COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Jul 29 13:25

Wikileaks + MSM Hype = ?

Ladies & gentlemen, welcome to the 40th episode of New World Next Week - the video series from CorbettReport.com & MediaMonarchy.com. This week we look exclusively at the massive media hype surrounding Wikileaks, wider wars & the future of the web.

Sources & Documentation: http://www.youtube.com/watch?v=UjW4s5EtG6s&playnext=1&videos=l1vERo_w39Q

Jul 29 11:01

US wants increased police access to email: report

The White House wants to give the FBI easier access to the Internet activity of suspects without a court order, the Washington Post reported Thursday.

Webmaster's Commentary: 

Just as soon as We The People get the same exact access to all government emails.

Jul 29 10:58

Facebook privacy fears for 100m users as their personal details are published on file-sharing site

The privacy of millions of Facebook users has been jeopardised after some of their details were harvested and published on the internet.

An online security consultant who wished to highlight the social networking site's privacy issues published a list of data taken from more than 100million users' profiles.

Ron Bowles used a piece of code to scan Facebook profiles, collecting data not hidden by the user's privacy settings.

The list has been shared as a downloadable file which has now spread rapidly across the internet, prompting anger and concern from millions of users around the world.

Jul 29 10:51

Sherrod to sue blogger who released video clip

Former Agriculture Department employee Shirley Sherrod said Thursday she will pursue a lawsuit against conservative blogger Andrew Breitbart - the man responsible for posting an edited video clip of Sherrod appearing to say she discriminated against a white farmer looking for assistance.

Webmaster's Commentary: 

Andrew Breitbart will immediately point the finger at whoever gave him the clip, and THAT should be an interesting story!

Jul 29 09:06

FBI backs record-keeping on prepaid cell phones

FBI Director Robert Mueller has endorsed anti-terrorism legislation that would require prepaid cell-phone sellers to keep records of buyers' identities.

Webmaster's Commentary: 

And the end result of all that expense and bureaucracy is that real terrorists (and even the Mossad and CIA fakes) will simply start every operation by stealing a bunch of cell phones. Good thinking Mueller! You are the perfect government official, able to spend a ton of money on a program that won't really accomplish anything.

n/a
Jul 28 23:05

Google and CIA Invest in ‘Future’ of Web Monitoring - Pre Crime

The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.

“We’re right there as it happens,” Ahlberg told Danger Room as he clicked through a demonstration. “We can assemble actual real-time dossiers on people.”

Jul 28 18:54

Who's Paranoid Now? US Military & Blogs (Official Docs)

...At that point the enemy blog might be used covertly as a vehicle for friendly information operations. Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience. Better yet, if the blogger happens to be passing enemy communications and logistics data, the information content could be corrupted. If the messages are subtly tweaked and the data corrupted in the right way, the enemy may reason that the blogger in question has betrayed them and either take down the site (and the blogger) themselves, or by threatening such action, give the U.S. an opportunity to offer the individual amnesty in exchange for information.

Jul 28 14:12

New Zealand pizza lovers suffer information theft from Hell

Some 230,000 New Zealanders have been told that their personally identifiable information may have fallen into the hands of hackers who apparently compromised the network of a locally famous food chain, Hell Pizza.

Jul 28 13:31

Wikileaks’ estranged co-founder becomes a critic

Cryptome’s history of publicizing leaks–while not yielding to pressure to remove them–is what led Young to be invited to join Wikileaks before its launch over three years ago. He also agreed to be the public face of the organization by listing his name on the domain name registration.

Operating a Web site to post leaked documents isn’t very expensive (Young estimates he spends a little over $100 a month for Cryptome’s server space). So when other Wikileaks founders started to talk about the need to raise $5 million and complained that an initial round of publicity had affected “our delicate negotiations with the Open Society Institute and other funding bodies,” Young says, he resigned from the effort.

Jul 28 11:57

Cable break hits Internet, phone, cable TV

Some 400,000 customers of Oceanic Time Warner Cable lost service Tuesday when the break occurred in a deep water undersea fiber-optic cable in the Molokai Channel.

Webmaster's Commentary: 

I wonder if one of the RIMPAC ships had an "accident."

Jul 28 08:27

Hackers shut down EU carbon-trading website

Hackers hijacked Europe's carbon-trading website and replaced it with spoof page detailing flaws in cap and trade scheme

Webmaster's Commentary: 

Okay, so occasionally you find a good hacker... (It will be interesting to see how hard they go after this one).

Jul 27 19:07

Is Your Last Name 'Arab'? Hope You Don't Want a Facebook Account!

Facebook appears to have solved the bug that led to the word 'Palestinian' being banned from page titles. But that's not their only problem: Now people with the surname "Arab" are being prevented from opening accounts.

Jul 27 11:49

Statewide outage for Oceanic Time Warner Cable

If you're having problems with the internet, you're not alone. Oceanic Time Warner Cable experienced a statewide outage just after midnight.

The interruption affects all services for the Big Island, Maui, Molokai and Lanai.

Webmaster's Commentary: 

Obviously Oahu is unaffected for the moment.

Jul 27 11:29

How long should a hard drive last?

Hard drive manufacturers are struggling - not just to stay ahead of each other, but to continue with a viable approach to making money. With drives being as cheap as they are, you know that the manufacturers can't spend a ton of effort in QA and test on each device. My suspicion is that the number of drives that arrive dead is much higher than it used to be. I'll also bet that "infant mortality" rates (drives, like mine, that experience a problem within the first few months of use) is also much higher than in the past.

