It took 90 minutes to 'steal' the Empire State Building

Found on NY Daily News on Thursday, 04 December 2008
Browse Pranks

The News swiped the 102-story Art Deco skyscraper by drawing up a batch of bogus documents, making a fake notary stamp and filing paperwork with the city to transfer the deed to the property.

Less than 90 minutes after the bogus documents were submitted on Monday, the agency rubber-stamped the transfer from Empire State Land Associates to Nelots Properties LLC. Nelots is "stolen" spelled backward.

Now you own it, now you don't.

Python 3.0 appears, strangles 2.x compatibility

Found on The Register on Wednesday, 03 December 2008
Browse Software

Python 3.0 is out now. The latest version makes some major changes to the popular programming language, and it's incompatible with version 2.x releases.

"The language is mostly the same, but many details, especially how to build-in objects like dictionaries and strings work, have changed considerably, and a lot of deprecated features have finally been removed. Also, the standard library has been reorganized in a few prominent places."

It will break a lot. Python is used in a lot of big projects, and updating that source isn't done in a week or two.

The Best Way To Stop Spam: Kill The Margins

Found on Techdirt on Tuesday, 02 December 2008
Browse Internet

Despite the advances in anti-spam technology and spammers getting sued, shutting down and having their service providers cut off their operations, the torrent of spam hitting email inboxes continues unabated.

A BBC story cites some earlier research that says spammers sending out 350 million messages a month can earn roughly $100 per day, while the entire massive Storm botnet could generate around $2 million per year.

But the underlying issue remains the fact that people click on spam and buy stuff through it. Changing that might be even harder than developing the perfect spam filter.

It will continue to be a cat and mouse game between spammers and spam-fighters. There are options, like using a separate address for each person and company you're in contact with. That way, once you're getting spam on the card012634@yourdomain.com address which you used to sign up at dubiousgiftcards.com, simply remove that address from your email system. Now that address is worthless to spammers. As a nice side effect, you'll see who leaks (or even sells) your email information, since they are unique and map to a single of your contacts only.

German automakers denounce EU compromise on CO2 emissions

Found on Physorg on Monday, 01 December 2008
Browse Technology

The German automobile federation VDA slammed on Tuesday an EU compromise on rules to cut CO2 emissions from new cars, saying it ignored the sector's current crisis.

"Globally, the project does not take enough account of the automobile industry's difficult situation," a VDA statement said.

The deal establishes a sliding scale until 2015 and different targets for various automakers, a key position of German companies, which produce generally bigger cars that consume more fuel.

Sweet move to avoid responsibility. The reduction of emissions was known before the crisis, but the industry didn't care much. Now it uses the crisis as an excuse to continue to produce fuel hungry cars.

Bittorrent declares war on VoIP, gamers

Found on The Register on Sunday, 30 November 2008
Browse Internet

Upset about Bell Canada's system for allocating bandwidth fairly among internet users, the developers of the uTorrent P2P application have decided to make the UDP protocol the default transport protocol for file transfers.

By most estimates, P2P accounts for close to half of internet traffic today. When this traffic is immune to congestion control, the remaining half will stumble along at roughly a quarter of the bandwidth it has available today: half the raw bandwidth, used with half efficiency, by 95% of internet users.

The internet is only a stable system because application developers are gentlemanly with regard to the amount of traffic they shove onto the network.

The article is heavily biased and focused on the ISP side. It's true that QoS plays an important role, but instead of only blaming the developers, one should look at the reasons, because usually one doesn't make such a shift just because it's fun. The main reason is the way an ISP sells Internet access to you. You get 100MBit links for a few dollars, but it gets throttled at some point because the QoS wants to make it nice for everybody else too. Now if you max out your 100MBit with eg P2P, your ISP considers that bad because your neighbour wants to use his webmail without lags. Their calculation is based on the assumption that you do not saturate your connection. Basically, they sell the 100MBit and hope that most people don't use it much. If they were honest, they would sell you the bandwidth their systems can handle 24/7. But 1MBit doesn't advertise well...

Hackers prepare supermarket sweep

Found on BBC News on Saturday, 29 November 2008
Browse Legal-Issues

A BBC investigation has unearthed a plan hatching online to loot US bank accounts via the checkout systems.

The gang plans to copy card details onto the magnetic stripes of fake cards and then use them in UK stores.

"The internet is the global marketplace," he said. "It's not difficult to take compromised cards from one country and exploit them in another. It's a simple and routine procedure for these guys these days."

"We would hope this will bring further pressure on the States to introduce chip-and-pin," said Jemma Smith of the UK payments organisation Apacs.

Actually, that's nothing new. And PIN cards won't solve the problem either. Fraudsters have already put a lot of effort into those and read the magnetic stripes with fake readers which pass the card through to the legal ones; and the PIN is recorded with a tiny wireless camera.

Technology responsible for Mumbai attacks

Found on The Inquirer on Friday, 28 November 2008
Browse Technology

A rambling article in today's CIOL notes "the terror strike on Mumbai has once again brought to the fore how technology, especially in the communication front, is being used for anti-social, or to be precise antihuman, activities."

The article melodramatically shrieks "a terrorist can safely use a satellite phone or even a micro blogging system to implement the mission of terror".

While you're at it, blame pen and paper, telephones and traditional mail. Oh, and even blame talking, because that's also a form of communication. This is one of the stupidest tries to blame everything on technology. Why not point out the real reasons, like religion?

Would You Add Easter Eggs To Software Produced At Work?

Found on Slashdot on Thursday, 27 November 2008
Browse Software

Do you add Easter Eggs to the software that is produced at the office? I mean, if you have complete control over the final product, do you spice it up with that little personal touch, which, as unlikely as it is that anyone will see, carries with it an 'I was here' signature?

Should we developers sign our creations?

I do, but everybody else just calls them bugs. Cruel world.

Nigerian 419 scams now hitting Paypal

Found on The Inquirer on Wednesday, 26 November 2008
Browse Legal-Issues

The perpetuator (presumably a male) wanted to transfer funds out a Paypal account and convert them back into US dollars. All the victim needed to do was check his Paypal account and when the money arrived and send a significantly lower amount back via Western Union.

Jennifer Perry from E-victims blamed Paypal's dispute resolution procedure system calling it a "very crude automated system."

"Paypal's guarantee doesn't really live up to expectations," Perry explained. "The public feel it [Paypal] is a gold-plated service like M&S or a credit card, but it isn't."

Not sure what's the bigger scam here: the 419ers or Paypal. You probably get screwed over by both.

Random House to digitize thousands of books

Found on Wired on Tuesday, 25 November 2008
Browse Various

With e-book sales exploding in an otherwise sleepy market, Random House Inc. announced Monday that it was making thousands of additional books available in digital form.

E-books remain a tiny part of the overall market, widely estimated in the industry at 1 percent or less.

As long as you cannot copy an e-book onto epaper easily, the market share won't increase much. After all, a real book is a real book; reading on a monitor just doesn't come close.