Jump to content

Search the Community

Showing results for tags 'Internet'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. visualbuffs

    How fast is your internet speed?

    I wonder what is the plan on other country dsl they have... i got upgraded to 8mb
  2. Russia demands Internet users show ID to access public Wifi (Reuters) - Russia further tightened its control of the Internet on Friday, requiring people using public Wifi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work. The decree, signed by Prime Minister Dmitry Medvedev on July 31 but published online on Friday, also requires companies to declare who is using their web networks. The legislation caught many in the industry by surprise and companies said it was not clear how it would be enforced. A flurry of new laws regulating Russia's once freewheeling Internet has been condemned by President Vladimir Putin's critics as a crackdown on dissent, after the websites of two of his prominent foes were blocked this year. Putin, who alarmed industry leaders in April by saying the Internet is "a CIA project", says the laws are needed to fight "extremism" and "terrorism." More: Communications Minister Nikolai Nikiforov said that demanding ID from Internet users was normal. "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice," he tweeted. A pro-Kremlin lawmaker said the measure was needed to prevent Cold War-style propaganda attacks against Russia. "It's about security. An information war is under way. Anonymous access to the Internet in public areas allows illegal activities to be carried out with impunity," Vadim Dengin, deputy chair of parliament's information technology committee, was quoted by state newspaper Izvestia as saying. Alexei Venediktov, editor of the popular Ekho Moskvy radio, lampooned the decree, saying the government's next step would be to embed a chip in people's chests "to automatically detect potential sellers of information to the enemy." UNEXPECTED Industry experts said vague wording in the decree did not define exactly what state who would have to comply with the law or what methods would be needed to authenticate users' identity. The Communications Ministry said in a statement that a "direct obligation to present identity documents" would only be required at "collective access points" such as post offices where the government provides public access to Wifi. State newspapers Izvestia and Rossiskaya Gazeta said the law required users to provide their full names, confirmed by an ID, at public Wifi access points including cafes and public parks. The personal data would be stored for at least six months. An official with the Moscow city government, Artem Yermolaev, said user identification could be carried out by registering a telephone number and receiving Wifi logins by SMS. Internet companies said they knew little about the new law. "It was unexpected, signed in such a short time and without consulting us," said Sergei Plugotarenko, head of the Russian Electronic Communications Association. The requirement for businesses to declare who was using their Internet networks would be the "biggest headache," he said. "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." Another law, which took affect on Aug. 1, requires bloggers with more than 3,000 followers to register with the government and comply with the same rules as media outlets. Websites are also required to store their data on servers located in Russia from 2016 - a move some believe would cut Russian users off from many international online services. Source
  3. Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then shaking it down for as many bitcoins as possible. Researchers at Dell’s SecureWorks security division say they’ve uncovered a series of incidents in which a bitcoin thief redirected a portion of online traffic from no less than 19 Internet service providers, including data from the networks of Amazon and other hosting services like DigitalOcean and OVH, with the goal of stealing cryptocurrency from a group of bitcoin users. Though each redirection lasted just 30 second or so, the thief was able to perform the attack 22 times, each time hijacking and gaining control of the processing power of a group of bitcoin miners, the users who expend processing power to add new coins to the currency’s network. The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.” The Dell researchers believe the bitcoin thief used a technique called BGP hijacking, which exploits the so-called border gateway protocol, the routing instructions that direct traffic at the connection points between the Internet’s largest networks. The hacker took advantage of a staff user account at a Canadian internet service provider to periodically broadcast a spoofed command that redirected traffic from other ISPs, starting in February and continuing through May of of this year. The Dell researchers won’t name that ISP, and they’re not sure how the hacker gained access to the account or whether he or she might have in fact been a rogue staffer. That BGP hijack allowed the hacker to redirect the miners’ computers to a malicious server controlled by the hijacker. From that server, the hacker sent the mining machines a “reconnect” command that changed the mining computers’ configuration to contribute their processing power to a pool that stockpiled the bitcoins they produced rather paying them out to the mining pool’s participants. “Some people are more attentive to their mining rigs than others,” says Joe Stewart, a Dell researcher whose own computers were caught up in one victimized mining pool. “Many users didn’t check their setups for weeks, and they were doing all this work on behalf of the hijacker.” In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack. But the total haul could be larger; The researchers stopped collecting data for several weeks of the attack because Stewart broke his ankle in the midst of the study. BGP hijacking has been discussed as a potential threat to internet security since as early as 1998, when a group of hackers known as the L0pht testified to congress that they could use the attack to take down the entire internet in 30 minutes. The scheme gained renewed attention at the DefCon security conference in 2008, and five years later was used to temporarily and mysteriously redirect a portion of US internet traffic to Iceland and Belarus. Compared to those large-scale digital hijackings, the latest bitcoin heist was a much smaller and targeted traffic-stealing operation. And given that it required inside access to an ISP, Dell’s researchers don’t expect Bitcoin thieves to repeat the attack any time soon. In fact, the BGP bitcoin-stealing exploits represent less of a new vulnerability in bitcoin than the persistent fragility of the internet itself, Dell’s researchers say. If one Canadian ISP can be used to redirect large flows of the Internet to steal a pile of cryptocurrency, other attackers could just as easily steal massive drifts of Internet data for espionage or pure disruption. The Dell researchers suggest that companies set up monitoring through a service like BGPmon, which can detect BGP hijacking attacks. But they shouldn’t expect to be able to actually prevent those attacks any time soon. “We’re going to see other events like this,” says Dell’s Stewart. “It’s ripe for exploitation.” Source
