Jump to content

Search the Community

Showing results for tags 'internet'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions


  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

  1. A Trippy Visualization Charts the Internet's Growth Since 1997 In 2003, Barrett Lyon created a map of the internet. In 2021, he did it again—and showed just how quickly it's expanded. Illustration: Barrett Lyon/The Opte Project In November 2003, security researcher Barrett Lyon was finishing college at California State University, Sacramento while working full time as a penetration tester—a hacker companies hire to find weaknesses in their own digital systems. At the beginning of each job, Lyon would do some basic reconnaissance of the customer's infrastructure; “case the joint,” as he puts it. He realized he was essentially refining and repeating a formula to map what the new target network looked like. “That formula ended up being an easy piece of software to write, so I just started having this software do all the work for me,” Lyon says. At lunch with his colleagues one day, Lyon suggested that he could use his network mapper to sketch the entire internet. “They thought that was pretty funny, so they bet me 50 bucks I couldn't do it," he says. So he did. What followed was a vast, celestial jumble of thin, overlapping lines, starbursts, and branches in a static image that depicted the global internet of the early 2000s. Lyon called the piece Opte, and while his betting colleagues were skeptical of the visual rats nests he produced at first, the final product immediately started attracting fans on Slashdot and beyond. Lyon's original Opte Internet Map from 2003. Illustration: Barrett Lyon/The Opte Project Now Opte is back in an entirely new and updated form. The original version used “traceroutes,” diagnostic commands that scout different paths through a network, to visualize the internet in all of its enormous complexity. But traceroutes can be blocked, spoofed, or have other inaccuracies. So in a 2010 exhibit of the original Opte at the Museum of Modern Art in New York, Lyon explored an alternative. Instead of basing the map on traceroutes, Lyon used Border Gateway Protocol routing tables, the subway maps of the internet, to get a more accurate view. Now he's carried that approach into this next generation. The original Opte was a still image, but the 2021 version is a 10K video with extensive companion stills, using BGP data from University of Oregon's Route Views project to map the global internet from 1997 to today. Lyon worked on the visualization for months and relied on a number of applications, tools, and scripts to produce it. One is a software package called Large Graph Layout, originally designed to render images of proteins, that attempts hundreds and hundreds of different visual layouts until it finds the most efficient, representative solution. Think of it as a sort of web of best fit, depicting all of the internet's sprawling, interconnected data routes. The closer to the center a network is, the bigger and more interconnected it is. While the concept—to map and visualize the whole internet—remains the same, animating its evolution and expansion over almost 25 years allows the new version of Opte to be more interactive. The materials are all free for non-commercial use and Lyon hopes the piece will be particularly valuable to educators and engaging for students. Viewers can see details about the different network regions, and Lyon made some diagrams and videos that call out specific points of interest. One shows China's network space, for example, with its two heavily controlled connections in and out. Lyon also highlights much of the United States military's internet presence, including NIPRNET, the Department of Defense's Non-Classified Internet Protocol Network, and SIPRNET, the Secret Internet Protocol Network. Zooming in on China's internet, present day. Illustration: Barrett Lyon/The Opte Project By moving through time, Opte also makes major internet events tangible, like Iran's national 2019 internet shutdown and Myanmar's recent internet blackout in the last few weeks. Lyon says he's still collecting data to give a robust picture of recent events. Opte even shows BGP route leaks, incidents where data meant to flow on a certain path was accidentally or maliciously redirected to travel over other parts of the network. The new project is constructed to be easily updatable so Lyon can revise it as time passes. While Opte is a striking and powerful visualization of the internet's size and impact, Lyon says the piece also ultimately depicts the internet's failure to become truly decentralized and insuppressible in its current form, particularly in countries and geographic regions that have limited points of connectivity to the global internet. “When I look at it, each one of those little squiggles and wiggles is human beings doing something,” Lyon says. “People actually using the network, building the network, literally going across oceans and mountains with fiber optic cables and digging ditches. All of that work is reflected in one snapshot. But some countries are not actually very connected and that enables control.” A Trippy Visualization Charts the Internet's Growth Since 1997
  2. The internet is an amazing place where you can find more than 1 billion websites. Along with some fantastic sites there are some weird ones too. It’s impossible for a person to visit every website. Therefore we have gathered some strange websites on the internet. Some of them are funny, some are really boring and a few are like you can’t answer why they exist. We haven’t included adult site here, so you can click on all link without any hesitation. Enjoy the list! 1. Iloveyoulikeafatladylovesapples: Feel the hunger of the fat lady until you let her eat enough apples. The website is completely useless still you can enjoy the graphics and background music. 2. Thenicestplaceontheinter.net: The really sweet website that offers free hugs. Go get it. 3. SciencevsMagic.net/Tes: You can mix the words amazing and weird to describe this one. Also, the website gave AIDS to my eyes. 4. Michaeljfoxnews: Feel the earthquake on your computer. 5. Pointerpointer: I don’t know where did they find these pictures but this is how you get to the specific point. 6. Heeeeeeeey: Just click on link and get the heeey hooo party feel. 7. wwwdotcom: A serious tip for you. 8. Rainymood: Rain makes everything better. So just sit back and enjoy the sound effect to enlighten your mood. 9. Isitchristmas: The name suggests all. May be the website has been designed for people suffering from short term memory loss. 10. Cat-bounce: And that’s how humans play with emotions of cats. 11. 111111111111111111111111111111111111111111111111111111111111: Believe me; I have no idea what the exact purpose of website. But it seems like website owner is not really a fan of Arnold Schwarzenegger. 12. Heyyeyaaeyaaaeyaeyaa: A catchy music with special cartoon characters for our special readers. 13. Thisman: This is the height of weirdness! The website says that hundreds of people dream about this face. No, I don’t. 14. Breakglasstosoundalarm: The thing you wanted to do once in your life is here. 15. Internetlivestats: I don’t think this is a live data, however you will get an idea of few internet stats. 16. Simonpanrucker: No words to explain this useless thing. Kindly decide yourself how weird it is. 17. Ilooklikebarackobama: You might wanna reply this website, “No you don’t, not even a bit”. 18. Corgiorgy: The cute dog army. 19. Haneke: If you like complicated things and pay too much attention into details, you won’t regret after visiting this website. 20. Fearthegaychicken: The question is what makes you think that this chicken is gay. Is it background color or the sound? 21. Koalastothemax: An amazing creativity and fun with pixels. 22. Procatinator: Cats popularity is increasing day by day and somehow this website is the reason behind it. 23. Youfellasleepwatchingadvd: If your mom doesn’t allow you to watch TV, you could spend some time here. 24. Essaytyper: This is the place where you become a professional typist in no time. 25. Feedthehead: My advice is, don’t just feed the head, play with the whole face. 26. Nooooooooooooooo: If your boss gives you extra workload, you can reply him this link. 27. Zoomquilt: The weirdness tends to infinity. Even a telescope can’t look so far. 28. Staggeringbeauty: Just shake the mouse and see the snake’s reaction. 29. Anasomnia: This is how dreams become nightmare. 30. Eelslap: Slap tight as many times as you want. He won’t mind. Source
  3. Hey guys.. i was just about to post a tutorial.. then i realized i can't copy & paste from notepad? the problem is only on nSaneForums? Im using: - IE 11 - Windows 8 i can copy & paste other sites like pastebin. i also enabled copy & paste in Security Options. anyone have any suggestions? ============================ EDIT: - found out why.. IE 11 is not compatible with PHP Boards :( - a work around is to turn off the Rich Text Editor (top left corner switch)
  4. LeeSmithG

    Word Press Information

