Hi guys,
sorry i havent been posting in a while been a bit hectic, i did a review on the iphone 3g which you should diffenetly go check out here - Iphone 3g review so head over to my channel give it a watch and dont forget to comment, like, share, and subscribe and share it with your friends.
i will also be doing a review on the apps that it comes with as well as my top 3 apps that i use on a frequent basis i will also be doing some reviews on cases for the iphone 3g. I will be doing a review on the new itunes when it launches so keep a eye that.
so thanks for reading, and watching my channel,
cool beans.
n00b IT topics
Tuesday, 9 October 2012
Monday, 6 August 2012
Incase you were wondering i have not forgotten about you ipad lovers out their, i found this artical by complete accident but after reading it, it made so much sense. Amazon has released a instant video app for the ipad. here is the original artical posted.
The nice thing about Amazon Instant Video is that it offers 'free' content along with your $79/year Amazon Prime subscription (which also offers free 2-day shipping and the Kindle lending library as perks), as well as offering content to rent or purchase on a per item basis. This means you can often get newer content on Amazon than you can on Netflix, providing you're willing to pay for it.
I checked out the iPad app and it works as advertised. One nice bonus feature is the ability to download TV episodes to your iPad; this only works with purchased content but if you're going to be without an Internet connection it'll be a handy option.
Oddly there doesn't seem to be a way to search from the iPad interface, only browse through the categories they decide to show you. Of course your iPad has a perfectly usable browser so it's not a big deal to switch over and set up your Watchlist. Oh, and as expected the iPad supports WhisperSync so you can start watching on one device and finish on another without losing your place.
I find it interesting that Amazon is embracing the iPad, given all the emphasis it's been putting on the Kindle Fire. One of the unique aspects of the Fire was that it was the only tablet that offered Instant Video. Of course the $200 Kindle Fire and the $500+ iPad service different markets. It'll be really interesting to see if Amazon brings Instant Video to Android tablets (particularly the Nexus 7, which is in direct competition with the Kindle Fire).
Anyway, consumers win here. More options for viewing content are always welcome and it's good to see Amazon Instant Video joining Netflix, Hulu Plus and HBO Go on the iPad.
Amazon rolls out a nifty Instant Video app for the iPad
________________________________________
Seemingly out of nowhere (unless I missed a memo) Amazon launched an Instant Video iPad app yesterday. I've often said that Amazon needs to get its video streaming content onto more devices and it's slowly getting there. In addition to the new iPad app you can watch Amazon Instant Video on Roku, Playstation 3, Xbox 360, Tivo, certain Internet-connected TVs and Blu-ray players and of course, the Kindle Fire.
Hmm, maybe it isn't getting there...maybe it has arrived.The nice thing about Amazon Instant Video is that it offers 'free' content along with your $79/year Amazon Prime subscription (which also offers free 2-day shipping and the Kindle lending library as perks), as well as offering content to rent or purchase on a per item basis. This means you can often get newer content on Amazon than you can on Netflix, providing you're willing to pay for it.
I checked out the iPad app and it works as advertised. One nice bonus feature is the ability to download TV episodes to your iPad; this only works with purchased content but if you're going to be without an Internet connection it'll be a handy option.
Oddly there doesn't seem to be a way to search from the iPad interface, only browse through the categories they decide to show you. Of course your iPad has a perfectly usable browser so it's not a big deal to switch over and set up your Watchlist. Oh, and as expected the iPad supports WhisperSync so you can start watching on one device and finish on another without losing your place.
I find it interesting that Amazon is embracing the iPad, given all the emphasis it's been putting on the Kindle Fire. One of the unique aspects of the Fire was that it was the only tablet that offered Instant Video. Of course the $200 Kindle Fire and the $500+ iPad service different markets. It'll be really interesting to see if Amazon brings Instant Video to Android tablets (particularly the Nexus 7, which is in direct competition with the Kindle Fire).
Anyway, consumers win here. More options for viewing content are always welcome and it's good to see Amazon Instant Video joining Netflix, Hulu Plus and HBO Go on the iPad.
