Being realistic, this is not far from what they were already doing: Google already tracked your searches, what you are watching on Youtube or your emails.
But before March, 1st, Google Plus, Youtube, Gmail and almost 60 Google products, were in different databases. With this change, Google guys are giving themselves the right to put all those products in just one big place, put one and one and one together to build a better and more complete online behaviour of YOU. And use it to chase YOU with their ads.
It should be nonsense for me to tell you to stop using Google products. Almost everything you do in the internet today, from searches and emails, to finding a street and comparing products’ prices, is somehow through a Google product or related to it.
But you can at least reduce the amount of information that Google will be able to collect from you.
You can, for instance, delete your Google history going to https://www.google.com/history/ and clicking the button “Remove all Web History”
You can also configure your advertising settings here: https://www.google.com/settings/u/0/ads/preferences/
You can edit your settings or even opt out.
Another way to “confuse” Google is creating a different account for each Google service (if you can keep up with all usernames and passwords).
Or, when watching a video on Youtube or searching the Web, make sure you are not logged in to your Google account.
There is also the possibility to use browser plugins that work to protect your data, or even anonymous proxies.
But, the truth is, as soon as you type into your computer, click anything, visit at a page, talk through Skype, or even talk on a telephone, (mobile or fixed), those who want to, can spy on you.
At least now Google is coming clear and telling you that they are spying on you. It makes better sense to me than living in a fool’s paradise, where you still believe that you have control over your life.
I’m not the one to normally do reviews or ads, but this is one well worth doing. Humble bundle is an initiative hosted by Wolfire studio, in which five other studios (2D Boy, Bit Blot, Cryptic Sea, Frictional Games and the recently joined Amanita Design) joined their award-winning indie games into a bundle with two charities (EFF and Child’s Play) that you can pay whatever you want, to be shared amongst them.
All games work on Linux and Mac (as well as Windows), are of excellent quality (I loved them) and separately would cost around 80 bucks. The average buy price for the bundle is around $8.50, but some people have paid $1000 already. Funny, though, that now they’re separating the average per platform, and Linux users pay, on average, $14 while Windows users pay $7, with Mac in between. A clear message to professional game studios out there, isn’t it?
About the games, they’re the type that are always fun to play and don’t try to be more than they should. There are no state-of-the-art 3D graphics, blood, bullets and zillions of details, but they’re solid, consistent and plain fun. I already had World of Goo (from 2D Boy) and loved it. All the rest I discovered with the bundle and I have to say that I was not expecting them to be that good. The only bad news is that you have only one more day to buy them, so hurry, get your bundle now while it’s still available.
World of Goo: Maybe the most famous of all, it’s even available for Wii. It’s addictive and family friendly, has many tricks and very clever levels to play. It’s a very simple concept, balls stick to other balls and you have to reach the pipe to save them. But what they’ve done with that simple concept was a powerful and very clever combination of physical properties that give the game an extra challenge. What most impressed me was the way physics was embedded in the game. Things have weight and momentum, sticks break if the momentum is too great, some balls weight less than air and float, while others burn in contact with fire. A masterpiece.
Aquaria: I thought this would be the least interesting of all, but I was wrong. Very wrong. The graphics and music are very nice and the physics of the game is well built, but the way the game builds up is the best. It’s a mix of Ecco with Loom, where you’re a sea creature (mermaid?) and have to sing songs to get powers or to interact with the game. The more you play, the more you discover new things and the more powerful you become. Really clever and a bit more addictive than I was waiting for… 😉
Gish: You are a tar ball (not the Unix tar, though) and have to go through tunnels with dangers to find your tar girl (?). The story is stupid, but the game is fun. You can be slippery or sticky to interact with the maze and some elements that have simple physics, which add some fun. There are also some enemies to make it more difficult. Sometimes it’s a bit annoying, when it depends more on luck (if you get the timing of many things right in a row) than actually logic or skill. The save style is also not the best, I was on the fourth level and asked for a reset (to restart the fourth level again), but it reset the whole thing and sent me to the first level, which I’m not playing again. The music is great, though.
