Other Posts

Unintended Consequences: Twelve Years Under the DMCA

Unintended Consequences: Twelve Years Under the DMCA

Twelve years after the passage of the controversial Digital Millennium Copyright Act (DMCA), the law continues to stymie fair use, free speech, scientific research, and legitimate competition. A new report from the Electronic Frontier Foundation (EFF) collects reported examples of abuses of the DMCA and the ongoing harm the law continues to inflict on consumers, scientists, and small businesses. The […]

March 3, 2010 · 0 comments · privacy and licensing

Software sniffs out criminals by the shape of their nose

Forget iris and fingerprint scans — scanning noses could be a quicker and easier way to verify a person’s identity, according to scientists at the University of Bath. With worries about illegal immigration and identity theft, authorities are increasingly looking to using an individual’s physical characteristics, known as biometrics, to confirm their identity.

File-Sharing Software Potential Threat to Health Privacy

The personal health and financial information stored in thousands of North American home computers may be vulnerable to theft through file-sharing software, according to a research study published online in the Journal of the American Medical Informatics Association. Healthcare professionals who take patient information home to personal computers containing peer-to-peer file-sharing software are jeopardizing patient confidentiality, note the authors of […]

Vine Linux

Vine Linux

Vine Linux is a Japanese, RPM-based, multi-purpose distribution. It is developed and maintained by Vinecaves, and it’s based on an earlier version of Fedora. It is one of those distributions that excludes non-free (proprietary) applications from its default installation. Unlike similar distributions, however, it has developed a smart method to make installing non-free applications very easy.

March 1, 2010 · 0 comments · Desktop & Server

New Security Threat Against ‘Smart Phone’ Users

Computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart mobile phones, with the potential to cause more serious consequences. The researchers, who are presenting their findings at a mobile computing workshop this week in Maryland, demonstrated how such a software attack could cause a smart phone […]

February 27, 2010 · 0 comments · mobile news, security

Malicious Software: Hiding the Honeypots

Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to […]

February 27, 2010 · 0 comments · security