Friday, 3 August 2012
The hidden ways mobile sites and free games are killing your battery
You think you know how mobile browsing and games are killing your battery, but it's actually a bunch of unseen inefficiencies.
_____________________________________________________

Chart via "Who Killed My Battery?"; click for larger view
You know about some of the things that are putting such a hurt on your mobile battery that you can’t hit 4 p.m. without a warning. Streaming music over 3G, for example, or keeping the screen on for long camera sessions. But mobile web sites and certain free apps might be killing your phone’s juice in sneaky ways, according to some recent studies.
At the World Wide Web 2012 conference in Lyon, France, this week, Stanford researchers plan to present , a study of how much power is consumed by mobile browsers on popular websites. They hooked up an Android phone and its battery to a rather geeky-looking monitor, and started surfing the mobile web. Even among those sites that offer mobile-optimized versions, there were some serious battery killers in the crowd: Wikipedia, Tumblr, IMDB, and Blogger, among others.
The main culprits are cascading style sheets (CSS) and JavaScript, which need to be downloaded and parsed by the mobile browser. On Wikipedia’s mobile site, the researchers actually modified the page scripts themselves, and came up with a version that reduced energy usage by around 30 percent, without any change to the content itself. Image formats (using JPG instead of GIF or PNG) make a difference, too, but the real difference is in how you handle interaction. The site that came out looking slim and powerful was Gmail’s mobile site, which uses HTML-based scripts to create an app-like experience, caches what information it can on the phone, and pares everything down for lower processing and data radio demands.
What would really help, the researchers suggest, was if more sites offloaded some of the computation, script-handling, and image scaling to their own servers, rather than asking your phone to handle it. Stanford researchers suggest both front-end proxies (which intercept data from web servers and render them in optimized form for the phone, as on Opera and Skyfire mobile browsers) and back-end servers (which the phone sends data to for processing). And if Google Analytics would allow mobile sites to be cached on the phone, instead of demanding fresh versions on every view for traffic-measuring purposes, that would help a lot, too.
Thursday, 2 August 2012
Survey: Drivers like in-car Internet but worry about safety, privacy
Auto makers are now including more connected services in their vehicles and trying to balance them with safety
____________________________________________________
August 02, 2012, 8:04 PM —
U.S. drivers seem to hold conflicting opinions on in-car Internet
access, viewing the technology as a driving hazard and even a threat to
privacy while praising the entertainment and safety features it offers.
These opinions, presented in a Harris Interactive poll released Wednesday, come as automakers are seeing increased driver demand for digital technology and are adding more of it to their vehicles.
More than three out of four (76 percent) of the survey's 2,634 respondents answered that in-car connectivity causes too much distraction and is dangerous to have in vehicles. Automakers have gone too far in including this technology in their vehicles, according to 55 percent of those surveyed. U.S. drivers tend to attach strong emotions to their vehicles, and the poll reinforced that view, with 61 percent of people saying their car is "a haven from the outside world" and they don't always need an outside connection.
The auto industry said it understands the technology's potential safety risks and incorporates it in a way that creates the fewest disruptions. Integrating a smartphone into a car reduces the distractions that would be present if the phone was simply placed in the passenger seat, said Wade Newton, director of communications for the Alliance of Automobile Manufacturers (AAM), an automotive trade group whose 12 members include Ford, Mazda, Toyota and General Motors.
"If the phone rings you have to reach over, grab it and see who's calling," he said. "If it is integrated, with one button they can accept the call, turn down the radio and open the speakers."
Integrated mobile phone use was an early example of in-car connectivity. Now the technology can turn vehicles into wireless hotspots, allow people to search the Web from dashboard touchscreens and connect to roadside assistance services by pressing a button.
All auto makers have introduced in-car connectivity features in some degrees and promote them on their websites. When asked to comment on the survey, though, some of the manufacturers declined to comment and others did not respond to interview requests by deadline.
