Out in the Open: How to Protect Your Secrets
From Nosey Android Apps
When you install an app on your phone, it often spreads its tentacles into other various parts of the device. Sometimes, it taps into the hardware that identifies your location. Others, it grabs data from your address book.
If you use an Android phone, the OS will tell you — explicitly — what the app is trying to access, and it will ask your permission to do so. But you can’t provide permission for one data grab and then reject another. It’s an all-or-nothing proposition. If you want the Twitter app but don’t want it accessing your text messages, you’re out of luck.
Reports: FCC Poised For Changes To Net Neutrality Policy
This post was updated at 12:10 a.m. ET on Thursday. See update below for details.
The Federal Communications Commission is getting ready to propose new rules when it comes to net neutrality, and are reporting based on unnamed sources.
Late Wednesday, FCC Chairman Tom Wheeler called the reports of a turnaround "."According to the Times and the Journal, the FCC is planning to allow Internet service providers to sell a faster pipe into people's homes to content companies willing to pay for it. In other words, content providers could pay for preferential treatment into American homes.
Gnawing the Knoppix Bones of kNowledge
From: Chapter 5 Putting Knoppix in Your ToolBox
#37 Run Remote Desktops
#38 Run X Remotely with FreeNX
#39 Run Windows Shares
#40 Create an Emergency Router
#41 Create an Emergency File Server
#42 Create an Emergengy Web Server
#43 Run Other Emergency Services: SSL, DHCP, DNS, MySQL, Inetd, NFS.
#44 WarDrive with Knoppix
#45 Audit Network Security
#46 Check For RootKits
#47 Collect Forensics Data
#48 Clone Hard Drives
#49 Wipe a Hard Drive
#50 Test Hardware Compatibility
#51 Copy Settings to Other Distributions