  4. 27 January 2014 Last updated at 13:10 GMT The BBC's Gordon Corera explains how agencies spy in the digital world The internet was designed to be free and open. Eight months after Edward Snowden's first leaks of classified information, is that still the case? The technology pioneers who designed the net's original protocols saw their creation as a way to share information freely across a network of networks. Yet Edward Snowden's leaks of classified documents from the US National Security Agency have revealed that American spies - and their British counterparts at GCHQ - now use that very same internet to sweep up vast amounts of data from the digital trail we leave every day. It isn't simply that they mine social media updates and the information we already give to companies. The NSA and GCHQ have allegedly tapped into the internet's structure. An ever-growing network Much like the universe in the aftermath of the Big Bang, the internet is expanding. From humble beginnings as a project within the US Department of Defense, the net has grown with each technological advance. This growth has required an ever-expanding physical infrastructure of routers, cables, data centres and other hardware. Between 1994 and 2013 they multiplied many times over. Internet backbone The giants of the net are companies and organisations that provide the so-called internet backbone, transferring data around the net over high capacity fibre optic cables. This map, made using data from Peer 1's Map of the Internet, shows the relative connectedness of organisations online. The biggest blobs - those with the most connections - are the backbone firms, dwarfing the likes of Google and Amazon. How data is transferred Almost everything we do online passes through a backbone company. If, for example, a student living in London sends an email to a friend in Brazil, the message will hop around the network and will often travel through a backbone firm like Level 3 Communications in the USA, which describes itself as "network provider for much of the world's communications infrastructure". So if the cables of firms like Level 3 were intercepted, the security agencies would have access to a huge amount of the world's internet traffic. In November 2013, the New York Times reported that the NSA may have accessed Google and Yahoo via Level 3's cables. In statement, the firm told the BBC: "We comply with applicable laws in each of the countries where we operate. In many instances, laws forbid us from revealing any details relating to our compliance, and make it a crime for us to discuss any required access to data. "Some media sources have incorrectly speculated that we have agreements with governments where we voluntarily provide access to network data even when we are not compelled to do so. That is incorrect. Customer privacy is paramount to our business. We do not allow unauthorised access to our network by any entity and will continue to operate our network to protect and secure our customers' data, while adhering to the laws that apply to Level 3 as well as all other telecommunications providers." Tapping cables Land-based cables are not the only physical access points for intercepting data. Snowden documents published in the Guardian last June indicate that the US and Britain's spy programmes aimed at "mastering the internet" include tapping the undersea cables through which data - and phone calls - flow. The documents claim GCHQ was able to monitor up to 600 million communications every day. The information describing internet and phone use was allegedly stored for up to 30 days in order for it to be sifted and analysed. GCHQ declined to comment on the claims but said its compliance with the law was "scrupulous". http://www.bbc.co.uk/news/technology-25832341
  5. Ever since XP.. i have never installed Adobe Flash.. i've always used a portable browser... with portable flash.. But Windows 8 natively comes bundled with Adobe Flash! There are tools out there for pre-mastering Windows' images... But this tutorial will focus on already installed /Online installs.. which i just uninstalled IE.. and wanted Flash gone as well.. 1. Navigate here to get your flash package: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages 2. Start PowerShell. 3. enable unsigned PowerShell scripts: Set-ExecutionPolicy -ExecutionPolicy RemoteSigned 4. Now scroll below and verify "Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" matches your registry key in Step 1. - if your package version is different.. edit all occurrence with your package version. 5. Now manually execute each command below.. 1 line at a time. $acl = get-acl -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing"$inherit = [system.security.accesscontrol.InheritanceFlags]"ContainerInherit, ObjectInherit"$propagation = [system.security.accesscontrol.PropagationFlags]"None"$rule = new-object system.security.accesscontrol.registryaccessrule "Administrators","FullControl",$inherit,$propagation,"Allow"$acl.addaccessrule($rule)$acl | set-aclSet-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name Visibility -Value 1New-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name DefVis -PropertyType DWord -Value 2Remove-Item -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384\Owners"dism.exe /Online /Remove-Package /PackageName:Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384If you followed the tutorial to a T.. you should see something similar to my output: Note: for extreme minimalists.. this procedure could be used to remove other packages.. dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-Camera-Package~31bf3856ad364e35~x86~~6.3.9600.16384dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-FileManager-Package~31bf3856ad364e35~x86~~6.3.9600.16384
  6. Internet Download Accelerator 5.19.0 Internet Download Accelerator lets you to noticeably increase the speed of file download from the Internet using HTTP, HTTPS and FTP protocols. The acceleration is achieved by splitting a file being downloaded into several parts and downloading these parts at the same time. Internet Download Accelerator resumes broken downloads from where they left off from both HTTP, HTTPS and FTP servers. To increase usability Internet Download Accelerator integrates with Internet Explorer, Firefox, Mozilla, Opera, Nescape and others, replacing the standard download modules. Moreover, the program monitors the system clipboard and detects URLs in the clipboard. With IDA you can download and save video from popular video sharing services: YouTube, Google Video, Metacafe and others. The program also contains: FTP Explorersite manager for password and download folders managementschedulerdownload speed control, automatic mode for the most comfortable browsing on the Webdial for dial-up connectionsearch for files, programs, games, and musicIDA Bar - a toolbar for Internet ExplorerNew en version: Possibility to save clips downloaded from YouTube as mp3 (in the Add download window choose "mp3" in the Desired quality menu);Smart Pause mode offers new ways to start downloads automatically;Improved integration with free video-converter Convertilla;Added ability to stop all downloads except those which do not support resume;Added ability to download clips from YouTube with minimal resolution 240p;YouTube downloads can be resumed for an unlimited time after start;Search for new downloads added to the toolbar;Improved plug-in management;Added support for the 4th and 5th mouse buttons in the embedded browser;Improved integration/disintegration into Internet Explorer, Opera, Chrome, Firefox, Safari;Improved download over HTTPS;Improved automatic detection of new file versions availability, Autoupdate folder;The descript.ion is updated when the download file name changes;Improved automatic IDA update;Fixed bugs in IDA Portable;Fixed bug with incorrect selection handling while changing categories;Fixed bug with renaming YouTube downloads;Other minor bugs fixed.Homepage: http://www.westbyte.com/ida/ OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Keygen Size: 6,23 Mb.
