26 June 2013

Study on Social Networking

A study conducted by the University of Michigan claims that social media websites like Facebook and Twitter are a narcissist magnet. For example, young adults of college age and their adult counterparts are using such services in order to bolster their egos and control perceptions of others. It was also suggested that vain college-age students prefer using Twitter to make their opinions and views seem important.

According to a University of Michigan researcher, social networking is about making individual’s image, how they are seen, and also checking on how others respond to that image. Apparently, the young tend to overvaluate the importance of their own opinions. For example, via Twitter, they are trying to broaden their social circles while broadcasting their views about various topics and issues.

In the meantime, adults exhibiting narcissism also tend to prefer Facebook for the same purpose. The study suggests that middle-aged adults normally have already formed their social selves and they just use social media in order to gain approval from people who are already in their social circles. The study tried to find out whether the narcissistic behavior was related to the amount of time a person spent posting, reading posts and commenting.

Thus, people were divided into two groups. The first tested 486 college students with an average age of 19 over the extent of their social media usage. The group also took part in a personality assessment measuring exhibitionism, superiority, authority, and self-sufficiency. It appeared that young adult college students who used Twitter extensively scored higher in certain types of narcissism.

The second group of the study focused on 93 adults with an average age of 35. The group completed a similar online survey, and it also turned out that middle-aged adults narcissists posted more frequent status updates on Facebook as well.

Tor Systems Used for Illegal Activities

According to statistics, many thousands of people access shady sites via Tor every day. While most users say they use the systems because they want to stay anonymous, some exploit the layers of proxies to find drugs.

images1.jpg

Originally, the Onion Router has been created by the US Navy a decade ago in order to keep government communications safe from prying eyes. The reports say that Tor had reached about 600.000 users annually. The way it works is quite simple to understand – instead of using one proxy to hide the IP addresses, it uses a whole chain of proxies, hence its name.

A decade ago nobody had this concept of privacy, but now this doesn’t seem so far-fetched anymore. While Tor claims to be used daily for various purposes by the military, journalists, law enforcement officers and activists, the Child Exploitation and Online Protection Center is warning that 1/3 of its users are suspected of conducting a wide range of unauthorized activities. Some people confessed they had started using Tor to buy drugs online. This is why some experts now believe that Tor should be blacklisted by governments. As for the United Kingdom, the country’s Prime Minister believes that sites and search engines have to take responsibility for what they offer, particularly when it comes to kids porn. David Cameron believes that Internet companies and search engines should use their extraordinary technical abilities to do more to root out child pornography. As a result, the government keeps convening a round-table of the largest online companies and demands to do more.

In the meanwhile, the backside of the problem is privacy – this is an overgrowing concern in the past several years. The experts admit that because of government collusion with record companies and rights owners to crack down on file-sharing copyrighted content, Internet users had to start using such networks as Tor, which were previously only used by advanced users and people looking for illegal content. So, people targeted by this type of law will do what they can to seek out material.

Among Tor users, there are innocent family people – they use Tor because they just don’t want themselves or family followed around by councils or the police. While the industry experts agree that the problems at hand can’t be ignored, the issue could easily get out of hand, like it happened with P2P.

23 June 2013

Streaming Services Proved Profitable

Staffan Albinsson has signed a doctoral thesis which claims that Internet piracy is bad for the entertainment industry. However, the worldwide web comes to the rescue in other forms, such as music streaming services – those proved a great and valuable source of revenues. 

musicstreaming.jpg

Albinsson’s findings start by reviewing the first major lawsuit of its kind – Metallica against Napster. Everybody knows the result of that epic battle, but there was something else, quite interesting: after the great fall of Napster and other file-sharing services, time for legitimacy came, and various services – for example, iTunes – made the first move by legitimizing online downloads.