BMW USA did reply to an interview request but could not comment on the survey. However, in an emailed statement, the company said that interest in safe motoring "is a healthy sign that consumers are concerned about distraction while driving, and we consider that a big success."
The statement added that BMW uses "science-based analysis" to incorporate smartphones and other in-car technology into its vehicles. "We have 5 driving simulators that are constantly evaluating the driver experience, plus we do mobile driver clinics in Europe, the U.S., and the Far East to assess driver reactions," the company said.
These opinions, presented in a Harris Interactive poll released Wednesday, come as automakers are seeing increased driver demand for digital technology and are adding more of it to their vehicles.
More than three out of four (76 percent) of the survey's 2,634 respondents answered that in-car connectivity causes too much distraction and is dangerous to have in vehicles. Automakers have gone too far in including this technology in their vehicles, according to 55 percent of those surveyed. U.S. drivers tend to attach strong emotions to their vehicles, and the poll reinforced that view, with 61 percent of people saying their car is "a haven from the outside world" and they don't always need an outside connection.
The auto industry said it understands the technology's potential safety risks and incorporates it in a way that creates the fewest disruptions. Integrating a smartphone into a car reduces the distractions that would be present if the phone was simply placed in the passenger seat, said Wade Newton, director of communications for the Alliance of Automobile Manufacturers (AAM), an automotive trade group whose 12 members include Ford, Mazda, Toyota and General Motors.
"If the phone rings you have to reach over, grab it and see who's calling," he said. "If it is integrated, with one button they can accept the call, turn down the radio and open the speakers."
Integrated mobile phone use was an early example of in-car connectivity. Now the technology can turn vehicles into wireless hotspots, allow people to search the Web from dashboard touchscreens and connect to roadside assistance services by pressing a button.
All auto makers have introduced in-car connectivity features in some degrees and promote them on their websites. When asked to comment on the survey, though, some of the manufacturers declined to comment and others did not respond to interview requests by deadline.
BMW USA did reply to an interview request but could not comment on the survey. However, in an emailed statement, the company said that interest in safe motoring "is a healthy sign that consumers are concerned about distraction while driving, and we consider that a big success."
The statement added that BMW uses "science-based analysis" to incorporate smartphones and other in-car technology into its vehicles. "We have 5 driving simulators that are constantly evaluating the driver experience, plus we do mobile driver clinics in Europe, the U.S., and the Far East to assess driver reactions," the company said.
Wednesday, 1 August 2012
NYC Starts Offering Free, Unlimited WiFi Via Payphone Kiosks
___________________________________
The first WiFi payphone at West 58th and Broadway (Jen
Chung/Gothamist)
You may start "using" public payphones a lot more:
Today, New York City officials announced a pilot program to provide free,
unlimited WiFi to the public through public payphone kiosks. Rahul Merchant,
the city's Chief Information and Innovation Officer and Commissioner of the
Department of Information, Technology and Telecommunications, noted how
offering free broadband access part of the Bloomberg administration's
"efforts to promote greater digital inclusion for New Yorkers."
The first location is at West 58th Street and Broadway, near
Columbus Circle in Manhattan. The kiosk will say "Free WiFi" on the
sides (right now, there are no plans for advertising on the payphone kiosk, but
there may be in the future). The other locations in the pilot are:
- 30-94 Steinway Street, Astoria, Queens
- 545 Albee Square, Brooklyn
- 2 Smith Street, Brooklyn
- 402 West Broadway, Manhattan
- 458 Seventh Avenue, Manhattan
- 28 West 48th Street, Manhattan
- 410 Madison Avenue, Manhattan
- 1609 Broadway, Manhattan
- 230 West 95th Street, Manhattan
The goal is to get locations in the
Bronx and Staten Island set up soon. The estimated radius of the signal is
about 100-200 feet, depending on the location. The city hopes to spread the
public WiFi throughout the city—there are over 12,000 payphones in about 9,000
locations. City Councilwoman Gale Brewer, who has previously chaired the
Council's technology committee, pointed out that even though the city has been
introducing more online access at schools, libraries and senior centers, they
aren't open all the time, while this would give 24/7 access to free WiFi.
