Linux Group Tests

The original objective in starting the compilation was to dispel the FUD that Linux does not have the necessary software to compete with Windows. Over time, the aim of the compilation was to enable Linux users, whatever their level of computing experience, to identify software of all types that is worth exploring. With the huge range of open source software available, there is simply not enough time for users to evaluate every application even within a single category of software.

The compilation is being frequently updated and new articles added on a regular basis.

via Linux Group Tests – Part 1 – Linux Links – The Linux Portal Site.

NSA Data-Scooping: A Coming Backlash in Europe?

Most European nations have long had stronger privacy laws than those in the United States. As a result U.S. Internet companies doing business there–incluiding Google, Microsoft, Yahoo, Facebook, and AOL–have signed on to so-called “safe harbor” principles, promising a European level of privacy protection. Now, of course, it appears they’ve also been providing gobs of data about some overseas customers to the U.S. National Security Agency (see “NSA Surveillance Reflects a Broader Interpretation of the Patriot Act”).

Among other fallout, it’s reasonable now to expect E.U. regulators and customers to go nuclear–and U.S. companies to face tough sledding ahead.

via NSA Data-Scooping: A Coming Backlash in Europe? | MIT Technology Review.

The birth of MMOs: World of Warcraft’s debt to MUD

Before there were the current generations of MMOs there were MUDs – multi-user dungeons or ‘dimensions’. And before there were MUDs there was MUD: A multi-player, text-based game running off a mainframe at Essex University.

MUD (known as MUD1 since the release of its successor, MUD2) used an interface similar to that of single player text adventure games and transplanted it to a multi-player realm where players could live virtual lives, solving puzzles, collecting treasure and killing fantastic creatures (and/or each other). The game launched in 1978, developed by Essex students Roy Trubshaw and, later, Richard Bartle.

via The birth of MMOs: World of Warcraft’s debt to MUD – games – Software – Techworld.

The Pirate Bay Helps to Expose Copyright Troll Honeypot

The Pirate Bay logs not only link Prenda to the sharing of their own files on BitTorrent, but also tie them directly to the Sharkmp4 user and the uploads of the actual torrent files.

The IP-address 75.72.88.156 was previously used by someone with access to John Steele’s GoDaddy account and was also used by Sharkmp4 to upload various torrents. Several of the other IP-addresses in the log resolve to the Mullvad VPN and are associated with Prenda-related comments on the previously mentioned anti-copyright troll blogs.

via The Pirate Bay Helps to Expose Copyright Troll Honeypot | TorrentFreak.

Microsoft outlines their system for used games, licenses, and family sharing

The real question is how publishers will deal with used games, and the possibility of “transfer” fees. Suddenly online passes, or their equivalent, are being supported at the console level. One thing is for sure, this is not a good system for any retailer that relies on the sale of used games, and it’s going to be very hard to rent games as well.

via The PA Report – Microsoft outlines their system for used games, licenses, and family sharing.

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. PRISM recruited its first partner, Microsoft, and began six years of rapidly growing data collection beneath the surface of a roiling national debate on surveillance and privacy. Late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.

via U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program – The Washington Post.

That will teach people not to put so much trust into the cloud.

Microsoft, FBI takedown Citadel botnet

According to Microsoft pirated Windows XP product keys were used to spread the Citadel malware. Redmond isn’t claiming a full take down because of the sheer size of the botnet but, it is optimistic that the seized equipment will help it to strengthen defenses in the future.

via Microsoft, FBI takedown Citadel botnet – ParityNews.com: …Because Technology Matters.

Prior to take down of Citadel, Microsoft has been a key player in take down of other botnets like Bamital, Kehlios and Nitol botnet

Hacking into the Indian Education System

Technically put, I merely needed to write a script to iterate through the various school IDs, check the different servers, and start with a student ID of 1 yet have a way to detect when there were no more students for a given school. I had to retrieve the resultant html files and parse them to extract all the useful information – Name, Date of Birth, ID, School, Marks.

via Hacking into the Indian Education System – On the Stepping Stone – Quora.

Several hours later, I had all the ISC and ICSE results on my very own computer, in a bunch of comma-separated value files. It was truly incredible. 26 megabytes of pure, magnificent data. An Excel file I couldn’t scroll to the bottom of. Just for kicks, I Ctrl+F’d a few names I knew and what do you know? There they were. Line after line of names, subjects and numbers. It was truly mesmerizing.