orange (5511). So by just looking at four example paths we can see it hit large networks in Europe, Latin America, the US, and India (9498 Airtel).” BGP is the Internet's protocol for distributing routing information between networks. A BGP advertisement shouts out to the rest of the internet to announce things like “if you give me traffic for Verizon, it will reach its destination”. Designed for a more trusting (and much smaller) Internet, BGP's most serious shortcoming is that it's up to network admins to check and filter information in route advertisements. As BGP Mon notes, BGP leaks are “a great risk to the Internet's stability”, and both sides of an advertisement should be filtering them before accepting them. Previous BGP incidents have sent YouTube traffic to Pakistan, blackholed Chinese traffic, made Belarus the default route for more traffic than it could handle, and redirected Level 3's traffic to Malaysia. There are various proposals to tweak BGP to stop this sort of thing happening, but as is so often the case, implementation is lagging far behind requirement. Article BGPMON - explanation of cause of outages in Japan and beyond
×
×
  • Create New...