Two years ago, the income from music streaming rose by 70% compared with the year before. As for today, music downloads are resulting in more income than CD sales. Albinsson’s study mentioned Swedish statistics which covered the last three decades and confirmed that digital piracy had indeed taken its toll on the music industry’s revenues. Anyway, the same period of time also saw an increase in revenues from live performances, radio broadcasts and TV. Moreover, since 2010 music streaming services, including Spotify and Pandora, had also contributed to the earnings of music creators.

This is an easy scheme of mutual contribution: the consumer is allowed to access a lot of content without violating the law, while the copyright owners are getting paid. This means that there’s no need for a discussion until next time new technology is introduced. The researcher admits that various forms of IP rights have different qualitative implications. Hopefully, the industry and everyone who is concerned about Internet piracy will consider the qualitative implications of IP laws.

20 June 2013

French Electronic Voting Turned into Farce

The country’s first electronic election seems to be turning into a farce. Indeed, the reports are coming in of the sort of election rigging that one would expect from 3rd world countries, not France. It turned out that an "online-primary" claimed as "fraud-proof" and "ultra secure" as the Maginot Line is vulnerable to a Blizkrieg of multiple and fake voting.
republique.jpg

The oncoming election was supposed to anoint a rising star of the moderate right – Nathalie Kosciusko-Morizet, 39. The latter was the Party's candidate in the election for mayor of Paris in 2014. The only problem was that she abstained in the final parliamentary vote on same-sex marriage a few months ago. The industry experts pointed out that it was going to be a tight election.

Afterwards, journalists from Metronews claimed that it was easy to breach the allegedly strict security of the election and voted a few times under different names in order to prove their point.

The new approach suggested that Parisians had to vote by making a credit card payment of €3 and providing the name and address of someone on the city's electoral roll. However, Metronews journalist managed to vote 5 times in total by paying with the same credit card under different names which, by the way, included “Nicolas Sarkozy”.

This situation appeared especially tricky for the UMP Party, because the latter has been accused of election fraud earlier. The matter is that back in 2012, the UMP almost split amid allegations of ballot-stuffing and other dirty tricks in an election in order to replace Nicolas Sarkozy as the national party president. An ex-Prime Minister, François Fillon, accused his competitor, the Party Secretary General, Jean-Francois Copé, of "fraud on an industrial scale".

China Closed Web for Maintenance

website-maintenance-management.png

It seems that the Chinese government just switched off the Internet last week when it became concerned that some people might remember the importance of the date. The matter is that it was the 24th anniversary of the massacre of protesters in Beijing's Tiananmen Square.


The authorities have come to a decision that the best way to commemorate the massacre is by declaring it “Internet maintenance day”. As a result, everyone had to spend the day updating their servers being unconnected to the worldwide web. In order to help the loyal network managers, the Chinese authorities simply switched off the web so that they weren’t bothered by too much traffic.
Of course, they couldn’t shut off the entire Internet, so a number of websites were told to commemorate Internet maintenance day while others had to update their servers in the normal manner. The websites under maintenance included blogs and portals which could want to remember 4 June for reasons other than being a patch Tuesday. In the meanwhile, the Twitter-like Sina Weibo was working, as well as the Chinese operations for MSN and Yahoo. The most interesting fact is that for some reason the dictionary website WordKu.com only offered one page showing a definition for the word "encore". Media reports say that a picture which edited the iconic image of a man standing in front of a column of tanks by replacing them with rubber ducks was censored as well.




16 June 2013

Content Industry Wants to Hack File-Sharers

The Commission on the Theft of American Intellectual Property is regarded by the entertainment industry as an independent and bipartisan initiative of leading US representatives from the private sector, public service in national security and foreign affairs, academe, and politics. Apparently, all of those representatives just happen to be very interested in peer-to-peer piracy.

The group has recently prepared an 84 page report saying that it expects Congress to legalize the use of malware in order to punish those users who are suspected of being copying illegally. The content industry wants to develop software that would be then loaded on PCs. The software in question should somehow detect if the user is pirating, and lock up their machine until the person confesses a crime to the police. Actually, this might be a good suggestion, because there is already a working model. The only problem is that it is used by Russian organized crime and deploys ransomware.

