Jump to content

Saran999

Retired Staff
  • Content Count

    740
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    25

Everything posted by Saran999

  1. There are a lot of shortcuts for Win8 and Win 7 to remember. I've compiled a list that may be useful to those that don't want to have always a pdf opened with all the shortcuts at hand. 10 Keyboard Shortcuts for Windows 8 you need to remember The shortcuts for Windows 7If you have not made the leap to Windows 8, this little cheat sheet will help you work more efficiently with Windows 7.
  2. I have this conversation all the time. Clients, friends, and neighbors invariably claim to understand the merits -- including approachability, reliability, fit and finish, performance, and security -- of Macs. Even diehard Windows aficionados admit application incompatibilities are now largely eliminated thanks to cloud computing’s popularity. Cost remains the holdouts’ sole argument. But is a MacBook Pro really more expensive than a comparable Windows system? While debating the cost differential between a standard Mac and business-class Windows laptop at lunch one day with a Windows holdout, I promised to explore the question. Here’s what I found. The Intel Core i5-powered 13.3” MacBook Pro Apple possesses 4 GB RAM, a 500 GB hard drive, integrated Bluetooth, a webcam, an SDXC card reader, a backlit keyboard, and a DVD burner standard. The cost on Friday, September 27th, 2013, was $1,199 (USD). And most everyone knows you typically receive a 5% discount if you establish a business account, but let’s pretend you don’t know that and you pay full price. Considering OS X includes Mail, Contacts and Calendar, plus iPhoto and iMovie, $1,199 is a competitive price. But just how competitive is it? Consider Dell’s Latitude E6330, a corporate workhorse 13.3” laptop. While Dell touts a low E6630 price on its web site, customizing the laptop to match the MacBook Pro and include a backlit keyboard, DVD burner, Intel Core i5, 4 GB RAM, integrated Bluetooth, and a webcam results in the Latitude costing $1,166.30 (USD), after $499.84 (USD) in promotional business pricing discounts. In other words, the Dell computer is only $32 (USD) cheaper. But wait. We haven’t calculated the costs for office productivity tools. And remember, OS X already includes Mail, Contacts and Calendar, and personal information management tools fully capable of replacing Microsoft Outlook. OS X also includes iPhoto and iMovie, tools that small businesses frequently use to complete basic marketing and social media campaigning tasks. So, to the Dell computer's cost, we need to add a copy of Microsoft Office Home and Business 2013 for $219.99 (USD) and a copy of Adobe Photoshop Elements bundled with Adobe Premier Elements for $149 (USD). Now, we’re looking at a Dell that really costs $1,535.29 (USD). To be fair, we also need to add the cost for Apple office productivity tools to the MacBook Pro’s price. Pages, Numbers, and Keynote are each $19.99 (USD) from the Apple App store, bringing the MacBook Pro’s total cost to $1,258.97 (USD). Thus, comparing a business-class Apple MacBook Pro with office productivity tools, a photo-editing app, and a video-editing tool to a comparable Dell Latitude with similar Office productivity tools and audio- and video-editing programs results in a cost savings of $276.32 (USD) when purchasing a Mac.
  3. Microsoft co-founder and Chairman Bill Gates and outgoing CEO Steve Ballmer are both up for re-election to the company’s board of directors according to a recent proxy filing. It’s a situation that normally wouldn’t be newsworthy but the stakes have changed in recent months as activist investors have been calling for new leadership to help Microsoft better compete in the mobile industry. Earlier this month, three of Microsoft’s top 20 investors reportedly urged Bill Gates to step down as Chairman. They believe the amount of power he has over the board is too high compared to the amount of shares he owns and that he might have a negative impact on selecting the next company CEO. Company shareholders will convene on November 19 to vote on the new board of directors. Fortunately for Gates and Ballmer, the board has recommended they both be re-elected to their current positions. Furthermore, the two will likely have some power at the company as Gates is the single largest shareholder with 4.52 percent of the company’s stock while Ballmer holds 3.99 percent. All other board members own less than one percent of the company although investment firm BlackRock owns 5.57 percent - still less than the 8.51 percent Gates and Ballmer own together. Ballmer announced plans to retire as CEO back in August but will stay on until a replacement is found. A special committee was created and is actively seeking his successor. At last check, Ford chief Alan Mulally was said to be the frontrunner for the job.
  4. It's not spying, it's an attempt to 'understand online communication tools' The NSA has published a statement explaining why US spies have been studying, infiltrating, and subverting so many of the digital technologies upon which people depend. The statement, "Why the Intelligence Community Seeks to Understand Online Communication Tools & Technologies", was published by the US Office of the Director of National Intelligence on Friday, shortly after news broke that the NSA has spent years trying to crack the anonymous Tor communications network. "The articles fail to make clear that the Intelligence Community's interest in online anonymity services and other online communication and networking tools is based on the undeniable fact that these are the tools our adversaries use to communicate and coordinate attacks against the United States and our allies," the NSA wrote. Though Tor is undoubtedly used