Eyes on the Stars (video 3:17) – On January 28, 1986, NASA Challenger mission STS-51-L ended in tragedy when the shuttle exploded 73 seconds after takeoff. On board was physicist Ronald E. McNair, who was the second African American to enter space. But first, he was a kid with big dreams in Lake City, South Carolina. (suggested by Michael F.)
Roozz rents software in the cloud – Many of the titles on Roozz are available for free, but some are available for rental only. The prices, which are set in per-day, per-week, or even per-year fees, seem very affordable. Some titles cost 99 cents for a week, while others are less than $4 per day. Prices are determined by the software publishers, but Roozz says it has offered input on pricing, as this rental model is somewhat new.
Get a free shared workspace for your small business – Bitrix24 offers a free shared workspace for up to 12 users. It’s part file-sharing service, part chat client, part CRM tool, part project manager, part employee manager, and so on, all wrapped up in a familiar, Facebook-style interface.
How to activate Windows 8’s File History feature – One caveat, though: It’s not a full-system backup tool like Windows Backup; by default it preserves only those files in your Libraries: documents, music, photos, and other media. You can add other folders if you wish, but only by adding them to your Libraries.
Netherlands, Canada Say WhatsApp Still Violates Privacy Laws – Dutch and Canadian officials say the popular mobile text messaging app WhatsApp violates their countries’ privacy laws because it rifles through users’ contacts to find other devices hooked up to the service.
KeePass makes strong passwords and keeps them safe – If you adopt just one security tool this year, make it KeePass. This free and open-source password manager is available for Windows, with unofficial ports for iOS, Android, Linux, and Mac OS X. A secure, lengthy, completely random password goes a long way towards improving your security–and having a separate password for each and every website and service you use is the single most important thing you can do to keep secure.
Get your cheap Windows 8 upgrade now – Microsoft’s $39.99 Windows 8 upgrade special ends Thursday, so you may want to buy it now even if you don’t plan to install it yet.
Fake Twitter followers: An easy game, but not worth the risk – Buying followers is morally dubious, possibly dangerous and can tear down even the most trusted social media figures, yet it’s poised to continue to grow in the immediate future. But hey, it can get you friends, right?
Court: Government Need Not Justify Warrantless Data Requests – A Virginia appeals court on Friday denied a right-to-access order filed by the Electronic Frontier Foundation and the American Civil Liberties Union on behalf of Icelandic parliamentarian Birgitta Jonsdottir and computer security researchers Jacob Appelbaum and Rop Gonggrijp. The denial confirms a lower court’s ruling that neither those individuals nor the public has the right to see the documents a court uses to justify its warrantless acquisition of information.
Google vows to push legal reforms to protect user privacy – “It’s important for law enforcement agencies to pursue illegal activity and keep the public safe,” wrote Google’s Senior Vice President and Chief Legal Officer David Drummond. “We’re a law-abiding company, and we don’t want our services to be used in harmful ways. But it’s just as important that laws protect you against overly broad requests for your personal information.”
Twitter grants data requests by federal government 69 percent of the time – Twitter released new numbers showing that the social network complied with government data requests 69 percent of the time in the United States, as government requests for user information worldwide continue to rise. “All signs suggest that these government inquiries will continue to climb into the foreseeable future,” Twitter said.
FixTracking Shows You How to Browse Securely and Privately on Any Browser – We’ve mentioned plenty of helpful tools for keeping your browsing anonymous and secure, but it’s hard to remember every single one and figure out what’s right for your needs. DuckDuckGo’s FixTracking site explains all your options and shows you how to set everything up so you can browse without worry who may be tracking your activity.
Facebook Graph Search Mines Potentially Rich Data for Phishers, Attackers – So why are security and privacy experts nervous? There’s some serious horsepower behind Graph Search, and there are users whose interests aren’t as benign as finding friends of friends in a particular location who happen to like country music, fine wine and yoga.