  7. By Diane Bartz WASHINGTON Mon Jan 13, 2014 12:12pm EST Visitors to the Supreme Court are pictured in the rain in Washington, October 7, 2013. Credit: Reuters/Jason Reed (Reuters) - The U.S. Supreme Court said on Monday it would not take on an Internet technology patent case that pitted a company accused of aggressively enforcing weak patents against another with an equally tough reputation for fighting patent infringement claims. The closely watched case involved the online shopping site Newegg Inc, which specializes in computer products, and software company Soverain Software LLC, which had accused Newegg of infringing three patents known as the "shopping cart patents," which describe a way to buy products online and pay for them. Chicago-based Soverain had filed similar lawsuits against a long list of companies, including J. Crew Group, Macy's Inc and Williams-Sonoma. Against Newegg, Soverain won in the U.S. District Court for the Eastern District of Texas but lost at the U.S. Court of Appeals for the Federal Circuit, which ruled that the three online shopping patents were invalid because they were obvious. In its filing to the Supreme Court, Newegg argued that the Federal Circuit decision should be upheld. "Petitioner's notorious 'shopping cart' patent merely applies the common sense concept of a shopping cart to the Internet," Newegg said. Newegg's chief legal officer, Lee Cheng, applauded the decision. "The witch is dead, hurray," he said. "We are very, very pleased that the Supreme Court has recognized ... these patents should never have been granted in the first place. What we have showed in the Soverain case is the fighting back works." Soverain President Katharine Wolanyk said, "We're obviously disappointed that the court denied our petition," said Wolanyk. "It's a really tough time to be a patent owner." There are a variety of bills before Congress aimed at reining in what many tech companies complain is frivolous patent litigation. Patrick Leahy, chairman of the Senate Judiciary Committee, has sponsored legislation aimed at targeting patent assertion entities (PAEs) - companies often known derisively as "patent trolls" - which buy or license patents and then extract licensing fees or file infringement lawsuits seen as frivolous. The U.S. House of Representatives passed a bill in December that would encourage judges to award fees to the winner of an infringement lawsuit if the judge deems the lawsuit unfounded. The White House urged Congress last June to take steps to curb abusive patent lawsuits that have sprung up in recent years, especially in the technology sector. The case is Soverain Software LLC v. Newegg Inc., 13-477, U.S. Supreme Court. (Reporting by Diane Bartz; Editing by Ros Krasny and Jonathan Oatis) http://www.reuters.com/article/2014/01/13/us-scotus-newegg-soverain-idUSBREA0C13Q20140113 Cooment: Supreme Court worked hard today, but all are important cases :)
  8. This story was published: 6 hours ago January 07, 2014 2:57AM A study has found no evidence of time travel like that in Back to the Future starring Christopher Lloyd (as Dr. Emmett Brown) and Michael J. Fox (as Marty McFly). Source: Supplied A US study has trawled the internet for time travellers looking for evidence of anyone mentioning future events before they happened. The study's author, Robert Nemiroff, a physicist at Michigan Technological University, scoured Twitter, Facebook, Google Google+ and Bing for any mention of Pope Francis or the comet ISON between the early 2000s to mid-2013. Their searching, the largest study of its kind to date, came up short suggesting there is no such thing as time travel, according to Popular Science. Mr Nemiroff said he and his colleague Teresa Wilson found Twitter to be the most useful service; Google turned up too many false-positives, and Facebook allows user to backdate posts, confusing the search effort. The scientists presented their study at a scientific meeting overnight and have submitted it to several journals. Mr Nemiroff said he came up with the idea for the research during a poker game with students. It isn't the first time people have tried to prove the existence of time travel. In 2012 physicist Stephen Hawking held a party for time travellers but sadly nobody came. http://www.news.com.au/technology/science/robert-nemiroff-a-physicist-at-michigan-technological-university-trawls-internet-in-search-of-time-travel-by/story-fn5fsgyc-1226796201070
  9. NASA’s Lunar Laser Communication Demonstration (LLCD) has made history using a pulsed laser beam to transmit data over the 239,000 miles between the moon and Earth at a record-breaking download rate of 622 megabits per second (Mbps). LLCD is NASA’s first system for two-way communication using a laser instead of radio waves. It also has demonstrated an error-free data upload rate of 20 Mbps transmitted from the primary ground station in New Mexico to the spacecraft currently orbiting the moon. “LLCD is the first step on our roadmap toward building the next generation of space communication capability,” said Badri Younes, NASA’s deputy associate administrator for space communications and navigation (SCaN) in Washington. “We are encouraged by the results of the demonstration to this point, and we are confident we are on the right path to introduce this new capability into operational service soon.” Since NASA first ventured into space, it has relied on radio frequency (RF) communication. However, RF is reaching its limit as demand for more data capacity continues to increase. The development and deployment of laser communications will enable NASA to extend communication capabilities such as increased image resolution and 3-D video transmission from deep space. “The goal of LLCD is to validate and build confidence in this technology so that future missions will consider using it,” said Don Cornwell, LLCD manager at NASA’s Goddard Space Flight Center in Greenbelt, Md. “This unique ability developed by the Massachusetts Institute of Technology’s Lincoln Laboratory has incredible application possibilities.” LLCD is a short-duration experiment and the precursor to NASA’s long-duration demonstration, the Laser Communications Relay Demonstration (LCRD). LCRD is a part of the agency’s Technology Demonstration Missions Program, which is working to develop crosscutting technology capable of operating in the rigors of space. It is scheduled to launch in 2017. LLCD is hosted aboard NASA’s Lunar Atmosphere and Dust Environment Explorer (LADEE), launched in September from NASA’s Wallops Flight Facility on Wallops Island, Va. LADEE is a 100-day robotic mission operated by the agency’s Ames Research Center at Moffett Field, Calif. LADEE’s mission is to provide data that will help NASA determine whether dust caused the mysterious glow astronauts observed on the lunar horizon during several Apollo missions. It also will explore the moon’s atmosphere. Ames designed, developed, built, integrated and tested LADEE, and manages overall operations of the spacecraft. NASA’s Science Mission Directorate in Washington funds the LADEE mission. The LLCD system, flight terminal and primary ground terminal at NASA’s White Sands Test Facility in Las Cruces, N.M., were developed by the Lincoln Laboratory at MIT. The Table Mountain Optical Communications Technology Laboratory operated by NASA’s Jet Propulsion Laboratory in Pasadena, Calif., is participating in the demonstration. A third ground station operated by the European Space Agency on Tenerife in the Canary Islands also will be participating in the demonstration. Original Article