Lugaru HD: A 3D Lara Croft bloody kung-fu bunny style. The background story is more for necessity of having one than actually relevant. The idea is to go on skirmishing, cutting jugulars, sneaking and knocking down characters in the game as you go along. The 3D graphics are not particularly impressive and the camera is not innovative, but the game has some charm for those that like a fight for the sake of fights. Funny.
Penumbra: If you like being scared, this is your game. It’s rated 16+ and you can see very little while playing. But you can hear things growling, your own heart beating and the best part is when you see something that scares the hell out of you and you despair and give away your hide out. The graphics are good, simple but well cared for. The effects (blurs, fades, night vision, fear) are very well done and in sync with the game and story. The interface is pretty simple and impressively easy, making the game much more fun than the traditional FPS I’ve played so far. The best part is, you don’t fight, you hide and run. It remembers me Thief, where fighting is the last thing you want to do, but with the difference is that in Thief, you could, in this one, you’re a puss. If you fight, you’ll most likely die.
Samorost 2: It’s a flash game, that’s all I know. Flash is not particularly stable on any platform and Linux is especially unstable, so I couldn’t make it run in the first attempt. For me, and most gamers I know, a game has to work. This is why it’s so hard to play early open source games, because you’re looking for a few minutes of fun and not actually fiddling with your system. I have spent more time writing this paragraph than trying to play Samorost and I will only try it again if I upgrade my Linux (in hoping the Flash problem will go away by itself). Pity.
Well, that’s it. Go and get your humble bundle that it’s well worth, plus you help some other people in the process. Helping indie studios is very important for me. First, it levels the play-field and help them grow. Second, they tend to be much more platform independent, and decent games for Linux are scarce. Last, they tend to have the best ideas. Most game studios license one or two game engines and create dozens of similar games with that, in hope to get more value for their money. Also, they tend to stick with the current ideas that sell, instead of innovating.
By buying the bundle you are, at the very least, helping to have better games in the future.
“Most of us wish we could give more, now we can. Everyclick is a really simple way to raise money for free, just by doing something you already do” said Polly Gowers CEO, co- founder and winner of the WEBA Ethical Entrepreneur of the year 2007. “As we see it, every search that is not raising money for charity is a search wasted.”
Everyclick.com works just like any other search engine, but allows the users to choose the charity they would like to benefit from their searching. The revenue generated for charities comes from companies that advertise on the site. There is no sign up fee or hidden charge to the user or the charity, it’s free giving.
Charities of all sizes are benefiting from this new fundraising service; they range from Cancer Research to small village schools. If 10% of the UK online population used Everyclick.com for their searches, an additional £172,000 would be raised for charity every day.
How to raise more money for Camfed using Everyclick:
- search the web using personalised Camfed search page: http://www.everyclick.com/camfed
- compare and shop using this link (shop online at Tesco, Dell, Amazon, M&S, BBC, and more – half the revenues will go to Camfed)
- collect sponsorship
- donate, give and reclaim
- tell your friends
- add our Camfed Everyclick webpage as your homepage
- Configure your email signature to spread the word
About Everyclick Charity Challenge
The Everyclick Charity Challenge enables us to raise more money and have the chance to win a poster campaign on 1500 Clear Channel Outdoor sites that will be viewed an estimated 192 million times.
The challenge runs from 15th October 2008 to 1 March 2009 during which time we will have a range of innovative ways to raise money online.
Just a quick note to say Computer Awards has announced their shortlist for this year… and guess what… they think I deserve to be between the eight finalists…
Who knows… The winners will be announced at a glittering prize-giving ceremony to be held on 5 November.
Crackers like to use phishing to spread their malicious code. And actually, if you take care with just some file extensions you can avoid these dangerous codes.
If you receive an e-mail with the extensions .cmd, .bat, .exe or .scr, don’t open it, even if it comes from a secure source. And, as email servers are blocking these attached files, crackers are using telephone promotions, your bank account and other current subjects to direct you to a malicious link where a virus is downloaded. They develop sites almost identical to the original sites, “clones”, where the cracker has total control over your acts. It’s really common send scraps to Orkut users with these links.