    Hello again. Was looking for some information. I was wondering if there is a such a thing as 'word press editing software', like dreamweaver or expression web. I have expression web 4 and dreamweaver 8 (free). I want to create a sports site with a top frame (logo) and then information in below with links underneath logo. So anyone got some ideas on software? Thanks in advance Lee
  5. DesertLoner

    Great news new friends ^_^

    There is a chance I might get my own internet next week. If such a case proves to be true I will have the ability to talk with you more :D. Alas, I must try not to get my hopes up. In one hour I will have a meeting with my book club. We shall talk again. Bye ^_^
  6. hi there :hi: I wonder how to monitor a program so we can get their IP addresses to exclude it on windows hosts file and what's software that we need too...? :think: Thank you :thumbsup:
  7. Eric Schmidt, who has been the CEO of Google and executive chairman of its parent company, Alphabet, predicts that within the next decade there will be two distinct internets: one led by the U.S. and the other by China. Village Global VC. The firm enlists tech luminaries — including Schmidt, Jeff Bezos, Bill Gates and Diane Green — as limited partners, then invests their money into early-stage tech ventures. At the event, economist Tyler Cowen asked, “What are the chances that the internet fragments over the years?” Schmidt said: BRI is an economic development strategy of the Chinese government that aims to connect and facilitate all kinds of trade, including digital trade, between China and countries in Europe, Africa, the Middle East and Southeast Asia. Schmidt’s predictions come at a time when his successor at Google, CEO Sundar Pichai, has stirred up controversy around the company’s strategy in China. Reportedly, Google has been developing “Project Dragonfly,” a censored version of its search engine that could appease authorities in China. The project allegedly included a means to suppress some search results, booting them off the first page, and a means to fully block results for sensitive queries, for example, around “peaceful protests.” In recent weeks, hundreds of Google employees lobbied Pichai for more transparency and signed a letter saying that the reported plans raised “urgent moral and ethical issues.” Pichai has said that Google has been “very open about our desire to do more in China,” and that the team “has been in an exploration stage for quite a while now,” and considering “many options,” but is nowhere near launching in China. In a separate discussion last night between Schmidt and several start-up founders, he lauded Chinese tech products, services and adoption, especially in mobile payments. He noted that Starbucks in China don’t feature a register. Customers order ahead online and pay with their phones before picking up their lattes. A business development leader with Facebook, Ime Archebong, asked Schmidt if large tech companies are doing enough good in the world. Schmidt replied: “The judge of this is others, not us. Self-referential conversations about ‘Do I feel good about what I’m doing?’ are not very helpful. The judge is outside.” At several points in the private discussion, Schmidt urged entrepreneurs to build products and services that are not merely addictive, but valuable. He also said not enough companies “measure the right things.” Too many focus on short-term revenue growth and satisfying shareholders, rather than what’s best for their users, society and the long-term health of their companies. Schmidt was the CEO of Google from 2001, when he took over from co-founder Larry Page, through 2011, when Page reclaimed the reins. He remained as executive chairman of Google and then Alphabet until earlier this year. Source
  8. After years of pressure from ISPs, net neutrality is under threat by the FCC itself. Chair Tom Wheeler promised to revive the Open Internet Order after it saw an unceremonious defeat in January, but a leaked version of his latest proposal would let companies pay ISPs for a "fast lane" to subscribers, undermining the spirit of the original rules, which barred companies from discriminating between services. Despite Wheeler’s reassurances, this new proposal is the exact opposite of net neutrality. It could undermine both the companies of today and the startups of tomorrow. It might also be exactly the push activists need to fight back. The new rules aren’t entirely the FCC’s fault. The January court ruling in a lawsuit by Verizon gave it limited power to regulate broadband providers under existing law, and there’s only so much it can do as long as they’re classified as "information services" rather than common carriers like traditional phone companies. There’s nothing explicitly stopping it, however, from reclassifying these services, which is exactly what net neutrality supporters have been urging it to do for years. The problem is that putting ISPs under the more restrictive common carrier designation would light a political powder keg, pitting proponents of a truly open internet against business advocates who say common carrier regulations would strangle ISPs’ ability to innovate. For the past few months, Wheeler has played it safe, promising a framework that seemed fragile but ultimately inoffensive. The new proposal, though, threatens to codify critics’ worst fears, and it’s spurred many of them into action. In a letter, Senator Al Franken (D-MN) warned that it "would not preserve the Open Internet — it would destroy it." His language is reminiscent of the response to another "internet-destroying" policy: SOPA, the anti-piracy bill that mobilized perhaps the most effective online protest of all time. Like SOPA, these proposed Open Internet rules tackle an issue that’s near to the hearts of both internet denizens and tech companies. And as the FCC plans to officially consider the rules on May 15th, they’re figuring out how to mobilize the same kind of opposition. Though the company hasn’t confirmed anything on the record, sources say that outspoken net neutrality proponent Netflix has privately brought concerns to the FCC, and that it, Google, and other major players are quietly planning an accompanying publicity blitz. Other groups have been more open. Mozilla, a prominent participant in the 2012 anti-SOPA blackout, has filed a petition with the FCC, asking it to regulate parts of internet service providers’ business under common carrier laws. Mozilla senior policy engineer Chris Riley sees the FCC’s current proposal as the worst of both worlds: by allowing "commercially reasonable" discrimination, it’s allowing ISPs to undermine net neutrality, and by requiring a baseline level of service, it could be stretching beyond the limited authority courts have given it. "I’m really worried that what the FCC would do now is both lose in court and fail to protect net neutrality," he says. If it fails, net neutrality supporters predict dire consequences. "I don't think that Reddit as we know it, and especially the next Reddit, the next small company, will be able to develop and thrive" under the new Open Internet rules, says Reddit general manager Erik Martin. "It's going to basically ensure that the next Facebook, the next Google, the next Reddit is going to be overseas." Reddit, currently one of the 25 most popular sites in the US, also joined the SOPA blackout, and it’s planning a site-wide online protest on May 15th. Nothing is locked down, but he hopes some of the politicians who have spoken out against the proposal will make appearances on Reddit — a statement by Senator Bernie Sanders (I-VT) made it to the top of the site last week. So far, Redditors have proposed tactics like a satirical throttle on popular image hosting site Imgur, letting visitors see ISP promotions for free but charging anywhere from $9 to $110 for cat pictures, animated gifs, and nudes. Wheeler’s proposed rules wouldn’t let companies outright block services, but the symbolism is clear. "I think the basic idea of giving people a glimpse of what it might look like should this come to pass is compelling," says Martin. "We've all grown up with an internet that is completely neutral and flat, and confronting people with what it might look like if the FCC proposal goes through and we end up losing net neutrality makes a lot of sense." Reddit co-founder Alexis Ohanian is also trying to recapture the spark. He’s currently running a crowdfunding campaign to erect a billboard as close to the FCC offices as possible, similar to the "Don’t mess with the internet" billboard he put in SOPA author Lamar Smith’s (R-TX) home district in 2012 (the current proposal has raised around $15,000 of its $20,000 goal). This time around, he’s also urged people to contact Congress and the FCC, linking to advocacy group Free Press’ "Save the Internet" campaign, which will hold a protest in Washington on May 15th. "We can’t get it wrong, everyone. The internet is too valuable and too important," says Ohanian in a video. "So please, help me, one more time, save the internet." Ohanian’s rhetoric is diminished slightly by the fact that virtually every internet-related issue of the last two years has been "the next SOPA" — the CISPA cybersecurity bill, the Trans-Pacific Partnership, even the thorny, extremely