  10. When ISPs and video providers fight over money, Internet users suffer. Lee Hutchinson has a problem. My fellow Ars writer is a man who loves to watch YouTube videos—mostly space rocket launches and gun demonstrations, I assume—but he never knows when his home Internet service will let him do so. "For at least the past year, I've suffered from ridiculously awful YouTube speeds," Hutchinson tells me. "Ads load quickly—there's never anything wrong with the ads!—but during peak times, HD videos have been almost universally unwatchable. I've found myself having to reduce the quality down to 480p and sometimes even down to 240p to watch things without buffering. More recently, videos would start to play and buffer without issue, then simply stop buffering at some point between a third and two-thirds in. When the playhead hit the end of the buffer—which might be at 1:30 of a six-minute video—the video would hang for several seconds, then simply end. The video's total time would change from six minutes to 1:30 minutes and I'd be presented with the standard 'related videos' view that you see when a video is over." Hutchinson, a Houston resident who pays Comcast for 16Mbps business-class cable, is far from alone. As one Ars reader recently complained, "YouTube is almost unusable on my [Verizon] FiOS connection during peak hours." Another reader responded, "To be fair, it's unusable with almost any ISP." Hutchinson's YouTube playback has actually gotten better in recent weeks. But complaints about streaming video services—notably YouTube and Netflix—are repeated again and again inarticles and support forums across the Internet. Why does online video have such problems? People may assume there are perfectly innocent causes related to their computers or to the mysterious workings of the Internet. Often, they're correct. But cynical types who suspect their Internet Service Providers (ISPs) intentionally degrade streaming video may be right as well. No, your ISP (probably) isn't sniffing your traffic every time you click a YouTube or Netflix link, ready to throttle your bandwidth. But behind the scenes, in negotiations that almost never become public, the world's biggest Internet providers and video services argue over how much one network should pay to connect to another. When these negotiations fail, users suffer. In other words, bad video performance is often caused not just by technology problems but also by business decisions made by the companies that control the Internet. These business decisions involve "peering" agreements that Internet companies make to pass traffic from one to another and negotiations over caching services that store videos closer to people's homes so they can load faster in your browser. When Internet providers refuse to upgrade peering connections, traffic gets congested. When ISPs refuse to use the caching services offered by the likes of Google and Netflix, video has to travel farther across the Internet to get to its final destination—your living room. The negotiations can lead to brinksmanship and bad blood. Recent public examples of such spats include: November 2010: After Internet backbone provider Level 3 signs a deal with Netflix to distribute video, Comcast demands money from Level 3 for carrying traffic over the proverbial "last mile" to Comcast subscribers.January 2011: European ISPs Deutsche Telekom, Orange (formerly France Telecom), Telecom Italia, and Telefónica commission a report saying companies like Netflix and Google's YouTube service should give ISPs a lot more money.August 2011: Cogent, another Internet backbone provider that handles Netflix traffic, files a complaint in France against Orange, saying the ISP is providing inadequate connection speeds.January 2013: Free, a French ISP, is accused of slowing down YouTube traffic by failing to upgrade infrastructure (but is later cleared of intentionally degrading YouTube traffic by the French regulator). Free also temporarily blocks ads on YouTube and other video services by sending an update to its modems.January 2013: Orange and Google have a similar dispute, with Orange CEO Stephane Richard claiming victory. He says that Google is paying Orange to compensate the operator for mobile traffic sent from Google servers.January 2013: Time Warner refuses Netflix's offer of a free caching service that would provide better performance to Netflix users on Time Warner's network.June 2013: Cogent accuses Verizon of allowing "ports" between the two providers to fill up, degrading Netflix performance for Verizon customers.July 2013: The European Commission opens an antitrust probe into whether ISPs abused market positions in negotiations with content providers, and it searches the offices of Orange, Deutsche Telekom, and Telefónica. Separately, the French government demands details of interconnection agreements involving AT&T and Verizon.In the most extreme cases, large Internet companies stop passing traffic to one another entirely. (This happened in 2005 with France Telecom and Cogent, in 2005 with Cogent and Level 3, and in 2008 with Sprint and Cogent.) But recent disputes have been less likely to lead to a complete severing of ties. "That type of reaction to a policy is becoming less common, possibly because it's so easy to publicize it," Reggie Forster, director of network engineering at XO Communications, told Ars. "They tend to want to keep that quiet." Instead, network operators can degrade traffic by failing to upgrade connections without severing them entirely. The public won't realize that's what's going on unless negotiations become so contentious that one party makes them public—or a government decides to investigate. Degraded connections disproportionately affect the quality of streaming video because video requires far more bits than most other types of traffic. Netflix and YouTube alone account for nearly half of all Internet traffic to homes in North America during peak hours, according to research by SandVine. And customers are far more likely to be annoyed by a video that stutters and stops than by a webpage taking a few extra seconds to load. Full article
  11. http://www.httrack.com/page/1/en/index.html Changelog v3.47-27 Fixed: fixed logging not displaying robots.txt rules limits by defaultFixed: license year and GPL link, libtool fixes (cicku)Fixed: Keywords field in desktop files (Sebastian Pipping)Downloads: httrack-3.47.27.exehttrack_x64-3.47.27.exehttrack-noinst-3.47.27.ziphttrack_x64-noinst-3.47.27.zip PortableApps.comFormat WinHTTrackPortable_3.47.27_32bit_64bit_Multilingual.paf.exe | CRC: FE213D32 | 4.25 MB (4,459,779 bytes)WinHTTrackPortable_3.47.27_32bit_64bit_Multilingual_online.paf.exe | CRC: B154D9B3 | 1.36 MB (1,430,396 bytes)Makes application portableMakes application stealthDependencies: NoneCompatible: WinAllSynopsis: i use this to rip entire websites, page by page, for offline browsing.. great for tutorials.. Languages: English, Bulgarian, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Japanese, Macedonian, Norwegian, Polish, Portuguese, PortugueseBR, Romanian, Russian, SimpChinese, Slovak, Slovenian, Spanish, Swedish, TradChinese, Turkish, Ukrainian.