The important take away? Drives are allowed to fail more often because they're so cheap to replace.

Jul 27 09:12

Iran targeted by industrial theft worm

Iran appears to have been the main target of the Stuxnet worm, which tries to steal data from industrial control systems.

The worm, which was first discovered last month, targets Siemens SCADA (supervisory control and data acquisition) management systems, which are most commonly used in industrial manufacturing facilities and utilities plants.

Webmaster's Commentary: 

Now, who would do a thing like that to Iran?!?!?

Jul 26 12:32

Former Google Engineers Launch New Search Engine: Cuil.com

According to eWeek.com, former Google engineers have launched a new search engine that could index even more sites than that of Google. The name of the search engine is Cuil (pronounced “cool”) and has already gone live.

Webmaster's Commentary: 

I spotted their web crawler going through my server earlier today.

Jul 26 12:31

Government says DMCA can’t stop jailbreaking, unlocking

The first administrative ruling makes clear that users are within their rights to modify to modify cell phone software so that the device will run applications other than those approved by its maker, say, Apple, and procured from sources other than the manufacturer's proprietary source, say Apple's App Stone.

The copyright office said: "When one jailbreaks a smartphone in order to make the operating system on that phone interoperable with an independently created application that has not been approved by the maker of the smartphone or the maker of its operating system, the modifications that are made purely for the purpose of such interoperability are fair uses."

Jul 26 10:31

Wikileaks Mirrors

Find all the current Wikileaks Mirrors here. Helpful, if the main site - wikileaks.org - is down.

Jul 26 10:25

Let Us All Solemnly Praise Wikileaks

We properly should offer recognition and honor to the great heroism of the people at Wikileaks:

Jul 26 10:21

The Afghanistan War Logs Released by Wikileaks, the World's First Stateless News Organization

"In media history up to now, the press is free to report on what the powerful wish to keep secret because the laws of a given nation protect it. But Wikileaks is able to report on what the powerful wish to keep secret because the logic of the Internet permits it. This is new."

n/a
Jul 25 10:22

Andrew Breitbart-- Major Right wing Echo Chamber Architect and Voice

You might think that Andrew Breitbart, involved in fraudulent, unethical faux journalism efforts attacking ACORN and Shirley Sherrod, is simply a small-time, ethically impaired lowlife-- pond scum. You would be wrong. Andrew Breitbart is, scum-metaphor-wise, BP grade, ocean destroying, gull oil well destorying major scum.

Jul 25 10:10

On the Edge with Max Keiser and Alex Jones

On the Edge from Friday, July 23rd with Alex Jones to talk about the surveillance state now being reported in Mainstream Media.

Jul 24 10:45

Wikipedia Revisionism by Israeli Pressure Groups

CAMERA (Committee for Accuracy in Middle East Reporting in America) is not in fact an organization devoted to fairness in journalism. … Its members also mounted a covert and conspiratorial attempt to edit all Wikipedia articles to slant them toward a rightwing Zionist perspective, and they were banned from Wikipedia when the plot was outed. The organization occasionally succeeds in correcting errors, but only in the same way that a fanatical Khomeinist would easily be able to find and correct errors in US journalism about the Islamic Republic of Iran. It isn´t that ideologues want fairness– they want to impose their blindered narrative on everyone else.

Webmaster's Commentary: 

That may explain why Wikipedia keeps deleting articles about What Really Happened and Michael Rivero

Jul 24 08:47

CNN ANCHORS CALL FOR CRACKDOWN ON BLOGGERS!

Of course these same talking heads make no mention of Joe the Plumber who reputation was smeared by professional journalists.

Webmaster's Commentary: 

Nor do they mention how the corporate media helped lie us all into war with Iraq. Then there were earlier embarrassments.

# NBC Dateline defames a trucking company in a report which manufactured claims of unsafe driving. NBC had to pay a half million in damages.

# CNN/Time - On June 7th, 1998, CNN reported that a Vietnam veteran had accused the Department of Defense of using nerve gas on it's own troops. While hardly the first time that the US has used chemicals against it's own people, this story proved to be un confirmable, and in the face of pressure from the Department of Defense, CNN retracted on July 2nd, 1998. Several reporters were fired, but CNN's Peter Arnett keeps his job by reminding everyone that he just reads what's given to him and has no way of knowing if it's true or not. At last report, Arnett, CNN and TIME have been sued for 100 million dollars for defaming the officers accused of the Sarin gas attacks.

# Steve Brill - Long time DNC donor Steven Brill created a magazine called "Brill's Content" and then shot his own magazine down with the debut issue, which instead of criticizing media offered up a 22 page attack on Kenneth Starr which was then used by the White House to again try to impede the investigation. No sooner had the Brill article debuted than virtually everyone interviewed for the article came forward to claim they had been misquoted and in one case to deny totally the statements attributed to them. Brill's shrill insistence that his quotes were indeed accurate and checked fell apart when one of the interviewees produced a tape recording of the interview. Brill was then forced to retract and apologize.