As you can see, it seems like after having run out of ideas, in order to fix their business model, the entertainment industry keeps looking to dictators and criminals. Then, more details on the scheme make it amusing reading. For example, they can design software which would only allow authorized users to open the files that contain valuable data. In case an unauthorized user accesses the data in question, the file could be rendered inaccessible and the unauthorized person’s PC could be locked down. The software will also provide the instructions about how to contact the police to receive the password the user needs to unlock the account.

It looks really weird that the entertainment industry is asking the American government (which is at the moment failing to cope with malware on its own infrastructure) for the right to use the same sort of techniques to protect its outdated business model. The industry experts believe that the American government is not that dumb. Moreover, the very fact that such ideas are suggested by the content industry demonstrates how little its representatives really care, or know about online security. Hopefully, ordinary citizens won’t be attacked by trojan horses guided by the movie and music studios in the near future.

Huawei Claims Government Snooping Is Normal

One of the senior Huawei executives has recently claimed that, on his opinion, it is standard practice for governments to use the worldwide web to spy and steal sensitive information. The Huawei head of security operations and ex CIO for the UK government was making these bold claims during the interview with the Australian Financial Review. John Suffolk claimed that the governments had always embarked on such practices and it is not a top secret. Many would agree with him, actually.

These claims followed reports that the Chinese corporation had allegedly gained access to secret designs of American weapons, which were supposed to be taken from the Australia’s new intelligence agency headquarters. Huawei executive pointed out that spying seems to be the “second-oldest profession”. John Suffolk also pointed out that nobody was actually surprised that any government in the world was desperate to figure out what other governments around the world were doing.

However, the comments made by John Suffolk could reignite the recent fears over using Huawei devices. The latter was the subject of some controversy in the United States in the name of national security. Or at least that’s what they were telling the people.

In October 2012, the US House of Representatives’ Intelligence Committee claimed that the Chinese giant should be shut out of the American market due to potential Chinese state influence, which posed a security threat. In the meanwhile, other countries have called on the European Union to investigate Huawei for similar reasons. Others, including Russia, are already enjoying cheap gadgets without any fear

03 June 2013

ডটএসইউ এখন হ্যাকারদের স্বর্গ

বিশ্বের মানচিত্র থেকে সোভিয়েত ইউনিয়ন অদৃশ্য হয়ে গেলেও সোভিয়েত ইউনিয়নের একটি সাফিক্স হ্যাকারদের আশ্রয়স্থলে পরিণত হয়েছে। সম্প্রতি যুক্তরাজ্যের প্রভাবশালী দৈনিক গার্ডিয়ান এক প্রতিবেদনে জানিয়েছে, ১৯৯০ সালে সোভিয়েত ইউনিয়নকে প্রদত্ত সাফিক্স ডটএসইউ হ্যাকাররা নিজেদের কাজে ব্যবহার করছে।

সাফিক্সটি ব্যবহার করে হ্যাকাররা স্প্যাম পাঠানো ও অর্থ চুরির মতো অপরাধ করছে। আরএসএ অ্যান্টি-ফ্রড ইউনিট নিরাপত্তা সংস্থার কর্মী ওরেন ডেভিড বলেন, “আমার মনে হয় না, এটি একটি রাজনৈতিক বিষয়। এটি শুধুই অবৈধ একটি ব্যবসা।”

ডেভিড এবং অন্যান্য বিশেষজ্ঞরা জানান, ২০১১ সালে রাশিয়া ডটআরইউ সাফিক্সটি নিজেদের নিয়ন্ত্রণে নেওয়ার পর হ্যাকাররা ডটএসইউ সাফিক্সটি ব্যবহার শুরু করে।

গ্রুপ-আইবির আন্দ্রেই কোমারোভ জানান, সোভিয়েত ডোমেইনে অনেক সমস্যা রয়েছে। তিনি বলেন, “আমার মতে, অর্ধেকেরও বেশি সাইবার অপরাধী এবং প্রাক্তন ইউএসএসআর সাফিক্সটি ব্যবহার করে।”

কোমারোভ আরও জানান, এক লাখ ২০ হাজারেরও বেশি ডোমেইন সাফিক্সটিতে রেজিস্টার্ড অবস্থায় আছে। এখন এটি বন্ধ করাটাও খুবই জটিল একটি কাজ।

19 May 2013

দিনে ৫০ কোটিবার 'মাথা চুলকায়' গুগল!