by many people for many different purposes, we would note that Osama Bin Laden, the architect of the September 11 2001 World Trade Center and Pentagon attacks, lived his final years in a compound with no internet connection whatsoever and studiously avoided all internet and carrier-based communications, depending instead on people. The statement goes on to note that "the Intelligence Community is only interested in communication related to valid foreign intelligence and counterintelligence purposes and that we operate within a strict legal framework that prohibits accessing information related to the innocent online activities of US citizens." Recent revelations around the NSA's spying systems have shown that the agency spent two years indulging in the bulk collection of mobile phone locations at home and abroad without oversight. Another leak described how its "Project Marina" scheme indiscriminately slurped metadata on internet users – both European and American – and stores that data for a year allowing it to be looked at "regardless whether or not it was tasked for collection." "In the modern telecommunications era," the NSA writes, "our adversaries have the ability to hide their messages and discussions among those of innocent people around the world. They use the very same social networking sites, encryption tools and other security features that protect our daily online activities." This appears to be a subtle justification for the NSA graphing connections between people both at home and abroad, such as its scheme to analyse people through the traces they leave on social networks. "Americans depend on the Intelligence Community to know who and what the threats are, and where they come from," the notoriously press-shy agency said. "Many of the recent articles based on leaked classified documents have painted an inaccurate and misleading picture of the Intelligence Community," the mercurial surveillance agency noted. "The reality is that the men and women at the National Security Agency and across the Intelligence Community are abiding by the law, respecting the rights of citizens and doing everything they can to help keep our nation safe." Documents declassified by the NSA in September show that between May 24, 2006, and February 17, 2009, the organization was monitoring 17,835 phone accounts, barely 2,000 of which had "reasonable articulable suspicion" of wrongdoing. A recent statement from NSA inspector general Dr. George Ellard disclosed that some spies "intentionally misused" the NSA's signals intelligence techniques to spy on their lovers and partners without oversight.
  5. How does a technologically savvy city respond to rising crime rates? By crowd-funding itself a private security detail. Oakland residents have launched three separate campaigns for a security force on Crowdtilt, a crowdfunding platform that promises to "makes it dead simple to pool funds for any purpose." The residents all hail from Rockridge—not the tony side of town, with its high "creative class" density, but Lower Rockridge, a middle class neighborhood north of Highway 24. Andy Lutz, a spokesperson for Crowdtilt, told TechPresident, a "crosspartisan" blog about the intersection of tech and politics, that the campaigns were not a disavowal of government: “They know the government means the best, and will help when they can,” he says, “but in the meantime, they're taking matters into their own hands.” In addition to the dangers of vigilantism, civic crowdfunding can also exacerbate inequalities in infrastructure investment, as Internet activist Ethan Zuckerman wrote last year. He told TechPresident: “Crowdfunding a solution for one neighborhood without working on the larger, underlying issues is concerning to me,” says internet scholar Ethan Zuckerman. [...] Still, he believes that there is potential for the program to benefit all of Oakland, assuming “hiring private security guards is part of a larger strategy to work with Oakland PD to increase funding for officers.” None of the campaigns indicate that there is any such arrangement in place. An admin for the most recent Crowdtilt campaign explicitly referenced an early morning robbery at the "Casual Carpool" line at the Rockridge BART station as the impetus behind the fundraising. All three campaigns want to use a company called VMA Security Group, whose patrol officers are certified to carry a firearm. One of the campaigns says "I will request they be unarmed unless they feel they cannot accomplish their duties otherwise." The other two make no reference to whether the private officers will be armed.
  6. Boston Dynamics, the company that’s singlehandedly trying to hasten the fall of humankind with its incredible robot technology, has just unveiled the WildCat – the next generation of its Cheetah robot. “WildCat is a four-legged robot being developed to run fast on all types of terrain. So far WildCat has run at about 16 mph on flat terrain using bounding and galloping gaits. The video shows WildCat’s best performance so far. WildCat is being developed by Boston Dynamics with funding from DARPA’s M3 program,” says the company. Sure, the Cheetah has been clocked at 28.3 mph, a bit faster than Usain Bolt. But that’s only when it’s running on a high-speed treadmill, powered by an off-board hydraulic pump. The WildCat, as seen in the terrifying video below, is untethered and coming at you down a dark alley. https://www.youtube.com/watch?feature=player_embedded&v=wE3fmFTtP9g
  7. You couldn't choose a worst picture for the 'poor' Ballmer... perhaps we must organize an offertory for him...