# Salon - An online magazine funded by Clinton donors, Salon, like Brill, was created to lend an air of credibility to some pretty silly accusations nobody else in the mainstream media would touch. Typical was the story Salon ran accusing Kenneth Starr of paying off witness David Hale. Upon examination, it turned out that Salon's sole source for the accusation was a woman who was a Clinton delegate, and had once worked for detectives trying to find dirt on Kenneth Starr. A (failed) professional psychic, she claimed she could control the rain with her mind and that it was she, not General Norman Schwartzkoppf, who had guided our troops to victory in Desert Storm. One of the reporters working for Salon is Jonathan Broder, who was fired from the Chicago Tribune for plagiarism.

# Stephen Glass - A reporter at the New Republic, Stephen wrote several award winning articles which reinforced the liberal's preconceived notions about conservatives and the nation at large. One example involved a story of a conservative conference that degenerated into drug use and group sex. The story passed editorial review and ran without basic fact checking. The story turned out to be a fabrication, along with almost 1/3 of the total work product of Glass's career at New Republic.

# Patricia Smith resigns her job at the Boston Globe after having to admit she fabricated characters for one of her stories. Later investigation shows that 52 of her articles for the newspaper cannot be verified as factual. Smith had been a finalist for a Pulitzer prize at the time of her disgrace.

# Mike Barnicle refused to resign his job at the Boston Globe after having been caught plagiarizing, and was fired. It was not the first time he had been investigated for fraud in his articles. Barnicle was suspended without pay for two months, which prompted an accusation of racial bias from the NAACP due to the difference in treatment between the white Barnicle and the black Pat Smith.

# The Weekly Standard settles a big lawsuit with Deepak Chopra.

# Both CNN and Tom Brokaw settle out-of-court with Richard Jewell.

# The Wall Street Journal loses a record libel suit filed by a Texas company, paying $200-million in damages.

Jul 24 08:22

Another iPhone glitch: Holidaymakers hit with huge bills for surfing web abroad - even with internet switched OFF

Owners of Apple's iPhone have been warned of a new problem that could see them unfairly charged hundreds of pounds for using them on holiday.

People with smart phones face big bills if they connect to the internet over the mobile phone network while overseas to check and send emails or browse the web.

Most holidaymakers turn off this function when abroad in order to avoid a nasty shock.

But some people who turn off this function on their iPhone are still being hit with enormous bills once they get home, it has been claimed.

Jul 23 12:14

India unveils prototype for $35 touch-screen computer

The Indian government has unveiled the prototype of an iPad-like touch-screen laptop, with a price tag of $35 (£23), which it hopes to roll out next year.

Aimed at students, the tablet supports web browsing, video conferencing and word processing, say developers.

Human Resource Development Minister Kapil Sibal said a manufacturer was being sought for the gadget, which was developed by India's top IT colleges.

Jul 23 09:35

Newspaper Chain’s New Business Plan: Copyright Suits

Steve Gibson has a plan to save the media world’s financial crisis — and it’s not the iPad.

Borrowing a page from patent trolls, the CEO of fledgling Las Vegas-based Righthaven has begun buying out the copyrights to newspaper content for the sole purpose of suing blogs and websites that re-post those articles without permission. And he says he’s making money.

(Note: If you do not advertise on your site and it is not a pay-site, then the copyrights fall under FAIR USE unless the copyright holder specifically limits that the information cannot be retransmitted/reprinted without the copyright holder's permission.)

Jul 23 09:33

Websites biggest terror threat, says watchdog

Webmaster's Commentary: 

Moi?!? :)

Jul 23 08:19

Town official doubly insulted by spyware allegation

"Based on (my) prior background in intelligence, believe me, if I had something attached to (the e-mail), your people would never find it, so let's not be ridiculous," Mr. Creamer responded that night. "That's such an insult to me."

Webmaster's Commentary: 

I doubt that will convince a jury.

Jul 22 17:02

INTIFADA PALESTINE IS BACK ONLINE

This morning there were several unsuccessful attempts to hack Intifada Palestine. We apologize that the website was disabled temporarily for security reasons. There was a coordinated effort to shut the website down.

Jul 22 14:04

Censorship of blogs continues

Thursday, July 22, 2010
Censorship of blogs continues
This time it's Incogman ....
This blog has been archived or suspended for a violation of our Terms of Service.
Now I know that some will say "good riddance" or it was a "hasbara nest" or "racist" or a "psyops operation" or whatever. I've even taken flack for linking him on my blog roll. The bottom line is that no one was ever forced to go there and freedom always means taking or leaving whatever you please.

Jul 21 13:11

False Flag Cyber Attack Could Takedown The Internet

An increasing clamour to restrict and control the internet on behalf of the government, the Pentagon, the intelligence community and their private corporate arms, could result in a staged cyber attack being used as justification.

Jul 21 11:49

Dell ships motherboard with malicious code

Dell has confirmed that some of its PowerEdge server motherboards were shipped to customers with malware code on the embedded server management firmware.

Jul 21 11:17

Andrew Breitbart is a Character Assassin Just as if He Were Shooting People with a Cherished Right Wing Handgun

Maybe all you need to know about Andrew Breitbart was that he was Drudge's protege, and now the protege has begun to eclipse his mentor for sleaze, if that is possible.

Jul 20 09:54

Apple Tells Congressmen It Batches, Encrypts Location Data

Apple told Congress it collects location information about users of the iPhone, iPad and Mac computers in batches and encrypts it before sending it over a WiFi connection from the device to Apple's servers every 12 hours.