complicated NSA surveillance situation. Like all these, net neutrality is more complicated than the straightforward SOPA copyright bill. "[sOPA] was just bad in the sense that it was horribly written, it wasn't internally coherent, it was technically wrong on several points, and it was clearly written by the powerful content companies," says Martin. But net neutrality is "complicated and perhaps even a little boring," he admits. "I think once you understand the implications [of the proposal] and that it's going to change the internet as we know it, and once you realize how fragile our ecosystem really is, then it becomes extremely alarming and extremely important. But that takes a little work, to get that across." And if the protest is to some extent getting the old gang back together, one very important member looks to be sitting things out. The Wikimedia Foundation was arguably the biggest player in the SOPA blackout, cutting off access to its massive US site to demonstrate the bill’s perils. But a spokesperson says that the foundation hasn’t seen high enough levels of community support to justify a public protest against Wheeler’s proposal, though it may file an FCC comment in the future. "We've been talking to folks, and we certainly have people who are interested, but we haven't really seen a response similar to SOPA / PIPA," she says. Unlike something like NSA surveillance, though, the net neutrality proposal has yet to go into effect. The FCC has already attempted damage control, threatening to reclassify carriers if they take advantage of the system. There are also few issues more dear to the internet community. When Google, a long-time net neutrality supporter, appeared to compromise its position in a joint statement with Verizon, protesters gathered outside its office; more recently, in the wake of Netflix’s direct connection deals with Comcast and Verizon, debate has broken out over whether the policy should be expanded to cover the internet backbone itself. But it’s hard to even explain the deal itself, let alone its implications. Likewise, when the Open Internet Order was struck down this spring, the FCC and cable companies’ reassurances made it hard to point to specific harm. Opponents have called net neutralitya "solution in search of a problem," pointing to the generally good behavior of ISPs. After the court’s ruling, ISPs promised that they would continue to support an "open internet" — Verizon, whose lawsuit was directly responsible for killing the Open Internet Order, said that the decision would "not change consumers' ability to access and use the internet as they do now." Wheeler’s proposal, by contrast, visibly guts the order — it practically maps out the bleak "pay for play" future we could expect without regulation. If it passes, there’s no going back. Many net neutrality advocates, including Martin, hope protesters can pressure the FCC into reclassifying ISPs as common carriers. After seeing the alternative, it’s possible the public will rally around them, coming down hard on the FCC and Congress itself, which has the power to pass new net neutrality provisions or otherwise signal support for reclassification. But Martin would settle for just killing this plan — it’s "certainly not as positive as actually getting reclassification," he says, "but it's much better than the proposal going through." Mozilla’s plan is more like a kind of regulatory judo. Its petition would leave services provided by an ISP to a user outside net neutrality rules, but it would require it to act as a common carrier for any "remote" services like Dropbox or Netflix — a statement says that would cover "all of our internet activity." If ISPs have opposed reclassification in general, they’ll probably fight just as hard against a proposal that just applies to most of its business. But Mozilla’s plan reflects the gap between the internet that the FCC regulated in 2002, just starting to transition out of the era of AOL web portals, and the one that exists today. "We have a new service here. A new service created by the ISPs, by net network technology," says Riley. "So what is that service?" To ISPs, their service is still that of a gatekeeper, directing traffic through a network. To net neutrality supporters, it’s a utility, like a water pipe or telephone line. And on May 15th, both sides will see the line that they’ll be fighting over in the coming months. Source
  9. A team of Dutch scientists has reportedly managed to 'teleport' information between two computers. The news came through a publication in a popular science journal, where they claimed to exchange data between two computers despite a lack of any connection. The technology used during this breakthrough has led Professor Ronald Hanson to claim that it would be possible to teleport ourselves with distance in the future. What we are teleporting is the state of a particle. If you believe we are nothing more than a collection of atoms strung together in a particular way, then in principle it should be possible to teleport ourselves from one place to another. As for the present, Professor Hanson and his team has provided a key step towards building quantum networks, and ultimately the quantum internet. The teleportation medium known as 'quantum entanglement' is completely hackproof, it's impossible to intercept the information relayed. The group of scientists achieved the data teleportation over a distance of three meters, they look to testing a distance of 1,300 meters this summer. Optical elements to guide single photons to each diamond The information transferred during the experiment is stored on diamond quantum bits. These are significantly more complex than the standard 'bit' that we see in our devices today. The diamond bits can store multiple values at once, contrasting to our limited '0 and 1' signaling scheme. What you're doing is using entanglement as your communication channel. The information is teleported to the other side, and there's no way anyone can intercept that information. In addition to this breakthrough, the team has gone directly against Einstein's belief that 'quantum entanglement' does not exist. Previously cast as "spooky actions" from the man himself, the team need to further prove that the entanglement process works with distance. Creating a hackproof internet is both exciting and daunting in its own right. If the breakthrough's continue coming our way, we could see data exchanges previously unheard of. The potential for an increase in crime rate is also huge. But don't go packing your bags for rural Alaska quite yet, it's still in early stages and there's no sign of any fully functioning network at this stage. Source
  10. If you want to use the internet and you don’t want the National Security Agency to see what you’re doing, you basically only need one tool: Tor, a network that anonymizes web traffic by bouncing it between servers. The NSA has been working on ways to get around "the Tor problem" for years without much success. "It should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications," the agency toldBusinessWeek. The original funding for this thorn in the NSA’s side actually came from the US Department of Defense; the Naval Research Laboratory originally funded the project to protect Navy employees abroad. The NSA says Tor is now used by "terrorists, cybercriminals, [and] human traffickers," so you’d think the Pentagon might consider that investment a mistake. Not so. The military has been working on a new generation of even bigger and better anonymity tools to supplement and replace Tor. The Defense Advanced Research Projects Agency or DARPA, the Pentagon’s high-tech research lab, started working on anonymity roughly four years ago through the Safer Warfighter Communications program, a collection of tools designed to thwart blacklisting, redirection, and content filtering. The program covers several anonymity projects, including cutting-edge encryption and a project called Service-Oriented Netcoded Architecture for Tactical Anonymity (SONATA). Details on SONATA are thin, but a researcher familiar with the work referred to it as a next-generation competitor to Tor. DARPA is also investing in Curveball, a "decoy routing" system developed by Raytheon BBN Technologies, that lets you pretend you’re surfing an unblocked website when you’re actually connecting to Facebook, the Pentagon, or some other sensitive site. Curveball uses a nifty trick that requires some cooperation from friendly internet providers. Those providers would install Curveball routers throughout their networks. Users with the Curveball client would then surf around randomly until they find a Curveball router. The router confirms with the client, then tunnels any subsequent traffic through the Curveball connection disguised as innocuous traffic. As the surfer moves around on Facebook, the Curveball connection pretends he or she is moving around on an unblocked site, say, Amazon. The fact that Curveball is embedded within a regular network makes it impractical for a government to block it without blocking lots of useful sites, impairing commerce or irritating citizens. Unlike Tor, Curveball doesn’t protect the user’s identity. However, it