9.24.2006

Train Vs Grain Truck

Incredible video of grain truck getting owned by a train.



Train Vs Grain Truck

9.23.2006

OWNED

These two guys get their asses POUNDED, and as you will see they deserve it.



CAN OF WHOOPASS

9.03.2006

Google developing eavesdropping software

Audio 'fingerprint' for content relevant ads


Comment The first thing that came out of our mouths when we heard that Google is working on a system that listens to what's on your TV playing in the background, and then serves you relevant adverts, was "that's cool, but dangerous".

The idea appeared in Technology Review citing Peter Norvig, director of research at Google, who says these ideas will show up eventually in real Google products - sooner rather than later.

The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that's adverts or search results, or a chat room on the subject.

And, of course, we wouldn’t put it past Google to store that information away, along with the search terms it keeps that you've used, and the web pages you have visited, to help it create a personalised profile that feeds you just the right kind of adverts/content. And given that it is trying to develop alternative approaches to TV advertising, it could go the extra step and help send "content relevant" advertising to your TV as well.

We suspect that such a world would be rather eerie, with a constant feeling of déjà vu every time anyone watched TV.

Technology Review said Google talked about this software in Europe last June, and that it breaks sound into a five-second snippets to pick out audio from a TV, reducing the snippet to a digital "fingerprint", which it matches on an internet server.

Given the furore caused when AOL released searches on the internet, there might be more than a few civil liberties activists less than happy for Google to put this idea into practice. Also, given that Google provides the software link between its search software and the microphone, it's a small step to making the same link to any webcams attached to the PC.

Pretty soon the security industry is going to find a way to hijack the Google feed and use it for full on espionage.

Google says that its fingerprinting technology makes it impossible for the company (or anyone else) to eavesdrop on other sounds in the room, such as personal conversations, because the conversion to a fingerprint is made on the PC, and a fingerprint can't be reversed, as it's only an identity.

But we should think that "spyware" might take on an extra meaning if someone less scrupulous decided on a similar piece of software.

The Google program converts sound into graphs, weeds out background noise, and reduces the graphs to key features that can then be translated into just four bytes of information, so that the fingerprints for an entire year of television programming would add up to no more than a few gigabytes, the company said.

Meanwhile, in an unconnected announcement this week, Google said it has signed a multi-year agreement with online auction giant eBay, to provide text-based advertising outside the US.

The companies also plan to launch a "click-to-call" advertising function on eBay using Skype and Google Talk.




source - The Register

9.02.2006

Open source "gaining enormous momentum"

seems like open source is gaining momentum in the software industry.


Open source "gaining enormous momentum"

Ninja Remote

As a big fan of geek toys I must show you my ninja remote. I am going to drive my neighbor craaaazy. No more late night parties when his TV and stereo keep turning off.


(evil grin)

Ninja Remote

9.01.2006

Mobile Spy Tool (With Video)

Thursday, August 31, 2006

Mobile Spy Tool (With Video)

Let's suppose you have a keylogger installed on "your" computer. Would you mind? There are a number of factors to consider: who is the owner of the computer, where is it physically located, and what are the local laws in effect? If it's at work and provided to you by your employer in a country with no laws against it, then you might mind - but there's nothing you can do about it. However - if we were speaking of your personal computer located in your own home - then of course you would mind. You might even be outraged.

How about your phone?

For the last several weeks we've been researching monitoring tools and spy applications that run on the Symbian OS as well as on other mobile phone platforms. And what we have discovered is rather interesting.

We originally thought that such software would still be a rather limited phenomenon and that there would be only a couple vendors making spy tools for smartphones. But it turns out that there's quite a cottage industry that has been lying low and by and large has been able to escape attention. We found that there are several vendors either making software for Symbian smartphones or are making hardware-modified versions of just about any phone available. All phones and software we found provided a rather similar set of features.

A typical feature set includes SMS forwarding, SMS and voice call log information, remote listening, covert conference calling, and some even include localization services. This basically means that if the victim has a full-featured spy application installed on their phone, they have no privacy whatsoever and that the one controlling the software has access to all of the information that the phone has.

The spy software vendors state that their software should be used only in accordance of local laws. And that a typical application for such tools is to keep track of your spouse (in order to catch possible cheating), or to monitor your children, or just to keep track of your own phone use.

But of course the vendors take no responsibility for how their software is actually used, and in many countries such monitoring is viewed as gross violation of personal privacy and can end up in a jail sentence. And these tools have darker uses such as industrial espionage, identity theft, or stalking.

Play Acallno Demo

In this video (WMV) (XviD) we demonstrate the use of one of the monitoring programs that we are investigating - Acallno.A. It's an SMS spying tool that forwards all sent or received messages to an additional number configured by the individual who installed it on the target phone.

We have added the detection of Acallno.A into F-Secure Mobile Anti-Virus as spyware. Acallno.A is a pseudonym for the real software name. We are in the business of informing our customers of what is running on their phone, not promoting commercial spy utilities.

Acallno.A is limited by the target device’s IMEI code, so you have to familiar access to the phone and cannot just sneak it onto just anyone’s phone. And it cannot be just included into trojan or other method of mass installation.

As monitoring tools are not always illegal, and there might be legal uses for Acallno.A or any other such software, it is possible for users to release the detected spyware so that Anti-Virus allows for its use. If you really want to do that, then please consult the product documentation.



source

ASUS meet Bit Torrent - Finally






It seems that ASUS has finally answered my prairs in giving upon the earth the all mighty ASUS WL-700gE Router and WL 100-W Adapter

Which features the next in wireless technology and carries a hefty 160 GB hard drive built right in. But that is not the best part - best part is that it has a built in platform that runs bit torrent downloads without the need of a PC and then dubs as a media hub giving it easy access to your already existing wireless network. So any media pc/laptop can pick it up. And for all of us that have used bit torrent you can agree it will be nice work off of the hard drive that is shredded by torrent use. Anyway enough with posting, just check out the link put above - as well as here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here here and here and here