Youtube Increase Upload Limit to 15 Minutes
Facebook To Birthday Pigs: ‘F*ck You B*tches’
YouTube Increases Video Upload Length to 15 Minutes
Tips to avoid ATM fraud at home and abroad
Google Plans To Make $10 Billion A Year From Mobile
‘Unhackable’ Android can be hacked
Brilliant Adobe Photoshop CS5 Tutorials From 2010
Best Safari 5 Extensions
Ballmer: Killing the iPad is a “job one urgency”
Seven Key Masters Have the Power to Restart the Internet
Have a happy SysAdmin Day (despite the pay)
20 Tips and Tricks to Become the Ultimate iPhoto Power User
Archive for July, 2010
The ergonomics of BlackBerrys make them difficult to fit into a stand-up dock or charging cradle, as evidenced by scant appearance in our roundup of nine non-iPhone docks. Modified soap dishes, however, make for a nice fit.
One crafty BlackBerry owner looked at a 99-cent Molger bamboo soap dish and thought its shape and size made for a nice fit with his phone. With a bit of sticky velcro, Hrishikesh modified his desk to keep a charger plug off the ground and keep the nicely wood-matched cradle in place when his phone wasn’t present and charging. The soap dish can, of course, hold phones other than BlackBerry models, but its wide base seems like a very good fit.
Free Font Two One
Age Free Font
Piron Free Ront
Code Free Ront
Acid Type Font
Zero One Base Font
Chunk Five Font
Val Stencil Font
Q Section Font
Sumkin Typeface Font
Oblik Serif Font
Dekar Free Font
Saf Free Font
Q H Font
Have a look at the sites below and give us your view on the best one. If anyone would like to add their own desktop backgrounds feel free to add a link in the comments section.
Mass BitTorrent Lawsuits Now Target Private Trackers
Mass lawsuits against alleged file-sharers, such as those from the US Copyright Group and lawyers ACS:Law and Gallant MacMillan in the UK, are generally accepted to have been generated from evidence gathered from big public BitTorrent sites. Now it appears that at least one other firm has jumped on the bandwagon, this time targeting a large private tracker.
WikiLeaks today released over 75,000 reports covering the war in Afghanistan.
The Afghan War Diaries an extraordinary secret compendium of over 91,000 reports covering the war in Afghanistan from 2004 to 2010. The reports describe the majority of lethal military actions involving the United States military. They include the number of persons internally stated to be killed, wounded, or detained during each action, together with the precise geographical location of each event, and the military units involved and major weapon systems used.
How to Relax at Pentagon? Watch Child Porn
Intellectually, you know better than to do something stupid like surf for porn while at work. Just the same, some people do it like the dozens of NSA, DARPA, DoD, and other Pentagon officials who possess security clearances, but allegedly purchased and downloaded child pornography over the Internet.
Apple loses big in DRM ruling: jailbreaks are “fair use”
Every three years, the Library of Congress has the thankless task of listening to people complain about the Digital Millennium Copyright Act. The DMCA forbade most attempts to bypass the digital locks on things like DVDs, music, and computer software, but it also gave the Library the ability to wave its magical copyright wand and make certain DRM cracks legal for three years at a time.
US security chiefs tricked in social networking experiment
Anna Chapman need never have bothered with moving to Manhattan to become a sleeper agent for the Russian intelligence service. The experience of another femme fatale, Robin Sage, suggests the 28-year-old spy, who posted raunchy photos on her Facebook profile, should instead have honed her social networking skills.
Tags: Free, gaming, online games
Online games are a great way to play good games on low end pc’s even if you are at work, here is a list of the top 10 free
Quake Live : The gameplay of Quake Live consists of players attempting to frag more of their opponents than any other player or team in a given match. This is achieved by navigating a 3D environment and shooting other players with a variety of weapons, while collecting health, armor, weapons, ammo and various power-ups.
2) zOMG : zOMG! is an offbeat, browser based MMO from Gaia Online. Grab your friends or go it alone as you battle your way across a rich world of sci-fi adventures.
3) RuneScape : RuneScape is a fantasy massively multiplayer online role-playing game (MMORPG) released in January 2001 by Andrew and Paul Gower. It is a graphical browser game implemented on the client-side in Java, and incorporates 3D rendering. It is recognised by the Guinness World Recordsas the world’s most popular free MMORPG.
4) Imperion : More than just a strategy game, Imperion is the gateway to a new era of reckoning – the colonization of endless space has begun. Join the experience and decide the fate of your people as their commander.
5) Power Soccer : The world’s best 3D online soccer game and its free to play online in your browser. Guys, this is best game for playing Soccer online and have some fun before 2010 FIFA World Cup starting after few days.
6) Gilfor’s Tales : Gilfor’s Tales is the fantasy MMORPG made by Studio Sodigital, the creator of Arthic. It’s completely available through your web browser. The whole game is made in Flash 9 containing realtime rendered 3D graphics.
7) Adventure Quest Worlds : A massively multiplayer game that plays online with Flash right inside your web browser. No software to download or install — and this MMO is free! Battle monsters in real-time RPG combat alongside your friends.