  12. By Liat Clark,Feb 7 2014, 3:08am AEST The greatest danger is the emergence of a balkanized Internet. Twenty-five years after the Web's inception, its creator has urged the public to reengage with its original design: a decentralized Internet that remains open to all. Speaking with Wired editor David Rowan at an event launching the magazine's March issue, Tim Berners-Lee said that although part of this is about keeping an eye on for-profit Internet monopolies such as search engines and social networks, the greatest danger is the emergence of a balkanized Web. "I want a Web that's open, works internationally, works as well as possible, and is not nation-based," Berners-Lee told the audience, which included Martha Lane Fox, Jake Davis (aka Topiary) and Lily Cole. He suggested one example to the contrary: "What I don't want is a Web where the Brazilian government has every social network's data stored on servers on Brazilian soil. That would make it so difficult to set one up." It's the role of governments, startups, and journalists to keep that conversation at the fore, he added, because the pace of change is not slowing—it's going faster than ever before. For his part, Berners-Lee drives the issue through his work at the Open Data Institute, World Wide Web Consortium, and World Wide Web Foundation, but also as an MIT professor whose students are "building new architectures for the Web where it's decentralized." On the issue of monopolies, Berners-Lee did say that it's concerning to be "reliant on big companies and one big server," something that stalls innovation, but that competition has historically resolved these issues and will continue to do so. The kind of balkanized Web he spoke about, as typified by Brazil's home-soil servers argument or Iran's emerging intranet, is partially being driven by revelations of NSA and GCHQ mass surveillance. The distrust that it has brewed, from a political level right down to the threat of self-censorship among ordinary citizens, threatens an open Web and is, said Berners-Lee, a greater threat than censorship. Knowing the NSA may be breaking commercial encryption services could result in the emergence of more networks like China's Great Firewall, to "protect" citizens. This is why we need a bit of anti-establishment pushback, alluded to by Berners-Lee. He reiterated the need to protect whistleblowers like Edward Snowden that leak information only in extreme circumstances "because they have this role in society." But more than this, he noted the need for hackers. "It's a really important culture. It's important to have the geek community as a whole think about its responsibility and what it can do. We need various alternative voices pushing back on conventional government sometimes." In the midst of so much political and social disruption, the man who changed the course of communication, education, activism, and so much more remains dedicated to fighting for a Web founded in freedom and openness. But when asked what he would have done differently, the answer was easy. "I would have got rid of the 'slash slash' after the colon. You don't really need it. It just seemed like a good idea at the time." http://arstechnica.com/tech-policy/2014/02/tim-berners-lee-we-need-to-re-decentralize-the-web
  13. selesn777

    Becky! Internet Mail 2.65.07

    Becky! Internet Mail 2.65.07 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keygen Size: 3,91 Mb.
  14. February 5, 2014 5:44 pm EST Countries where the Internet is most controlled and speaking your mind on it can get you in serious trouble with the government, according to the Committee to Protect Journalists: 1. North Korea. All websites are under government control. About 4% of the population has Internet access. 2. Burma. Authorities filter e-mails and block access to sites of groups that expose human rights violations or disagree with the government. 3. Cuba. Internet available only at government controlled "access points." Activity online is monitored through IP blocking, keyword filtering and browsing history checking. Only pro-government users may upload content. 4. Saudi Arabia. Around 400,000 sites have been blocked, including any that discuss political, social or religious topics incompatible with the Islamic beliefs of the monarchy. 5. Iran. Bloggers must register at the Ministry of Art and Culture. Those that express opposition to the mullahs who run the country are harassed and jailed. 6. China. China has the most rigid censorship program in the world. The government filters searches, block sites and erases "inconvenient" content, rerouting search terms on Taiwan independence or the Tiananmen Square massacre to items favorable to the Communist Party. 7. Syria. Bloggers who "jeopardize national unity" are arrested. Cybercafes must ask all customers for identification, record time of use and report the information to authorities. 8. Tunisia. Tunisian Internet service providers must report to the government the IP addresses and personal information of all bloggers. All traffic goes through a central network. The government filters all content uploaded and monitors e-mails. 9. Vietnam. The Communist Party requires Yahoo, Google and Microsoft to divulge data on all bloggers who use their platforms. It blocks websites critical of the government, as well as those that advocate for democracy, human rights and religious freedom. 10. Turkmenistan. The only Internet service provider is the government. It blocks access to many sites and monitors all e-mail accounts in Gmail, Yahoo and Hotmail. http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385
  15. By Grant Gross Feb 11, 2014 1:32 PM The European Union will push for diminished U.S. influence on Internet governance because of “loss of confidence” in the current U.S.-centric model, according to a news report. The European Commission, the executive arm of the E.U., is set Wednesday to propose a series of steps to globalize Internet governance functions, reported The Wall Street Journal, citing an E.U. draft policy paper. The proposal is sparked by revelations of mass U.S. surveillance activities online, the newspaper said. "Large-scale surveillance and intelligence activities have ... led to a loss of confidence in the Internet and its present governance arrangements,” the Journal quotes the policy paper as saying. ICANN (the Internet Corporation for Assigned Names and Numbers), with headquarters in California, currently oversees Internet governance issues, including the assignment of top-level domains. The U.S. government and ICANN have a long-standing operating agreement, but in recent years, many countries have questioned the arrangement. The European policy paper seems to reject a U.N. takeover of Internet governance functions, by rejecting calls for a new international legal regime. The paper calls for a multistakeholder process that ICANN trumpets as its current model. An ICANN spokesman didn’t have an immediate comment on the proposal, while an E.U. spokeswoman wasn’t immediately available for comment. "The Internet should remain a single, open, free, unfragmented network of networks, subject to the same laws and norms that apply in other areas of our day-to-day lives,” the E.U. document said, according to the Journal. “Its governance should be based on an inclusive, transparent and accountable multistakeholder model.” ICANN President and CEO Fadi Chehade, since taking over the organization in mid-2012, has concentrated on giving ICANN a more international focus, and he’s opened offices in Turkey, Singapore, Beijing and Geneva. Governments including Russia, China and Brazil have called for more international governance of the Internet in recent years. Since last year’s revelations about broad U.S. National Security Agency surveillance programs, Brazil has proposed to wall off its Internet traffic from U.S. networks. http://www.pcworld.com/article/2096880/report-eu-to-push-to-reduce-us-role-in-internet-governance.html
  16. selesn777

    Becky! Internet Mail 2.65.06

    Becky! Internet Mail 2.65.06 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keygen Size: 3,90Mb.