Jul 20 07:38

Group Calls for Hearings Into Google’s Ties to CIA and NSA

More information has emerged about Google’s relationship with the government and spook agencies (see PR Newswire below). The revelations should come as no surprise.

Jul 19 19:09

Bomb-making tips, hit list behind Blogetery closure

More details are surfacing about why Blogetery.com, a blogging platform that claimed to service more than 70,000 blogs, was mysteriously booted from the Internet by its Web-hosting company.

The site was shut down after FBI agents informed executives of Burst.net, Blogetery's Web host, late on July 9 that links to al-Qaeda materials were found on Blogetery's servers, Joe Marr, chief technology officer for Burst.net, told CNET. Sources close to the investigation say that included in those materials were the names of American citizens targeted for assassination by al-Qaeda. Messages from Osama bin Laden and other leaders of the terrorist organization, as well as bomb-making tips, were also allegedly found on the server.

Jul 19 13:08

Obama's War on the Internet: The Ministry of Truth

By Philip Giraldi

The Ministry of Truth was how George Orwell described the mechanism used by government to control information in his seminal novel 1984. A recent trip to Europe has convinced me that the governments of the world have been rocked by the power of the internet and are seeking to gain control of it so that they will have a virtual monopoly on information that the public is able to access. In Italy, Germany, and Britain the anonymous internet that most Americans are still familiar with is slowly being modified. If one goes into an internet café it is now legally required in most countries in the European Union to present a government issued form of identification.

Jul 19 11:17

Dissent and you may disappear or go to jail

If you put all this together and look at what’s going on it could give one the distinct impression that governments around the world aren’t liking the internet, they’re not liking bloggers who disagree with them, and they want to make sure everyone cow-tows to whatever they decide you should believe in, and no bitching allowed. Make too much noise and your website will disappear and we now even have the potential in the European Union that you may go to jail if you don’t go along with the party line.

As I noted earlier this week, I was offline for a while because I had my blog hosted at Blogetery, who mysteriously had an entire server confiscated by an as yet to be discovered government agency for an as yet to be discovered reason(s). This took about 70,000+ blogs offline instantly.

Jul 19 08:28

Obama’s War on the Internet

The Ministry of Truth was how George Orwell described the mechanism used by government to control information in his seminal novel 1984. A recent trip to Europe has convinced me that the governments of the world have been rocked by the power of the internet and are seeking to gain control of it so that they will have a virtual monopoly on information that the public is able to access. In Italy, Germany, and Britain the anonymous internet that most Americans are still familiar with is slowly being modified. If one goes into an internet café it is now legally required in most countries in the European Union to present a government issued form of identification.

Jul 19 07:26

Microsoft Confirms Windows 7 SP1 Zero-Day Flaw

In an advisory, the company explained: “The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut.”

The company also said that the vulnerability can be exploited using a removable device such as a USB stick.

...

Until the patch is released, Microsoft has advised users to disable the ability to display icons for shortcuts and the the WebClient service, to prevent the flaw being exploited.

Jul 18 12:16

More info on government-ordered shutdown of 73,000 Wordpress blogs.

Webmaster's Commentary: 

Read the quotes from Burstnet carefully. This sounds like something other than a DMCA case, as the ISP says "this was not a typical case, in which suspension and notification would be the norm."

Note that Burstnet will not tell the owner of the affected site the nature of the problem, or which government agency ordered the shut down.

Jul 18 11:30

Censorship Alert: Obama Deception Illegally Removed from You Tube

Webmaster's Commentary: 

Fortunately, there are a lot of copies of Obama Deception at YouTube such that the deletion of one or two is not going to keep the public from finding the video if they want to search for it.

Jul 18 09:18

CYBER ATTACKS THAT GIVE US STRENGTH

Just over a year ago, DesertPeace and What Really Happened were the targets of an attack in the Jerusalem Post itself… once again proving that we are doing a good job! These are the attacks that give us the strength to go on….

Jul 17 09:32

HOW TO MAKE YOUR OWN IPHONE APP.

You can create a native app that lives with all the other apps, and for the most part, it’s going to be a pitch-perfect imitation.

You can do this with the skill set you probably already have: HTML(5), CSS, and JavaScript.

I’ll show you how to create an offline HTML5 iPhone application. More specifically, I’ll walk you through the process of building a Tetris game.

Webmaster's Commentary: 

This is a cute little trick submitted by a reader while I was figuring out how to put fake applications and phone calls on the iPhone for this TV show... that... I... am... not... working... on... any... more...........(ahem). If you have access to your own server, you can set up a simple download that you view in Safari, then save to the main screen as a standalone app. Now, I cannot share anything I worked on for the show, but as part of my testing I re-implemented the Javascript Apollo DSKY simulator as an iPhone app, which you can install and play with by doing the following.

1. Using the Safari browser in the iPhone, go to http://whatreallyhappened.com/iPhone/index.html

You will see the simulator running in the browser.

2. Press the + button at the bottom of the screen, then on the pop-up menu, select "Add to Home Screen".

3.Press "Add" at upper right. Safari will exit and you will see the new app. The original source is available at http://sixrevisions.com/web-development/html5-iphone-app/ and if you can write HTML5 and Java, you can make your own local iPhone app to play with then the iPhone 4 drops your calls!

Jul 16 19:01

4 tips to protect you from ATM thieves

Typically, ATM thieves use two devices to capture your PIN and card data. One device sits near where you swipe your card and reads the magnetic stripe on your card with your account number.