To access the WiFi on a device, you select the "Free
WiFi" option. Then, after you've agreed to accept the terms and
conditions, you're taken to the NYCgo.com website, the city's tourism arm, and
then you've got free WiFi. A 5-minute YouTube video loaded pretty
quickly—perhaps even more quickly than our home Time Warner Cable WiFi.
Merchant, who also announced the DOITT was issuing a RFI
asking the public for feedback about what they want from NYC payphones (like
would they want 311 services, etc.), did not believe the city's goal was make a
profit on the venture, but rather to give a "service" to New Yorkers
and visitors. Peter Izzo, senior operations executive at Van Wagner
Communications, an outdoor company that owns many payphones, said the cost of
installing the WiFi devices was about $2,000 per location, and that the
maintenance and ongoing usage costs would be borne by them and other phone
companies (a total of 13 companies, such as Van Wagner and Titan Outdoor,
operate public payphones; the city regulates all of them).
When asked about crime and potential vandalism, Izzo said
payphones were more likely to be damaged by graffiti or "a taxi careening
into one" and that vandalism like a missing phone had dropped
dramatically. He added that after decades of working with payphones, "you
learn something."
Obama Signs Executive Order Giving Him and Federal Government
Control of All Forms of Communication Under Any Circumstances
_____________________________________
On Friday, July 6, 2012, without any fanfare or publicity,
President Barack Obama signed an executive order titled Assignment of National Security and Emergency Preparedness
Communications Functions. Chances are that Obama didn’t want
to bring attention to this action because of the power it places in his grasp.
Section 1 of the executive order reads:
“The Federal Government must have the ability to communicate
at all times and under all circumstances to carry out its most critical and
time sensitive missions. Survivable, resilient, enduring, and effective
communications, both domestic and international, are essential to enable the
executive branch to communicate within itself and with: the legislative and
judicial branches; State, local, territorial, and tribal governments; private
sector entities; and the public, allies, and other nations. Such communications
must be possible under all circumstances to ensure national security,
effectively manage emergencies, and improve national resilience. The views of
all levels of government, the private and nonprofit sectors, and the public
must inform the development of national security and emergency preparedness
(NS/EP) communications policies, programs, and capabilities.”
Basically, this executive order gives the president and
Department of Homeland Security the authorization to take over and control any
and all lines of communications any time they want to, as spelled out in
Section 5.2 of the executive order:
“Sec. 5.2. The Secretary of Homeland
Security shall: (a) oversee the development, testing, implementation, and
sustainment of NS/EP communications, including: communications that support
Continuity of Government; Federal, State, local, territorial, and tribal
emergency preparedness and response communications; non-military executive
branch communications systems; critical infrastructure protection networks; and
non-military communications networks, particularly with respect to
prioritization and restoration;
(b) incorporate, integrate, and ensure interoperability and the necessary combination of hardness, redundancy, mobility, connectivity, interoperability, restorability, and security to obtain, to the maximum extent practicable, the survivability of NS/EP communications defined in section 5.2(a) of this order under all circumstances, including conditions of crisis or emergency;”
Some analysts have reviewed the executive order and state
that this section gives the Department of Homeland Security the authorization
to seize any and all private communications facilities
it deems necessary.
The National Communications System defines the
communications infrastructure as:
“The communications infrastructure is a complex system of
systems that incorporates multiple technologies and services with diverse
ownership. The infrastructure includes wireline, wireless, satellite, cable,
and broadcasting, and provides the transport networks that support the Internet
and other key information systems.”
When you wade through the executive order and other related
government documents, you discover that this document gives the president the
power to seize and control every form of communication within the United States
for any reason they so desire.
Now add this to the National Defense Authorization Act passed by
Congress last year that gives the United States government to arrest, detain
and hold indefinitely any American without a warrant, formal charges or any
reason other than declaring the person is a threat to the nation. Any
detained under this act will be sent to a military run prison and held until
such time as the government decides to release them.
