Happy Birthday: BitTorrent turns 10 today

Programmer Bram Cohen began designing the peer-to-peer (P2P) BitTorrent protocol in April 2001. On July 2, 2001, he posted the following Yahoo Groups message: "My new app, BitTorrent, is now in working order, check it out here -http://bitconjurer.org/BitTorrent/." Today, the protocol is thus 10 years old.

Cohen wrote the first BitTorrent client implementation in Python. The initial response for the new P2P protocol was next to nonexistent. The only reply he received on the message board read as follows: "What's BitTorrent, Bram?..."

In the summer of 2002, Cohen collected free pornography to lure beta testers to use the program. BitTorrent became popular thanks to its ability to quickly share large music and movie files online. Although Cohen never supported piracy, BitTorrent would never have become popular without it.

Today, BitTorrent is one of the most common protocols for transferring large files. In November 2004, it was estimated that BitTorrent accounted for 35 percent of all Internet traffic. The latest data, from February 2009, puts the number anywhere from 27 percent to 55 percent of all Internet traffic (depending on geographical location).

The protocol is now maintained by Cohen's company, which also goes by the name of BitTorrent. There are numerous BitTorrent clients available for multiple computing platforms, the most popular of which is µTorrent. Version 3.0, which adds many new features, was released just last week.

In January 2011, the company revealed that BitTorrent and µTorrent hit 100 million monthly users. On an average day, 20 million users from over 220 countries use either of the two BitTorrent clients, available in 52 languages, and 400,000 new clients are downloaded every day.

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://www.techspot.com/news/44522-happy-birthday-bittorrent-turns-10-today.html

seattle public schools worldstarhiphop the game season 4 episode 1 freddie mitchell simon chipmunk lebron james twitter jimmer fredette thomas tew rum issaquah school district the game tv show

A Smarter, Stealthier Botnet

A new kind of botnet?a network of malware-infected PCs?behaves less like an army and more like a decentralized terrorist network, experts say. It can survive decapitation strikes, evade conventional defenses, and even wipe out competing criminal networks.

The botnet's resilience is due to a super-sophisticated piece of malicious software known as TDL-4, which in the first three months of 2011 infected more than 4.5 million computers around the world, about a third of them in the United States.

The emergence of TDL-4 shows that the business of installing malicious code on PCs is thriving. Such code is used to conduct spam campaigns and various forms of theft and fraud, such as siphoning off passwords and other sensitive data. It's also been used in the billion-dollar epidemic of fake anti-virus scams.

"Ultimately TDL-4 is simply a tool for maintaining and protecting a compromised platform for fraud," says Eric Howes, malware analyst for GFI Software, a security company. "It's part of the black service economy for malware, which has matured considerably over the past five years and which really needs a lot more light shed on it."

Unlike other botnets, the TDL-4 network doesn't rely on a few central "command-and-control" servers to pass along instructions and updates to all the infected computers. Instead, computers infected with TDL-4 pass along instructions to one another using public peer-to-peer networks. This makes it a "decentralized, server-less botnet," wrote Sergey Golovanov, a malware researcher at the Moscow-based security company Kaspersky Lab, on this blog describing the new threat.

"The owners of TDL are essentially trying to create an 'indestructible' botnet that is protected against attacks, competitors, and antivirus companies," Golovanov wrote. He added that it "is one of the most technologically sophisticated, and most complex-to-analyze malware."

The TDL-4 botnet also breaks new ground by using an encryption algorithm that hides its communications from traffic-analysis tools. This is an apparent response to efforts by researchers to discover infected machines and disable botnets by monitoring their communication patterns, rather than simply identifying the presence of the malicious code.

Demonstrating that there is no honor among malicious software writers, TDL-4 scans for and deletes 20 of the most common forms of competing malware, so it can keep infected machines all to itself. "It's interesting to mention that the features are generally oriented toward achieving perfect stealth, resilience, and getting rid of 'competitor' malware," says Costin Raiu, another malware researcher at Kaspersky.

