There is a subtle art to influencing people’s opinions and the way that a particular topic is viewed. We have seen multiple attempts at this, some good, some bad. For the marketing savvy it seems that nothing they (or their charges) say can ever be negative. For those that are… less competent the message come out all wrong and often changes the intended push into something very negative. The MPAA and others in the anti-piracy community seem to be in the latter group.
Remember when we told you that BitTorrent was coming out with their very own chat app called Bleep? No well they are and from the information we have so far it is looking like a pretty cool application. The concept is to take basic chat and run it, encrypted, through Torrent swarms. This move, in theory, should prevent the big guys from being able to store or grab your communications in transit.
AMD has been something of an unusual company ever since they first decided to dive into the x86 market with their purchase of NexGen. The would-be CPU maker had an interesting knack of building CPUs that performed well, but were always just a pace behind their rivals. That was the case until AMD pulled off a minor miracle in the form of the Athlon and Athlon64 CPUs. AMD seemed to have stolen the crown from Intel and looked likely to keep it for a long time.
Ever since the take down of Napster the copyright industry has taken a much more aggressive stance on piracy. This stance had taken the form of new laws, increased lobbying and a push to make ISPs responsible for policing everyone’s activities on the internet. They have even sought for, and are still trying to get, trade agreements that allow the US to push their laws onto other countries in the form ACTA and the TPP. Now all of these measures have their seedier side to them, but so far none are exactly illegal (immoral and potentially unethical? That is another question)… At least not until you start looking at some of the trials and arrests that have happened in the last few years.
We have more news from the Snowden front as Der Spiegel reports one a joint NSA, GCHQ program dubbed treasure map. Although the program was originally revealed by the NY Times in late 2013 it was originally described as a network mapping program with no surveillance application. This claim is no longer holding up as more and more information come out about the two agencies plans to map the entire internet in real time.
As the title of this article suggests there is another new video on the internet that claims to show the Windows 9 menu and how it all works. The appearance of the video comes on the heels of more than one alleged screen shot and some other items that have leaked from Microsoft themselves. As we all know Microsoft has a lot riding on the next version of Windows simply because of the lack of consumer acceptance that Windows 8.x has had.
It is not often that we can write about a big company like Microsoft and say they are doing “the right thing”. This is even more true in light of the Snowden revelations that showed the close cooperation that Microsoft (and others) had with many data collection programs run by the NSA. Any trust that people had in Microsoft and their drive to protect their customer’s data vanished in an instant. Since those days Microsoft has been working very hard to rebuild consumer trust. They have put SSL and TLS encryption on their email service and have put a few privacy (pronounce that security if you are in government) features in place to help change the public opinion.
Since the beginning of 2014 the IT world has been rocked by more than a few major breaches. The number of credit cards and user information now up for sale is staggering. So how have these attacks managed to get in and make off with so much data so quickly? Of course there are the usual suspects in these cases, weak passwords and users downloading malware on their systems that allow a potential attacker into their system.
The concept of the VPN (Virtual Private Network) is one that is intended to allow people to make a secure, encrypted connection from point A to point B. in most cases this connection is from a remote location back to the home or an office. VPN actually covers a few different protocols that include IPSEC (IP Security), PPTP (point to point tunnel protocol), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Socket Layer) and a few other less common ones. In recent years it has also become a method to get around DNS blocking and also as a form of maintaining private/ anonymous communication.
Remember all of the data that was collected from the Dotcom raid? You know the stuff, the raid that was ruled legal even if the warrants that were used to justify it were not. Well it seems that there is some movement on the return of the data taken from the Dotcom house as a court of appeals has ruled that clones of the drives taken need to be returned to Kim Dotcom as soon as convenient.