I have never been a conspiracy nut and usually avoid those
that are, but I can’t help but see the evidence over the past year to indicate
that Barack Obama has almost everything in place to allow him to declare
martial law and suspend the American way of life. He has the power to
control all forms of communication and detain anyone he wants. He has
purposely driven the economy and job market to the brink of collapse.
As much as I hate to admit it, I honestly believe that if
Obama gets re-elected, that he will finalize the economic collapse of America
and in so doing, will declare martial law and take control of all
communications. He will arrest and detain anyone who opposes him.
In all likelihood, he will disband Congress, the Supreme Court and stop all
elections. Ultimately, he will declare himself to be the supreme ruler of
the nation and assume complete dictatorial control of the country.
This November’s election IS the most important presidential
election in the history of America. It may very well be the last election
we will ever have. I pray I’m wrong, but all of the evidence points to
that conclusion.
Tuesday, 31 January 2012
Why SOPA and PIPA Suck, V1.0
| Why SOPA and PIPA Suck, v1.0 | |
| Published by: senjespar, on 2011-12-29 12:36:56 | |
| "Why SOPA and PIPA Suck" - A quick-start guide to how this legislation may very well miss up the internet. This was originally written as a textfile, so I apologize if the formatting is off. ***DISCLAIMER*** I threw this together quickly, in an effort to get the information out there. I attempted to ensure the technical accuracy of the information, and provide adequate resources so that interested individuals could easily dig deeper into this matter. I apologize for any errors in grammar, technical information, or general stupidity. It's been a long day. If you find any errors, please let me know. |||=================================================================== ||| I. INTRODUCTION |||=================================================================== The "Stop Online Privacy Act" (aka "SOPA", H.B. 3261) is a bill that was proposed to help fight online piracy, such as counterfeit goods and intellectual property/copyright infringement. -[1,2]-Although there has been much speculation in the online communities about what specific methods would be used to block "bad" sites, a lot of attention has been placed on DNS filtering, and therefore will be the focus of this pastebin. Also of interest is the Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011 (aka "PROTECT IP", S.968). -[4]-The PROTECT IP Act is a similar bill which was started in the Senate. In an article dated November 18th, 2011, CNET quotes Markham Erickson, who states: "It would cover IP blocking...I think it contemplates deep packet inspection." -[3]- Assuming the legislation passes (in either form), there are a number of ways to go about blocking these terrible websites that are causing so much harm. The first method I will present is the DNS filter - in short, this is a rather ineffective method of filtering, and may end up actually "breaking" the web. But more on that later. Another, more effective method, is IP blocking - in other words, your ISP (Verizon, Comcast, etc.) would receive a notice to block all requests for a certain IP address. In effect, the Peoples Republic of America could make any site (or computer for that matter) essentially disappear from the internet. The last method I will quickly mention is "deep packet inspection". This is a method that China uses to block their subjects from seeing anything "harmful" to their state interests.* -[6]- In brief, deep packet inspection involves the government reading NEARLY EVERY SINGLE BIT OF DATA that you send or view online. This, in my opinion, is the only truly effective way of enforcing censorship, and comes at the price of Big Brother regularly viewing and scanning each and every word, picture and file that is transmitted via the internet. If this sounds like universal wiretapping to you, then you are right. In 2008, a bipartisan group of representatives denounced NebuAds attempts at deep packet inspection, stating it was "flatly illegal". -[7]- Flatly illegal, that is, unless it's Congress trying to do it. ***DISCLAIMER: OPINION*** It is often difficult for us average folk to sympathize with the billionaire performers in Hollywood and RIAA/MPAA who claim that we are stealing from them and compromising profits. We often defend this point with "Kanye/Britney/whomever can afford to lose that $0.99 I would pay on iTunes", which they undoubtedly can. They are correct - it is stealing, plain and simple. However, you dont see blanket legislation that infringes our basic privacy for any other crime, like shoplifting. In fact, I would be willing to bet