Distributed by criminal freelancers called affiliates, who get paid between $20 and $200 for every 1,000 infected machines, TDL-4 lurks on porn sites and some video and file-storage services, among other places, where it can be automatically installed using vulnerabilities in a victim's browser or operating system.

Once TDL-4 infects a computer, it downloads and installs as many as 30 pieces of other malicious software?including spam-sending bots and password-stealing programs. "There are other malware-writing groups out there, but the gang behind [this one] is specifically targeted on delivering high-tech malware for profit," says Raiu.

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://feeds.technologyreview.com/click.phdo?i=8b72d53808ac5ac08785c846dd3c826d

the game season 4 episode 1 freddie mitchell simon chipmunk lebron james twitter jimmer fredette thomas tew rum issaquah school district the game tv show lasso of truth terrence j

Google and its two-pronged relevance problem

Google?s long-rumoured new social project finally arrived this week and there?s little doubt that it?s off to a good start.

Consisting of Facebook-style sharing and discussion; group video chat; mobile group messaging and automated content discovery, Google+ has been met with the general approval of early adopters lucky enough to get in. Demand for access is high, with invites even being sold on eBay.

However Google+ has one huge challenge ahead ? relevance ? both in terms of finding a place in people?s everyday lives and making sure it serves users with exactly what they want.

Where does Google+ sit?

Despite a positive early reception to the service, the big challenge for Google+ isn?t pleasing users in its first few days, it?s finding a solid place for it in their lives in the long term. What will that place be? At present, it?s difficult to say. Looking at the currently big social networks, they fit into a few core categories:

Sharing and communicating with friends: Facebook, Hyves, Orkut etc.

Sharing quick thoughts, news and opinions: Twitter

Business-focused networking: LinkedIn, Xing, Viadeo etc.

So where does Google+ fit into this? It manages to sit across all these verticals. The use of ?Circles? to organise friends and contacts means you can share business-focused information with your colleagues and photos of a night out with your friends in the same place without too much fear of them crossing over into the wrong audiences. The big question is, can Google convince a groundswell of people to make the switch from their existing social networks?

Opinions vary on this issue. Robert Scoble wrote this week on ?Why yo momma won?t use Google+ (and why that thrills me to no end)?. He sees the service as being the perfect service for geeks. ?Come on now, we geeks and early adopters and social media gurus need a place to talk free of folks who think Justin Bieber is the second coming of Christ. That?s what we have in Google+ right now. Do we really want to mess that up??

Scoble believes that Google+ doesn?t stand a chance against Facebook. ?Most ?average users? are locked into Facebook and aren?t willing to consider a new social tool until they hear about it from their friends. Since most of the people who are on Google+ so far are geeks, insiders, social media stars, journalists, and other people? the chances normal people (metaphorically speaking, your mom) won?t hear about Google+ from normal users for quite a while. By then I?m sure Facebook will react (ie, copy) Google+?s best features? This will mean that normal users, who aren?t really going to get involved at this point in Google+?s life, won?t feel the need to switch.?

It?s a fair point. Facebook is already expected to roll out Skype-powered video chat next week, striking out one potential ?reason to switch?. Additionally, will Facebook users really want to learn how to use a new tool to share with their friends? For many people, Facebook isn?t about the service itself, that?s just a way of easily communicating with friends. If it does that job and doesn?t screw up too badly, people will stay around.

Conversely, others believe Facebook is definitely under threat. Nick O?Niell at All Facebook points out that once you?ve given it a go, there?s always a little red notifications counter at the top of the screen whenever you?re logged into Google. Even if you don?t make Google+ your first port of call when opening your browser, that notification counter will always be there, tempting you to see what your friends have been up to.

Mahendra Pasule, an Editor at technology news aggregator Techmeme, believes that Facebook should indeed be concerned. He points out that although Facebook captures lots of information on its users? tastes, it hasn?t used this data to improve the relevance of what is displayed to individuals.

