When record companies use censorship to remove negative reviews

Posted by on Aug 20, 2012 in Sécurité

When record companies use censorship to remove negative reviews

Tweet Give some power to a record unscrupulous, and there are great chances that what he gives away to divert no ethics … Right holders have the opportunity to give Google a list of links containing illegal content online, so Google the dereference to prevent piracy is too easy. Unless Universal is caught with his hand in the bag to slide in the middle of illegal links links to negative reviews, so that his last be removed from the search engine ranking of the most...

Read More »

Should he doubt the fact of flying

Posted by on Aug 3, 2012 in Sécurité

Should he doubt the fact of flying

Tweet Renderman talks about his new work, and particularly those with a professional radio waves. In one weekend, they imported all air traffic in a geographical area within a flight simulator. Following this, they have exported the data from aircraft flight simulator in real airspace and were able to follow live the virtual flight from one site to air traffic control. Renderman as often pointed out, that will happen the day that he some evil will be interested in this kind...

Read More »

Easily incorporate the backdoors into BIOS tampered

Posted by on Aug 3, 2012 in Sécurité

Easily incorporate the backdoors into BIOS tampered

Tweet Using open source tools like Coreboot, Seaboot iPXE and it is possible at any time of the distribution chain of computers, making the delivery person can change the firmware of the various components of a PC to give indelible remote access to a third party The BIOS, such as SCADA, is a technology born in the early 80s, which is inherited by all machines in x86, either directly with a native BIOS, firmware or indirectly with a “modern” whose design...

Read More »