could be used to secretly get to Tor in countries where access to the network is restricted. So why is one branch of the military building tools that will one day be used to thwart another branch? Dan Kaufman, director of DARPA’s Innovation Information Office, which covers the Safer Warfighter Communications program, says there isn’t any tension caused by DARPA working on tools that could one day be used to dodge the NSA. "[The program] started with a conversation I had with Special Forces," Kaufman says. "While obviously there may be multiple uses… we built it for Special Forces. People are welcome to take the technology and do stuff, but that’s not why we built it." Government surveillance and censorship is growing around the world. Countries like China, North Korea, and Iran exert obsessive control over what people can do online, while laws are getting stricter in places like Turkey and Kazakhstan. Internet censorship was one of the Thai military’s first moves after taking over their country’s government in May. US military forces don’t always carry their own communications gear. They often use chat rooms or whatever is publicly available even when stationed in hostile, internet-freedom-hating countries. "You’re in a place where you need to be able to communicate back," Kaufman says. "And you need to make sure that that regime is not blocking you, and you need to make sure that you stay anonymous because you’re undercover." The Defense Department says it has to invest in technology even if that technology could one day be used against it. "The best way to ensure national security in a fast-changing world is to maintain our technological superiority in critical technology areas," a spokesperson for the Defense Department tells The Verge in a statement. "The department is continuously working to develop important scientific and technological domains and will not limit our research strictly out of concern that the results might someday fall into our adversaries' hands." The department also takes "the appropriate steps" to ensure technology does not enable the US’s enemies, the spokesperson says. Enabling anonymous communications may bolster national security in other ways. Tor no longer receives support from the Pentagon, but it’s now funded in part by the Bureau of Democracy, Human Rights, and Labor or DRL, a division of the State Department that supports freedom of information around the world. DRL explicitly supports "anti-censorship and secure communications technology" with the hope of spreading Western democratic values. Tor is also used by journalists, activists, and whistleblowers. Many believe US national security will benefit overall from the free flow of media, especially in countries that censor the news and circulate anti-American propaganda. Still, we may see a leaked NSA presentation in a few years: "the SONATA problem." Source
  11. Giveaway Extended for Bitdefender Internet Security 2015 The giveaway ends in 7 hrs.! UPDATE: The giveaway is over As you may or may not know, Softpedia and Bitdefender have put together a giveaway promo over this past weekend for the new av tool, Bitdefender Internet Security 2015. However, the developer's website had some server issues last night that prevented users from claiming their free key for the application. Therefore, Bitdefender has decided to provide extra time for those unlucky ones who haven't got a chance to obtain a license. In other words, there are a few more hours added to the timer, more specifically until today, Monday 21 at 16:00 UTC (9:00 a.m. PDT/PST). Giveaway page
  12. Brewee - breweries navigator & craft beer locator v4.7.1 (Free App / No Ads) Do you love beer? Have you wondered, “what are the best craft breweries near me”? You need Brewee – the ultimate nearby craft breweries navigator! Take advantage of the fact that microbreweries grow like crazy and don’t miss the best-tasting beer near you. 🍻Brewee will help you taste a crafted beer all around the world. We have the largest database of breweries and a community of beer enthusiasts who share their experiences with others. Brewee allows you to explore and discover craft breweries in your area and across the country. 🌐THE NEED FOR BREWEE Searching for the best beer bars and best beer places often end with irrelevant searches leaving you frustrated. Brewee tackles that by giving you relevant recommendations. Brewee is your tailored and advanced beer nearby navigator gives you the most relevant answers to questions like “best breweries around me,” “best breweries nearby,” “best craft beer near me” and similar searches. Now how one app where beer is glorified! An app where you will find an endless source of best breweries around the globe (currently the largest database is in the US) Favorite and plan your visits in other cities too – there are some breweries that are a must-visit! 🍺WHY YOU’LL LOVE BREWEE Tap into an extensive database and join thousands of beer lovers who are visiting and rating local breweries. ▪️Breweries navigator The easiest way to find breweries near you. The relevant search feature allows you to find the best beer local places on a map. ▪️Real visitor reviews Hundreds of thousands of reviews from real users. Finally, you can choose craft breweries based on real beer ratings. ▪️Relevant information included Go to the brewery's website to find more information. Call directly using the phone on the listing and get directions. ▪️Great cooperation with breweries We help breweries to be able to understand beer drinkers better. The next time you are up for a cold beer in a place you haven’t been.. Brewee is here to help. Now it’s time for a tasty cold beer. 👉 Download this excellent beer community and beer places locator for free! Homepage Changelog: Minor improvements Use a temporary email address to create an account. Download
  13. Ponydroid Download Manager v1.5.10 (Patched) (derrin Mod) Ponydroid is a download manager download manager specially designed to optimize and automate the downloads. Install Ponydroid on your smartphone or tablet and enjoy the comfortable features when it comes to downloading files. It is available in English Spanish Japanese. Italian German French Portuguese Simplified and Tradicional Chinese Russian Polish Romanian and Korean. The application is in charge of everything it accesses the web where the file is hosted it waits the required time and starts downloading them one by one. - Ponydroid optionally blocks the downloads if there is not WIFI conection - manages waiting times - send you notificactions when a file download is completed or if it needs you to enter captchas - works with or without Premium accounts - several options to add links for downloading - integrated browser - CLICK'N LOAD support - .DLC files support - supports for interchangeable links - REMOTE CONTROL of Ponydroid via web browser or Mipony Remote ideal for using it on Android miniPC - shows history of downloaded files - MULTISEGMENT download - automatic download retries and - analyzes the avaibility of the files. - more than 300 file hosters supported including Rapidgator, mega.co.nz, Zippyshare, bannedhost.net, Nitroflare, Mediafire, Depositfiles, Filefactory, Uploading, 4shared, etc. Ponydroid manual: http://www.ponydroid.com/en/manual.php Homepage Download Changelog: Updated Alldebrid, in some devices it was not possible to enter the login PIN Updated wetransfer.com Updated ddownload.com Updated cloud.mail.ru Updated userscloud.com Updated prefiles.com Updated subyshare.com Updated anonfiles.com Updated ge.tt Updated megaup.net Updated hitfile.com Updated uplovd.com Added mundofile.com Site: https://www.upload.ee Sharecode: /files/12309938/Ponydroid1.5.10Patched.apk.html
  14. Advanced Download Manager 10.0.12 Build 100012 [Pro] [Mod] Powerful Downloader for Android: - downloading from internet up to three files simultaneously; - accelerated downloading by using multithreading (9 parts) - interception of links from android browsers and clipboard; - download files in background and resume after failure; - loader for images, documents, archives and programs; - downloading to SD-card for Lollipop and Marshmallow; - smart algorithm for increased speed of downloading; - downloading only through the internet on Wi-Fi; - boost downloader for 2G, 3G and 4G networks; - changing the maximum speed in real time; - video downloader and music downloader; - resuming of interrupted downloads; - support files larger than 2 gigabyte; - parallel download files in queue. Advanced Settings: - interface customization and themes; - select the folder for downloaded files; - different automatic actions after finishing; - save different file types in different folders; - create an empty file to accelerate downloading; - autostop process if the battery charge level is low; - import list of links from a text file on SD-card; - autoresume after errors and break of connection; - planning start of downloading at right time; - turbo mode for speed up downloading; - getting size of file and beautiful name; - backup list of downloads and settings; - profiles for each type of connection; - automatic operation on schedule; - support quick autoadd download. Clean Interface: - light material