8 ) Phosphor : Phosphor is a first-person shooter created with Adobe Director. It runs on your browser with the help of Adobe Shockwave player.Current development is focused on improving multiplayer games.
9) ORANGEfps : ORANGEfps is a browser based First Person Shooter Game, a place where all First Person Shooter lovers can come play a completely free, fast paced, multi and single player shooter all in your browser. No complicated registration or downloads necessary, just click and play the way games should be played.
10) Earth Eternal : Its a new 3D MMO adventure game with unique gameplay. Set in a high-fantasy universe that combines real-world history, legend, and myth with original creations, Earth Eternal incorporates a blend of original fiction, mythologies from Norse to Egyptian, and classic fairy tales into an epic, sweeping story.
Tags: Downloads, torrent
This weeks most downloaded films as reported by Torrent Freak
|Ranking||(last week)||Movie||Rating / Trailer|
|1||(1)||Clash Of The Titans||6.0 / trailer|
|2||(…)||Death At A Funeral||4.8 / trailer|
|3||(2)||Repo Men||6.2 / trailer|
|4||(…)||The Ghost Writer||7.8 / trailer|
|5||(5)||The Karate Kid||5.8 / trailer|
|6||(3)||The Twilight Saga: Eclipse (TS)||4.3 / trailer|
|7||(4)||The A-Team (R5)||7.5 / trailer|
|8||(9)||Green Zone||7.2 / trailer|
|9||(6)||Hot Tub Time Machine (R5)||7.2 / trailer|
|10||(back)||The Bounty Hunter||5.1 / trailer|
Tags: pirate, Swedish
The Swedish Pirate Party, who are at the forefront of anti-copyright lobbying in Sweden, are planning to shake up the country’s ISP market. After taking over the supply of bandwidth to The Pirate Bay, Piratpartiet will now partner in the launch of Pirate ISP, a new broadband service that will offer anonymity to customers and provide financial support to the Party.
To defend the rights of BitTorrent users worldwide, the Swedish Pirate Party volunteered to provide bandwidth to The Pirate Bay after previous hosts got into legal trouble in May. At the beginning of July, the Pirate Party surprised again. Not only would they be The Pirate Bay’s new host, but they would use Parliamentary immunity to run the site from inside the Swedish Parliament.
Now the Party have made another interesting announcement. Together with technology partners, they will enter the broadband market with Pirate ISP, a new service designed to deliver consumer Internet in line with the Pirate Party’s ideals.
Gustav Nipe, student of economics, long-standing Pirate Party member and CEO of Pirate ISP told TorrentFreak that Pirate ISP is based on the hacker ontology. “If you see something and you think it’s broken you build a patch and fix it. With that as a reference point we are launching an ISP. This is one way to tackle the big brother society.”
“The Pirate ISP is needed in different ways. One is to compete with other ISPs, let them fight more for our internet. If they don’t behave there will always be someone else taking their share,” Nipe added.
Aside from the competition angle, Gustav Nipe told TorrentFreak that the Pirate ISP will maximize privacy for all its customers. Operated by ViaEuropa – the company behind the iPredator anonymity service – Pirate ISP users will remain anonymous.
The service began beta testing in the city of Lund yesterday with around 100 residents of LKF, a housing organization whose aim is to provide quality accommodations at a reasonable cost.
After the first two weeks of testing, the initial expansion aim is to take 5% of the market in Lund and then set up in further locations around Sweden. This is a reasonable aim according to Nipe, who told TorrentFreak that they start small so they can assure quality service to all their customers.
At the Hacknight conference in Malmö, Nipe told Shane Murray from nrli.tv that they will not allow the Swedish Government to monitor Pirate ISP users and will refuse to retain logs. He warned that any attempt to force it to do otherwise will result in a constitutional issue.
Nipe was also clear on how Pirate ISP would respond to outside interference, in particular that from the United States.
“They can bring on whatever they have, we will refuse to follow there. We don’t agree with what they are saying and we don’t agree with the laws they are making so if they have an issue with us, then we will have an issue – but that’s it.”
For most potential Pirate ISP customers who intend to use the service to file-share, the immediate threats will come from closer to home, primarily from Henrik Pontén at Svenska Antipiratbyrån, the Swedish Anti-Piracy Bureau. Nipe said they are prepared to deal with this challenge.
“It would be a pity to reveal all the tricks that we have, so we will save those for later. But we have ways to ensure that no customer should have to get a sad letter home from Henrik Pontén.”
For his part, yesterday Pontén seemed unimpressed.
“Our investigations have focused on people with much higher safety. The question has been asked a thousand times before,” he said. “When the police come calling, they must disclose the information.”
It seems that the wider Swedish public won’t have long to wait to discover if Pirate ISP can live up to its promises. According to Nipe they will roll out big in Sweden at the end of this summer.
Tags: Cyber Crime, Hacking
There may be no country on the planet more vulnerable to a massive cyberattack than the United States, where financial, transportation, telecommunications and even military operations are now deeply dependent on data networking.
