Jump to content

inhiway

Members
  • Content Count

    41
  • Donations

    $0.00 
  • Joined

  • Last visited

Community Reputation

48 Excellent

2 Followers

About inhiway

  • Rank
    Newbie
  • Birthday 01/13/1950

Profile Information

  • Gender
    Male
  • Location
    Indiana
  1. With Obama's Signature, Cell Phone Unlocking Legal Once Again By Chloe Albanesius August 1, 2014 05:30pm EST The law specifies that consumers can unlock their cell phones without running afoul of copyright laws. President Obama this afternoon signed into law a bill that makes it legal for consumers to unlock their cell phones. "As long as their phone is compatible and they have complied with their contracts, consumers will now be able to enjoy the freedom of taking their mobile service - and a phone they already own - to the carrier that best fits their needs," the White House said in a statement. The Unlocking Consumer Choice and Wireless Competition Act was approved by Congress last month, and now becomes law. It specifies that consumers can unlock their cell phones without running afoul of copyright laws. It also directs the Librarian of Congress to consider whether gadgets like tablets should be eligible for unlocking. FCC Chairman Tom Wheeler, whose agency pushed for cell phone unlocking under former Chairman Julius Genachowski more than a year ago, said today the new law is a "positive development." "When the wireless industry worked with the FCC on a voluntary agreement to unlock devices when consumers' contracts have been fulfilled, they took an important step forward," Wheeler said. "The President's signature today makes greater consumer choice the law of the land." That agreement was announced in December, when the carriers committed to a voluntary set of principles that will make it easier for consumers to unlock their devices. But stakeholders wanted more, prompting the bill from Congress. The debate dates back to an October 2012 decision from the Library of Congress's (LOC) Copyright Office, which gave consumers a 90-day window to unlock their phones without carrier permission before that practice became illegal in January. The Copyright Office reviews the rules on unlocking (and jailbreaking) every three years, as required by the Digital Millennium Copyright Act (DMCA). In 2012, regulators found that "there are ample alternatives to circumvention. That is, the marketplace has evolved such that there is now a wide array of unlocked phone options available to consumers." That did not sit well with OpenSignal's Sina Khanifar, who added a petition to the White House site asking for the decision to be reversed. It passed the 100,000 e-signature threshold needed for an official White House response, and that response was posted in March 2013, with the Obama administration issuing its support for cell phone unlocking. Today, the White House championed the bill as "a rare trifecta: a win for American consumers, a win for wireless competition, and an example of democracy at its best - bipartisan congressional action in direct response to a call to action from the American people." http://www.pcmag.com/article2/0,2817,2461784,00.asp
  2. inhiway

    todays music video is-------------------

    I Knew You Were Trouble - WALK OFF THE EARTH Feat. KRNFX
  3. inhiway

    todays music video is-------------------

    Gang of Rhythm - Walk off the Earth (Official Video)
  4. As soon as I read the article, I followed the instructions to 'fix' my copy of Firefox. Firefox is my #1 browser and I don't need people snooping on me if I can avoid it. The article also gave me another reason to not want to use Chromium for any serious browsing. I hope some other members see the article and read it. Whether they want to follow the advice is up to them.
  5. inhiway

    Hello all :)

    GoodPerson. I'm new here too, but I bet with a nick like yours, you'll fit right in.
  6. How to prevent Firefox from sending downloaded file information to Google By Martin Brinkmann on July 23, 2014 in Firefox - Last Update: July 23, 2014 17 Starting with Firefox 32, Mozilla will check file downloads against Google's application reputation database which is powering Chrome's Safe Browsing feature since 2012. If you have read the release notes of Firefox 31, you may have noticed the entry "block malware from downloaded files" under What's New. The integration of the feature in Firefox 31 is the first step in the implementation which will be completed when Firefox 32 is released to the public in six weeks. In Firefox 31, a local list is used to determine whether a downloaded file is malicious or not. This downloaded list is updated regularly, ans whenever a download is being made, that download is checked against the list to make sure it is not malicious in nature. From Firefox 32 on, downloads are checked against the local list and a remote list if the local list does not return a hit. This remote list is maintained by Google, and to access it, information about the download are submitted in the process. While the file itself does not get transferred, its SHA-256 hash value as well as other information such as the suggested file name for the download, the length of the file in bytes and the url the file was downloaded from are. If you are a Firefox user, please continue this article from this link: http://www.ghacks.net/2014/07/23/prevent-firefox-sending-download-information-google/
  7. inhiway

    13 Inventive Ways to Totally Screw Up Your Kids

    Oh yeah, now you expect us to believe your post script.
  8. inhiway

    looking for a new home

    Welcome to CyberPhoenix wozza4.
  9. inhiway

    the new one

    Welcome to CP Ringor
  10. I have never been a Comcast customer, but from what I have read, I have to agree with you Tech.
  11. inhiway

    A funny thing happen to me 2-day

    I'm glad you've got it sorted out GhostDreams
  12. inhiway

    Hello all

    Welcome to CP Ldog16. I've only been here a week or two, but no one here has chopped my head off yet.
  13. inhiway