  8. Since 2010, the National Security Agency has been creating social graphs of some Americans, according to newly disclosed documents and interviews by the New York Times. These graphs identify people’s associates, their locations at certain times, their traveling companions and other personal information, according to the NYT report, which is the latest revelation from documents provided by Edward J. Snowden, the former N.S.A. contractor. NSA leaker Edward Snowden The NSA authorized the conduct of “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the documents said. It can augment the communications data “with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such ‘enrichment’ data…,” the report said. The news comes amid continued moves by other companies and countries to exploit the opportunities afforded by the revelations. For example, Germany’s largest email providers, including partly state-owned Deutsche Telekom, have teamed up to offer a new service, Email Made in Germany. http://www.e-mail-made-in-germany.de/ By encrypting email through German servers and abiding by the country’s strict privacy laws, the companies said U.S. authorities won’t easily be hack into this information. More than a hundred thousand Germans have adopted the service since it was rolled out in August, the WSJ reported Friday on the service. Separately, Senator Dianne Feinstein apparently accidentally confirmed Thursday that the NSA is collecting emails via “upstream” collection methods — in other words, from the Internet backbone — by doing so directly from U.S telecom companies who have been willing to cooperate. This is something that the U.S. government apparently hasn’t admitted until now.
  9. The National Security Agency’s spying tactics are being intensely scrutinized following the recent leaks of secret documents. However, the NSA isn't the only US government agency using controversial surveillance methods. Monitoring citizens' cell phones without their knowledge is a booming business. From Arizona to California, Florida to Texas, state and federal authorities have been quietly investing millions of dollars acquiring clandestine mobile phone surveillance equipment in the past decade. Earlier this year, a covert tool called the “Stingray” that can gather data from hundreds of phones over targeted areas attracted international attention. Rights groups alleged that its use could be unlawful. But the same company that exclusively manufacturers the Stingray—Florida-based Harris Corporation—has for years been selling government agencies an entire range of secretive mobile phone surveillance technologies from a catalogue that it conceals from the public on national security grounds. Details about the devices are not disclosed on the Harris website, and marketing materials come with a warning that anyone distributing them outside law enforcement agencies or telecom firms could be committing a crime punishable by up to five years in jail. These little-known cousins of the Stingray cannot only track movements—they can also perform denial-of-service attacks on phones and intercept conversations. Since 2004, Harris has earned more than $40 million from spy technology contracts with city, state, and federal authorities in the US, according to procurement records. In an effort to inform the debate around controversial covert government tactics, Ars has compiled a list of this equipment by scrutinizing publicly available purchasing contracts published on government websites and marketing materials obtained through equipment resellers. Disclosed, in some cases for the first time, are photographs of the Harris spy tools, their cost, names, capabilities, and the agencies known to have purchased them. What follows is the most comprehensive picture to date of the mobile phone surveillance technology that has been deployed in the US over the past decade. “Stingray” The Stingray has become the most widely known and contentious spy tool used by government agencies to track mobile phones, in part due to an Arizona court case that called the legality of its use into question. It’s a box-shaped portable device, sometimes described as an “IMSI catcher,” that gathers information from phones by sending out a signal that tricks them into connecting to it. The Stingray can be covertly set up virtually anywhere—in the back of a vehicle, for instance—and can be used over a targeted radius to collect hundreds of unique phone identifying codes, such as the International Mobile Subscriber Number (IMSI) and the Electronic Serial Number (ESM). The authorities can then hone in on specific phones of interest to monitor the location of the user in real time or use the spy tool to log a record of all phones in a targeted area at a particular time. The FBI uses the Stingray to track suspects and says that it does not use the tool to intercept the content of communications. However, this capability does exist. Procurement documents indicate that the Stingray can also be used with software called “FishHawk,” (PDF) which boosts the device’s capabilities by allowing authorities to eavesdrop on conversations. Other similar Harris software includes “Porpoise,” which is sold on a USB drive and is designed to be installed on a laptop and used in conjunction with transceivers—possibly including the Stingray—for surveillance of text messages. Similar devices are sold by other government spy technology suppliers, but US authorities appear to use Harris equipment exclusively. They've awarded the company “sole source” contracts because its spy tools provide capabilities that authorities claim other companies do not offer. The Stingray has become so popular, in fact, that “Stingray” has become a generic name used informally to describe all kinds of IMSI catcher-style devices. First used: Trademark records show that a registration for the Stingray was first filed in August 2001. Earlier versions of the technology—sometimes described as “digital analyzers” or “cell site simulators” by