design; - filter by types and status; - left menu with quick options; - context menu for easy management; - sorting downloads by order, size and name; - open completed files through favorite apps; - information about downloading: speed, size, time; - support pause, resume, restart for downloads; - creation of advanced profiles for sites; - fine-tuning for each download; - widget on home screen. Extended Notifications: - icon with progress and speed in notification panel; - transparent progress-bar on top of all windows; - completion notification by sound and vibration. Built-in ADM Browser: - support of multiple tabs; - advanced media downloader; - list of history and bookmarks; - easy sending file to downloader; - download mp3 from popular archives; - interception of mp4 video from tubes; - easy downloader for all types of files; - download accelerator for social networking; - option "User-Agent" for forgery the browser. Simple control for downloads: - press on the download to start/stop the process; - press on the completed download to open the file; - long press on download to display the context menu. Add URL links in ADM: - press on link and from window "Complete action using" select ADM Editor; - long press on a link to display the context menu, press "Share" or "Send" and from window "Share via" select ADM Editor; - copy link, after program intercept it from clipboard and send in ADM Editor, or use "Add" button and paste the link. ADM is the best android download manager for you! Homepage Download Changelog: Torrent support. I will gladly accept all your suggestions to my email! Sorry for the frequent updates. Fixing a bug causing the app to freeze. Site: https://www.upload.ee Sharecode: /files/12256905/ADM_10.0.12_build_100012_armeabi-v7a_arm64-v8a_x86_x86_64.apk.html
  15. NetSpeed Indicator: Internet Speed Meter - 3G, 4G, 5G, Wi-Fi v1.6.5 (AdFree Mod Lite) (Mikesew1320 Mod) NetSpeed Indicator is convenient small and simple network tool with useful features that allows you to discover your download and upload speeds check ping analyze and get connected devices on Wi-Fi speed test and many more. Check current Download/Upload speeds directly from your statusbar notification or in app it self. Since Android doesn't show network connection statistics on screen you are not able to see current internet bandwidth used for upload and download. You can track the live network information for any kind of a network (2G 3G 4G 5G Wi-Fi)! Net Speed indicator also contains other functions: 1. Speed test - The most accurate speed test 2. Check Today's and Monthly usage of Data and Wi-Fi usage for both sent and received bytes. 3. App stats - A place to check the app data and WiFi usage over chosen period of a time. 4. Floating widget - Floating bubble (also expandable on tap) showing the current Upload/Download speeds. 5. Wi-Fi Analyzer - Check more info about your and available Wi-Fi hotspots (SSID BSSID Signal strength MAC ID frequency and many more). 6. Ping test - Test PING on any destination(by default is google.com) and get min max and average ping including packet loss. 7. Discover devices - Find all devices connected to your Wi-Fi get info about them. Available in app subscription for ads removal: - Disable ads for 24h - Disable ads for 1 week - Disable ads for 1 month Application is quite new so plenty of features will be there just keep supporting me. App tends to be one of the best of this kind. Our current TO-DO list is pretty long. I'm listening for suggestions by the users and trying to implement them as soon as possible. 90% of suggestions are actually there. Check links below for more. NEW!!! Beta is available with some new features and some fixes get it from a link below https://forum.xda-developers.com/showpost.php?p=81696859&postcount=2 If you have suggestion ideas or anything else including reporting bugs join discussion group on this link: https://t.me/NetSpeedIndicator Thanks for supporting Homepage Download Changelog: - Fixed force close when switching from Speed test - Fixed force closing app - Updated dependencies Site: https://www.upload.ee Sharecode: /files/12300410/NetSpeedIndicator-v1.6.5_MoD_by-Mikesew1320.apk.html
  16. Internet Download Manager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance. What's new in version 6.38 Build 16 (Released: Dec 25, 2020) Added support for new types of video streams Fixed bugs Download just use same download links as in nsanedown and you will get latest version
  17. Internet Download Manager 6.31 Build 9 Changelog: http://internetdownloadmanager.com/news.html Changes: (Released: Oct 18, 2018) Fixed problems with downloading for several types of video streams Fixed the problems with Firefox and Google Chrome integration caused by some security applications Fixed bugs Download: http://mirror2.internetdownloadmanager.com/idman631build9.exe Retail: http://download.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman631build9f.exe http://mirror2.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman631build9f.exe
  18. For years, the number of Americans who have reported using the internet, social media, and smartphones has been on a meteoric rise. But that rate has slowed to a near-stall. New data published this week by the Pew Research Center show that, since 2016, that number has plateaued, indicating those technologies have reached a saturation point among many groups of people. The percentage of Americans using smartphones (77%), the internet (88% to 89%), and social media (69%) has remained virtually unchanged during the last two years. “Put simply, in some instances there just aren’t many non-users left,” the report states. More than 90% of adults younger than 50 report they use the internet or own a smartphone. This number squares with some of the trends noticed earlier this year by Gartner, a global research firm. The fourth quarter of 2017 marked the first time since 2004 that the market for smartphones declined globally compared to the prior year. People are less frequently buying new phones. “While demand for high quality, 4G connectivity and better camera features remained strong, high expectations and few incremental benefits during replacement weakened smartphone sales,” the firm reported. That’s already posed significant challenges for foreign companies looking to break into the US market. The Chinese brand Xiaomi is the fourth-largest seller of smartphones in the world. But as CNBC reported earlier this year, any goals it has for getting its products into American hands will be tough, with market saturation being a big reason why. Of course, there are segments of the US population that represent room in which to expand the use of smartphones and the internet. About 60% of Americans living in rural zones complain they have internet speeds so slow that it inhibits use. There’s also the population over 50 years old, which often complains that learning a new technology isn’t worth their time, according to the Pew report. In 2015, a Pew survey showed 34% of people over 65 said they had no confidence in their ability to perform tasks online. So for companies looking to make inroads, some of the challenges are clear: Invent products that make usability improvements to what’s already offered by Apple or Samsung that can be applied across a broad age range of people. It’s a tall order, but a tighter market could just pave the way for a newer, better wave of technology. Source
  19. What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common? Alex is a software security engineer at Mozilla, where he works on sandboxing and anti-exploitation for Firefox. Previously he was a software engineer with the United States Digital Service, and served as a member of the board of directors of both the Python and Django Software Foundations. One bug affects iPhones, another affects Windows, and the third affects servers running Linux. At first glance these might seem unrelated, but in reality all three were made possible because the software that was being exploited was written in programming languages which allow a category of errors called "memory unsafety." By allowing these types of vulnerabilities, languages such as C and C++ have facilitated a nearly unending stream of critical computer security vulnerabilities for years. Imagine you had a program with a list of 10 numbers. What should happen if you asked the list for its 11th element? Most of us would say an error of some sort should occur, and in a memory safe programming language (for example, Python or Java) that's what would happen. In a memory unsafe programming language, it'll look at wherever in memory the 11th element would be (if it existed) and try to access it. Sometimes this will result in a crash, but in many cases you get whatever happens to be at that location in memory, even if that portion of memory has nothing to do with our list. This type of vulnerability is called a “buffer-overflow,” and it's one of the most common types of memory unsafety vulnerabilities. HeartBleed, which impacted 17 percent of the secure web servers on the internet, was a buffer-overflow exploit, letting you read 60 kilobytes past the end of a list, including passwords and other users’ data. There