U.S. DoD’s cybersecurity force to increase fivefold – The Pentagon is poised to start searching for more than 4,000 new employees for the Defense Department’s Cyber Command, in a bid to boost its cyber defensive and offensive capabilities. The news, shared with The Washington Post by department officials that wished to remain anonymous, is expected to be announced soon.
Bug makes Java’s latest anti-exploit defenses moot, claims researcher – Java’s new security settings, designed to block “drive-by” browser attacks, can be bypassed by hackers, a researcher announced Sunday.
Trojan uses anti-spam system to keep in touch with C&C servers – The latest innovation in this particular “field” has been spotted by Symantec researcher Takashi Katsuki, who recently discovered a Trojan that uses Sender Policy Framework (SPF) to keep the connection between malware and C&C servers alive and well. Ironically, the SPF is an email validation system designed to spot email spoofing and, therefore, spam.
48% of IT staff fear unauthorized access to virtual servers – Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, according to Varonis. The study, conducted at VM World conferences, suggests that there is a limited awareness of security matters when it comes to visualized servers, with 70% of respondents having little or no auditing in place on virtual servers.
Kindle Fire Nabs 33 Percent of U.S. Android Tablet Market – The U.S. is dominating the Android tablet race, and consumers here seem particularly enamored with Amazon’s Kindle Fire, according to Localytics.
Newegg Crushes Patent Troll in Online ‘Shopping Cart’ Suit – Online retailer Newegg scored a major victory against a well-known patent troll last week, meaning Newegg will not have to hand over $2.5 million to Soverain Software.
Pinterest tests new look with bigger pins, restructured navigation – The addicting social-networking site is mixing things up a bit to make its pins even more gripping.
Google+ Tops Twitter as World’s No. 2 Social Network – Google+ has passed Twitter and YouTube to become the world’s second largest social network, beaten out only by Facebook, according to a U.K. market research firm.
Google sued by iPhone users in U.K. over Safari tracking – A new privacy battle against the Web giant is heating up in the U.K. as Apple users claim their Internet habits were illegally tracked on the Safari Web browser.
HP will jump on the Chromebook bandwagon: Report – Another week, another major PC vendor announcing that it’s planning a Chromebook offering of its own. Last week, it was Lenovo; this week, according to reports, it’s none other than HP.
Lenovo Downplays RIM Acquisition Report – PC giant Lenovo is downplaying a recent report that the company is looking to acquire BlackBerry maker Research in Motion.
High-level language – A programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages. In contrast, assembly languages are considered low-level because they are very close to machine languages. The main advantage of high-level languages over low-level languages is that they are easier to read, write, and maintain. Ultimately, programs written in a high-level language must be translated into machine language by a compiler or interpreter.
Off Topic (Sort of):
1.8 gigapixel ARGUS-IS. World’s highest resolution video surveillance platform by DARPA – Where it will be used, however, with the war in Afghanistan apparently winding down, is another question entirely. Its efficacy in a military setting would be unsurpassed, but it’s easy to imagine how ARGUS could be used here at home in the US, too. (suggested by Michael F.)
Dvorak: Vine: 6 Seconds of Crap – I’m coining this era “the Instagram era” because it is marked by taking good things in life and making them crappy. Music mashups do this, Instagram does this, and in my opinion, even Twitter manages to do this, though it is debatable whether short posts are bad or good.
The Evolution of the BlackBerry – With BlackBerry 10 on the horizon, we take a look back at the long history of RIM’s hot handhelds.
Cracked: 6 Ridiculous Myths About the Middle Ages Everyone Believes – When you think of the Middle Ages, chances are you picture gallant knights sitting astride brilliant destriers galloping through a sea of plagues, ignorance, and filth. And you can hardly be blamed for that, when everything from the movies you watch to your high school history teacher (who was mainly the football coach) has told you that …
House panel demands answers regarding Swartz prosecution – Letter to Attorney General Eric Holder says committee has “many questions” about the Justice Department’s handling of prosecution of the Internet activist, who committed suicide earlier this month.