the FBI—were being deployed in the mid-1990s. An upgraded version of the Stingray, named the “Stingray II,” was introduced to the spy tech market by Harris Corp. between 2007 and 2008. Photographs filed with the US Patent and Trademark Office depict the Stingray II as a more sophisticated device, with many additional USB inputs and a switch for a “GPS antenna,” which is likely used to assist in location tracking. Cost: $68,479 for the original Stingray; $134,952 for Stingray II. Agencies: Federal authorities have spent more than $30 million on Stingrays and related equipment and training since 2004, according to procurement records. Purchasing agencies include the FBI, DEA, Secret Service, US Immigration and Customs Enforcement, the Internal Revenue Service, the Army, and the Navy. Cops in Arizona, Maryland, Florida, North Carolina, Texas, and California have also either purchased or considered purchasing the devices, according to public records. In one case, procurement records (PDF) show cops in Miami obtained a Stingray to monitor phones at a free trade conference held in Miami in 2003. “Gossamer” The Gossamer is a small portable device that can be used to secretly gather data on mobile phones operating in a target area. It sends out a covert signal that tricks phones into handing over their unique codes—such as the IMSI and TMSI—which can be used to identify users and home in on specific devices of interest. What makes it different from the Stingray? Not only is the Gossamer much smaller, but it can also be used to perform a denial-of-service attack on phone users, blocking targeted people from making or receiving calls, according to marketing materials (PDF) published by a Brazilian reseller of the Harris equipment. The Gossamer has the appearance of a clunky-looking handheld transceiver. One photograph filed with the US Patent and Trademark Office shows it displaying an option for "mobile interrogation" on its small LCD screen, which sits above a telephone-style keypad. First used: Trademark records show that a registration for the Gossamer was first filed in October 2001. Cost: $19,696. Agencies: Between 2005 and 2009, the FBI, Special Operations Command, and Immigration and Customs Enforcement spent more than $1.3 million purchasing Harris’ Gossamer technology and upgrading existing Gossamer units, according to procurement records. Most of the $1.3 million was spent by the FBI as part of a large contract in 2005. “Triggerfish” The Triggerfish is an eavesdropping device. It allows authorities to covertly intercept mobile phone conversations in real time. This sets it apart from the original version of the Stingray, which marketing documents suggest was designed mainly for location monitoring and gathering metadata (though software can allow the Stingray to eavesdrop). The Triggerfish, which looks similar in size to the Stingray, can also be used to identify the location from which a phone call is being made. It can gather large amounts of data on users over a targeted area, allowing authorities to view identifying codes of up to 60,000 different phones at one time, according to marketing materials. First used: Trademark records show that a registration for the Triggerfish was filed in July 2001, though its “first use anywhere” is listed as November 1997. It is not clear whether the Triggerfish is still for sale or whether its name has recently changed, as the trademark on the device was canceled in 2008, and it does not appear on Harris’ current federal price lists. Cost: Between $90,000 and $102,000. Agencies: The Bureau of Alcohol, Tobacco, Firearms, and Explosives; the DEA; and county cops in Miami-Dade invested in Triggerfish technology prior to 2004, according to procurement records. However, the procurement records (PDF) also show that the Miami-Dade authorities complained that the device "provided access" only to Cingular and AT&T wireless network carriers. (This was before the two companies merged.) To remedy that, the force complemented the Triggerfish tool with additional Harris technology, including the Stingray and Amberjack, which enabled monitoring of Metro PCS, Sprint, and Verizon. This gave the cops "the ability to track approximately ninety percent of the wireless industry," the procurement documents state. “Kingfish” The Kingfish is a surveillance transceiver that allows authorities to track and mine information from mobile phones over a targeted area. The device does not appear to enable interception of communications; instead, it can covertly gather unique identity codes and show connections between phones and numbers being dialed. It is smaller than the Stingray, black and gray in color, and can be controlled wirelessly by a conventional notebook PC using Bluetooth. You can even conceal it in a discreet-looking briefcase, according to marketing brochures. First used: Trademark records show that a registration for the Kingfish was filed in August 2001. Its “first use anywhere” is listed in records as December 2003. Cost: $25,349. Agencies: Government agencies have spent about $13 million on Kingfish technology since 2006, sometimes as part of what is described in procurement documents as a “vehicular package” deal that includes a Stingray. The US Marshals Service; Secret Service; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Army; Air Force; state cops in Florida; county cops in Maricopa, Arizona; and Special Operations Command have all purchased a Kingfish in recent years. “Amberjack” The Amberjack is an antenna that is used to help track and locate mobile phones. It is designed to be used in conjunction with the Stingray, Gossamer, and Kingfish as a “direction-finding system” (PDF) that monitors the signal strength of the targeted phone in order to home in on the suspect’s location in