What’s worse: U.S. security officials say the country’s cyberdefenses are not up to the challenge. In part, it’s due to a severe shortage of computer security specialists and engineers with the skills and knowledge necessary to do battle against would-be adversaries. The protection of U.S. computer systems essentially requires an army of cyberwarriors, but the recruitment of that force is suffering.
“We don’t have sufficiently bright people moving into this field to support those national security objectives as we move forward in time,” says James Gosler, a veteran cybersecurity specialist who has worked at the CIA, the National
Security Agency and the Energy Department.
If U.S. cyberdefenses are to be improved, more people like Gosler will be needed on the front lines. Gosler, 58, works at the Energy Department’s Sandia National Laboratory in Albuquerque, N.M., where he focuses on ways to counter efforts to penetrate U.S. data networks. It’s an ever-increasing challenge.
“You can have vulnerabilities in the fundamentals of the technology, you can have vulnerabilities introduced based on how that technology is implemented, and you can have vulnerabilities introduced through the artificial applications that are built on that fundamental technology,” Gosler says. “It takes a very skilled person to operate at that level, and we don’t have enough of them.”
Gosler estimates there are now only 1,000 people in the entire United States with the sophisticated skills needed for the most demanding cyberdefense tasks. To meet the computer security needs of U.S. government agencies and large corporations, he says, a force of 20,000 to 30,000 similarly skilled specialists is needed.
Some are currently being trained at the nonprofit SANS (SysAdmin, Audit, Network, Security) Institute outside Washington, D.C., but the demand for qualified cybersecurity specialists far exceeds the supply.
“You go looking for those people, but everybody else is looking for the same thousand people,” says SANS Research Director Alan Paller. “So they’re just being pushed around from NSA to CIA to DHS to Boeing. It’s a mess.”
The Center for Strategic and International Studies highlights the problem in a forthcoming report, “A Human Capital Crisis in Cybersecurity.“
According to the report, a key element of a “robust” cybersecurity strategy is “having the right people at every level to identify, build and staff the defenses and responses.”
The CSIS report highlights a “desperate shortage” of people with the skills to “design secure systems, write safe computer code, and create the ever more sophisticated tools needed to prevent, detect, mitigate and reconstitute from damage due to system failures and malicious acts.”
The cyber manpower crisis in the United States stands in sharp contrast to the situation in China, where the training of computer experts is a top national priority. In the most recent round of the International Collegiate Programming Contest, co-sponsored by IBM and the Association for Computing Machinery, Chinese universities took four of the top 10 places. No U.S. university made the list.
The Chinese government, in fact, appears to be systematically building a cyberwarrior force.
“Every military district of the Peoples’ Liberation Army runs a competition every spring,” says Alan Paller of SANS, “and they search for kids who might have gotten caught hacking.”
One of the Chinese youths who won that competition had earlier been caught hacking into a Japanese computer, according to Paller, only to be rewarded with extra training.
“Later that year, we found him hacking into the Pentagon,” Paller says. “So they find them, they train them, and they get them into operation very, very fast.”
Some members of Congress, eager to follow China’s example, are now promoting a U.S. Cyber Challenge, a national talent search at the high school level. The aim is to find up to 10,000 potential cyberwarriors, ready to play both offense and defense.
“The idea is for schools around the country to field teams, and the teams would compete against one another,” says Sen. Thomas Carper, a Delaware Democrat who is one of the backers of the effort. He sees the challenge as an opportunity “not only for them to hone their skills on being able to hack into other systems, particularly those of folks we may not be fond of, but also to use what they learn to strengthen our defenses.”
In order to protect a computer system, one needs to know how someone might attack it. Last year’s preliminary Cyber Challenge game was won by a 17-year-old from Connecticut — Michael Coppola — who was smart enough to hack into the game computer and add points to his own score.
“There’s actually a flaw within that Web application,” Coppola says. “Using that, I was able to execute commands on the computer running the scoring software, and I was able to add points and basically do whatever I wanted.”
It was certainly an unconventional approach, but the competition judges were so impressed by Coppola’s ability to hack into the computer game that they actually rewarded him for changing his score.
“It’s cheating,” Michael says, “but it’s like the entire game is cheating.”
Indeed. People who know how to cheat will soon be on the front lines of cyber defense, because the best way to defend a computer system from attack is to figure out how an adversary would be able to hack into it.
Now 18, Coppola is himself looking to a career in cybersecurity.
Tags: Downloads, Mac
Today we are providing top mac apps for web designers for free download. Free mac apps for web designers is the favorite topic among the designers. Mac users always wait for freeware.
There are many reasons that Mac rule over Windows because of some great features like fast booting time, easy file sharing, excellent graphics and don’t forget cool Mac applications. I think that Mac OS X is the most advanced operating system out there.
I prefer Mac OS X because of excellent apps which helps me to improve productivity and make any task a lot easier. In this article, I am sharing some freeware Mac apps for those who just purchased a new Mac and don’t know what to install.
1) Image Tricks
This is paid application of mac but this is the best mac apps for web designers. Here is trial version available.