রতিদিন গড়ে প্রায় ৫০ কোটিবার ‘মাথা চুলকায়’ গুগলের সার্চ ইঞ্জিন। প্রযুক্তি সংবাদবিষয়ক সাইট সিনেট জানিয়েছে, প্রতিষ্ঠার ১৫ বছর পরেও গুগল সার্চ ইঞ্জিনের ওই দৈনিক বিপাকে পড়ার খবর নিশ্চিত করেছেন সার্চ ইঞ্জিনটির লিড ডিজাইনার জন ওয়াইলি।

সার্চ ইঞ্জিন হিসেবে গুগল যতই শক্তিশালী হোক না কেন, প্রতিদিন তাকে এমন সব প্রশ্নের সম্মুখীন হতে হয় যে, মাথা চুলকিয়েও সঠিক উত্তর দিতে হিমশিম খায়। ব্লুমবার্গ টিভিকে দেওয়া এক সাক্ষাৎকারে গুগল সার্চ ইঞ্জিনের প্রতিদিনকার এই বিপাকের খবর জানান ওয়াইলি। এই সমস্যা সমাধান করাটাও যে অতি জরুরি, তাও স্বীকার করেন তিনি।

প্রতিমাসে ১০ হাজার কোটিবার বিভিন্ন বিষয়ে গুগলে অনুসন্ধান চালান সারাবিশ্বের ইন্টারনেট ব্যবহারকারীরা। ব্যবহারকারীদের ওই অনুসন্ধানে সঠিক তথ্য সরবরাহ করতে প্রতিদিন ২ হাজার কোটি ওয়েবসাইট থেকে নতুন তথ্য সংগ্রহের চেষ্টা করে গুগল।

এই বিপুল তথ্যের মধ্যে প্রতিদিন প্রায় ৫০ কোটি অনুসন্ধানে সঠিক জবাব দিতে হিমশিম খায় গুগলের সার্চ ইঞ্জিনটি। এ সংখ্যা গুগল সার্চ ইঞ্জিন ব্যবহারকারীদের দৈনিক অনুসন্ধানের ১৫ শতাংশ।

Microsoft Officially Replaced Hotmail with Outlook

The software giant has completed the transition from Hotmail to the new Outlook.com. As a result, the latter now boasts over 400 million accounts overall. The representatives of the company point out that the new Outlook email application has a number of different features from Hotmail. For example, it offers two-factor authentication, an updated calendar and app, as well as integration with cloud service called Skydrive and Skype.

Experts admit that most Hotmail users won’t notice any difference, so you can continue using your account as long as you want. You can also claim an Outlook email address whenever you like. Microsoft mentioned that Hotmail had over 300 million active accounts before its closure. Thus, upgrading had meant communicating with millions of people, upgrading all the mailboxes and also making sure that everyone’s details like mail, calendar, contacts, folders, and personal preferences were all preserved during the upgrade. This process was done live and as fast as in 6 weeks.

Industry observers remind that Hotmail was one of the first Internet-based email services, created by Sabeer Bhatia and Jack Smith in July 1996 as “HoTMaiL”. Three years later Microsoft acquired the Internet email service for about $400 million to rebrand it as “MSN Hotmail”. Finally, Outlook.com was launched three months ago, based around the company’s Metro design language. Apparently, the service closely mimics the interface of Microsoft Outlook. Now we can officially say goodbye to Hotmail, which already doesn’t exist.