that, dollar-for-dollar, more money is lost in the retail world through petty theft each year than in the music/movie industry. To the best of my knowledge, Congress has never enacted this type of blanket legislation that invades our privacy - except in the name of combating terrorism, of course. One more quick note - I know, I know. I used Wikipedia for several sources. Fuck off, this isn't a scholarly paper, its a quick-start guide for folks who are not familiar with the technical implications of this legislation. |||=================================================================== ||| II. WHAT IS "DNS"? |||=================================================================== DNS stands for "Domain Name System", which is a system of servers that routes internet traffic, making it easier for humans to navigate to their favorite websites. The DNS allows us to type in a URL, such as "www.example.com" and arrive at the website, rather than remember an IP address (123.456.789.00). In a simplified example, your computer queries a DNS server to ask directions to a website. Your computer has a list of pre-defined servers to ask first - usually set by your ISP (e.g., Comcast) in order to speed up your internet service. This DNS lookup sounds something like this: COMPUTER: "Hey, anyone know where "foo.com" is at?" DNS SERV: "Yeah, try 123.456.78.90." [COMPUTER looks at 123.456.78.90] SERV 2: "Can I help you?" COMPUTER: "Yeah, I am looking for "foo.com". Any idea where it's at?" SERV 2: "Sure, its over at 444.555.66.77." [COMPUTER connects to foo.com] In this conversation, the DNS SERV would be the first place your computer would ask for directions - this is typically determined by your computer's settings and your ISP. This server would in turn reply with a server who can give better directions, or maybe it knows by itself. Typically, you are routed several times. In short, the DNS is often likened to a "map" or "phonebook" for the internet world. It lets us browse to the correct sites by simply remembering the (hopefully) human-friendly URL. Without the DNS, we would not necessarily be lost, we would just have to keep a hard copy directory that lists the website and its respective IP address. |||=================================================================== ||| III. WHAT IS "DNS FILTERING"? |||=================================================================== DNS filtering is commonly employed by companies, educational institutions and other places which may not want their employees or students accessing non-work-related sites, commonly social media and pornography sites. DNS filtering works by pointing your computer to the filter as the DNS server. The filter is the first server your computer will ask for directions. This server recognizes that you are trying to access a forbidden site, and gives your computer bad directions - usually to that "This webpage is blocked" page. |||=================================================================== ||| IV. CIRCUMVENTION OF DNS FILTERING |||=================================================================== The easiest way to circumvent DNS filtering is by accessing the site directly by IP. Instead of typing "google.com" into your address bar, try typing "http://74.125.113.104/". You should arrive at the same page. By doing this, your computer does not need directions, because you gave it the exact address to go to. Unfortunately, this does not always work, because many sites use various forms of redirection and other sites to host their content. For example, Twitter (IP: http://199.59.149.230/) also uses a site called twimg.com to store images and style/layout data. Most DNS filters will block these sub-components, resulting in the page loading incorrectly. To fix this, we can modify the HOSTS file, which is on virtually every operating system. The HOSTS file is typically empty, but can act as a map or phonebook for your computer, in lieu of, or to supplement, the DNS. By adding websites and their IP addresses to the HOSTS file, our computer no longer needs to query the DNS for directions. While editing your HOSTS file can result in loss of some internet connectivity if done incorrectly, it's not much more difficult than using proper grammar in an e-mail. There is also the possibility of manually setting your computer to point to DNS servers that will give you the answers you want. For example, you could point your computer to DNS servers outside the USA that would return the correct IP address for a blocked website, thereby completely circumventing any filtering that the government puts into place. Finally, there are several browser plug-ins and programs that will attempt to resolve the IP address for you, without consulting the DNS. These were specifically developed to circumvent internet censorship. Tor