  17. MyLanViewer 4.17.2 + Portable MyLanViewer Network/IP Scanner is a powerful Netbios and LAN/Network IP address scanner for Windows, whois and traceroute tool, remote shutdown and Wake On LAN (WOL) manager, wireless network scanner and monitor. This application will help you find all IP addresses, MAC addresses and shared folders of computers on your wired or wireless (Wi-Fi) network. The program scans network and displays your network computers in an easy to read, buddy-list style window that provides the computer name, IP address, MAC address, NIC vendor, OS version, logged users, shared folders and other technical details for each computer. MyLanViewer Network/IP Scanner supports remote shutdown, wake-on-lan, lock workstation, log off, sleep, hibernate, reboot and power off. It is able to monitor IP address and show notifications when the states of some computers change. MyLanViewer Network/IP Scanner can also view and access shared folders, terminate user sessions, disable shared folders, show netstat information and detect rogue DHCP servers. The software can monitor all devices (even hidden) on your subnet, and show notifications when the new devices will be found (for example, to know who is connected to your WiFi router or wireless network). The program easy to install and use, and has a user-friendly and beautiful interface. Website: http://www.mylanviewer.com Year: 2013 OS: Windows XP / Vista / 7 / 8 Language: Eng / Rus Medicine: Crack Size: 4,48 / 5,17 Mb.
  18. By Chris Mooney Feb. 14 2014 1:23 PM Narcissistic, Machiavellian, psychopathic, and sadistic. n the past few years, the science of Internet trollology has made some strides. Last year, for instance, we learned that by hurling insults and inciting discord in online comment sections, so-called Internet trolls (who are frequently anonymous) have a polarizing effect on audiences, leading to politicization, rather than deeper understanding of scientific topics. That’s bad, but it’s nothing compared with what a new psychology paper has to say about the personalities of trolls themselves. The research, conducted by Erin Buckels of the University of Manitoba and two colleagues, sought to directly investigate whether people who engage in trolling are characterized by personality traits that fall in the so-called Dark Tetrad: Machiavellianism (willingness to manipulate and deceive others), narcissism (egotism and self-obsession), psychopathy (the lack of remorse and empathy), and sadism (pleasure in the suffering of others). It is hard to underplay the results: The study found correlations, sometimes quite significant, between these traits and trolling behavior. What’s more, it also found a relationship between all Dark Tetrad traits (except for narcissism) and the overall time that an individual spent, per day, commenting on the Internet. In the study, trolls were identified in a variety of ways. One was by simply asking survey participants what they “enjoyed doing most” when on online comment sites, offering five options: “debating issues that are important to you,” “chatting with others,” “making new friends,” “trolling others,” and “other.” Here’s how different responses about these Internet commenting preferences matched up with responses to questions designed to identify Dark Tetrad traits: To be sure, only 5.6 percent of survey respondents actually specified that they enjoyed “trolling.” By contrast, 41.3 percent of Internet users were “non-commenters,” meaning they didn’t like engaging online at all. So trolls are, as has often been suspected, a minority of online commenters, and an even smaller minority of overall Internet users. The researchers conducted multiple studies, using samples from Amazon’s Mechanical Turk but also of college students, to try to understand why the act of trolling seems to attract this type of personality. They even constructed their own survey instrument, which they dubbed the Global Assessment of Internet Trolling, or GAIT, containing the following items: I have sent people to shock websites for the lulz. I like to troll people in forums or the comments section of websites. I enjoy griefing other players in multiplayer games. The more beautiful and pure a thing is, the more satisfying it is to corrupt. Yes, some people actually say they agree with such statements. And again, doing so was correlated with sadism in its various forms, with psychopathy, and with Machiavellianism. Overall, the authors found that the relationship between sadism and trolling was the strongest, and that indeed, sadists appear to troll because they find it pleasurable. “Both trolls and sadists feel sadistic glee at the distress of others,” they wrote. “Sadists just want to have fun ... and the Internet is their playground!” The study comes as websites, particularly at major media outlets, are increasingly weighing steps to rein in trollish behavior. Last year Popular Science did away with its comments sections completely, citing research on the deleterious effects of trolling, and YouTube also took measures to rein in trolling. But study author Buckels actually isn’t sure that fix is a realistic one. “Because the behaviors are intrinsically motivating for sadists, comment moderators will likely have a difficult time curbing trolling with punishments (e.g., banning users),” she said by email. “Ultimately, the allure of trolling may be too strong for sadists, who presumably have limited opportunities to express their sadistic interests in a socially-desirable manner.” http://www.slate.com/articles/health_and_science/climate_desk/2014/02/internet_troll_personality_study_machiavellianism_narcissism_psychopathy.html Chris Mooney is the author of The Republican War on Science and, with Sheril Kirshenbaum, Unscientific America: How Scientific Illiteracy Threatens Our Future.
  19. Blumentals Software Surfblocker 5.0 With Surfblocker you can easily restrict internet access at specified times or on demand. You can allow and block websites and limit which programs and features have access to the internet. For example, you can allow only e-mail and and work or study related websites. You can also simply password protect internet connection or set it to be automatically disabled after a specified amount of time. Of course, you can also block harmful and hazardous content automatically. Features Website: http://www.surfblocker.com/ OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Patch Size: 12,27 Mb.