real time. The device comes inbuilt with magnets so it can be attached to the roof of a police vehicle, and it has been designed to have a “low profile” for covert purposes. A photograph of the Amberjack filed with a trademark application reveals that the device, which is metallic and circular in shape, comes with a “tie-down kit” to prevent it from falling off the roof of a vehicle that is being driven at “highway speeds.” First used: Trademark records show that a registration for the Amberjack was filed in August 2001 at the same time as the Stingray. Its “first use anywhere” is listed in records as October 2002. Cost: $35,015 Agencies: The DEA; FBI; Special Operations Command; Secret Service; the Navy; the US Marshals Service; and cops in North Carolina, Florida, and Texas have all purchased Amberjack technology, according to procurement records. “Harpoon” The Harpoon is an "amplifier" (PDF) that can boost the signal of a Stingray or Kingfish device, allowing it to project its surveillance signal farther or from a greater distance depending on the location of the targets. A photograph filed with the US Patent and Trademark Office shows that the device has two handles for carrying and a silver, metallic front with a series of inputs that allow it to be connected to other mobile phone spy devices. First used: Trademark records show that a filing for the Harpoon was filed in June 2008. Cost: $16,000 to $19,000. Agencies: The DEA; state cops in Florida; city cops in Tempe, Arizona; the Army; and the Navy are among those to have purchased Harpoons since 2009. “Hailstorm” The Hailstorm is the latest in the line of mobile phone tracking tools that Harris Corp. is offering authorities. However, few details about it have trickled into the public domain. It can be purchased as a standalone unit or as an upgrade to the Stingray or Kingfish, which suggests that it has the same functionality as these devices but has been tweaked with new or more advanced capabilities. Procurement documents (PDF) show that Harris Corp. has, in at least one case, recommended that authorities use the Hailstorm in conjunction with software made by Nebraska-based surveillance company Pen-Link. The Pen-Link software appears to enable authorities deploying the Hailstorm to directly communicate with cell phone carriers over an Internet connection, possibly to help coordinate the surveillance of targeted individuals. First used: Unknown. Cost: $169,602 as a standalone unit. The price is reduced when purchased as an upgrade. Agencies: Public records show that earlier this year, the Baltimore Police Department, county cops in Oakland County, Michigan, and city cops in Phoenix, Arizona, each separately entered the procurement process to obtain the Hailstorm equipment. The Baltimore and Phoenix forces each set aside about $100,000 for the device, and they purchased it as an upgrade to Stingray II mobile phone spy technology. The Phoenix cops spent an additional $10,000 on Hailstorm training sessions conducted by Harris Corp. in Melbourne, Florida, and Oakland County authorities said they obtained a grant from the Department of Homeland Security to help finance the procurement of the Hailstorm tool. The Oakland authorities noted that the device was needed for “pinpoint tracking of criminal activity.” It is highly likely that other authorities—particularly federal agencies—will invest in the Hailstorm too, with procurement records eventually surfacing later this year or into 2014. No one’s talking Ars contacted the agencies most frequently referenced above, including the FBI; the DEA; the Bureau of Alcohol, Tobacco, Firearms, and Explosives; the Secret Service; and Immigration and Customs Enforcement. Our requests for comment were either not returned or rebuffed on the grounds that the topic is "law enforcement sensitive." Harris Corp. also turned down an interview request and declined to answer any questions for this story. The FBI has previously stated in response to questions about the Stingray device that it "strives to protect our country and its people using every available tool" and that location data in particular is a "vital component" of investigations. But when it comes to discussing specific surveillance equipment, it is common for the authorities to remain tight-lipped because they don’t want to reveal tactics to criminals. The code of silence shrouding the above tools, however, is highly contentious. Their use by law enforcement agencies is in a legal gray zone, particularly because interference with communications signals is supposed to be prohibited under the federal Communications Act. In May, an Arizona court ruled that the FBI's use of a Stingray was lawful in a case involving conspiracy, wire fraud, and identity theft. But according to the American Civil Liberties Union (ACLU), when seeking authorization for the use of the Stingray tool, the feds have sometimes unlawfully withheld information from judges about the full scope of its capabilities. This means that judges across the country are potentially authorizing the use of the technology without even knowing what it actually does. That's not all. There is another significant issue raised by the Harris spy devices: security. According to Christopher Soghoian, chief technologist at the ACLU, similar covert surveillance technology is being manufactured by a host of companies in other countries like China and Russia. He believes the US government’s “state secrecy” on the subject is putting Americans at risk. "Our government is sitting on a security flaw that impacts every phone in the country," Soghoian says. "If we don't talk about Stingray-style tools and the flaws that they exploit, we can't defend ourselves against foreign governments and criminals using this equipment, too."
  10. Saran999