Most files available to download in these websites are those kind mentioned in the beginning: .cmd, .bat, .scr or .exe.
The .cmd and .bat files are used to execute scripts known as batch files, to automate tasks. Crackers use these kind of files to steal user data. The .scr are screen saver files, and most users trust this kind of files, but the virus will be activated when the screen saver is executed.The most known, and still most used as phishing is .exe. Users know how dangerous these files are, but, most of time, they don’t pay attention to the extension they are downloading.
The files mentioned are Trojans and keyloggers. Trojans open your machine to the cracker and Keyloggers record everything you type. So, can you imagine the damage to your personal data?
Now that you know these dangerous files, what to do to protect your data? it’s always a good idea to have a firewall and other prevention methods that can identify these links and extensions. And don’t think you will notice that your computer was infected. The cracker don’t want to be noticed, he will be hidden, and quiet, to get all information he wants.
Take care with those files and links, check the extension, don’t open files from unknown sources and don’t execute anything in your computer that you are not sure what is. It’s not that hard to be safe on line.
It’s time to recycle using your hand craft abilities!
Computer Chip Trivet
Don’t you know what to do with those old computer chips laying around? What do you think about a stylish trivet? Instructions are simple to follow: all you need are some computer chips , grout, adhesive, and a tile square.
Once you’re all finished, you’ll have a nicely geekified trivet for all your hot stuff.
You’ll really impress your geeky friends with this genuinely useful kitchen tool that you can make: a trivet built out of old computer chips.
Follow this link for full instructions.
Hard Drive Wind Chimes
The drive platters themselves are also quite remarkable: precisely made aluminium patters with a surface not unlike recording tape. The disks make a lovely clear note if you strike them, so it was only natural to make them into a set of wind chimes.
An interesting side effect is that the shiny shiny platters reflected little spots of light into the house. Naturally, if you have cats, they’ll love it too.
Follow this link for full instructions.
Hard Drive Picture Frames
So, you’ve disassembled hard drives, taken the magnets out, made wind chimes out of the platters, and so on. One thing that you might have left over is a set of printed circuit boards. Funny shaped printed circuit boards, with holes in them.
Here’s how to turn those leftover PCBs into fabulous geek-chic picture frames.
It’s done! Hang it on something ferromagnetic!
Here’s a completed picture frame, hanging on a wire bookshelf.
Follow this link for full instructions.
First of all, if you thought Internet Explorer and Firefox were your only options, you were mistaken. This section reviews Internet Explorer and Firefox basics and introduces other viable Web browser options.
Microsoft Internet Explorer is a common target for browser hijacking. Internet Explorer 7.0 provided a significant upgrade to Microsoft browser security but, still have flaws, like the one discovered for an Israeli vulnerability researcher. Aviv Raff warned in a posting on his blog Wednesday that Attackers could exploit a new flaw in Internet Explorer 7 (IE 7) to launch phishing expeditions. Raff said IE 7 running on Windows XP and Vista is susceptible to cross-site scripting attacks.
So, you don’t have options and you have to use IE, or maybe, for some weird reason, you just like it.
IE has the ability to provide a secure browsing, but it’s the responsibility of the organization or the user to configure it.
Yes you have to do your homework. You can start reading this How-to articles from Microsoft.
If you are tired of patching your IE browsers every week (at least) may consider migrating to Mozilla Firefox, a popular third-party browser that is generally thought to be more secure than IE. However, Firefox is not immune to attacks, and as the browser increases in popularity, it’s likely to become a bigger target for attackers.
In this link you can find a list of security tips for Firefox users, but it’s great reading for other users as well.
Not satisfied with Firefox or IE? Yes, there are other options, such as Opera, Safari, Konqueror, Lynx (this one just for grown ones) and others. They all have theirs pros and cons, visit their webpages and and learn what you should expect if you’re not using IE or Firefox.
