| Saturday December 20th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

How To Actually Win a Fist Fight

stance5.jpg

You know it has to be said, first sentence, first paragraph: the best way to win a fist fight is not to get into one in the first place.

No shit, sherlock.

Every single mens magazine who has ever attempted to publish an article like this has started (and ended) exactly that way and is usually devoid of any real information – sometimes because someone on the editorial staff wanted to avoid putting the periodical at risk for a lawsuit; other times because the author has absolutely no clue what they’re talking about, so they cop out with this “Verbal Judo Wins The Day!” crap.

Read the rest of this entry »

Ohh the irony

mic.jpg

If you didn’t know, the United States Postal Service had a very successful competitor.

The government then made competing with the USPS illegal… LOL

Wikipedia link

Super-delegates explained: How the nomination could still be in doubt after all the primaries, and why your vote matters less than you think

thecaucus75.jpg
WASHINGTON – It’s called the Democratic Party, but one aspect of the party’s nominating process is at odds with grass-roots democracy.

Voters don’t choose the 842 unpledged “super-delegates” who comprise nearly 40 percent of the number of delegates needed to clinch the Democratic nomination.

The category includes Democratic governors and members of Congress, former presidents Bill Clinton and Jimmy Carter, former vice president Al Gore, retired congressional leaders such as Dick Gephardt, and all Democratic National Committee members, some of whom are appointed by party chairman Howard Dean.

The Republicans do not have a similar super-delegate system.

These super-delegates don’t have superhuman powers, but unlike rank-and-file Democrats, they do automatically get to cast a vote at the convention to decide who the party’s nominee will be.

Although dubbed “unpledged” in Democratic Party lingo, the super-delegates are free to come out before their state’s primary and pledge to support one of the presidential contenders.

Follow the link below to read the rest of this interesting and disturbing article

MSNBC Article

Linux Package Management 101

Excellent linux packages 101 writeup by DownloadSquad. it seems Ubuntu-rific but some of the info is universal.

“Your shiny new Linux system has it all — except that one program you really needed it to install. You get online, you find the program’s website, and click ‘download’. Except there’s not just a link to the program there.

There are four, or five, or more links to the program. Each has a slightly different format, ending with .rpm, .deb, .tgz, or possibly even .ebuild.

Some include x86 in the name, while others say ppc or amd64. What’s the difference? What’s actually included in these packages?

Packages are pre-compiled programs for your system (the exception being Gentoo’s .ebuild). You’ve got to know a bit about your system to install them.

synaptic-sm.jpg It’s not enough to know just that you need an .rpm or .deb. You should know your computer’s architecture (32 or 64 bit chip? PowerPC?), as well as the architecture of the distribution you installed. Don’t panic if you have a 64 bit chip and installed an x86 distribution (backwards compatibility is a good thing), but keep in mind you’ll have to install x86 packages. It’s best to use a package labeled for your distribution, though in some cases it is possible to install packages across similar Linux systems. For instance, many Slackware packages are able to install on Zenwalk.

Package management refers to the way your distribution installs and configures (as well as manages and removes) software applications and libraries on your system. When Windows installs an .exe (which is the closest thing in Windows to a package) it usually places it in a single specific place within a directory. Linux installs across a few directories, leaving many new Linux users scratching their heads as to where their .rpm actually went. Most distributions install the executables in /usr/bin, and the libraries in /usr/lib. You may notice related files in /usr/share or /etc.

Read the rest of this entry »

Money Management Finance Website Buxfer Lets You Store Sensitive Data On Your Own Computer

buxferscreencap.jpg

With its new Google Gears functionality, Buxfer might finally be the answer for people who want the bells and whistles of an online personal finance website (hello Mint!)—charts, pretty colors, and general infoporn goodness—without having to blindly trust an unknown company with sensitive data such as bank account or credit card numbers (goodbye Mint!). The service uses Google Gears to store account login information and credentials on your own computer, then syncs the data collected with the Buxfer servers, writes VentureBeat.

Buxfer has been around for a while—both Consumerist and Lifehacker wrote about it nearly a year ago—but the Google Gears functionality is a new component added just last month, and at least at first glance it seems like a good answer to the “sensitive data” issue.

