'Thug' takes $hot at gun granny

Found on New York Post on Monday, 30 March 2009
Browse Pranks

This pistol-packing granny, who shot a man she accused of mugging her in her wheelchair, wishes she had finished the job -- because now, he's suing her for millions.

"I'm a peaceful person. I wish that I had killed him," said Margaret Johnson, 59, whose grandfather, Ellsworth "Bumpy" Johnson, once ruled Harlem's underworld and was immortalized in several hit movies.

"I'm not spending a dime on that son-of-a-bitch," she said. "This boils my blood. Why is he picking on me again?"

In New York City victim shoots you.

Malware probes find a China angle

Found on CNet News on Sunday, 29 March 2009
Browse Computer

China is coming under scrutiny as the possible source of malicious software and Internet attacks directed at foreign governments and other institutions.

Completed separately, both reports--"Tracking GhostNet," from the Munk Centre for International Studies in Toronto, and "The snooping dragon," from the University of Cambridge Computer Laboratory--address the Chinese government's efforts to monitor the activities of the Dalai Lama and the governing of Tibet.

Now if the Great Firewall of China would work both ways. The chinese government does not really care much about outgoing, truly malicious traffic (not just malicious because it's free information).

Major cyber spy network uncovered

Found on BBC News on Saturday, 28 March 2009
Browse Computer

An electronic spy network, based mainly in China, has infiltrated computers from government offices around the world, Canadian researchers say.

They included computers belonging to foreign ministries and embassies and those linked with the Dalai Lama - Tibet's spiritual leader.

There is no conclusive evidence China's government was behind it, researchers say. Beijing also denied involvement.

Of course the chinese government denies being involved. Did anybody honestly think they would say "Oh, you caught us"?

Why can't Windows shut down promptly?

Found on CNet News on Friday, 27 March 2009
Browse Software

I realize that sometimes there is a bit of housekeeping to do in the form of closing files but--give me a break--should that really have to take up to five minutes? And there have been countless times in my experience when it simply never shuts down, forcing me to hold the power button for several seconds. I've even had laptops that were so stubborn that I had to remove the battery to turn them off.

Sometimes the program just hangs there forever, sometimes it quits after a random period of time and sometimes the entire computer just crashes.

Now give me a break too. Larry Magid calls himself a leading Internet safety advocate, but it seems to be impossible for him to handle a computer. If you pay a little attention and think before installing every EXE you'll find online, even Windows will actually run pretty well. My Windows desktop shuts down in less than half a minute (and there are lots of background tasks running). There's a BSOD about once a year and rare random freezes are related to 3rd party software.

Volunteers flock to space experiment

Found on BBC News on Thursday, 26 March 2009
Browse Astronomy

What would you be prepared to do for money? For $6,500 (£4,500) a month, to be precise?

How about the following: locking yourself inside a small metal container for three months without any communication with the outside world, with electronic monitors attached to various parts of your body and with frozen baby food and cereal bars for breakfast, lunch and dinner?

The six volunteers from Russia, France and Germany believe they are playing a small part in the making of history by bringing the long-cherished goal of a manned mission to the planet Mars one step closer.

I just wonder why nobody considers a base on the moon anymore. It takes a year or so to get to Mars, but just a week for the moon. It should be obvious that it's better to start practising on something that's close.

In Praise of the 3-Hour Game

Found on Wired on Wednesday, 25 March 2009
Browse Software

The Maw is a very short game; downloadable from the Xbox Live arcade, you can get through the entire storyline in about three hours. And this was the one thing that annoyed the otherwise-thrilled critics.

Still, the uniform kvetching about The Maw's short span made me wonder: Why exactly is 40 hours considered the natural length of a videogame?

Forty hours might sound like a reasonable amount of play. But the truth is that very few games offer an experience that truly requires - and rewards - 40 hours of play.

40 hours aren't long enough. A good game should make you play longer without getting boring by having to do the same over and over again. What's important today are the graphics; the story often comes second. Or perhaps I'm just too old for today's games.

Comcast, Cox join RIAA antipiracy campaign

Found on CNet News on Tuesday, 24 March 2009
Browse Internet

Joe Waz, a senior vice president at Comcast, the nation's second largest ISP, told a gathering of music industry executives that the company has issued 2 million notices on behalf of copyright owners, according to multiple people who were in attendance.

An AT&T spokeswoman said that the ISP has not threatened anyone with the disabling of service but acknowledged that warning letters sent to customers, the company says it reserves the right to terminate service.

To those who advocate for Internet users, however, any plan that threatens to shut off someone's Internet access without hard evidence is unfair.

The RIAA can't even come up with bulletproof evidence in front of a court. I doubt it will increase efforts to be accurate with their accusations. Also, if you have to send letters to 2 million customers, even the most thick-headed should realize that there's time for a change of the old business models.

'Unafraid' of Internet, China Appears to Block YouTube

Found on Wired on Monday, 23 March 2009
Browse Censorship

China is not afraid of the Internet, its Foreign Ministry said on Tuesday, even as access to the popular video sharing site YouTube appeared to be blocked.

"Many people have a false impression that the Chinese government fears the Internet. In fact it is just the opposite," Foreign Ministry spokesman Qin Gang told reporters.

It has been described by analysts as another step in the Party's battle to stifle dissent in a year of sensitive anniversaries, including the 20th anniversary of the government's bloody crackdown on the pro-democracy Tiananmen Square protests in 1989.

Afraid of China? I'm sorry Qin Gang, but you think your regime is more important than it is. The Internet does not fear China; it does not even need China. Despite the blocking, information cannot be censored. Too bad that the Internet cannot be coordinated that well; otherwise it would be fun to cut off China from the net on every anniversary of Tiananmen Square. Or of similar massacres. Oh wait, then we could leave China offline permanentely.

$101 million 'stuck to SoundExchange's fingers'

Found on P2P Net on Sunday, 22 March 2009
Browse Various

As of the end of 2007, SoundExchange had accumulated over $101 million in 'investments'.

On its website, SoundExchange describes itself as 'an independent, nonprofit performance rights organization that is designated by the U.S. Copyright Office to collect and distribute digital performance royalties for featured recording artists and sound recording copyright owners.'

By now, the answer should be obvious; SoundExchange can't find the people it's supposed to pay.

By now, everybody should have realized that the RIAA and it's zombies care about nothing but the money. The "Ripoff Independent Artists Association" has no reason to go and search for those "it collects the money for". So basically, it's their job to collect money for those poor poor artists; but it's not their job to find and give them the money. That's even worse than the "devilish" filesharing because sharers don't collect money in the name of artists without the intention of delivering it.

Kaminsky: MS security assessment tool is a 'game changer'

Found on The Register on Saturday, 21 March 2009
Browse Software

Microsoft on Friday released an open-source program designed to streamline the labor-intensive process of identifying security vulnerabilities in software while it's still under development.

As its name suggests, !exploitable Crash Analyzer (pronounced "bang exploitable crash analyzer") combs through bugs that cause a program to seize up, and assesses the likelihood of them being exploited by attackers.

Well, if someone has experience with exploited bugs, it's them.