    Unlimited BandWith - Free VPN

    Geat heads up! Thanks for sharing this, Cheers
  11. supposing that your word was 'lachrymose'... beware of... Echinuliform resembling small spines
  12. Most people are now fully aware of how much tracking is going on when you go online, and how easy it is for companies and governments to know where you go, what you do there, and who you talk to. But meanwhile, another piece of technology has slowly started being adopted by organizations all over the world, and is still relatively unknown by most people, yet could be the key to bringing the type of surveillance state that we currently experience online, to the offline world. Let me give you a little anecdote of something that happened to me last month. I walked into a local bank branch near where I live in XXX, a bank where I don't have any account, and never interacted in any way, in order to ask about some investment products. I get directed to one of the staff members and I talked to her for about 10 minutes, never saying my name or giving her any way to identify me. I ended up not being interested in what she was offering and walked away. But as I did, the last thing she said was "Goodbye, Mr. XXX." That's nice but how did she know who I was, despite the fact that I never gave any hint of my identity? I didn't think much of it at the time, but after getting back home I did some research and found articles from a few years back about some banks here in Italy contracting with a company to provide them with facial recognition cameras. Going over the incident in my head, this seems like the most likely explanation. Now one argument people could make is that banks already have cameras, lots of them, and so do stores and buildings all around our modern towns. But I would argue that facial recognition brings this to a whole new level. What we're basically seeing is the same thing that happened years ago with phone calls. Back in the day, when you picked up a telephone and placed a call, it would go along an analog circuit and the wire would need to be physically plugged in. We knew it was possible for someone at the central office to listen in, but the chance was remote, and there was no way they could start listening to every phone call as they went on. This is the same way normal cameras function. The best refinement the industry has managed to do is divide several cameras into a single screen, and then place multiple screens in front of a single security guard. But facial recognition completely changes the rules of the game. Now, we have software programs able to recognize anyone who walks by instantly, and record that in a database. Facial recognition systems can work in a number of ways. The traditional system uses a standard camera and software that can compare some features of your face to a database of photos. By looking at the size of your nose, your eye position, or the slope of your jaw, it may be able to figure out who you are. A newer and much more reliable way to do facial recognition is to use multiple cameras and do a 3D comparison. This way, many more features of your face can be compared with what's in the database. Finally, some systems can even identify skin patterns such as lines, moles, spots and other characteristics found on most faces. But how widespread is it really? This technology is nothing new. Back in 2004 the US State Department began implementing a huge facial recognition system for visa applicants. The New York Times reported last month that the Department of Homeland Security is in the final stages of developing such a system as well. The FBI is also spending over $1 billion on its own facial recognition system. Recently, it was revealed that the Attorney General of Ohio already implemented such a system back in June, without telling anyone. The system relies on 10 years of information from driver's licenses, gun permit holders, known criminals, sex offenders and more, all stored in a central database. The technology is also widely used in advertising. This video is just one such system which can access 36 million users within 1 second. So we know the technology exists, and has become very refined. We also know corporations and governments are hard at work to implement it for their own purposes. The problem is that as with most things in technology, the law is lagging behind. There is no legal framework as to how facial recognition can be done. We're all used to seeing cameras everywhere we go, but the question that needs to be answered sooner rather than later is whether we're alright with these cameras automatically identifying us, recording everywhere we go, and then acting on this information, providing anything from personalized ads on a nearby billboard to a complete tracking profile at your local government office.
  13. Ramson A Eurasian garlic (Allium ursinum) having broad, stalked, oblong to lance-shaped leaves and bulbous roots used in salads and relishes. Often used in the plural.
  14. Saran999