Read the rest of this entry »

Beware of NetSol (NetworkSolutions.com)

netsol.png

A friend tipped me off to a Domain State thread that warns you not to look up a domain name at Network Solutions. If you go to the Networks Solutions site and look up a domain name to see if it’s registered then Network Solutions, within seconds, will buy the domain name, causing you to have to go buy it from them.

Let me explain, using a specific example, exactly what Network Solutions is doing and what is wrong with what they’re doing.

First, I went to the NetworkSolutions.com home page and filled out their form to see if RonPaulIsGod.com was available. According to Network Solutions, RonPaulIsGod.com was available. (It is my contention that within seconds of my inquiring about the RonPaulisGod.com domain name Network Solutions automatically registered that domain name.)

But, my friend called me on my cell phone and I had to step away from my computer for a few minutes. A few minutes later, I realized that I could buy that same domain name for $6.99 over at another registrar and decided to go with them, rather than paying Network Solutions the $34.99 for the domain name. After all, I could think of a lot of things that I could spend the savings of $28 dollars on, mainly 3 other domain names.

Then I come to find out, Network Solutions had already purchased the domain name and I am forced to buy it from them. Not only did Network Solutions buy the domain name after I looked it up, they automatically put up a “domain parking page” on the site, telling me that I must buy it from them.

Network Solutions may call this a service of theirs. Frankly, I would not call this a “service” or even a bad business practice–I would call it extortion. There are thousands of registrars out there, and we all have the right to register a domain name at any registrar. It’s called “fair competition”. If I check to see if a domain name is available at Network Solutions, I should not be required to purchase that domain name from them for $34.99. I should be able to go to another registrar and register it for $6.99 or even $14.99. A domain lookup is absolutely not an agreement to buy.

Read the rest of this entry »

Does Wiping a Hard Drive with Zeros Really Work?

 This might be pretty interesting as long as someone doesnt just steal the guys drive.

Q. What is this?

A. A challenge to confirm whether or not a professional data recovery firm or any individual(s) or organization(s) can recover data from a hard drive that has been overwritten with zeros once. I used the 32 year-old Unix dd command using /dev/zero as input to overwrite the drive. Three data recover companies were contacted. All three are listed on this page. Two companies declined to review the drive immediately upon hearing the phrase ‘dd’, the third declined to review the drive after I spoke to second level phone support. Here is their response… paraphrased from a phone conversation:

“According to our Unix team, there is less than a zero percent chance of data recovery after that dd command. The drive itself has been overwritten in a very fundamental manner. However, if for legal reasons you need to demonstrate that an effort is being made to recover some or all of the data, go ahead and send it in and we’ll certainly make an effort, but again, from what you’ve told us, our engineers are certain that we cannot recover data from the drive. We’ll email you a quote.”

The Great Zero Challenge

New Hampshire Results LEAKED!

nhresultscnnod1.jpg

(in reference to this past post.)

Chilling NYTimes Graphic: A Year in Iraq

The chart, compiled from data provided by the American and Iraqi governments and news media organizations, gives information on the type and location of each attack responsible for the 2,592 recorded deaths among American and other coalition troops, Iraqi security forces and members of the peshmerga militias controlled by the Kurdish government.

Warning: Large Graphic
06opchartlarge.gif

HOWTO: Access the Internet When Web Browsers are Disabled

calc.jpg

Ever been on PC where Internet Explorer was blocked? One solution would be to use a portable version of Firefox on a USB drive, or you can access a hidden browser in Microsoft HTML Help program if removable media is not an option. This was tested on Windows XP SP2 with Internet Explorer 6.

Read the rest of this entry »

Jupiter’s Rings Revealed (wallpaper sized)

jupring1_gal_big.jpg
Right Click -> Save Target As…

Source

If Your Hard Drive Could Testify

airport.png

Federal government claims it has the power to search citizens’ laptops upon re-entry into US. Ugh.

A couple of years ago, Michael T. Arnold landed at the Los Angeles International Airport after a 20-hour flight from the Philippines. He had his laptop with him, and a customs officer took a look at what was on his hard drive. Clicking on folders called “Kodak pictures” and “Kodak memories,” the officer found child pornography.