Jul 16 10:49

Lysenkoism

Lysenkoism is used colloquially to describe the manipulation or distortion of the scientific process as a way to reach a predetermined conclusion as dictated by an ideological bias, often related to social or political objectives[1].

Webmaster's Commentary: 

The Global Warming Cult is using politics to drive the science to support their desired agenda. But this is nothing new. It has happened before ... with lethal results!

In 1928, in the USSR there was a man named Trofim Denisovich Lysenko, a favorite of Stalin, and ultimately, a con-artist. He was as popular then in the USSR as Al Gore is in the US today.

Lysenko's prize theory, which suited Stalin's political needs at the time, was that plants and animals could inherit traits acquired from the environment in a single generation. That is, if you used cooling to trick Winter wheat seeds to germinate and grow in the Spring ( a technique already used in the US at the time) the seeds from the chilled plants would go on germinating in the Spring in perpetuity.

There was very little science in Lysenko's science, but this "revolution" suited Stalin's desire to outdo the accomplishments in genetics which had occurred under Lenin. Honor upon honor was heaped on Lysenko (just as is done with Al Gore today) and real scientists who questioned his theories were shunned, vilified, and removed from their positions (not unlike the experiences of those who question the basic beliefs of the global warming cult). The state media of the USSR proclaimed the virtues of the Lysenko method beyond all doubt and question, just as the state media of the USA proclaims the "Science is settled" regarding AGW. But Lysenko had no more real science training than Al Gore, and his theory that the environment could permanently alter the genetic structure of crops was completely wrong.

However, for political reasons, the USSR mandated that all farmers had to use the Lysenko method (just as the present government intends to force us all to use the "Al Gore Cap and Credit" method) and the result was widespread famine when during the following spring, the second generation wheat refused to germinate.

This illustrates the problems which can result when the government thinks it understands science, or that science can be subordinated to political agenda.

Jul 15 09:19

Coca-Cola Scam Hits Facebook

There’s a new scam on Facebook promising to show you a video revealing the “truth” about Coca-Cola, but all it’s really after is your personal info.

Jul 15 09:15

How the Mozilla Sniffer Backdoor Was Discovered

Mozilla pulled one of their Firefox add-ons earlier this week for containing a backdoor which stole passwords from its users. Netcraft has taken a closer look at how the rogue extension worked, and how it was discovered by chance rather than through any code review process. Mozilla are working on a new security model to stop this kind of backdoor happening again.

Jul 15 09:03

U.S. Plans Cyber Shield for Utilities, Companies

The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.

Webmaster's Commentary: 

The US Government just pinned a "Kick me" sign on all those critical facilities by turning them into hacker "Trophy hunts." Hackers will try to crash those systems just to be able to brag about it, and given the government's piss-poor ability to stop the virus (not to mention Viagra ads) flooding our computers, my nickle is on the hackers to win this one.

Jul 15 08:31

More people are losing their jobs due to online missteps

It’s the kind of story that those who use Facebook and Twitter don’t like to hear. Last week, CNN Mideast Affairs editor Octavia Nasr lost her post after tweeting her respect for a militant cleric.

In a statement, Ms. Nasr said that she’d exercised poor judgment as a representative of CNN when she tweeted that Ayatollah Mohammad Hussein Fadlallah was “one of Hezbollah’s giants I respect a lot.”

Webmaster's Commentary: 

Except that Ms. Nasr wasn't posting to Twitter as a representative of CNN but as a private citizen, with full freedom of speech as guaranteed by the Constitution. CNN has ever legal right to tell Ms.Nasr what to say on CNN (even to lie to the people, under the precedent set in the Fox News SBGH lawsuit), but CNN has no legal authority over Ms. Nasr's private life.

Of course, what is at issue here isn't really CNN. Israeli supporters in the US have launched a Soviet-style progrom to purge the media of anybody "disloyal" to Israel's point of view; a pogrom whose most visible casualty was Helen Thomas. Ms. Nasr wasn't the first, and she will not be the last.

Jul 14 13:21

Microsoft: 25,000 PCs attacked with latest Windows zero day

The Windows Help and Support Center vulnerability that was patched with yesterday’s MS10-042 bulletin was under active attack by malware miscreants, especially in Europe where Microsoft tracked about 25,000 attempts to exploit the vulnerability.

According to Microsoft’s Holly Stewart, the attacks escalated significantly when the company announced the issue would be fixed in this month’s Patch Tuesday.

Jul 14 09:54

Windows XP, The Incredible Immortal Operating System!

I love Windows XP. A lot. I’ve been a user since day one, and three of the four computers in my home are still running it beautifully. The fourth is a Mac. So it comes as delightful news to me to hear that Microsoft is again extending downgrade rights to XP, until – get this - the end of Windows 7’s life cycle.

This means, simply put, that Windows XP will be alive and well in 2020.

Jul 14 09:51

USB Coffee-Cup Warmer Could Be Stealing Your Data

Are you sure that the keyboard or mouse you are using today is the one that was attached to your computer yesterday? It might have been swapped for a compromised device that could transmit data to a snooper.

The problem stems from a shortcoming in the way the Universal Serial Bus (USB) works. This allows almost all USB-connected devices, such as mice and printers, to be turned into tools for data theft, says a team that has exploited the flaw.

Welcome to the murky world of the "hardware trojan".