are other types of memory unsafety vulnerabilities with C/C++, though. Other examples are “type confusion,” (mixing up what type of value exists at a place in memory) “use after free,” (using a piece of memory after you told the operating system you were done with it) and “use of uninitialized memory” (using a piece of memory before you’ve stored anything in it). Together, these form some of the most common vulnerabilities across widely used software such as Firefox, Chrome, Windows, Android, and iOS. I've been tracking the security advisories for these projects for more than a year and in almost every release for these products, more than half of the vulnerabilities are memory unsafety. More disturbingly, the high and critical severity vulnerabilities (generally those which can result in remote code execution, where an attacker can run any code they want on your computer; this is usually the most severe type of vulnerability) are almost always memory unsafety. From my own security research into the widely used open source image processing libraries ImageMagick and GraphicsMagic, in the last year I've found more than 400 memory unsafety vulnerabilities. If these vulnerabilities are so prevalent, can cause so much damage, and there are languages that don't have these pitfalls, then why are these languages still so common? First, while there are now good choices for languages that prevent memory unsafety vulnerabilities, this wasn’t always the case. C and C++ are decades-old and enormously popular languages, while memory-safe languages that are usable for low-level programming like web browsers and operating systems, such as Rust and Swift, are only just starting to achieve popularity. A bigger issue is that when developers sit down to choose a programming language for a new project, they're generally making their decision based on what languages their team knows, performance, and ecosystem of libraries that can be leveraged. Security is almost never a core consideration. This means languages which emphasize security, at the cost of ease of use, are at a disadvantage. Furthermore, many of the most important software projects for internet security are not new, they were started a decade or more ago, for example Linux, OpenSSL, and the Apache webserver are all more than twenty years old. For massive projects like these, simply rewriting everything in a new language isn't an option; they need to be incrementally migrated. This means that projects will need to be written in two languages, instead of one, which increases complexity. It can also mean needing to retrain a huge team, which takes time and money. Finally, the largest problem is that many developers don't believe there's a problem at all. Many software engineers believe the problem is not that languages like C/C++ facilitate these vulnerabilities, it's that other engineers write buggy code. According to this theory, the problem isn't that trying to get the 11th item in a 10 item list can result in a critical vulnerability, the problem is that someone wrote code which tries to get the 11th item in the first place, that they either weren't a good enough engineer or weren't disciplined enough. In other words, some people think that the problem isn't with the programming language itself, only that some people don't know how to use it well. Many developers find this position compelling, despite the mountain of competing evidence—these vulnerabilities are omnipresent, and effect even companies with the largest security budgets and the most talented developers! It's one thing to discuss the tradeoffs and how we can make memory-safe languages easier to learn, but after thousands upon thousands of vulnerabilities that are preventable with a better programming language, the evidence makes it clear that "try harder not to have bugs" is not a viable strategy. However, there is some good news. Not everyone is in denial about this problem. Rust (disclosure: Rust’s primary sponsor is my employer, Mozilla) is a relatively new programming language which aims to be usable for every problem C and C++ are used for, while being memory safe and thus avoiding these security pitfalls. Rust is gaining adoption, it’s now used by Mozilla, Google, Dropbox, and Facebook, and I believe this demonstrates that many people are starting to look for systemic solutions to the memory unsafety problem. Further, Apple’s Swift programming language is also memory safe, while its predecessor, Objective-C, was not. There are a number of things we can do to accelerate the search for a comprehensive solution to the ongoing security disaster that is memory unsafety. First, we can get better at quantifying how much damage memory safety causes. While I've been performing rudimentary statistics for a few projects, there is an opportunity for more rigorous tracking. The CVE project, an industry-wide database of known vulnerabilities, could track for every vulnerability whether it was a memory unsafety issue, and whether a memory safe language would have prevented it. This will help us answer questions like, "Which projects would benefit most from a programming language that is memory safe?" Second, we should invest in research into how to best migrate existing large software projects to memory safe languages. Currently the idea of migrating something like the Linux kernel to a different programming language is a task almost too large to imagine. Dedicated research into what sort of tools could facilitate this, or how programming languages could be designed to make it easier, would dramatically reduce the cost of improving older, larger, projects. Finally, we can shift the culture around security within software engineering. When I first learned C++ in college, it was expected that sometimes your program would crash. No one ever told me that many of those crashes were also potential security vulnerabilities. A lack of awareness about the connection between the bugs and crashes developers encounter and security issues, from early on in a developer’s career, is emblematic of how security is a secondary concern in software engineering and how we teach it. When creating new projects it should be accepted that one of the criteria when choosing a programming language should be "How will this choice impact security?" Memory unsafety is currently a scourge for our industry. But it doesn't have to be the case that every Windows or Firefox release fixes dozens of avoidable security vulnerabilities. We need to shift ourselves from treating each memory unsafety vulnerability as an isolated incident, and instead treat them as the deeply rooted systemic problem they are. And then we need to invest in engineering research into how we can build better tools to solve this problem. If we make that change and that investment we can make a dramatic improvement to computer security for all users, and make HeartBleed, WannaCry, and million dollar iPhone bugs far less common. Source
  20. Wilson Drake

    Happy Safer Internet Day 2019

    This year lets all raise our hands to make Internet a safer place on Safer Internet Day
  21. Google makes billions from its cloud platform. Now it’s using those billions to buy up the internet itself — or at least the submarine cables that make up the internet backbone. Above: An operator works during the mooring of an undersea fiber optic cable near the Spanish Basque village of Sopelana on June 13, 2017. In February, the company announced its intention to move forward with the development of the Curie cable, a new undersea line stretching from California to Chile. It will be the first private intercontinental cable ever built by a major non-telecom company. And if you step back and just look at intracontinental cables, Google has fully financed a number of those already; it was one of the first companies to build a fully private submarine line. Google isn’t alone. Historically, cables have been owned by groups of private companies — mostly telecom providers — but 2016 saw the start of a massive submarine cable boom, and this time, the buyers are content providers. Corporations like Facebook, Microsoft, and Amazon all seem to share Google’s aspirations for bottom-of-the-ocean dominance. I’ve been watching this trend develop, being in the broadband space myself, and the recent movements are certainly concerning. Big tech’s ownership of the internet backbone will have far-reaching, yet familiar, implications. It’s the same old consumer tradeoff; more convenience for less control — and less privacy. We’re reaching the next stage of internet maturity; one where only large, incumbent players can truly win in media. Consumers will soon need to decide exactly how much faith they want to place in these companies to build out the internet of tomorrow. We need to decide carefully, too; these are the same companies that are gaining access to a seemingly ever-increasing share of our private lives. Walling off the garden If you want to measure the internet in miles, fiber-optic submarine cables are the place to start. These unassuming cables crisscross the ocean floor worldwide, carrying 95-99 percent of international data over bundles of fiber-optic cable strands the diameter of a garden