    Rate the signature above you....

    You must rate it Tech! ... ok, it's my fault, let's be more precise... Give a vote on a 10 system basis. I'll start with your that's a 8/10 only because it's too big for me, but I do really like the flaming Harley
  15. Boy, this review was easy. Normally, when I sit down for a week or so with a gaming mouse, it's all about coming to grips with a new feel and a new design. Not so with Mionix's Naos 8200, because it's the updated version of the Naos 5000, my personal mouse, the one that sits under my hand ten hours a day, five days a week, and which has done so for, oh, nearly three years now. There was zero familiarization needed because, externally, the mice are identical. It's like Mionix is trying to replace a comfortable old pair of shoes with a new pair exactly the same size and exactly the same style. While this made the review easier, it also made it tougher on the new Naos 8200, because those are some big shoes to fill. SPECS WHAT I LIKED Design - This is, by a country mile, the most comfortable mouse I have ever held. Which probably explains why Mionix haven't changed the design from the Naos 5000. It's got support for all five fingers, and even after a full day's use (8-10 hours), you hand feels fine. Feel - That design is complemented by a wonderfully soft matte finish, which while showing stains a little too easily, adds to the comfort factor during long sessions. Mionix says this is thanks to four layers of rubber being stuck on top of each other. What You Need, Where You Need It - There aren't many buttons on the 8000, or fancy wheels, or dials, or anything like that. Just a few buttons that work really well and feel indestructible. I also like how the DPI switch is clearly marked and sits right under the click-wheel, so you can change on the fly without having to flip your mouse over or pull off a button combo. Speed - Look, like HDTVs, we're at a point with this whole DPI arms race where the average human arm/eye can't seriously tell the difference. What I can tell you, though, is that this mouse is very fast and very responsive, enough to notice it when you've got the 5000 and 8200 plugged in side by side. https://www.youtube.com/watch?feature=player_detailpage&v=UFvAiWCd7ls WHAT I DIDN'T LIKE Weight - Weird. The Naos 5000 let you add weights to the base to make it heavier (which I prefer). The 8200 does not. MY FINAL WORD It's the best mouse I've ever used. Simple. It's incredibly well-made, it feels great, it's supremely comfortable and is snappy as hell. The loss of custom weights stings a little, but since I found performance a little sharper than on the 5000, I think the 8200 comes out on top. The Naos 8200 retails for $90, and is available now.
  16. Made by Mionix - they of the Naos 8200 fame, my favourite gaming mouse of them all - it's of course lacking in the bulk or custom ergonomics you'll find in a right-handed mouse. Everything else I like about the Naos 8200, though, is here. It's just a bit smaller. The build quality is superb, every button giving a strong, reassuring click. Like other Mionix mice, the soft matte finish to the exterior is extremely comfortable. It was fast, precise, and not once in my testing (Mirror's Edge, Rome II, EUIV) did it stall, slow down or glitch out. It even has a nice heft to it, surprisingly for a mouse that's on the small side. The basics specs are: 9 buttons, full programmable 8200DPI, 72mhz 32-bit processor, 3-step in-game DPI adjustment. Maybe the best part is that, like its bigger brother the Naos, the Avior is that rarest of beasts, a fantastic gaming mouse that's also subtle in design. There are no enormous logos, no flashy colour schemes, no ridiculous angles, it's just a soft rubber mouse with a simple LED in the wheel and another in the Mionix logo at the palm (which can't even be seen while you're using it). It's not boring, though. The matte finish and clean lines make this a very attractive mouse. https://www.youtube.com/watch?feature=player_embedded&v=oAO6L-wfC3Y Downsides? They're all related to the ambidextrous design. There are buttons along both sides of the mouse (the Avior supports 5 profiles); depending on which hand you're using one of these sets is a pain to get to, asking you to either take your ring finger off the top/wheel and slide down, or pull your pinkie back fro its resting place. It's also a bit small; I don't have a big hand, but while Mionix say the mouse can be used with either a claw or palm grip, I think a lot of people are going to struggle getting good purchase with their palms. Mostly problems with the concept, then, not this mouse in particular. Meaning if you really must get an ambidextrous mouse, this one is fantastic. Just don't expect the same level of comfort or ease of use as a dedicated right (or left!) handed mouse. The Avior 8200 is available now, and retails for around $90.
  17. The sexy hookups app Bang With Friends has agreed to change its name after a legal spat with social games designer Zynga. The two companies were at loggerheads over the "With Friends" bit of the casual sex app's name. The naughty app agreed to change all its branding and also to take the offending words out of its corporate bumf. A joint statement by the two companies said: Zynga Inc. and Bang With Friends, Inc. are pleased that they have reached an amicable resolution of their dispute. Although the terms of the settlement are confidential, Bang With Friends, Inc. acknowledges the trademark rights that Zynga has in its WITH FRIENDS marks and will be changing its corporate name and rebranding its services in the near future. Details on the next version of Bang With Friends can be found at www.TheNextBang.com. Zynga has released a number of apps with the same nomenclature, although they were generally rather gentle games like Words With Friends, Hang With Friends and Scramble With Friends, which is a word-jumble game rather than something rude. Anyone still looking to see the future of dating shagging should look for The Next Bang instead. This is not the first time the banging app has changed its name. Apple kicked it out of the App Store in May this year – although the tech titan did not give a reason at the time, it is thought to be down to the firm's ever-changing profanity filter. It later returned to iOS as Down, referring to the "down to bang" status it allows horny fanbois to broadcast when they wish to get down and dirty. At the time of publication, however, it was nowhere to be found on the App Store. The Next Bang, as the app is now known, works by allowing Facebookers to anonymously pick a Facebook chum with whom they'd like to bump uglies. If the other person has the app and has picked them as well, the app reveals their identities to each other, allowing the pair to get jiggy at their next available convenience.
  18. Saran999