is a common program that is used by Chinese citizens to get past their governments censors. You can download Tor at https://www.torproject.org. You may need to download the "bridge" portion of the program, too. |||=================================================================== ||| V. SECURITY RISKS CREATED BY GLOBAL DNS FILTERING |||=================================================================== If you have not guessed by now, users WILL circumvent any DNS filtering that the US puts into effect. However, as anyone who has ever gotten one of those pesky "redirect viruses" knows, this poses major security risks. First and foremost, the sheer number of users desperate to download the latest song or movie will eventually click on ANYTHING that lets them download what they want. There are a number of studies online that show with overwhelming evidence that most internet users are not the smartest, and despite knowing that a link or file may contain a virus, will click on it anyway. Feel free to google for this data. A malicious user could easily craft a script to modify the HOSTS file on your computer to point your bank website to a phishing site, under the guise of giving you access to pirated media. Also, a malicious user could give you erroneous DNS information, claiming it would give you access to the sites you want. However, you are now routing ALL of you internet traffic through THEIR servers. This should immediately be a red flag to anyone who has ever heard the words "computer" and "security". -[8]- There are several other major risks involved, and I will refer you to a Technical Whitepaper -[9]- for more details. The last one I will touch upon is the fact that such widespread DNS filtering and redirection could very well "break the internet". If you use online banking, or sites like eBay or Amazon you are already familiar with secure browsing. Most sites currently use some form of authentication, typically in the form of SSL (HTTPS), certificates, etc. A better solution has been proposed, which is DNSSEC (DNS Security Extensions) -[10]-. In short, the governments interference with the DNS will cause a break in the chain of trust - similar to a problem you have probably already encountered when your browser gives you the "You are about to be redirected to a connection that is not secure." error. Finally, there are several other concerns, and I will again refer you to the Whitepaper (-[9]-) for further detailed explanation. You should now be familiar with some of the basic principles, and how these acts could very well destroy the internet as we know it today, as well as create a giant step backwards in internet security. I should take this time to once again state that I do not have a problem enforcing illegal downloads, as it is technically theft, but I believe that, once again, Congress has given in to lobbyists and created blanket legislation in the interests of one single group, thus continuing to neglect the rights of the American people. |||=================================================================== ||| VI. REFERENCES, RESOURCES AND OTHER PROOF THAT I AM NOT PULLING THIS OUT OF MY ASS |||=================================================================== [1] Bill Text: 112th Congress (2011-2012) H.R. 3261 -- Stop Online Privacy Act ---> http://thomas.loc.gov/cgi-bin/query/z?c112:H.R.3261: (Accessed 19-DEC-2011) [2] "Stop Online Privacy Act" (Wikipedia) ---> http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act (Accessed 19-DEC-2011) [3] "SOPA's Latest Threat: IP blocking, privacy-busting packet inspection" Pub: 18-NOV-2011 ---> http://news.cnet.com/8301-31921_3-57328045-281/ sopas-latest-threat-ip-blocking-privacy-busting-packet-inspection/ (Accessed 19-DEC-2011) [4] Bill Text: 112th Congress (2011-2012) S.968 -- Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property ---> http://thomas.loc.gov/cgi-bin/bdquery/z?d112:s.00968: (Accessed 19-DEC-2011) [5] "PROTECT IP Act" (Wikipedia) ---> http://en.wikipedia.org/wiki/PROTECT_IP_Act (Accessed 19-DEC-2011) [6] "Deep Packet Inspection" (Wikipedia) ---> http://en.wikipedia.org/wiki/Deep_packet_inspection (Accessed 19-DEC-2011) [7] "NebuAd Grilled Over Hot Coals in Congress on Privacy" Pub: 17-JUL-2008 ---> http://news.cnet.com/8301-13578_3-9993554-38.html (Accessed 19-DEC-2011) [8] "What is a host hijack?" ---> http://www.adoko.com/hijackers-host.html (Accessed 19-DEC-2011) [9] "Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill - A Technical Whitepaper" Pub: May 2011 ---> http://www.circleid.com/pdf/PROTECT-IP-Technical-Whitepaper-Final.pdf (Accessed 19-DEC-2011) [10] "Domain Name Service Security Extensions" (Wikipedia) ---> http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions (Accessed 19-DEC-2011) |
Subscribe to:
Comments (Atom)
