TorrentFreak: When Authors Demand Payment For Every Copy, They Advocate...
Yes, really. There's a whole lot of confusion in the dangerous and wrong cliché that "authors must be paid" for every copy that's made. We live in a market economy for good reasons.Source:...
View Articlexkcd.com: Watson Medical Algorithm
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleTorrentFreak: Top 10 Most Pirated Movies of The Week – 12/21/15
The top 10 most downloaded movies on BitTorrent are in again. 'The Intern.' tops the chart this week, followed by ‘The Peanuts Movie' 'Pan' completes the top three.Source: TorrentFreak, for the latest...
View ArticleTorrentFreak: The Hateful Eight and The Revenant Screeners Leaked Online
High quality copies of some of the year's most anticipated movies have begun leaking to torrent sites. Screeners of The Hateful Eight and The Revenant leaked before their theatrical release, with one...
View ArticleLWN.net: Kernel prepatch 4.4-rc6
The 4.4-rc6 kernel prepatch is out. "Things remain fairly normal. Last week rc5 was very small indeed, this week we have a slightly bigger rc6. The main difference is that rc6 had a network pull in it."
View ArticleRaspberry Pi: Star Wars Carnival (no spoilers!)
We went to see The Force Awakens on Friday. (Short review: it’s terrific and you should go and see it.) The comments here are a spoiler-free zone: comments which give away any of the plot will be...
View ArticleSchneier on Security: Back Door in Juniper Firewalls
Juniper has warned about a malicious back door in their firewalls that automatically decrypts VPN traffic. It's been there for years. Hopefully details are forthcoming, but the folks at Hacker News...
View ArticleLWN.net: Cracking Linux with the backspace key?
Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace"....
View ArticleAWS Official Blog: AWS Week in Review – December 7, 2015
Let’s take a quick look at what happened in AWS-land last week: Monday December 7 We announced Instance Protection for Auto Scaling. We announced Encryption at Rest for Amazon Aurora. I published AWS...
View ArticleLinux How-Tos and Linux Tutorials: How to convert packages between .deb and .rpm
Unfortunately, and after years of development in every part of the free software that we enjoy, there are still two primary types of software package available in GNU/Linux systems. The one is the .deb...
View ArticleAWS Security Blog: AWS ISO 27001 Certification Increases Total In-Scope...
AWS has just completed our annual audit of ISO 27001, a certification we achieved back in 2010. 10 new services are now in scope under ISO 27001: Amazon CloudFront Amazon EC2 Container Service (ECS)...
View ArticleDarknet – The Darkside: PowerSploit – A PowerShell Post-Exploitation Framework
PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. Basically PowerSploit is a PowerShell Post-Exploitation...
View ArticleLet's Encrypt - Free SSL/TLS Certificates: OVH Sponsors Let’s Encrypt
We’re pleased to announce that OVH has become a Platinum sponsor of Let’s Encrypt. According to OVH CTO and Founder Octave Klaba, “OVH is delighted to become a Platinum sponsor. With Let’s Encrypt, OVH...
View ArticleLWN.net: Security advisories for Monday
CentOS has updated jakarta-commons-collections (C5: code execution). Debian has updated blueman (privilege escalation) and tomcat8 (Security Manager bypass). Fedora has updated bind (F23: two...
View ArticleTorrentFreak: Hackers Grab Deluge and qBitTorrent User Databases
The websites of the torrent clients Deluge and qBittorrent, as well as the torrent site SumoTorrent, have reportedly been compromised. Access to the stolen user information including emails and hashed...
View ArticleSchneier on Security: “The Medieval Origins of Mass Surveillance”
This interesting article by medieval historian Amanda Power traces our culture's relationship with the concept of mass surveillance from the medieval characterization of the Christian god and how piety...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: VP of B2 Sales: Return...
Following the trend of founders coming back to their companies (Alexis Ohanian to Reddit, and Jack Dorsey to Twitter), Backblaze is thrilled to have one of our founding team join us again. Nilay Patel...
View ArticleLauren Weinstein's Blog: A Proposal for Dealing with Terrorist Videos on the...
As part of the ongoing attempts by politicians around the world to falsely demonize the Internet as a fundamental cause of (or at least a willing partner in) the spread of radical terrorist ideologies,...
View ArticleMatthew Garrett: GPL enforcement is a social good
The Software Freedom Conservancy is currently running a fundraising program in an attempt to raise enough money to continue funding GPL compliance work. If they don't gain enough supporters, the...
View ArticleAWS Official Blog: AWS Week in Review – December 14, 2015
Let’s take a quick look at what happened in AWS-land last week: Monday December 14 We announced Encrypted EBS Boot Volumes. We updated the DynamoDB Backend for Titan to Version 1.0. We announced that...
View Article