    sex maniac

    whoops!
  19. Saran999

    Before you criticize

    Good advice, and you gain a pair of shoes. So, mind to criticize only ppls that have shoes that you like! ... and, mind to have always shoes that nobody will like, so nobody will criticize you, and you'll be happy forever and ever and ever, owning billions of shoes that you will never put on your feet as to not be criticized by others that may steal it. But you may always sell the shoes that you have taken, and become rich!...... and then criticize your customers and get back their shoes again, and again, and again... that's a whole new kind of economy here!
  20. 1. The bacteria aren’t actually eating your flesh. The various species—including some that cause strep and staph—enter a wound, scrape, or bug bite and unleash a flood of toxic chemicals that kill surrounding tissue cells. 2. At least 650 cases crop up each year in the US—and about a quarter prove fatal. Flesh-eating bacteria have claimed the life of particle physicist Alexandru Marin, a chunk of the right leg of science fiction writer/marine biologist Peter Watts, and some of Slayer guitarist Jeff Hanneman’s right arm. 3. One common flesh-eating bacterium, Streptococcus pyogenes, has yielded a new kind of molecular superglue. This bug makes an ultrasticky protein that helps it invade human cells. But disassembled in the lab, that protein has been used to lock distant molecules together—even at high temperature and in acidic environments.
  21. Rhubarb (Rheum rhabarbarum) is a species of plant in the family Polygonaceae. They are herbaceous perennials growing from short, thick rhizomes. They have large leaves that are somewhat triangular, with long fleshy petioles. They have small flowers grouped in large compound leafy greenish-white to rose-red inflorescences.
  22. Saran999

    The longest sentence ever!

    and ((He's a lightning doing amazing run dodgeing bringing Beer and ....)
  23. Saran999

    Corrupt a Wish Foundation

    Granted, but then you become a prisoner in a small and very deep pit, unable to move, but with endless supplies of water and food I wish to walk on Mars and explore it totally
  24. Saran999

    CP User Bars [UPDATED]

    Very nice, immediately adopted! Cheers
×