Thursday, January 18, 2007

Backup your records and save your life

When someone robbed me my labtop last year, I thought I was going to loose my identity. I didn't backup my ressources...because I am so clever.
So now I keep my external memory bar and my usb keys always with me....

“FaceBook stalking”



"Facebook stalking" is the term that has developed for this typically harmless practice of finding people (or finding their profiles, at least) on Facebook and learning about them without their knowledge or consent. "It's a lot easier than the real thing," said freshman Abe Del Rio. Facebook stalking is mostly harmless and used to find out someone's e-mail to coordinate a class project or to discover other people on campus with common interests and tastes.

But it isn't just students that are Facebook stalking anymore. Campus security and residence life staffs have begun using pictures posted on the social networking site to find and prosecute students for alcohol violations. At Western Washington University, four students were placed on probation and one was asked to leave the housing system based on alcohol violations that were documented and discovered through Facebook.

Privacy pollution, the modern freedom robbery



The expression “privacy pollution” refers to a diary problem we all know: the "junk" mails and the spams. We all receive every day newletters about the new technologies to enlarge our penis...
You see? That's it.
What are some of the concerns?

E-mail spam is the most common form of internet spamming. It involves sending unsolicited commercial messages to many recipients. Unlike legitimate commercial e-mail, spam is generally sent without the explicit permission of the recipients, and frequently contains various tricks to bypass e-mail filtering.
Spammers obtain e-mail addresses by a number of means: harvesting addresses from Usenet postings, DNS listings, or Web pages; guessing common names at known domains (known as a dictionary attack); and "e-pending" or searching for e-mail addresses corresponding to specific persons, such as residents in an area. Many spammers utilize programs called web spiders to find e-mail addresses on web pages (see also address munging). Many e-mail spammers go to great lengths to conceal the origin of their messages. They might do this by spoofing e-mail addresses (similar to Internet protocol spoofing). The spammer will modify the e-mail message so it looks like it is coming from another e-mail address. However, many spammers make it easy for recipients to identify their messages as spam by placing an ad phrase in the From field. Spammers try to circumvent the email filters by intentionally misspelling common spam filter trigger words.
For example, "viagra" might become "vaigra", or other symbols may be inserted into the word as in "v/i/a/g./r/a". E-mail service providers have begun to use the misspellings themselves as a filtering test. The most dedicated spammers—often those making a great deal of money or engaged in illegal activities, such as the pornography, casinos and Nigerian scam businesses—are often one step ahead of the providers. Retail e-mail services are updated constantly with improved spam filters, keeping track of spammers' technological progress by examining e-mails their users report as spam (many providers today have a prominent button to report spam). So-called "spambots" are a major producer of e-mail spam. The worst spammers create e-mail viruses that render an unprotected PC a "zombie computer"; the zombie will inform a central unit of its existence, and the central unit will command the "zombie" to send a low volume of spam. This allows spammers to send high volumes of e-mail without being caught by their ISPs or being tracked down by antispammers; a low volume of spam is instead sent from many locations simultaneously.
Bill Gates, speaking at the World Economic Forum in Davos in January 2004, predicted that spam would soon be "a thing of the past", and that Microsoft was working on several temporary solutions, as well as on a permanent "magic solution", to spam.

The California legislature found that spam cost United States organizations alone more than $10 billion in 2004, including lost productivity and the additional equipment, software, and manpower needed to combat the problem.

Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages. In addition, spam has costs stemming from the kinds of spam messages sent, from the ways spammers send them, and from the arms race between spammers and those who try to stop or control spam. In addition, there are the opportunity cost of those who forgo the use of spam-afflicted systems. There are the direct costs, as well as the indirect costs borne by the victims - both those related to the spamming itself, and to other crimes that usually accompany it, such as financial theft, identity theft, data and intellectual property theft, virus and other malware infection, child pornography, fraud, and deceptive marketing.