And remember: on the second Tuesday of every month, Microsoft releases hot fixes for its newest flaws which almost invariably include Internet Explorer patches. Yes, at least twice a month you will have to patch your IE.
Others Web browser of your choice will release their patches eventually.
Now you can build your own robot! Carnegie Mellon University’s Robotics Institute, USA, has released its recipes to build robots as home.
Using TeRK (Telepresence Robot Kit), you can find all pieces you need and even adapt others parts to do your own robot.
Right now, they have 4 recipes:
Qwerkbot Classic (The Qwerkbot Classic is the simplest mobile robot that you can build using a Qwerk processor. Utilizing the holes in the Qwerk enclosure as mount points for two motors and a caster the Qwerkbot recipe literally turns your Qwerk into a robot.)
Qwerkbot+ (The Qwerkbot+ adds a pan-tilt head to allow independent motion of the camera and robot base. This version is somewhat more challenging to build than the Qwerkbot Classic.)
AC Power (The AC power Adapter allows you to power a QweRK from an ordinary AC wall outlet.)
Flower (The Flower is a stationary robot with seven degrees of freedom. Once you have built the Flower, you can use TeRK’s Robot Universal Remote and Flower Power software to program its movements. You can program your Flower to rise or wilt and program the motions of its petals. Because the Flower is equipped with IR sensors on three of its petals, it can track objects moving in front of it. It can even catch a lightweight ball.)
While all others bots are for beginners, the Flowers is quite more complex and you can spend 10 hours building it.
But, how cute is that!
Actually, the robot’s secret is the internal electronic controller Qwerk, a microcomputer using Linux to control all cameras, USB devices, engines and sensors. The robot’s sftware is Open Source and you can use virtually any computer language.
Oh, yes! There are bad news… Now, they are selling the kit just in US. By the way, the Flower Robot Total cost of parts is $725,00.
Technology helps us to solve problems, but they are vulnerable to several types of threats. Any kind of lost or unavailability could be too dangerous for small and big companies. So, information security is a basic investment.
But, how do you decide what kind of investments are necessary?
First of all, you must know the cost of your business’ downtime to protect it against failures.
A deep investigation of users’ access to the internet together with your data security needs will help you to begin your security policy.
- What do you want to protect?
- What are the risks?
- What parts of your business are relevant?
- What do your users expecting from their computers? What do they need for their jobs?
Now, you can start writing your security policy. The best way to develop a policy is to work from an example policy. You can find several templates of security policies in the internet. You must define the mission of information security in your company: scope, responsibilities, enforcements, revision.
You need a Continuity Plan; which will involve a lot of areas in your company, such as technology, electric power, engineering, staff planning, communication, etc. Your users must know the Security Policy and they need to be trained constantly.
Processes must be review in a constant basis, to ensure that you have the latest and most up-to-date version of a solution.
Remember that threats and vulnerabilities are constantly evolving.
So, you make business decisions and you know how important is protect you computer data. Security systems are the implementation of those decisions. Good security system starts with careful planning and understanding company business, not robust hardware and software.
Security policies are strategic documents that guide you for security. If you don’t understand your business needs it will be difficult implement and configure those security systems.
Remember that a firewall security policy cannot exist alone. It must be accompanied by your company board support, a policy that establishes how to maintaining physical security, staff training and awareness, and other specific security controls.
A firewall stands between your protected network and public internet. Its main function is to examine traffic coming from the public side to the private; to make sure it reflects your security policies before permitting that traffic to pass through your private network.
Two things you must think about implementing firewalls:
1. Acquire the right firewall for you company
There are lots of firewalls in the market, but without a solid and trustable host, your firewall will be worthless.
2. Configure your firewall to meet your security policies
You could create rules that allow your users to access local web servers but that prevent employees to access local systems such as financial, development and human resources.
When you define a strong security policy that balances your users’ needs with your business needs, you will be able to find the right combination of IT resources to implement it. Keep in mind that firewall rules comes from your business needs.