  20. cFosSpeed 9.05 Build 2100 Beta :showoff: ;) Homepage Changelog x Hopefully fixed a crash in speedsrv.dll. Thanks to Ben Yee Hua.x Our firewall wasn't adapted to IPv6. Fixed. Thanks to Ben Yee Hua.Download from homepage
  21. Facebook Looks to Drones to Boost Internet Access Facebook has acquired key members of U.K.-based Ascenta to help it reach the goal of worldwide Internet access. Can drones help expand broadband availability? Facebook's new Connectivity Lab is looking at the high-flying devices - not to mention satellites and lasers - to assist in providing Internet access worldwide. In a blog post, Facebook chief Mark Zuckerberg said his Internet.org outreach organization has "made good progress so far," citing work in the Philippines and Paraguay, where 3 million more people now have access to the Web. "We're going to continue building these partnerships," he pledged, "but connecting the whole world will require inventing new technology, too." To that end, the Connectivity Lab team has been working on developing new platforms for connectivity "on the ground, in the air and in orbit," according to Internet.org. The team includes aerospace and communications tech experts with backgrounds at NASA's Jet Propulsion Lab and Ames Research Center, as well as the National Optical Astronomy Observatory. But Zuckerberg also revealed a new partner: U.K.-based Ascenta, whose five-person team worked on early versions of Zephyr, the longest-flying solar-powered unmanned aircraft. Facebook is "bringing on key members of the team from Ascenta," Zuckerberg said, who will be "working on connectivity aircraft." According to Bloomberg, the acquisition cost Facebook $20 million—a drop in the bucket compared to recent purchases of WhatsApp ($16 billion) and Oculus VR ($2 billion). Facebook did not immediately respond to PCMag's request for confirmation. Zuckerberg launched Internet.org in August, with the intent of increasing access to the Web, and bringing the Internet "to the next 5 billion people." As of now, about one-third of the world's population has online access. Industry heavyweights like Ericsson, MediaTek, Nokia, Opera, Qualcomm, and Samsung have thrown their support into the venture, pledging to develop joint projects, share knowledge, and mobilize organizations and governments to bring the world online. But it's going to take more than connection control, more capacity, and faster data speeds to turn the entire globe onto the Web. So Facebook will take to the air. The only problem: different communities need different solutions. So where satellites may do the trick in lower-density areas, solar-powered drones are better suited for more high-frequency locations. "There's a fabulous set of problems to work on to try to figure out … how to make all those satellites interconnect with each other to make sure that you have an Internet backbone that's essentially flying through the air as these satellites are moving by you," Yael Maguire, Facebook's director of engineering, explained in a video (below). Located 20 kilometers above the earth, these drones, which can stay aloft for months at a time, will broadcast the Internet to local users at significantly higher speeds and better connection than a satellite would. "We're just at the beginning," Maguire said. "There's some awesome problems to solve." Google has a similar Internet-connection effort, dubbed Project Loon, which is using base stations and high-flying balloons to increase Internet access. Source
  22. This year marks the first time that the U.S has earned Reporters without Borders' dubious honor. The United States and United Kingdom achieved the dubious honor of being branded “Enemies of the Internet” for the first time. Watchdog group Reporters Without Borders released its annual report on which countries restrict access to the internet through censorship and surveillance this week. Repeat offenders China and North Korea made the list again this year, but the democracies of America and Britain joined the ranks thanks to the National Security Agency and the Government Security Headquarters’ activities, respectively. Another democratic newcomer to the group? India, for its Centre for Development of Telematics. “The mass surveillance methods employed in these three countries, many of them exposed by NSA whistleblower Edward Snowden, are all the more intolerable because they will be used and indeed are already being used by authoritarians countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own violations of freedom of information,” the group wrote in its report. GlobalPost took a closer look at the countries branded “Enemies of the Internet” in 2014: United States The report’s authors slammed America’s “highly secretive” NSA, which they said has “come to symbolize the abuses by the world’s intelligence agencies.” NSA whistleblower Edward Snowden revealed a government surveillance program in his leak of classified documents last June that included the mass data collection of the phone and internet records of millions of Americans. Through a close relationship with service providers like AT&T, Level 3 and Verizon, the NSA can monitor the web “at the infrastructure level” both in the United States and outside, according to the report. United Kingdom The report dubbed the United Kingdom the “world champion of surveillance” thanks to British eavesdropping agency Government Communications Headquarters. “As part of its project ‘Mastering the Internet,’ GCHQ has developed the world’s biggest data monitoring system,” the report said. “Supported by the NSA and with the prospect of sharing data, the British agency brushed aside all legal obstacles and embarked on mass surveillance of nearly a quarter of the world’s communications.” Snowden said last June that the UK was “worse than the US” when it came to digital spying. India India remained largely silent in the wave of condemnation that followed Snowden’s revelations about NSA surveillance. According to the report’s authors, it had reason to. India’s “extensive” surveillance system has only expanded since the Mumbai attacks in 2008, allowing the government “direct, unlimited and real-time access to a wide variety of electronic communications without relying on Internet service providers.” China The report claimed that China’s “Electronic Great Wall” is only getting taller. The government not only blocks website content, but also monitors the internet access of individuals in one of the most regulated online environments in the world. It also continues to be the world’s biggest prison for netizens. At least 70 online information providers are currently serving time for their internet activities, including Nobel Peace laureate Liu Xiaobo. Around 30 of the journalists currently in jail were convicted for what they posted online, according to the report. North Korea “North Korea is one of the few countries where censorship can be judged by what is seen online, rather than what is missing,” Reporters without Borders wrote. Only 2 million of the hermit country’s 24.7 million people have access to computers, let alone the internet. North Koreans can only access a highly-censored national intranet developed by the country’s Central Scientific and Technological Information Agency. Even this access is tightly controlled by the country’s intelligence agencies. The country also has units like Group 109 and Department 27, dedicated to tracking down digital devices brought in from outside the country. Russia Russia’s extensive surveillance program known as SORM has been in the works since the mid-1980s, and expanded to include the internet in 1998. Since then, the country has adopted “dangerous legislation” that controls the dissemination of news and information online, according to the report. A 2012 law allows authorities to compile a “blacklist” of websites that allegedly contain “pornography or extremist ideas, or promoting suicide or the use of drugs.” At the time, critics of the legislation said it was designed to suppress political