Jul 14 09:30

RIAA paid its lawyers more than $16,000,000 in 2008 to recover only $391,000

The RIAA's "business plan" is even worse than I'd guessed it was.

The RIAA paid Holmes Roberts & Owen $9,364,901 in 2008, Jenner & Block more than $7,000,000, and Cravath Swain & Moore $1.25 million, to pursue its "copyright infringement" claims, in order to recover a mere $391,000.

Jul 14 09:02

Apple shares plunge after bad review of iPhone 4 sparks recall rumours

Apple shares plunged by more than four percent yesterday after an influential guide gave the new iPhone 4 a poor review, wiping £6.5 billion off the firm's value.

The fall came after Consumer Reports, a US group similar to Which? in the UK, said it could not recommend the iPhone 4 after its tests confirmed concerns about signal loss when the device is held in a certain way.

Jul 13 14:56

Got an iPhone 4? You may need duct tape

In a controlled test, Consumer Reports found that people who hold the iPhone 4 in a way that covers up an antenna connector on the phone's lower left side will experience poorer reception and possibly dropped calls.

But if you slap a piece of duct tape over that antenna connection, the reception problems go away, the group says.

"When your finger or hand touches a spot on the phone's lower left side -- an easy thing, especially for lefties -- the signal can significantly degrade enough to cause you to lose your connection altogether if you're in an area with a weak signal," Consumer Reports says.

"Due to this problem, we can't recommend the iPhone 4."

Jul 13 10:17

Apple Censors Consumer Report iPhone4 Discussions

Jul 13 10:11

DON’T PLUG INTO ZIONISM…

WOT is a creation of Mozilla, a Web Browser that came on the scene after the demise of Netscape. They appear to be independent from the outside, but they apparently are one of Google’s prime ‘charitable organisations’ at the moment. With the support received, I am sure comes a commitment to uphold the ideals of the Google Corporation, which includes the blind support of zionism. Hence the determination that Window Into Palestine is a ‘dangerous’ site.

The reality is that the zionists themselves are the dangerous ones. Their Web Tools should be avoided at all costs, including their Blogsite, Blogger. There are other vehicles where you can set up your own Blog, far away from the harassment of Jerusalem’s ‘overseer’.

Jul 12 12:08

GOOGLE ATTACKING BLOGS AGAIN

One of my sidelinks leads to a Blog called Window Into Palestine….
if you click on it you get the following popup from Google….

Reported Attack Page!

This web page at windowintopalestine.blogspot.com has been reported as an attack page and has been blocked based on your security preferences.
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.

Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.

Jul 12 11:12

UC online degree proposal rattles academics

Taking online college courses is, to many, like eating at McDonald's: convenient, fast and filling. You may not get filet mignon, but afterward you're just as full.

Now the University of California wants to jump into online education for undergraduates, hoping to become the nation's first top-tier research institution to offer a bachelor's degree over the Internet comparable in quality to its prestigious campus program.

Jul 12 08:41

Microsoft hides mystery Firefox extension in toolbar update

As part of its regular Patch Tuesday, Microsoft released an update for its various toolbars, and this update came with more than just documented fixes. The update also installs an add-on for Internet Explorer and an extension for Mozilla Firefox, both without the user's permission. As you can see in the Windows Update screenshot above, Microsoft does not indicate that the update will install anything for either browser. It's also not really clear what the installed extension actually does.

To make matters worse, the update was marked "Important" instead of "Optional," which means it was more likely to be installed either automatically (if the user has Automatic Updates on) or manually when the user clicks Install (Important updates are checked by default).

Jul 12 02:18

Free speech in Barack Obama's America: Whatever you say, say nothing

Freedom of speech may be part of the United States Constitution but perhaps the First Amendment that enshrines it could do with a caveat or two being added.

Congress may make no law "abridging the freedom of speech, or of the press", the Bill of Rights lays down. That still holds true but, increasingly, speaking freely can get you fired or tarred for life.

Even more ominously, the internet and the increased ease of free communication is allowing the cannier politicians to escape scrutiny rather than be held to account.

Jul 11 10:48

Hacker Creates Plugin That Trashes Chrome’s Security

We hate to scare you on Friday right before a good weekend, but this story is alarming enough that you need to hear about. Before we proceed, know that this exploit is out in the open, be extra careful when you install any Chrome plugin; you may be at risk.

The exploit, developed by programmer Andreas Grech, employs a plugin coded using jQuery to track users’ login information and have it emailed to himself. He claims that he has tested the plugin, and that it has been successful against Twitter, Gmail, and Facebook.

Jul 11 09:52

Google Street View accused of Congress 'snooping'

Google has stressed all along that someone would need to be using the network as their cars passed by and that the in-car wifi equipment automatically changes channels roughly five times a second.

Consumer Watchdog focused on a number of high profile politicians whose homes appear on Google's Street View maps.

It found that Congresswoman Jane Harman, who heads the intelligence sub committee for the House's Homeland Security Committee, has an open home network that could have leaked out vital information that could have been picked up by Street View vehicles.

Webmaster's Commentary: 

It occurs to me that a US official who is actually working for Israel no longer needs to leave a chalk "X" on a mailbox and stick envelopes full of papers underneath a local bridge for pickup.

All a traitor needs to have is an open WiFi post and a handler could drive by out on the street in front of their home, send a message packet to the traitor's computer over the WiFi and have the "take" flash back to their laptop in the blink of an eye without even slowing down the car! Given the very limited range of WiFi, interception would be very difficult.