    A funny thing happen to me 2-day

    Did the rest of the email look genuine? i.e. how did your ISP know it wasn't you trying to access your email with your password. I'm just curious that you are sure that this wasn't a phishing email. It would suck if you had to change all your passwords for nothing.
  14. Most people here are probably too savvy to fall for this scam, but I thought it should be reported in case this is something new. 30,000 ‘Pirates’ Receive Fake ‘Fines’ With Trojans Attached By Andy on July 8, 2014 In recent days an estimated 30,000 Internet users have received emails containing copyright warnings and demands for cash settlements. The emails, which detail alleged infringements on content from EMI, Sony, DreamWorks and Paramount, are not only fake but also have a sting in the tail - a nasty trojan just waiting to be installed. warningIt used to be the case that when a copyright holder tracked down an alleged file-sharer they would have to make contact via regular snail mail. Legal threats in the post nearly always mean business and have to be dealt with in an appropriate manner. With the advent of companies such as Rightscorp, however, demands for cash settlement now regularly arrive via email. While some recipients treat these emails as spam, they are sent by a legitimate company acting on behalf of genuine rightsholders. Whether people should pay up on presentation of a mere email is a personal matter, but there are some instances in which no payment should ever be considered. During the past several days there have been increasing reports of Internet users in Germany receiving cash demands for alleged copyright infringement. The emails detail alleged piracy offenses on tracks from Jay-Z, R Kelly, James Blunt, Bullet for My Valentine, and metal bands Sepultura and Children of Bodom, to name just a few. It’s a very big operation indeed. According to lawyer Christian Solmecke, a lawyer who regularly defends in piracy cases, up to 30,000 individuals are affected, with many calling his offices for legal advice. But while the emails say they are being sent on behalf of a range of rightsholders from EMI, Sony, and *****W. to DreamWorks and Paramount Pictures, drilling down into the details reveals the whole operation as a huge scam. The ‘settlement’ mails demand between 200 and 500 euros within 48 hours to make potential lawsuits go away. One reads: This is a warning because of your violation of § 19a of the Copyright Act on 07.06.2014. The music album ‘Bullet For My Valentine – Temper Temper’ was downloaded from your IP address 8.149.94.13 at 3:40:24. This violates § 19a of the Copyright Act and must be reported to the responsible District Court. Only the fastest possible payment of a fine of 400.88 euros can prevent this. We expect payment within the next 48 hours. For details see the attached document XXXXXXXXX.zip As can be predicted from the final line, the real plan is to trick recipients into opening a file apparently containing details about their case, but which in fact carries a suspected trojan. “It is very likely that the zip file contains a virus, designed to spy on credit card and account information. The floodgates would then be opened to online banking fraud and identity theft,” Solmecke warns. “For this reason, all users that have opened the ZIP file attachment should check their PC immediately with a virus scanner and install the security updates for their anti-virus software,” the lawyer concludes. Finally, by including legitimate law firms’ contact details in the emails, specifically companies that are involved in the settlement business already, the scammers are using a particularly crafty technique to come across as genuine. One lawfirm, Sasse & Partner, was forced to issue a statement denying involvement in the scheme. “The ‘warnings’ are sent under the name of our lawyer Jan Spieldenner. The perpetrator or perpetrators are apparently making use of the fact that our firm regularly sends warnings on behalf of various clients and has thereby acquired a certain reputation. We point out that the warnings provided by us are never sent as a zip file,” the company explains. Quite how many people will actually pay up on receipt of such an email is unknown, but by sending out tens of thousands it seems likely that a few will. At the full 500 euro rate, just a couple of dozen ‘settlements’ will net a sizable amount of cash – as ‘genuine’ copyright trolls know only too well. http://torrentfreak.com/30000-pirates-receive-fake-fines-with-trojans-attached-140708/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Torrentfreak+%28Torrentfreak%29
  15. Tens of thousands of Americans sell themselves online every day The Internet has become a virtual flea market, with online consumer-to-consumer sites like Amazon, eBay, and Craigslist selling millions of products every day. Used smartphones are a popular sales item on eBay – more than 80,000 people list their phones for sale each day. It seems like a smart way to make some extra money, but AVAST has found out that many fail to protect their identity in the process. AVAST recovers an abundance of personal data from used smartphones Most sellers delete all of their personal data prior to selling their used devices… or so they think. We purchased 20 used Android phones off eBay and used simple and easily available recovery software to restore deleted files. The amount of data we were able to retrieve was astonishing and proves that simply deleting is not enough. Our analysts found the following: More than 40,000 stored photosUsed Smartphones for Sale More than 1,500 family photos of children More than 750 photos of women in various stages of undress More than 250 selfies of what appear to be the previous owner’s manhood More than 1,000 Google searches More than 750 emails and text messages More than 250 contact names and email addresses Four previous owners’ identities One completed loan application One phone even had a competitor’s security software installed, but unfortunately it did not help the former owner as it revealed the most personal information out of all the phones we analyzed. No one cares about my old photos, messages and Google searches, right? Wrong! As the old saying goes, a picture is worth a thousand words. Now add private Facebook messages that include geo-location, Google searches for open job positions in a specific field, media files, and phone contacts. Put all of these pieces together to complete the puzzle and you have a clear picture of who the former smartphone owner was. Stalkers, enemies, and thieves can abuse personal data to stalk, blackmail and steal people’s identities. They can use this information to watch people’s every move, exploit their strange fetishes, open credit cards in their name, or even continue what they started by further selling their personal information online. How to permanently delete and overwrite data from your Android phone Deleting files from your Android phone before selling it or giving it away is not enough. You need to overwrite your files, making them irretrievable. To do so, install (brand deleted) Anti-Theft from the Google Play Store. Once you have the app installed, turn on the “thorough wipe” feature within the app. You will then need to create a my.avast account to connect to the phone (this allows users to remotely wipe their phones in theft cases as well). The final step is to wipe the phone clean, which will delete and overwrite all of your personal data. http://blog.avast.com/2014/07/08/tens-of-thousands-of-americans-sell-themselves-online-every-day/ I can only afford inexpensive "dumb" phones, so I just dispose of them or throw then in a drawer.
×