activism and dissent. The list of criteria used to block websites has only grown in the years since. Journalists, bloggers and other netizens are also frequently subject to government harassment, particularly if they post about “sensitive subjects” in the public interest, according to thereport. Just days before a referendum was planned for the Crimean region of Ukraine this month,Russian authorities blocked a number of independent news sites. Syria Since Syria’s civil war broke out in 2011, the country has clamped down on all means of communication, including the internet. Telecom infrastructure in Syria is essentially controlled by three companies — the Syrian Telecommunications Establishment (STE), the Syrian Computer Society (SCS) and Syriatel — which remain under the firm control of the Assad family and regime. The report accused these companies of reducing internet capacity to limit access to news and images of protests and the government’s subsequent crackdown. At one point, the Syrian government was blamed for a nationwide shutdown of the internet in November 2012. Syria’s minister of information denied culpability and blamed “terrorists” for the blackout. Iran Internet censorship, cyber attacks and the imprisonment of internet users are “common practice” in Iran, according to the report. In 2012, the country formed the Supreme Council for Cyber-Space to “protect Iranians from Internet dangers.” The Working Group for Identifying Criminal Content carries out the council’s orders, and has ordered the temporary or permanent closure of hundreds of news sites since its creation. It boasts of receiving 500,000 “voluntary reports” of criminal content from citizens on its website. The country’s main internet service provider is owned by the Revolutionary Guards. Iranian authorities have been working for years to establish a national internet network not connected to the World Wide Web, also referred to as the “Halal Internet.” Source
  23. BEIJING Tue Jan 21, 2014 12:36am EST (Reuters) - Chinese Internet users are now required to register their real names to upload videos to Chinese online video sites, an official body said, as the Communist Party tightens its control of the Internet and media to suppress anti-government sentiment. The new rule has been implemented to "prevent vulgar content, base art forms, exaggerated violence and sexual content in Internet video having a negative effect on society," China's State Administration of Press, Publication, Radio, Film and Television (SARFT) said on its website on Monday. Online video sites are often a lodestone for comment and critique on social issues in China, with users uploading videos documenting corruption, injustice and abuse carried out by government officials and authorities. Online video sites are extremely popular in China, with 428 million users. Those allowing user uploads include sites operated by Youku Tudou Inc and Renren Inc. Neither Youku Tudou nor Renren were available for immediate comment. Last year the Communist Party began a heavy-handed campaign to control online discourse, threatening legal action against people whose perceived rumors on microblogs such as Sina Weibo are reposted more than 500 times or seen by more than 5,000 people. Rights groups and dissidents criticized the latest crackdown as another tool for the ruling Communist Party to limit criticism of it and to further control freedom of expression. China has attempted to implement similar real-name registration rules, including when buying SIM cards for mobile phones and signing up for Tencent's WeChat mobile messaging app and microblogs. However these have proven difficult to implement and easy to avoid for China's tech-savvy Internet population. China's Internet regulation system is mired in bureaucracy and overseen by a number of government agencies, including SARFT, the State Council and the Ministry of Industry and Information Technology, which can lead to conflicts of interest between these bodies. (Reporting by Paul Carsten; Editing by Michael Perry) http://www.reuters.com/article/2014/01/21/us-china-internet-idUSBREA0K04T20140121
  24. By Zach Epstein on Jan 20, 2014 at 11:26 AM The rabbit hole that is the Internet goes much deeper than most people know. In fact, the World Wide Web as we know it represents just 4% of networked web pages the remaining 96% of pages make up what many refer to as the Invisible Internet, Invisible Web or Deep Web. This massive subsection of the Internet is 500 times bigger than the visible Web and is not indexed by search engines like Google. Finding sites on this invisible network of webpages isnt easy as a result, so its often home to nefarious services like Silk Road. Theres plenty more to the Deep Web than that, however, and an infographic posted recently by WhoIsHostingThis the same group that recently taught us how to disappear online does a good job of detailing the basics, including how to access this mysterious network of hidden sites with a special Web browser like Tor. The full infographic follows below. http://bgr.com/2014/01/20/how-to-access-tor-silk-road-deep-web
  25. By Zach Epstein on Jan 20, 2014 at 12:20 PM It’s easy to forget how far the Internet has come considering how plugged in we all are today thanks to laptops, smartphones and other connected devices, but we found a fantastic video that will no doubt serve as an eye-opening and hilarious reminder. ”Imagine, if you will, sitting down to your morning coffee, turning on your home computer to see the day’s newspaper,” begins this report from KRON in San Francisco. “Well, it’s not as far-fetched as it may seem.” The report, filed by KRON’s Steve Newman back in 1981, details the birth of Internet news as it chronicles an experiment being conducted by the San Francisco Examiner where editors programmed a copy of each day’s paper into a computer and made it available via the Internet. To connect to the Web and access the S.F. Examiner’s paper, by the way, a reader had to place the receiver of his or her telephone on a dock and then manually dial into a service provider’s network. “This is only the first step in newspapers by computers,” Newman said in the report. ”Engineers now predict the day will come when we get all our newspapers and magazines by home computer, but that’s a few years off.” Psh, it’ll never happen. The video made the rounds five or so years ago, but a recent email from a reader refreshed our memory and it’s too good to not share. It’s an absolute gem and it’s embedded below. Do yourself a favor and watch it right now. It’s easy to forget how far the Internet has come considering how plugged in we all are today thanks to laptops, smartphones and other connected devices, but we found a fantastic video that will no doubt serve as an eye-opening and hilarious reminder. ”Imagine, if you will, sitting down to your morning coffee, turning on your home computer to see the day’s newspaper,” begins this report from KRON in San Francisco. “Well, it’s not as far-fetched as it may seem.” The report, filed by KRON’s Steve Newman back in 1981, details the birth of Internet news as it chronicles an experiment being conducted by the San Francisco Examiner where editors programmed a copy of each day’s paper into a computer and made it available via the Internet. To connect to the Web and access the S.F. Examiner’s paper, by the way, a reader had to place the receiver of his or her telephone on a dock and then manually dial into a service provider’s network. “This is only the first step in newspapers by computers,” Newman said in the report. ”Engineers now predict the day will come when we get all our newspapers and magazines by home computer, but that’s a few years off.” Psh, it’ll never happen. The video made the rounds five or so years ago, but a recent email from a reader refreshed our memory and it’s too good to not share. It’s an absolute gem and it’s embedded below. Do yourself a favor and watch it right now. http://bgr.com/2014/01/20/internet-history-video-tv-report
×
×
  • Create New...