Another way a Congressional spy could send data to their handler involves the file transfer apps on smart phones (like "Mover" for the iPhone), which allow the transfer of documents from one phone to another over a WiFi router. A spy for Israel can be in a clothing store dressing room at the mall while the handler is eating lunch at the food court next door, and as long as there is an open WiFi in the area, information can be sent from one phone to the other without a compromising physical contact. The router itself does not save the data it passes from one phone to the other. If the clandestine messages are hidden inside image files via steganography, even a random search of the phones would not reveal anything compromising, as the phones themselves are all "off the shelf".

In any event, given the obvious need for security coupled with the Congressional pay and budgets, I find the presence of open unsecured WiFi ports in the homes of pro-Israel congresscritters to be worrisome!

Jul 11 09:15

Australia Delays Internet Censorship and Filtering Under Pressure

Jul 10 20:48

World Of Warcraft: Real Tyranny in a Virtual World

The battle against the online equivalent of the implantable RFID chip has begun.

Earlier this week, Vivendi-owned Blizzard Entertainment announced that all World Of Warcraft (WOW) game forum users will require a REAL ID login in order to post their comments. The new identification requirement will begin with the release of the next game expansion, Cataclysm, which is due out later this year. The REAL ID login will require that a user's real name be visible, thus ending all anonymous posting on WOW forums.

Jul 10 08:41

Ten Ways We Are Being Tracked, Traced and Databased

Are technological advances infringing on our right to privacy?

Activist Post

The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry - which now seems to becoming a war on "liberty and privacy." Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot. High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:

Jul 09 10:05

Broadcast viewership hits record low

Americans avoided television in historic levels over the past week.

Webmaster's Commentary: 
Jul 09 09:15

French News Web Site Shakes Sarkozy Camp

At dinner parties there is talk of a French Watergate, but with at least one big difference: the would-be Woodwards and Bernsteins behind the biggest scandal to hit the presidency of Nicolas Sarkozy work on the Web instead of at a newspaper.

Jul 08 21:14

Bishop Donald Corder: Cost of Being a Turkish Samurai

The CIA death squads and kindred units from the military killed many, many people and most certainly there was extensive ‘collateral damage’ – meaning innocent people being murdered

Jul 08 21:10

The Israeli stranglehold on CNN

The decision by the CNN administration to fire Octavia Nasr, a secular and thoroughly westernize woman, underscores the ethical bankruptcy of the leading American media, especially its harsh intolerance of non-conformist perceptions and convictions.

n/a
Jul 08 10:13

U.S. Plans Cyber Shield for Utilities, Companies

"Perfect Citizen is Big Brother."

Jul 08 09:38

Democrats Want to Tax Your ATM Withdrawals

Rep. Chaka Fattah (D-Pa.) has introduced Davis’s dream legislation. It would charge a penny for every dollar of your money drawn from an ATM machine. That would then beg the question — why put your money in a bank if you are going to get taxed merely for the right to access your money.

But wait . . . it’s gets better. They’re back to wanting to tax the internet too.

Jul 08 08:31

The Cybersecurity Directive Goes Viral

Michael Edwards
Activist Post

The latest National Security Directive presented by the establishment mouthpiece, The Wall Street Journal, indicates that the marketing campaign for Cybersecurity has just gone viral.

Jul 08 04:05

FlashBack: Alex Jones threatens Jeff Rense, has him kicked off GCN

Why Jeff is Moving to a New and Better Network

Dear Friends of Liberty and Free Speech... Following is a reply I sent to a long-time listener and thought you should be able to read it, too. It will answer the basic questions many have asked. Thank you, all, for your kindness and support. I am looking forward to working with the new networks which will be making major efforts to present the program on far more stations than the former network ever did. With best regards to all of my good Friends here at MySpace.

Jul 07 11:00

ISP filtering legislation on the way

THE federal government hopes to introduce legislation to enable its controversial internet filter by the end of the year.

Communications Minister Stephen Conroy said the legislation would be this year "sooner rather than later''.

Webmaster's Commentary: 

"YOU WILL SEE ONLY WHAT WE WANT YOU TO SEE, DUMBKOPF!!!!"

n/a
Jul 06 20:23

Labour wasted thousands on developing Government apps for iPhones

Tens of thousands of pounds were squandered by Labour on developing software for the iPhone, it emerged yesterday.

Ministers sanctioned the development of the applications, with costs for each running as high as £40,000.

They included a travel advice tool for the Foreign Office, an NHS application to let you track your drinking habits and a DVLA 'motoring masterclass'.

There was even one for jobseekers to find out about vacancies - though critics might argue whether someone who can afford an iPhone would need such a tool.

Jul 06 17:01

Wiki deletes my page of quotations.

Webmaster's Commentary: 

Bunch of sore losers, really!

Jul 06 15:07

The Lights Are Going Out For Free Speech On The Internet

Type the keywords “Internet censorship” into Google News and you will immediately understand to what degree the world wide web is under assault from attempts by governments globally to regulate and stifle free speech. From Australia to Belarus, from Turkey to Vietnam, from Pakistan to Egypt, from Afghanistan to Iran, huge chunks of the Internet are going dark as the Chinese model of Internet regulation is adopted worldwide.