It is complicated to fight it because spamming itself abridges the historical freedom of the Internet, by attempting to force users to carry the costs of material which they would not choose.
But there are actions, as I will explain it here.

An ongoing concern expressed by parties such as the Electronic Frontier Foundation and the ACLU has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge.
These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools which (either through error or design) also block non-spam e-mail from sites seen as "spam-friendly". SPEWS is a common target of these criticisms. Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use which draws fire. Some see spam-blocking tools as a threat to free expression—and laws against spamming as an untoward precedent for regulation or taxation of e-mail and the Internet at large. Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against trespass and conversion, some laws specifically targeting spam have been proposed.
In 2004, United States passed the Can Spam Act of 2003 which provided ISPs with tools to combat spam. This act allowed Yahoo! to successfully sue Eric Head, reportedly one of the biggest spammers in the world, who settled the lawsuit for several thousand U.S. dollars in June 2004.
Examples of effective anti-abuse laws that respect free speech rights include those in the U.S. against unsolicited faxes and phone calls, and those in Australia and a few U.S. states against spam. In November 2004, Lycos Europe released a screensaver called make LOVE not SPAM which made Distributed Denial of Service attacks on the spammers themselves. It met with a large amount of controversy and the initiative ended in December 2004.Court cases Attorney Laurence Canter was disbarred by the Supreme Court of Tennessee in 1997 for sending prodigious amounts of spam advertising his immigration law practice. Robert Soloway lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a default judgment and permanent injunction against him. The judgment includes a statutory damages award of $10,075,000 under Oklahoma law. In the first successful case of its kind, Mr. Nigel Roberts from the Channel Islands won £270 against Media Logistics UK who sent junk e-mails to his personal account.

Thursday, January 11, 2007

Youtube personal pages implication


When you create a personal page on you tube, it can have a lot of implications. Why?
First of all, because you enter in a community which is uge because Youtube is incredibly popular. This makes you involved in the web life and in the activity you chose. For example, if you upload videos you will have a lot of contact in this sector and you will be free to creates new pages with others youtube guys.
You can also be implicated in the web economic life if someone have noticed you for your talents or originality. It involves too the question of artistic property. If your production is at a buzz start, you artistic or entertainment life will change.
For me, the best use of Youtube profile is the professional one.
I think it is really helpful when for example you have an association without financial suppport. It is the best advertisement in terms of rentability and exposition. You are sure to find a public. It is the same thing for young artists who can express themselves in this site without technical matters. I show you here what I mean by the way of an animation picture.
Even in the big companies, the e-cv is a good thing to see how the employees behave themselves behind new technologies. It is a new way to evaluate the candidate, who is more free to present himself with his own words. i think this is a good invention but not for everybody. There are people who are no used to be filmed. They could fill really ill at ease to present themselves in a professional way in front of a camera. For me it is important to respect this. We have to let people chose how he wants to present himself.
The results are amazing. There is an example of e-cv I found of You Tube.
Enjoy.

A definition of the web content management system


A content management system (CMS) is a computer software system used to assist its users in the process of content management. A CMS facilitates the organization, control, and publication of a large body of documents and other content, such as images and multimedia resources. A CMS often facilitates the collaborative creation of documents. A web content management system is a content management system with additional features to ease the tasks required to publish web content to Web sites.
We generally use it for storing, controlling, versioning, and publishing industry-specific documentation such as news articles, operators' manuals, technical manuals, sales guides, and marketing brochures. It may support the following features:
- Import and creation of documents and multimedia material
-Identification of all key users and their content management roles
- The ability to assign roles and responsibilities to different content categories or types.
- The definition of the content workflow tasks, often coupled with event messaging so that content managers are alerted to changes in content.
- The ability to track and manage multiple versions of a single instance of content.
- The ability to publish the content to a repository to support access to the content. Increasingly, the repository is an inherent part of the system, and incorporates enterprise search and retrieval.
For example, we use it right now on this blog. We made a wiki in my class where we also use CMS.