hose. All told, there are more than 700,000 miles of submarine cables in use today. While past cable builders leveraged cable ownership to sell bandwidth, content providers are building purposefully private cables. The internet is commonly described as a cloud. In reality, it’s a series of wet, fragile tubes, and Google is about to own an alarming number of them. The numbers speak for themselves; Google will own 10,433 miles of submarine cables internationally when the Curie cable is completed later this year. The total shoots up to 63,605 miles when you include cables it owns in consortium with Facebook, Microsoft, and Amazon. Including these part-owned cables, the company has enough submarine infrastructure to wrap around the earth’s equator two-and-a-half times (with thousands of cable miles to spare). The impetus for Google’s submarine projects This submarine cable boom makes more sense when you look at the growth of traffic that’s taken place in the past decade. In the Atlantic and Pacific, content providers accounted for over half of total demand in 2017. Content provider data use has skyrocketed from less than eight percent to near 40 percent in the past 10 years. It should be noted here that stats are significantly lower in Africa and the Middle East, suggesting that developed nations hunger for video content and cloud apps are a driver of the trend. This is supported by overall international bandwidth use between countries. In 2017, India only used 4,977 Mbps of international bandwidth. The U.S. used a staggering 4,960,388 Mbps that same year. The cost of privatized infrastructure Like the removal of Net Neutrality, privatizing internet infrastructure has only reduced prices for consumers. The problem we now face is a moral one: Do we want a private internet? Or do we want to preserve the “Wild West” web that we’ve had to this point? Unfortunately, the question isn’t as simple as drawing a line between “good” and “bad” network optimizations. Practices like edge networking and zero-rating are critical to the business models of companies like Netflix and AT&T — they also don’t technically violate the rules, and ultimately deliver much better services to consumers. As we look to the future, we need to start asking ourselves what the internet is really going to look like whenever the content services that already command so much of our attention are in control of the internet backbone as well. Privatized infrastructure may bring untold benefits for consumers in the short run, but is there a cost we aren’t considering? Source
  22. Russia is considering whether to disconnect from the global internet briefly, as part of a test of its cyber-defences. The test will mean data passing between Russian citizens and organisations stays inside the nation rather than being routed internationally. A draft law mandating technical changes needed to operate independently was introduced to its parliament last year. The test is expected to happen before 1 April but no exact date has been set. Major disruption The draft law, called the Digital Economy National Program, requires Russia's ISPs to ensure that it can operate in the event of foreign powers acting to isolate the country online. Nato and its allies have threatened to sanction Russia over the cyber-attacks and other online interference which it is regularly accused of instigating. The measures outlined in the law include Russia building its own version of the net's address system, known as DNS, so it can operate if links to these internationally-located servers are cut. Currently, 12 organisations oversee the root servers for DNS and none of them are in Russia. However many copies of the net's core address book do already exist inside Russia suggesting its net systems could keep working even if punitive action was taken to cut it off. The test is also expected to involve ISPs demonstrating that they can direct data to government-controlled routing points. These will filter traffic so that data sent between Russians reaches its destination, but any destined for foreign computers is discarded. Eventually the Russian government wants all domestic traffic to pass through these routing points. This is believed to be part of an effort to set up a mass censorship system akin to that seen in China, which tries to scrub out prohibited traffic. Russian news organisations reported that the nation's ISPs are broadly backing the aims of the draft law but are divided on how to do it. They believe the test will cause "major disruption" to Russian internet traffic, reports tech news website ZDNet. The Russian government is providing cash for ISPs to modify their infrastructure so the redirection effort can be properly tested. Source
  23. He wants a rehearing. President Trump is determined to challenge an appeals court ruling preventing him from blocking critics on Twitter. The Justice Department has filed papers for Trump that demanded a rehearing by the Second US Circuit Court of Appeals in New York, arguing that the three-judge panel's unanimous decision was "fundamentally misconceived." The move would supposedly create a chilling effect for politicians if upheld. "Public officials who address matters relating to their public office on personal accounts will run the risk that every action taken on that account will be state action subject to constitutional scrutiny," according to the filing. The challenge may face an uphill battle. In the earlier ruling, Circuit Judge Barrington Parker noted that @RealDonaldTrump is "one of the White House's main vehicles" for official activity -- it's under scrutiny precisely because many of Trump's tweets are state actions. He "hereby ordered" companies to find alternatives to production in China on August 23rd while using his personal account, for example, and incorrectly . If Trump was allowed to block critics of his policies on his personal account, other politicians could simply shift their announcements to personal accounts to avoid their responsibilities for civic interaction. This lines up to a degree with a January ruling that an official's Facebook page is a public forum. As it is, there are calls for consistency across the aisle. Critics have sued Rep. Alexandria Ocasio-Cortez arguing that they, too, shouldn't be blocked on Twitter merely based on disagreements. While Trump may not be fond of seeing critics' tweets, the ruling could also ensure that rival politicians have to contend with online objectors of their own. Source
  24. Under his direction, the site grew to become a credible video game streaming contender . Matt Salsamendi was just 18 years old when he co-founded Mixer, the site which has grown to be the third most popular video game streaming platform. Now, he's announced he is moving on from the company to take on new projects. The company was originally called Beam, and it was acquired by Microsoft in 2016. It was subsequently renamed as Mixer, where it succeeded in tempting over some high-profile Twitch users such as Fortnite star Ninja. Mixer remains a David next to Twitch's Goliath though, with a StreamElements report showing Twitch makes up 72.2 percent of time spent watching live streams and Mixer makes up just 3 percent. Mixer is continuing to grow, however, with a report from Streamlabs showing the number of gaming hours streamed on the platform has tripled in the third quarter of this year, likely due to the presence on Ninja on the platform. "During my time at Mixer, we made leaps in technology and community that changed the way people think about competition in the game streaming space," Salsamendi wrote in a statement posted to Twitter. Regarding the company's acquisition by Microsoft, he was positive: "The support we received from across Microsoft was humbling for me and the experience I've gained in the last three years is irreplaceable." Salsamendi is now moving into a different field, working on using lasers in music projects. He didn't give a lot of details on what his new project will be, but he said he has a passion for lighting at EDM festivals and tours and will be pursuing that. Source