But why should Americans concern themselves with countries halfway across the globe adopting Chinese-style net censorship? Because under Senator Joe Lieberman’s 197-page Protecting Cyberspace as a National Asset Act, the United States would formally mimic China’s “great firewall” of web censorship.

Jul 06 13:06

BLOGGERS OF THE WORLD UNITE! YOU HAVE NOTHING TO LOSE BUT INJUSTICE IN GAZA!!

Bloggersunite.org is calling on all bloggers to unite on July 9 to blog about Gaza. The site is asking bloggers to make “a simple promise: ‘Gaza, We will not forget You.’”

Webmaster's Commentary: 
Jul 05 17:39

'Paywall will underperform – the numbers don't add up'

The internet guru on the death of newspapers, why paywall will fail and how the internet has brought out our creativity – and generosit

Webmaster's Commentary: 

It isn't the paper and it isn't the pay. The reason the corporate media is in decline is that the public knows the corporate media is nothing more than a giant advertisement for government and corporate policy. People do not like to be lied to, and charging them for the privilege only adds insult to injury.

The blog-o-sphere would not even be here if the corporate media had simply told us all the truth about Vince Foster, TWA 800, Iran-Contra, Mena, OK City, Waco, Saddam's "Nookular" bombs, 9-11, etc. etc. etc. None of us out here on the front lines of the information war would have bothered doing what we do if all we did was repeat the facts and truth already on public display. We do this job because the corporate media will not. And on the day when the corporate media tells us all the truth, when the media is not just selling us another war or making excuses when Israel attacks Americans in international waters I will be happy to shut this website down and spend the remainder of my life doing visual effects and chasing Claire around the house.

But until the media decides to be truthful with the people, they will continue to go out of business and I and my partners on truth will continue to get the facts out there the people need to make good decisions.

Jul 05 11:20

Russian spy ring needed some serious IT help

The Russian ring charged this week with spying on the United States faced some of the common security problems that plague many companies -- misconfigured wireless networks, users writing passwords on slips of paper and laptop help desk issues that take months to resolve.

Webmaster's Commentary: 

This whole Russian spy story is a joke!

Jul 05 11:00

TSA To Block Websites With “Controversial Opinions”

“The Transportation Security Administration (TSA) is blocking certain websites from the federal agency’s computers, including halting access by staffers to any Internet pages that contain a “controversial opinion,” according to an internal email obtained by CBS News.”

Webmaster's Commentary: 

Moi?!?!? :)

n/a
Jul 05 07:46

TSA To Block Websites With “Controversial Opinions”

The Transportation Security Administration will block all websites that contain “controversial opinion” from its federal computers in the latest example of how Internet censorship is expanding in both the private and public sector as the federal government prepares to push through a power grab that will empower President Obama to shut down the world wide web with an emergency decree.

“The Transportation Security Administration (TSA) is blocking certain websites from the federal agency’s computers, including halting access by staffers to any Internet pages that contain a “controversial opinion,” according to an internal email obtained by CBS News.”

Jul 05 00:25

Guess Who Wants to Kill the Internet?

It would be hard to think of anyone who has done more to undermine American freedoms than Joseph Lieberman.

Since 9/11, the Independent senator from Connecticut has introduced a raft of legislation in the name of the “global war on terror” which has steadily eroded constitutional rights. If the United States looks increasingly like a police state, Senator Lieberman has to take much of the credit for it.

Jul 04 22:31

Managed News: Inside The US/NATO Military Industrial Media Empire

We face what appears to be a military industrial media empire so powerful and complex that truth is mostly absent or reported in disconnected segments with little historical context. A case in point: The London Times reported on June 5, 2010, that American troops are now operating in 75 countries. Has President Obama secretly sanctioned a huge increase in the number of US Special Forces carrying out search-and-destroy missions against Al-Qaeda around the world?

Jul 04 08:21

TSA to Block "Controversial Opinion" on the Web

The Transportation Security Administration (TSA) is blocking certain websites from the federal agency's computers, including halting access by staffers to any Internet pages that contain a "controversial opinion," according to an internal email obtained by CBS News.

The email was sent to all TSA employees from the Office of Information Technology on Friday afternoon.

It states that as of July 1, TSA employees will no longer be allowed to access five categories of websites that have been deemed "inappropriate for government access."

The categories include:

Jul 04 00:13

Bishop Donald Corder: The Sun Tzu of a Turkish Samurai - The Commander - Part 3

Turkish Prime Minister Recep Tayyip Erdogan has taken up the challenge in the face of the hegemonic giants comprised of the dominant capital and ruling class of the US, and he is one who has mobilized assets on behalf of the global voice, and rallied the world around his decision to champion the Palestinian peoples under Zionist occupation and the historic ways of life of the Turkish peoples. This represents the nightmare dilemma of a US hegemony and Zionist machine.

Jul 03 16:23

Facebook Testing Face Detection in Photos

Social networking giant Facebook has begun testing face-detection technology on photo uploads, aiming to make it easier for Facebook users to tag their photos and identify subjects.

Jul 03 08:08

UK banking customers targeted by data-stealing Trojan

Two UK-based botnets are zeroing in on British bank customers with new variants of the Zeus Trojan, according to a security firm.

The Zeus botnets, which consist of 20,000 to 30,000 compromised computers, are being used to send out regionally-specific infected spam to distribute links to the Trojans, according to Trusteer. Compromised UK websites are also being used in the attack on online banking users, it added.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA