Although the phone can now be rooted, the Droid X bootloader encryption hasn’t been cracked yet—meaning that there is still no way to install custom ROM images on the device
Archive for 2010/07/23
The Moscow Arbitration Court awarded a publishing house $249.6 million in damages in a copyright infringement case, an unprecedented sum, an attorney said
Three quarters of illegal shipments stopped by EU customs officials in 2009 were shipped by post or air, suggesting that Internet sales of illegal items have increased, according to an annual report on illegal trade flows by the European Commission’s department for taxation and customs union.
The figures highlight that counterfeiters are concentrating increasingly on sales to individuals rather than dispatching bulk shipments to intermediaries that are expensive to send and could more easily be tracked
Indonesia is taking steps to block pornographic Web sites before the start of the Muslim fasting month of Ramadan, the country’s information minister said Thursday, defying local criticism that the plan amounted to censorship and was unworkable.
He said the filter would not be 100 percent effective but was a “first step to minimize the distribution of pornography.”
43.3% of BitTorrent torrents are movies, 29.1% are TV shows and 16.5% are music
Only 0.3% of files on BitTorrent confirmed to be legal
GM secrets allegedly offered to Chinese rival
The only thing you have to do is enter a contest and hack Minobet.nl (Ministry of Obfuscation & Transparency) to recover a bunch of classified documents from their servers.
Make sure to hack the right servers though because hacking other .nl sites or the wrong servers could get you into real trouble.Article 138a Dutch criminal code (Dutch penal code) Hacking and aggravated hacking 1. A person who intentionally and unlawfully enters into (a part of) an automated work is liable to a term of imprisonment of not more than one year or a fine of the fourth category, as guilty of hacking. The act of hacking is committed when access to the work is obtained: a.By breach of security,
b.By a technical action,
c.Through false signals or a false key, or
d.By assuming a false capacity. 2.Hacking is punishable by a term of imprisonment of not more than four years or a fine of the fourth category if the perpetrator subsequently copies, intercepts of records data that are stored, processed or transmits via the automated work to which he has unlawfully obtained access for himself or another 3.Hacking committed through the intermediary of a public telecom network is punishable by a term of imprisonment of not more than four years or a fine of the fourth category if the perpetrator subsequently: a. uses the processing capacity of an automated work with the object to give himself or another illegal advantages;
b. obtains access to the automated work of a third party though the automated work to which he has illegally obtained access.
The organization Bits of Freedom (BoF) is demanding that the Dutch government prohibits T-Mobile from having Google and Apple pay for deploying their services on T-Mobile’s network. T-Mobile is currently in talks with Google about the data-intensive service YouTube.
BoF is of the opinion that the Dutch government should ban such plans because T-Mobile should not be allowed to differentiate between sites and services. “Providers are the gatekeepers of the internet. They are not allowed to decide which sites or services we want to visit. (T-Mobile’s parent company) Deutsche Telekom is indicating that it does want to play such a role”, Bits of Freedom director Ot van Dalen stated. T-Mobile would be damaging the open nature of the net.
The Dutch Consumer Authority agrees with BoF: “We are in favor of absolute Net Neutrality” spokesperson Sandra de Jong stated.
It is not clear yet what will happen if the talks between T-Mobile and Google fail to deliver anything.
Meanwhile Telecom providers are already differentiating between various online services. Various providers limit the content streaming options and Vodafone is charging 5 euro per month for use of VOIP services.
DPI vendor says 90% of ISP customers engage in traffic discrimination
The ISP’s overbooking industry standard normally stands between 1:10 to 1:50 ratios. This means that for every 10 to 50 customers they promise X amount of bandwidth they can only provide X amount of bandwidth at any given time (instead of the promised 10X to 50X bandwidth). To put it differently 10 to 50 customers will be sharing X amount of bandwidth instead of having X amount of bandwidth dedicated to each one of them.
It might seem a horrible scam but surprisingly it works well for both the Airline companies and the ISP’s assuming they keep their ratios down to an acceptable level.
Sure you will always have a few disgruntled customers, ones that booked a flight only to find that there is not enough space on the flight or people that find their Internet connection unbearably slow.
So when does overbooking become a problem?
The problem starts when ISP’s start to get too greedy.
When this happens overbooking goes well beyond 1:10 to 1:50 ratios. During the past several years we have seen several ISP’s over the world that take the ratios up to 1:100 and even to 1:200.
What this means, at such high share ratios, that most customers in most hours of the day will suffer great delays, reduced bandwidth and an overall lousy internet connection.
Recent email communication between White House Deputy Chief Technology Officer Andrew McLaughlin (in photo), who is Google’s former head of Global Public Policy, and multiple outside individuals raise new questions about the official’s alleged circumvention of federal ethics and recordkeeping rules Click here for a 12-page pdf of the McLaughlin emails. (Topics: Net Neutrality, Internet Policy, Copyright, Intellectual Property)
A majority of organizations have been the target of advanced threats – and they’re not doing a good job at defending themselves, according to a new report by the privacy research Ponemon Institute and network security firm NetWitness.
So far this year, Intel, Symantec and Northrop Grumman have joined Google in the list of companies who have publicly informed their investors about the risks of computer attacks in filings with the U.S. Securities and Exchange Commission
Ponemon Institute Discovers Majority of Business Leaders Underestimate Risk of Advanced Cyber Threats
Detection of advanced threats is low:
- 46% took one month or longer to detect an advanced threat
- 45% discovered the attackers “by accident”
- 47% rely on either ad hoc activities or manual analysis to detect advanced threats
Changes are required across the board:
- 81% felt that their leadership lacked awareness of the seriousness of the business risks associated with advanced threats.
- Only 24% agreed that prevention or quick detection of advanced threats is a top security priority in their organization.
- Only 32% reported that their security-enabling technologies are adequate
- Only 26% reported security personnel are adequate to deal with advanced threats.
- Verizon: $4.4 million
- Comcast: $3.82 million
- AT&T: $3.08 million
- Microsoft: $1.85 million
- HP: $1.6 million
- Google: $1.34 million
- Oracle: $1.15 million
- Entertainment Software Alliance: $1.14 million
- Intel: $840,000
- IBM: $730,000
- Yahoo: $550,000
- ITIC: $535,000
- Amazon: $500,000
- Cisco: $370,000
- Apple: $330,000
- Dell: $690,000
- Facebook: $60,000
Googling the Google Lobbyists
Recently, the Washington Post noted as part of a two-year investigation into America’s intelligence community that Google supplies special mapping and search products to the U.S. military and intelligence community, with some Google employees enjoying top secret clearance to work with the government. That news has consumer advocates and politicians asking exactly what information Google has collected — and why.
Consumer Watchdog Repeats Request for Google Wi-Spy Hearing in Congressional Testimony About Federal Use of Web 2.0 Technology
Apple can’t say it. Competitors won’t admit it. But I will: the iPad is a category-creating monster hit. Personal computing will never be the same
Baidu, China’s leading Internet search company, has a “plausible” case against its U.S.-based domain registry for allegedly allowing a hacking attack that left the site disabled and defaced, a U.S. judge ruled Thursday
Going by these metrics—2GB a movie in particular—a Rogers subscriber will get about seven movie downloads per month on the ISP’s Light plan. The Evdoinfo.com site calculates a one-hour high definition Netflix stream as snarfing up 1.67 GB in data
Reports that the Internet will be at a loss for addresses within a year aren’t exactly correct, but over the next several months the shrink wrap will be taken off of the last batch of fresh, unused addresses. It’s the beginning of the end for IPv4