“The whole aim of practical politics is to keep the populace alarmed – and thus clamorous to be led to safety – by menacing it with an endless series of hobgoblins, all of them imaginary.”
– H.L. Mencken 1880 –1956
Today’s Free Downloads:
Outlook on the Desktop – Outlook on the Desktop will place the Microsoft Outlook Calendaring system right on your desktop. The calendar object gets pinned to your desktop and stays there all the time in plain sight so you can always see what’s upcoming. Of course, the benefits don’t stop there.
FastStone Image Viewer – FastStone Image Viewer is a free image browser, viewer, converter and editor that supports all major graphic formats. Other features include a batch image converter / resizer, a Full Screen image viewer with Select-Zoom support, a clear magnifier and a slideshow with 150+ transitional effects.
Midget Lesbian Porn, Trannies With Knives, and Other Assorted Spam Comments
There’s not much that’s funny about comment spam. Comment spam has the potential to be dangerous – if it’s allowed to be blindly posted. I’ve written a number of articles dealing with the hows/whys of comment spam in the past, so I won’t belabor the point. If you wish you can checkout – Comment Spam Is Dangerous BS!
Over and above the danger it may pose to Internet travellers, by its very nature, comment spam is a pain in the patootie for bloggers who have to deal with it. Here on this site – every morning I’m forced to deal with upwards of 300+ pieces of comment spam. This morning for example – 358. These numbers do not include the 200 or more spam comments, that will arrive throughout the day.
Not a big problem you might think – just hit “delete all spam.” Done – over with – on to the next thing. Except, the downside to the quick erase method is; some genuine comments that may have a link/attachment (which will trigger the spam filter), get lost in the flush.
Recently, for example, a reader made the point that I had not posted his previous comment and questioned, if I intended to handle his current comment in the same way. Since I do not filter genuine comments, I could only assume that this reader’s prior comment had fallen victim to the “flush it down the toilet” method. An apology, of course, was in order. So, a pain in the patootie? You bet.
Even so, hard as it is to imagine – there is a bit of a silver lining to comment spam. Sure, I had to dig deep to find it – but, I have to admit – there are those rare moments when I get my morning coffee up my nose, when the unintentional humor of a spam comment catches me unaware.
Now, I don’t mean any disrespect to those who consider Midget Lesbian Porn to be the height of eroticism …………………….. (no, I better not write what I really want to say). But, the following brought tears to my eyes – tears of laughter, that is.
Midget lesbian porn – dominican-republic-travelxxxxxx/ x
Lolita midget porn videos – dominican-republic-travelxxxxxx
Midget asian porn http://dominican-republic-travel-dealsxxx
Hard core midget porn pics, QzpMldJ.
All of the links actually resolve to – http:midgetporntube4u.com/?act=public_html/dominican-republic-travel-deals.net/&
Travelling to the site – if you’re running WOT – would pop up the following warning. Just a quick question for WOT though – why would “Child safety” be unrated?
But lets move on to the following. Both of these put a cramp in my sense of how to comment, in this post, gracefully. So, I’ll just say – WHAT?
Ticked off trannies with knives (referral link removed).
Penis enlargement bible free download (referral link removed).
But the best, the spam comments that leave me in stitches, are the Google Translate fails. One would think, that if a spammer went to all the trouble of writing a complex spam comment, he’d a least get it right. Here’s a few recent examples.
So you see – even comment spam has an upside. Sort of.
A quick note: In the 20 minutes it took to write this short piece, I’ve become the ungrateful recipient of another 118 spam comments. These guys just never give up.
Filed under Comment Spam, Porn, WOT (Web of Trust)
Tagged as Bill Mullins, comment spam, fails, Google Translate, Tech Thoughts