?Facebook has done a not-so-great job capturing users? interests. Many people have ?Liked? hundreds of pages just because they were asked to do so by their friends. Facebook?s obsession with and over reliance on the social graph has corrupted their interest graph, and this might well be Facebook?s Achilles Heel in the long term. Google Plus takes a different approach. The goal of Sparks is to capture your true interests. It is in a primitive state at present, but I?m talking about the Big Picture here!?

A ?next-generation? social network?

While Pasule is speculating on a future direction Google+ may take, it?s important to remember that Google hasn?t just learned from its own mistakes, it?s had a rare opportunity to build a brand new social network from scratch, with a huge budget, world-class engineers, and lessons learned from a wide range of other services.

Facebook?s sketchy approach to privacy? Google+ lets you not only easily determine exactly who sees each individual item that you publish, but also lets you check exactly what your profile looks like to any other user at any time. Twitter users posting about topics you?re not interested in as well as things you are? Google+ has the ability to target messages at people who will be interested in them, so you don?t spam your geek followers with, say, a discussion about your local city carnival.

So, Google+ can perhaps be seen as a ?next generation? social network, building on the lessons learned from the services which emerged in the middle of the last decade. Well-known venture capitalist Fred Wilson, whose fund?s portfolio of investments includes Twitter, Foursquare and Tumblr, points out that social networks aren?t killed by new ones, but by a failure to react and adapt to changing circumstances.

?I think the vast majority of ?deaths? are self-inflicted. Facebook didn?t kill MySpace and Friendster, they killed themselves by failing to address the shortcomings of their services and their inability to respond to changing market dynamics, in some cases brought on by competitors. Of course, that fate could be in store for any company, including our portfolio companies, but it won?t be because of Google+.?

Wilson believes that there?s space for Google+ to sit alongside its competitors as an alternative for those who don?t want a Facebook, Twitter or Tumblr style experience. ?My dad, for example, doesn?t want any of those experiences,? Wilson says. ?He might like Google+. It?s a lot like email. He can curate groups of friends; his friends from school, his friends from the army, his friends from the community he lives in, and share information with them quickly and easily.?

Similarly, journalism professor and self-confessed Google fan Jeff Jarvis suggested in a public Google+ post today that while Facebook is for relationships, Twitter is for broadcasting and blogs are for writing, Google+ is for sharing. Whether users end up taking it in that primary direction remains to be seen, but it would certainly give the service a place as a kind of turbo-powered version of Tumblr.

Google+ and the ?push problem? ? knowing your audience

The other side of the Google+ relevance problem is all about sharing the right things with the right people. It?s something the service has been built from the ground up to do, but has it done it the right way? Robert Scoble has described his frustration that while you might make a Circle of people who are connected to something that you are interested in, they may not necessarily talk about those things.

I?ve picked out all of the VCs and put them into a circle. I?m looking at that list right now. Problem is it isn?t giving me ONE THING that I expect VCs to talk about. There isn?t one item that talks about funding new companies, gives me some insider look into Silicon Valley, or that gives me tips for how to run my company to get better returns.

Instead I see Joi Ito?s dive pictures, Ryan Spoon talking about Facebook Places, David Lee changed his profile photo, Francine Hardaway posted some funny animated GIF, Paul Buchheit talking about Twitter celebrities. And on and on and on it goes.

It?s a fair point, and one that can currently only be solved by people organising their Circles well, so that they only share information with people who want it. For example, the VCs Scoble refers to could share their holiday snaps with personal friends and their thoughts on tech investing publicly. This will surely start to happen as users grow accustomed to Google+, but the problem highlights an interesting facet of the service ? relevancy is curated by the sender, not the receiver.

You may have me in a ?tech bloggers? circle, but I may (wrongly) have you in a ?photography enthusiasts? circle. I may have something to say about technology that would interest you, but because I?ve categorised you incorrectly, you?ll never know. Meanwhile, you?ll be wondering why I only ever talk about cameras ? I was trying to be relevant to you, but because I ?filed? you in the wrong Circle it achieves the opposite effect.