  25. The next 50 years may bring pervasive connectivity, brain-computer interfaces and walled-off areas of the internet. As the internet turns 50, the technology is only picking up steam and continuing to reinvent many aspects of our lives, from the way we do business, and the way we find dates and jobs, to the way we run for political office. The internet was born when the first Arpanet link was established between the University of California, Los Angeles and the Stanford Research Institute at 22:30 hours on October 29, 1969. UCLA professor Leonard Kleinrock and his student Charley Kline sent the first message to Bill Duval, a programmer at Stanford University. That first communication was the spark that ignited the growth of the internet and everything it has brought with it – email, sharing pictures on Facebook, buying books and toasters on Amazon, watching movies on Netflix, cat videos, mean-spirited memes and election-tampering bots. The spark was lit in 1969, but the internet really began to transform our lives in the late ‘90s to early 2000s. “Oh, the internet is turning 50, but that first internet connection between Stanford and UCLA was between two guys. It didn’t involve the whole planet,” says Genevieve Bell, a Senior Fellow at Intel Corp. and director of the Autonomy, Agency and Assurance Institute at the Australian National University. “It really started to change our lives and shake our consciousness around the time when Google became a verb. It all exploded at the intersection of Google, smartphones, apps, Amazon, Facebook and eBay.” It’s difficult to quantify how the internet has changed the world. If someone needs directions, most no longer go to the car to pull out a map. If it’s the middle of the night, they don’t have to wait till their bank opens at 9 a.m. to find out how much money is in their checking account. What did the president say at a rally last night? Go online to read his comments. We file our taxes online. We order food online. “The internet has changed our ideas of time and space and distance,” Bell says. “The internet can instantly tell us who was president in 1969, and what hours the new restaurant in town is open. We can watch a rover moving around on Mars. I can keep track of my friends in America from Australia.” The internet also has created new communities, bringing together people from all over the world because they share a common love for the same band, Pez dispensers or a TV chef. Of course, the existence of the internet also means anonymous online trolls can flood social media with hateful comments, and overseas bots can post negative and untruthful tweets about politicians and celebrities to incite anger, dissension and even violence. And while enterprises of all sizes use the internet to streamline their supply chain management operations and connect customers more closely with their brands, they also have to deal with hackers stealing customers’ financial information, or competing corporations and nation states planting negative online comments or using the internet to spy on their product plans or financials. Privacy, or the increasing loss of it, also is a problem thanks to the internet – or more accurately, thanks to the way we use the internet . “As the years have passed, the internet has been getting smarter,” says David Reinsel, a senior vice president at IDC, a technology analyst firm. “You’re no longer just going somewhere. It’s watching you go somewhere, and it is learning about you by what you purchase and what you search and what you ‘like.’ With everything you do online, you leave a trail of information. Your digital self is more you than your physical self now. And it’s pushing information at you based on what it knows about you.” Companies are using all of that personal information to strategically target individual users with specific advertisements and marketing. “Before a company would create a product for men or for a particular generation,” Reinsel says. “Now with the information they’re getting about us online, they can tailor it down to the individual. Think about the day you walk into a restaurant and you’re greeted by name and you’re presented a menu that takes into account what foods you like and your allergies. We’re not there yet, but that’s where we’re heading. The downside, though, is if that restaurant tells your health insurance company that you ordered the banana split. I have a problem with that.” Companies have a lot of opportunities to siphon information about our likes and dislikes, our political leanings, our hobbies and our 2 a.m. shopping sprees because our laptops, tablets and smartphones have become something of an extra appendage. We’re rarely unconnected. The thought of it makes many people anxious and feel at loose ends. Surveys have shown that while many people scroll online news sites, Twitter and Facebook over their morning coffee, others can’t even wait until they get out of bed to check to see what’s happening in the world or what memes are being posted. We’re addicted. We’re so connected that entire businesses – AirBnB, Uber, GrubHub and online mega giant Amazon – exist totally online. Pervasive internet connectivity, brain-computer interfaces So if the internet has changed our lives this dramatically in the last 50 years or even the last 15 years, what could the next 15 or 50 years bring? While the internet has created the opportunity for people to work productively and successfully all while being out of the office, the advancement of technologies like virtual reality and augmented reality will only add to the power of telecommuting tools like Skype, Zoom, instant messaging and Slack, according to Marc Weber, internet history program founder at the Computer History Museum in Mountain View, Calif. “There are companies that are really using remote technology to change the way they work,” Weber says. “But when we get satisfactory virtual reality over the Web and other remote enabling technologies, there will be an even bigger change. If you make it easy to do telepresence or other ways to virtually connect people, that will change the way people work.” While Google failed with the initial release of its Google Glass wearable technology, which was widely panned as awkward and creepy, Weber predicts that more, and better, wearable devices will hit the market, and that will help change the way we connect to the internet. “Right now, we access the internet through these tiny screens we carry in our pockets,” Weber says. “Whether it’s something like Google Glass, advances in smart watches, or a brain-computer interface so we can surf the Web in our mind’s eye, there will be some new technology that makes it easier to access the internet. We couldn’t predict Airbnb and Yelp before smartphones became common. How can we predict what will happen when we can get information through our brain-computer interface? The next big advance in how we access the internet will change the medium again.” Kleinrock, who today is a distinguished professor of computer science at UCLA, has great hopes for the next 10 or 20 years of the internet. For starters, we’ll be even more connected than we are now, he says, and that’s going to enable another exciting round of technological growth. Instead of simply being well connected to the internet at home, in the office or at the local cafe, we’ll have a strong, fast connection when we’re walking the dog, traveling in the country or out in the middle of nowhere. Picture a day when you wake up on 5G, have 5G access in your car and out in the world. You’d have a continuous flow of information, with persistent authentication unlocking everything from your car to your office building and your mailbox. Sensors in the front door to your house might check your walking gait and your heart rate, and then connect to a chip in your body, and unlock the door as you approach it. “I foresee a pervasive global nervous system on this planet so wherever you go, the internet is available and accessible,” Kleinrock says. “And the internet of things will explode. We’ll be able to take cyber space that lives in your laptops and cell phones and embed it in the walls, in our cars and in our bodies with logic, memory, sensors, cameras, microphones and displays. You won’t have to see them or touch them. We’ll have this invisible network. Add to that the fact that we will have intelligent software agents that live in the network and alert you to things, seek out things you want and handle your priorities. It’ll be maybe 10 years before we have the proper interface, like speech and brain wave sensing, so instead of flapping my tongue, I’ll be able to communicate with my walls or car by just thinking about something.” Dark side of internet connectivity However, Kleinrock also envisions negatives in this futuristic scenario. What if that widespread access doesn’t apply to everyone or every country? “I do worry that we’re in for trouble,” he says. “I’m concerned that nation states will put walls around their national networks and won’t communicate with others. China, Russia, Turkey, even the EU – what if you can’t move from one of these areas of the internet to another? If we break up into separate networks, we lose an awful lot. We lose the ability to roam around without boundaries, and that has made the internet so powerful.” Charles Severance, clinical professor of information at the University of Michigan, says he also fears that what he calls today’s golden age of universal internet connectivity will go away. “I think there will be dark forces, whether companies or governments, that will control our connections,” says Severance, who teaches a course called Internet History, Technology and Security. “What if there’s a day when people will only be approved to connect to Facebook? Try to go to another site and the connection won’t work. Whoever holds these shared resources will become traffic cops and they will make you bribe them or pay them for resources.” “We are in the golden age of the internet,” Severance says. “In 50 years, we’ll say, ‘When I was a kid, you could connect from anywhere. You could put up any website.’ And kids will say, ‘What?’ It’ll be so sad that only old people will remember how great the internet was. I’m not looking forward to the next 50 years. I’m just really happy now.” Source
  • Create New...