The search was not unusual: the government contends that it is perfectly free to inspect every laptop that enters the country, whether or not there is anything suspicious about the computer or its owner. Rummaging through a computer’s hard drive, the government says, is no different than looking through a suitcase.

One federal appeals court has agreed, and a second seems ready to follow suit.

There is one lonely voice on the other side. In 2006, Judge Dean D. Pregerson of Federal District Court in Los Angeles suppressed the evidence against Mr. Arnold.

“Electronic storage devices function as an extension of our own memory,” Judge Pregerson wrote, in explaining why the government should not be allowed to inspect them without cause. “They are capable of storing our thoughts, ranging from the most whimsical to the most profound.”

Read the rest of this entry »

An XKCD for the Ron Paul groupies

fandom.png

Source

Clarkson stung after bank prank

 clarkson.jpg

Top Gear TV presenter Jeremy Clarkson has lost money after publishing his bank details in his newspaper column.

The Top Gear host revealed his account numbers after rubbishing the furore over the loss of 25 million people’s personal details on two computer discs.

He wanted to prove the story was a fuss about nothing.

Read the rest of this entry »

McCain On Iraq

mccainoniraq.jpg

Please Do Not Do This

dscn7823.JPG

Attack of the Clones

clone.jpg

It’s all the latest rage – vehicle cloning. And rage is just what you’ll feel if you are the victim. Here is how it works. Thieves steal a car, usually a high-end “desirable” car or SUV. Then they take the vehicle identification number or VIN from a similar vehicle and slap it on the stolen car. Because each VIN is unique like a fingerprint, the stolen vehicle become a clone of a legitimate vehicle. Add some fake papers, and the thieves are ready to sell you a vehicle that looks perfectly legal.

When the police come knocking on your door, you have no legal recourse – you have to hand over the stolen property. Statistics show that this horror story is happening to more and more people ever year. In 2007 there were over 1.3 million cars stolen cars in the US, with over 250,000 or 1 in 5 of these stolen vehicles sold to unsuspecting victims. In the UK, this is being called that fastest growing car crime. And Canadians are being hit just as hard.

But you can avoid being a car clone victim. Here are nine tips to protect you from ending up the proud owner of a stolen car.

Read the rest of this entry »

Urban WiFi Routers at Risk

wardriving.jpg

Indiana University researchers say densely populated wireless routers could be the next method for spreading pharming, script injection, and bot infections

By Kelly Jackson Higgins Senior Editor, Dark Reading

Your crazy next-door neighbor could also be your biggest WiFi security risk: If his wireless router gets infected, it could spread malware to your router as well.

Researchers at Indiana University in Bloomington recently built an epidemiological model of the feasibility of malware rapidly spreading among WiFi routers in a densely populated area. They found in their simulations that tens of thousands of WiFi routers could be infected in two weeks — and most were infected within 24 to 48 hours.

The researchers then tested their model as a launching pad for drive-by pharming, an attack method demonstrated last year by several of their colleagues in a proof-of-concept attack they co-developed with Symantec. That’s where an attacker uses a broadband router vendor’s default password to control the router, after first luring the victim to a malicious Website to infect them with malicious JavaScript code. (See New ‘Drive-By’ Attack Is Remote.)

Read the rest of this entry »

Linux phone to Debut upgrade at CES

openmoko.png

OpenMoko has announced an upgrade to its Linux-powered mobile phone and plans to present the device at CES. That’s a slap in the face for open source competitor Google Android, which is still in development.In its announcement, OpenMoko writes “. . . at CES we will formally preview GTA02 to the public. We are doing this at an invitation-only media event, and not the general show floor.”The GTA02 model was renamed FreeRunner and according to OpenMoko will be “previewed at CES and ship later this spring– first to developers and then to end users as software for the new hardware features becomes available.”

OpenMoko may be looking to build a larger community of Linux software developers as it begins to to make its phone consumer-friendly.

Though Google recently announced the launch of its Android Developer Challenge, the company has not given any indication of when any Android-powered hardware may appear.

That gives OpenMoko a head start in developing additional Linux software for its phone and claiming marketshare.

Read the rest of this entry »

 Page 146 of 152  « First  ... « 144  145  146  147  148 » ...  Last »