Of course, this won?t bother everyone and Twitter has thrived despite the fact that many users talk about a variety of topics to all their followers. We enjoy the ?humanising? aspect of knowing what our heroes had for lunch or what they?re watching on TV. Still, for a service selling itself on sharing relevant information, the need to know your audience well enough to feed them the right information is an odd weakness, and one that is only starting to show itself as user numbers grow.

One way Google could approach this problem is to recommend Circles to put people into, based on what it knows about their interests. Google can pull a lot of information about your tastes and interests based on your behaviour on Google+, your Google Profile and even your search history. Sure, the company would have to be careful about the way it implemented this, but the very fact that it could do it, shows that if anyone can solve the problem of relevance, Google can.

A long way to go

Steven Levy, a journalist who has had unparalleled access to the inner workings of the Googleplex over the years, this week explained for Wired how what was launched this week was only part of Google?s full social picture:

?The parts announced Tuesday represent only a portion of Google?s plans. In an approach the company refers to as ?rolling thunder,? Google has been quietly been pushing out pieces of its ambitious social strategy ? there are well over 100 launches on its calendar. When some launches were greeted by yawns, the Emerald Sea team leaders weren?t ruffled at all ? lack of drama is part of the plan. Google has consciously refrained from contextualizing those products into its overall strategy.?

Levy goes on to describe how the launch of Google+ is just ?one more milestone in a long, tough slog to remake Google into something more ?people-centric?.? That long tough slog is clearly paying off, too. Google has clearly learned a lot from the mess that was Buzz. This week, Google-watcher Gina Trapani listed a few of the things Google+ learned from Buzz and Wave. From extensive field testing, to a user-centric development approach, right down to launching with a good mobile app, Google has clearly taken a lot of feedback on board from its previous mistakes.

It?s still taking feedback on board too. Within hours of the launch of Google+, a privacy loophole was identified whereby a post that you?d shared to a limited Circle of users could be reshared publicly (to the rest of the world) by any of those users. Google has acted quickly, blocking the public resharing of limited posts. Googlers are also incredibly active on the service, spotting complaints and suggestions from users and getting involved in conversations.

Whatever place Google+ eventually finds in the world, it?s clear that there?s still a lot of work to be done, and so judging it at this early stage is premature. Given that the Google+ team is working fast to respond to users? concerns and shaping the service based on feedback, there?s definitely a strong chance that it will grow into a stronger, more relevant offering in the coming weeks.

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://thenextweb.com/google/2011/07/03/google-and-its-two-pronged-relevance-problem/

the game tv show lasso of truth terrence j most popular thanksgiving side dish the game bet lights out nyc school closings scelestious stephanie seymour and son david nelson

A Smarter, Stealthier Botnet

A new kind of botnet?a network of malware-infected PCs?behaves less like an army and more like a decentralized terrorist network, experts say. It can survive decapitation strikes, evade conventional defenses, and even wipe out competing criminal networks.

The botnet's resilience is due to a super-sophisticated piece of malicious software known as TDL-4, which in the first three months of 2011 infected more than 4.5 million computers around the world, about a third of them in the United States.

The emergence of TDL-4 shows that the business of installing malicious code on PCs is thriving. Such code is used to conduct spam campaigns and various forms of theft and fraud, such as siphoning off passwords and other sensitive data. It's also been used in the billion-dollar epidemic of fake anti-virus scams.

"Ultimately TDL-4 is simply a tool for maintaining and protecting a compromised platform for fraud," says Eric Howes, malware analyst for GFI Software, a security company. "It's part of the black service economy for malware, which has matured considerably over the past five years and which really needs a lot more light shed on it."

Unlike other botnets, the TDL-4 network doesn't rely on a few central "command-and-control" servers to pass along instructions and updates to all the infected computers. Instead, computers infected with TDL-4 pass along instructions to one another using public peer-to-peer networks. This makes it a "decentralized, server-less botnet," wrote Sergey Golovanov, a malware researcher at the Moscow-based security company Kaspersky Lab, on this blog describing the new threat.

