Billionaires' Basements: the luxury bunkers making holes in London streets. A new billionaires’ craze for building elaborate subterranean extensions is making swiss cheese of London’s poshest streets – but at what cost?
Entertainment
Every Gesture Used to Beat Angry Birds Visualized on Paper
Instant Google Street View. Type something (slowly) and teleport around the world.
Nuclear Power Plant Simulation Game
Taliban accidentally CCs everybody on its mailing list
Internet
Google and Bing autocomplete what they think they know what you're thinking. Sometimes they get it wrong. "People who study online behavior also say the autocomplete feature reveals broader patterns, including indications that the questions people ask of search engines often veer into the sensitive and politically incorrect." There's even a Tumblr devoted to Google Poetics.
In an attempt to make itself less desirable to copyright infringers, starting November 27, RapidShare will begin capping non-paying users at 1 gigabyte of outbound downloads per day. (Paying users will have 30 gigabytes.) Meanwhile, controversial Megaupload founder Kim Dotcom is planning a January debut for his new Mega service - which plans to insure itself against litigation by having all hosted material encrypted by the uploader's browser before transmission.
What does proper authorization to access a computer system mean? Robert Graham of Errata Security writes about the recent conviction of Andrew Auernheimer (aka weev) for “hacking” AT&T. Two years ago, weev discovered a bug in AT&T's website that exposed the email addresses of customers with iPads. According to weev, the flaw was reported as per responsible disclosure practices by first informing AT&T before bringing it public. However the FBI investigated and arrested him under the Computer Fraud and Abuse Act (CFAA). On 20th November 2012, he was found guilty of identity fraud and conspiracy to access a computer without authorization.
Reading & Discussion
Mr. Fix-It: The engineering mentality
What does proper authorization to access a computer system mean? Robert Graham of Errata Security writes about the recent conviction of Andrew Auernheimer (aka weev) for “hacking” AT&T. Two years ago, weev discovered a bug in AT&T's website that exposed the email addresses of customers with iPads. According to weev, the flaw was reported as per responsible disclosure practices by first informing AT&T before bringing it public. However the FBI investigated and arrested him under the Computer Fraud and Abuse Act (CFAA). On 20th November 2012, he was found guilty of identity fraud and conspiracy to access a computer without authorization.
Resources & Utilities
Responsify is a browser based tool, which allows you to create your own responsive template. Think of it as a foundation for you to build upon. You can customise the grid to suit your content, rather than trying to make the content fit the grid.
Science
David Brin points to Asteroid belts at just the right place are friendly to life -November 6, 2012 , saying "This combination is calculated to be rare, in perhaps just 4% of solar systems. That rarity offers yet one more new, rather daunting candidate for the Fermi Paradox."
XKCD explains explains the major parts of the Saturn V rocket.
Software
The Frightening Things You Hear at a Black Hat Conference
Technology
Five years ago today Jeff Bezos’ Amazon.com released the Amazon Kindle, a move that would revolutionize the publishing industry. While often controversial, most recently for its international tax avoidance schemes, Amazon has been very successful and has made millions for its founder. What has Bezos done with some of his tax-free millions? Well for one, he launched and landed a rocket vertically.
No comments:
Post a Comment