Back in April, we looked at an ambitious European plan to simulate the entire planet. The idea is to exploit the huge amounts of data generated by financial markets, health records, social media and climate monitoring to model the planet's climate, societies and economy. The vision is that a system like this can help to understand and predict crises before they occur so that governments can take appropriate measures in advance. There are numerous challenges here. Nobody yet has the computing power necessary for such a task, neither are there models that will can accurately model even much smaller systems. But before any of that is possible, researchers must gather the economic, social and technological data needed to feed this machine.
Facebook is well on its way to becoming the most popular way that people share links, photos, and other content with their friends. For many sites it’s becoming a powerful new driver of traffic — get people to ‘Like’ your stuff, and Facebook’s network effects will expose it to dozens of their friends. Just make sure not to do something that might make Facebook angry. Otherwise it might nuke every link to your site, choking off this river of traffic that you’ve worked so hard to build.
No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle…they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other. But there are some places where a spider cannot enter. Take library databases which need a password for access. Or even pages that belong to private networks of organizations. Dynamically generated web pages in response to a query are often left un-indexed by search engine spiders.
A malware-laden flash drive inserted in a laptop at a U.S. military base in the Middle East in 2008 led to the "most significant breach of" the nation's military computers ever, according to a new magazine article by a top defense official. The malware uploaded itself to the U.S. Central Command network and spread undetected on classified and unclassified computers creating a "digital beachhead, from which data could be transferred to servers under foreign control," William J. Lynn III, U.S. deputy secretary of defense, wrote in his essay in the September/October issue of Foreign Affairs.
Among the oft-cited weaknesses in using passwords for authentication are that people choose bad, easily guessed passwords, such as “123456” or, even, “password.” But even carefully chosen passwords are not enough, at least if they are too short, according to researchers at the Georgia Tech Research Institute. The reason: graphics processing units, which are powerful enough to conduct quick, effective brute-force attacks on password-protected systems.
A COUPLE of months or so after becoming Britain’s prime minister, David Cameron wanted a few tips from somebody who could tell him how it felt to be responsible for, and accountable to, many millions of people: people who expected things from him, even though in most cases he would never shake their hands. He turned not to a fellow head of government but to…Mark Zuckerberg, the founder and boss of Facebook, the phenomenally successful social network. (It announced on July 21st that it had 500m users, up from 150m at the start of 2009.)
Since the Web’s evolution and its definitive opening up to a much broader public - the famous 2.0 – literally millions of blogs have appeared and this gigantic network has converted itself, apparently, into a global offering that provides unlimited access for the common good. Since then much has been said about the democratizing merits of the Web and its virtues as a tool in promoting free trade, access to the largest markets irrespective of the country of origin. Any person or business for an extremely low, or even zero cost, could access the largest global market in the history of mankind.
Most BitTorrent sites operate in the shadows, with operators who rarely speak in public and guard their identities closely. Mininova is not one of those sites and in a new interview, company directors Erik Dubbelboer and Niek van der Maas reveal a little more about running one of the world’s biggest BitTorrent sites. Most visitors to Mininova will be completely unaware that this is not your regular torrent site. Unlike many private torrent sites – operating on the fringes of legality and trying to keep a fairly low profile (whilst gathering donations in order to stay alive) – Mininova is a very successful and fully-fledged tax-paying business with a revenue of well over a million dollar a year.
TrueCrypt is an open source (meaning free) encryption tool for encrypting folders or entire disk partitions. It creates virtual encrypted volumes that can be mounted as drives. You can use either passwords or keys to access your encrypted volumes. Keys require the normal key management (storage, backup, etc.) that would be required with Microsoft's EFS or other encrypting system that is key-based. With passwords, TrueCrypt becomes a true on-the-fly encryption tool. TrueCrypt is an open source project, and the download is available from SourceForge.