30
2012
Anonymous Warns Syrian Government
Global hacking network Anonymous said it will shut down Syrian government websites around the world in response to a countrywide Internet blackout believed to be aimed at silencing the opposition to President Bashar al-Assad. The blackout is most likely a sign of things to come as well, up to and including a devastating retaliation against the rebels. Syria was plunged into communication darkness on Thursday when Internet connectivity stopped at midday. Land lines and mobile […]
27
2012
Ten year old girls laptop confiscated
Police in Helsinki seized the laptop of a young girl during a search of her family’s home last week, according to her father. The alleged offense? Using the popular BitTorrent website The Pirate Bay to download a single album. Last year, 9-year-old Julietta came across a torrent on The Pirate Bay after searching on Google for Finnish pop star Chisu’s latest album. The download failed to work, and she and her father went and bought the album together shortly afterwards. Unbeknownst to them, Finland’s […]
26
2012
BLUE MONDAY!
HostGator has continued on their great deal! I purchase quite a few domains myself, and know a few who started up simple WP blogs since they were such cheap hosting. We are offering: 50% OFF on ALL hosting services. This includes shared hosting, reseller hosting, VPS hosting, Dedicated servers and Windows hosting! We are also offering Domain Names for only $1.95 if purchased with Web Hosting! This is THE BEST offer we have ever ran […]
23
2012
BLACK FRIDAY!
Fantastic deal by HostGator today! Click above to get the deal, or here! 50% OFF on ALL hosting services. This includes shared hosting, reseller hosting, VPS hosting, Dedicated servers and Windows hosting! We are also offering Domain Names for only $1.95 if purchased with Web Hosting! This is THE BEST offer we have ever ran on domain names before! Domain names not purchased with web hosting will still be only $6.95. We also have […]
21
2012
Warrantless access to Americans’ e-mail
Are you serious? How hard is the government going to try and destroy our privacy? Well apparently they are going to try really hard, and keep trying until they get it. A Senate proposal touted as protecting Americans’ e-mail privacy has been quietly rewritten, giving government agencies more surveillance power than they possess under current law (written in 1986 and beyond outdated). Patrick Leahy, the influential Democratic chairman of the Senate Judiciary Committee, has dramatically reshaped his legislation […]
20
2012
Best FTP clients
Five solid FTP clients that also happen to be free Takeaway: FTP isn’t going away anytime soon and for anyone looking for a solid FTP client, here are five free tools that should meet nearly any need. No matter how embedded into our lives cloud computing becomes, there are still plenty of companies and individuals that rely upon good old fashion file transfer protocol (FTP). There’s a reason for that. FTP is easy to use, reliable, and can […]
16
2012
The ITU could put the Internet behind closed doors.
We love the internet. And we’re guessing you do too. Think about all the awesome things it gives us: A vast communication network; innovative businesses; a platform to freely speak or challenge powerful governments; and hundreds and hundreds of hours of cat videos. All this great stuff is available because the internet was designed in an open and inclusive way, with a multitude of voices being able to get a say on how it’s governed. […]
14
2012
DARPA National Cyber Range Rapidly Emulates Complex Networks
Realistically and quickly replicating globally interconnected networks to securely test new cyber tools and capabilities is no longer an issue for cyber researchers thanks to the DARPA-developed National Cyber Range (NCR). The NCR, which transitioned in October to the Test Resource Management Center under the Deputy Assistant Secretary of Defense for Developmental Test and Evaluation, provides a secure, self-contained facility where complex defense and commercial networks can be rapidly emulated for cost-effective and timely validation of cyber […]