"The owners of TDL are essentially trying to create an 'indestructible' botnet that is protected against attacks, competitors, and antivirus companies," Golovanov wrote. He added that it "is one of the most technologically sophisticated, and most complex-to-analyze malware."

The TDL-4 botnet also breaks new ground by using an encryption algorithm that hides its communications from traffic-analysis tools. This is an apparent response to efforts by researchers to discover infected machines and disable botnets by monitoring their communication patterns, rather than simply identifying the presence of the malicious code.

Demonstrating that there is no honor among malicious software writers, TDL-4 scans for and deletes 20 of the most common forms of competing malware, so it can keep infected machines all to itself. "It's interesting to mention that the features are generally oriented toward achieving perfect stealth, resilience, and getting rid of 'competitor' malware," says Costin Raiu, another malware researcher at Kaspersky.

Distributed by criminal freelancers called affiliates, who get paid between $20 and $200 for every 1,000 infected machines, TDL-4 lurks on porn sites and some video and file-storage services, among other places, where it can be automatically installed using vulnerabilities in a victim's browser or operating system.

Once TDL-4 infects a computer, it downloads and installs as many as 30 pieces of other malicious software?including spam-sending bots and password-stealing programs. "There are other malware-writing groups out there, but the gang behind [this one] is specifically targeted on delivering high-tech malware for profit," says Raiu.

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://feeds.technologyreview.com/click.phdo?i=8b72d53808ac5ac08785c846dd3c826d

the game season 4 episode 1 freddie mitchell simon chipmunk lebron james twitter jimmer fredette thomas tew rum issaquah school district the game tv show lasso of truth terrence j

Fitbit users are unwittingly sharing details of their sex lives with the world

Heard of Fitbit? Currently only available in the US, Fitbit?s tracker is a little gadget that automatically tracks data about a person?s activities, such as calories burned, sleep quality, steps and distance.

Being based in the UK, I have yet to try Fitbit personally but from my understanding, users are also able to manually add details of their activity for moments when wearing a Fitbit tracker isn?t appropriate, like sex.

Whether they know it or not, many Fitbit users profiles are public and a quick Google search provides a wealth of personal data about people?s sex lives. We?re not talking just date and time here, but effort given and even ?kissing, hugging?.

While nowhere near is startling as finding your credit card details published on Google, this is perhaps a little too much information to be sharing with the world and something current and future users should know about.

(H/T to Andy Baio for the spot)

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://thenextweb.com/industry/2011/07/03/fitbit-users-are-inadvertently-sharing-details-of-their-sex-lives-with-the-world/

lasso of truth terrence j most popular thanksgiving side dish the game bet lights out nyc school closings scelestious stephanie seymour and son david nelson the chipmunks

100 Years of IBM in Pictures

IBM DEY RECORDER (1880)

This device, resembling an antique clock, is an early Dey dial recorder, which was used to track the hours worked by employees. The dial recorder was developed in 1880 by Alexander Dey. In 1907 his business was acquired by the International Time Recording Company, one of the companies that would later form IBM.

Credit: IBM

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://feeds.technologyreview.com/click.phdo?i=efd11283ef7f17321b632a9d2ea51027

lasso of truth terrence j most popular thanksgiving side dish the game bet lights out nyc school closings scelestious stephanie seymour and son david nelson the chipmunks

Weekend Open Forum: Your experience with mail-in rebates

Let me preface this by saying that I understand you've probably had some positive experiences with mail-in rebates -- I have too. However, I'm inclined to believe they're nothing short of a rampant marketing gimmick that have tainted the consumer tech space. Besides relying on questionable ethics to succeed, they often spoil the entire shopping experience. For example, nearly half of Newegg's video cards are advertised with a rebate (14 out of 34 pages), and many of those "discounted" items have their price hidden.

