Senate Judiciary Committee approves Big Brother bills

Approved by the Senate Judiciary Committee and written by Senator Arlen Specter in cooperation with the White House, the National Security Surveillance Act would legalize the NSA’s surveillance program and vastly expand the scope of Presidential power. If it is passed, the bill would allow the President to act above the law.

read more | digg story

33 Ways RFID Has Entered Your Life

From access cards to talking prescriptions, RFID technology has entered just about every industry. Chips embedded in cheese? I didn’t see that one coming.

read more | digg story

6 Tips To Protect Online Search Privacy

Concerns over privacy and the use of online search are at an all-time high. Here’s how to create a strong shield for privacy.

read more | digg story

Linux Quick Hacks

How often do mounts and umounts fail because you can’t determine what is using the device? How many times you cannot eject a CD because something’s got it “busy”?, These and many others tips that will raise your Linux-fu.

read more | digg story

Posted in Uncategorized. Leave a Comment »

Entertainment Industry: wiretap the net!

“The entertainment industry has proposed that ISPs should be forced by law to monitor all customers’ communications for copyright infringement, charging for anything that might be a copyrighted work.”

read more | digg story

What you should (and shouldn’t) expect from 64-bit Linux

So you just bought and assembled a brand-new AMD64 workstation. The only decision that remains is whether to install a 64-bit Linux distribution, or stick with comfortable, tried-and-true IA-32. If you are seeking an easy answer to that question, I can’t help you. Running 64-bit Linux has its pros and cons.

read more | digg story

BSD vs. Linux

While there’s overwhelming similarity between the operating systems in most cases, there are also a lot of differences. As you probe more into the differences, you find that they emerge from deep-seated disagreements. Some are disagreements over development methodology, some over deployment and usage, some about what’s important, some about who’s important, and some about which flavor of ice cream is superior. Just comparing the surface differences doesn’t tell you anything; it’s the deeper differences that both explain and justify why each group does things the way they do.

read more | digg story

Germany Cracks Down on Tor Node Operators

German police are currently raiding server rooms all over Germany, and seizing TOR servers on the basis that they are trafficking child pornography.

read more | digg story

Unix – The Hole Hawg

Unix has always lurked provocatively in the background of the operating system wars, like the Russian Army. Most people know it only by reputation, and its reputation, as the Dilbert cartoon suggests, is mixed. But everyone seems to agree that if it could only get its act together and stop surrendering vast tracts of rich agricultural land and hundreds of thousands of prisoners of war to the onrushing invaders, it could stomp them (and all other opposition) flat.

read more | digg story

The Idiocy of Crowds

The effectiveness of groups, teamwork, collaboration, and consensus is largely a myth. In many cases, individuals do much better on their own. Our bias toward groups is counterproductive. And the technology of ubiquitous connectedness is making the problem worse.

read more | digg story