TorrentFreak: Why Netflix VPN ‘Pirates’ (Shouldn’t) Terrify Hollywood
This week Netflix announced that it would ramp up its crackdown on VPN and proxy pirates. The decision is a response to increased demands from major Hollywood players, but is this fear of VPN pirates...
View ArticleErrata Security: Some notes C in 2016
On r/programming was this post called "How to C (as of 2016)". It has some useful advice, but also some bad advice. I thought I'd write up comments on the topic. As somebody mentioned while I was...
View ArticleTorrentFreak: Torrent From the Cloud With Seedr
Most people download torrents with desktop clients such as uTorrent but with a simple user interface and tiny learning curve, Seedr takes torrenting into the cloud. Hiding users' IP addresses from the...
View ArticleTorrentFreak: Movie Outfits Flag MPAA’s Search Engine as a Pirate Site
The MPAA has repeatedly urged Google to get tougher on copyright infringement, but recently it learned that anti-piracy efforts also have a downside. Several pages from the MPAA's search engine for...
View ArticleGrigor Gatchev - A Weblog: Дапийнемпоедно
Тази история ми я разказа един познат. Ето я, доколкото си я спомням. —- В болничната стая бяхме все с различни заболявания. Аз – пострадал с крака. Друго едно момче – потрошило се при падане. И така,...
View Articlexkcd.com: Longer Than Usual
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleLauren Weinstein's Blog: Despite Politicians, the Internet Can Save Us from...
Yesterday evening I discovered a fault in a rather complex piece of electronics apparatus here. It was not obvious to debug and I'm not an expert regarding that particular circuitry. I posted a query...
View ArticleTorrentFreak: Top 10 Most Pirated Movies of The Week – 01/18/16
The top 10 most downloaded movies on BitTorrent are in again. 'The Big Short.' tops the chart this week, followed by ‘The Revenant' 'Spectre' completes the top three. Source: TF, for the latest info on...
View ArticleSource Code in TV and Films: Some VHDL code in Denpa Kyoushi transition...
Some VHDL code in Denpa Kyoushi transition background (beginning of ep. 12). Code is rather consistent and appears to implement VGA controller.
View ArticleTorrentFreak: Court Grants Free Legal Assistance to Accused Movie Pirates
With up to $150,000 in damages available to plaintiffs in copyright infringement cases involving just a single movie, being a defendant can be a scary prospect. However, a judge in the United States...
View ArticleRaspberry Pi: Raspberry Pi physical dashboard
You can do an awful lot with a seven-segment display, a dial and some imagination. Happily for us all, the good folks at Adafruit have metaphorical and literal buckets of all those things, and have...
View ArticleAWS Official Blog: Amazon Wind Farm Fowler Ridge is Live!
Back in November 2014 AWS made a long-term commitment to achieve 100% renewable energy usage for our global infrastructure footprint, and we continue to make progress towards this goal. Today’s news on...
View ArticleSchneier on Security: Match Fixing in Tennis
The BBC and Buzzfeed are jointly reporting on match fixing in tennis. Their story is based partially on leaked documents and partly on data analysis. BuzzFeed News began its investigation after...
View ArticleLWN.net: Security advisories for Monday
Arch Linux has updated docker (information disclosure), ffmpeg (cross-origin attacks), go (information disclosure), go-ipfs (information disclosure), hub (information disclosure), keybase (information...
View ArticleTorrentFreak: VPN Providers Condemn Netflix Blocking Crackdown
VPN providers have unanimously condemned Netflix's crackdown on subscribers who use so-called unblocking services. Several VPN companies have announced counter-measures, while others raise the issue of...
View ArticleDarknet – The Darkside: MITMf – Man-In-The-Middle Attack Framework
MITMf is a Man-In-The-Middle Attack Framework which aims to to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. Originally...
View ArticleSchneier on Security: Counterfeit Theater Tickets in New York
Counterfeiters are making tickets for the Broadway show "Hamilton." Counterfeiting is much easier when the person you're passing the fakes off to doesn't know what the real thing is supposed to look like.
View ArticleErrata Security: Flawed From the Start & Missing the Mark: Georgia’s Proposed...
Bad state laws can have the same chilling effect on technology as bad federal laws. In this guest post, friend of Errata Elizabeth Wharton (@lawyerliz) discusses the latest anti-drone law introduced...
View ArticleAWS Official Blog: AWS Week in Review – January 11, 2016
Let’s take a quick look at what happened in AWS-land last week: Monday January 11 We announced ClassicLink DNS Support. We announced that Elastic Beanstalk Now Supports t2.nano Instances and Deployment...
View ArticleLWN.net: Mycroft: Linux’s Own AI (Linux.com)
Swapnil Bhartiya takes a look at Mycroft AI and talks with CTO Ryan Sipes, on Linux.com. "Earlier this month, the developers released the Adapt intent parser as open source. When many people look at...
View Article