Regardless of whether you're interested in taking advantage of the promotion, many cards have to be added to your cart before you can see their price both before and after the rebate. Naturally, this can be incredibly annoying if you're trying to spot-check a bunch of different cards. The circus continues post-purchase as you jump through half a dozen flaming hoops to save $10 on a $250 purchase. In a race against the clock, you have to obtain one or more rebate forms, snip your UPC label and mail them before time expires.

Even if you're vigilant enough to complete the process, your submission may conveniently "vanish" in the mail or somehow, they're postmarked too late to qualify. I've experienced both firsthand. Assuming the company is honest enough to accept your rebate, they'll still test your patience (and memory) by delaying your check. I've waited upwards of six months before and another TS staffer has had a rebate pending for more than nine months. Are we just extremely unlucky or have you been shafted by a rebate program too?

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://www.techspot.com/news/44519-weekend-open-forum-your-experience-with-mail-in-rebates.html

scelestious stephanie seymour and son david nelson the chipmunks seattle public schools worldstarhiphop the game season 4 episode 1 freddie mitchell simon chipmunk lebron james twitter

Gaming 27 - The PlayStation Ryvita

A Smarter, Stealthier Botnet

A new kind of botnet?a network of malware-infected PCs?behaves less like an army and more like a decentralized terrorist network, experts say. It can survive decapitation strikes, evade conventional defenses, and even wipe out competing criminal networks.

The botnet's resilience is due to a super-sophisticated piece of malicious software known as TDL-4, which in the first three months of 2011 infected more than 4.5 million computers around the world, about a third of them in the United States.

The emergence of TDL-4 shows that the business of installing malicious code on PCs is thriving. Such code is used to conduct spam campaigns and various forms of theft and fraud, such as siphoning off passwords and other sensitive data. It's also been used in the billion-dollar epidemic of fake anti-virus scams.

"Ultimately TDL-4 is simply a tool for maintaining and protecting a compromised platform for fraud," says Eric Howes, malware analyst for GFI Software, a security company. "It's part of the black service economy for malware, which has matured considerably over the past five years and which really needs a lot more light shed on it."

Unlike other botnets, the TDL-4 network doesn't rely on a few central "command-and-control" servers to pass along instructions and updates to all the infected computers. Instead, computers infected with TDL-4 pass along instructions to one another using public peer-to-peer networks. This makes it a "decentralized, server-less botnet," wrote Sergey Golovanov, a malware researcher at the Moscow-based security company Kaspersky Lab, on this blog describing the new threat.

"The owners of TDL are essentially trying to create an 'indestructible' botnet that is protected against attacks, competitors, and antivirus companies," Golovanov wrote. He added that it "is one of the most technologically sophisticated, and most complex-to-analyze malware."

The TDL-4 botnet also breaks new ground by using an encryption algorithm that hides its communications from traffic-analysis tools. This is an apparent response to efforts by researchers to discover infected machines and disable botnets by monitoring their communication patterns, rather than simply identifying the presence of the malicious code.

Demonstrating that there is no honor among malicious software writers, TDL-4 scans for and deletes 20 of the most common forms of competing malware, so it can keep infected machines all to itself. "It's interesting to mention that the features are generally oriented toward achieving perfect stealth, resilience, and getting rid of 'competitor' malware," says Costin Raiu, another malware researcher at Kaspersky.

Distributed by criminal freelancers called affiliates, who get paid between $20 and $200 for every 1,000 infected machines, TDL-4 lurks on porn sites and some video and file-storage services, among other places, where it can be automatically installed using vulnerabilities in a victim's browser or operating system.

Once TDL-4 infects a computer, it downloads and installs as many as 30 pieces of other malicious software?including spam-sending bots and password-stealing programs. "There are other malware-writing groups out there, but the gang behind [this one] is specifically targeted on delivering high-tech malware for profit," says Raiu.

Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Source: http://feeds.technologyreview.com/click.phdo?i=8b72d53808ac5ac08785c846dd3c826d

freddie mitchell simon chipmunk lebron james twitter jimmer fredette thomas tew rum issaquah school district the game tv show lasso of truth terrence j most popular thanksgiving side dish

Gaming 27 - The PlayStation Ryvita