tag:blogger.com,1999:blog-2724464917153395402024-03-13T05:55:22.765-07:00plug2playplug2play - RFID - Computers Security - Forensics - Flash hacks - and more ...Unknownnoreply@blogger.comBlogger237125tag:blogger.com,1999:blog-272446491715339540.post-22458925769078844512017-03-23T00:50:00.004-07:002017-03-23T00:50:55.225-07:00AI is hot these days. <div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="https://www.velti.com/" target="_blank">Velti</a> launches Daedalus AI <br />
<br />
Velti’s powerful Adaptive Recommendation Engine helps you navigate your
way through the mobile communications maze, and align your messaging
campaigns with your customers’ preferences, maximizing their response
rate.<br />
<br />
Check it out:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.velti.com/" target="_blank"><img alt="www.velti.com" border="0" height="279" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlOdfJj4qOwNA9mGUglwoqBwQ9W-6PGcSXaeK3r0gU4msBdAWewQvkNTKfeb_LVu-mPGz585cT-HY5-4LZV-KCVrJELmJZcwUqEz1ho-f_-2WtKaR9Pt2Cfp3A7iLFPlyYaFbdzY7yOMHA/s320/Velti.jpg" width="320" /></a> </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.velti.com/" target="_blank">Velti's Daedalus AI</a></div>
<span id="goog_2024863813"></span><span id="goog_2024863814"></span><br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-54701007494565521162016-02-09T11:48:00.001-08:002016-02-09T11:48:36.046-08:00ENISA Cyber Europe 2016 - Are you ready for the next cyber crisis?<br /><br />
<br /><iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/2wVsB1WCfNg" width="480"></iframe>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-89926881924447072912011-11-22T03:03:00.000-08:002011-11-22T03:03:41.169-08:00Most DDoS Attacks Originate From ChinaA company that protects against DDoS attacks, Prolexic Technologies, released its attack report for Q3 2011. There’s a lot to the report, including that Prolexic mitigated what it claims is the largest event in 2011 (in terms of packet-per-second volume). That attack occurred between November 5-12 and, according to Prolexic, portends the increasing scale and complexity of DDoS attacks.<br />
<br />
Indeed, the report shows that DDoS attacks are increasing in terms of bandwidth (up 66% from Q3 2010) and packets-per-second, which is up nearly four-fold from the same time period a year ago.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://hothardware.com/newsimages/Item19530/prolexic-image1.png" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="375" width="585" src="http://hothardware.com/newsimages/Item19530/prolexic-image1.png" /></a></div><br />
What is perhaps most notable, however, is where the attacks are coming from. The report found that China was the biggest offender, responsible for over half (55%) of all DDoS attacks. For perspective, number two on the list is India, with 8.69% of the attacks.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://hothardware.com/newsimages/Item19530/prolexic-image2.png" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="391" width="585" src="http://hothardware.com/newsimages/Item19530/prolexic-image2.png" /></a></div><br />
Further, China is responsible for most of the botnets being sent out; it’s the country of origin for the two largest ASNs. One accounts for 43.88% of them, and the other 21.79%. Again, for perspective, the third-largest botnet is from Turkey and gobbles up just 9%.<br />
<br />
Original post found at: http://hothardware.com/News/Most-DDoS-Attacks-Originate-From-China-Says-Report/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-57448240489092561142011-10-11T08:21:00.000-07:002011-10-11T08:21:10.167-07:00CSET: The Cyber Security Evaluation Tool!with the recent surge in vulnerabilities related to the SCADA systems, it is highly imperative by organizations to securely manage their setups. CSET, the Cyber Security Evaluation Tool by Department of Homeland Security (DHS) aids organizations in properly securing their digital property. This tool will help organizations to better evaluate their network safety structure, enabling them to detect their weaknesses so that remote attackers can be prevented and combated.<br />
<br />
<b>CSET</b><br />
<br />
The Cyber Security Evaluation Tool (CSET) can provide you with a systematic and repeatable approach for assessing the cyber security posture of your industrial control systems (ICS) networks and IT systems. It also includes both highlevel and detailed questions related to all ICS, so that organizations can protect their key cyber assets. CSET is an easy to install desktop software tool that guides users through a step-by-step process to assess their control system and information technology network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cybersecurity posture of the organization’s enterprise and industrial control cyber systems. The tool derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.<br />
<br />
Download CSET:<br />
<br />
CSET v4.0 – CSET_4.0.iso – <a href="http://us-cert.gov/control_systems/csetdownload.html">http://us-cert.gov/control_systems/csetdownload.html</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-82057225929643403202011-05-10T08:46:00.000-07:002011-05-10T08:46:47.867-07:00Government Use GPS to Track Your Moves on your own car.<div class="separator" style="clear: both; text-align: center;"><a href="http://img.timeinc.net/time/daily/2010/1008/gps_courts_0824.jpg" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="200" width="307" src="http://img.timeinc.net/time/daily/2010/1008/gps_courts_0824.jpg" /></a></div><br />
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway — and no reasonable expectation that the government isn't tracking your movements.<br />
<br />
That is the bizarre — and scary — rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants — with no need for a search warrant.<br />
<br />
<b>read more here :</b> <a href="http://www.time.com/time/nation/article/0,8599,2013150,00.html">http://www.time.com/time/nation/article/0,8599,2013150,00.html</a><br />
<br />
One of these devices was torn down here:<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://guide-images.ifixit.net/igi/oPLmMAYYcgFpe11q.standard" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="224" width="300" src="http://guide-images.ifixit.net/igi/oPLmMAYYcgFpe11q.standard" /></a></div><br />
<br />
<br />
<a href="http://www.ifixit.com/Teardown/Tracking-Device-Teardown/5250/1">Tracking Device Teardown </a><br />
<br />
The crazy thing is it is totally legit.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-57573641192286136192011-02-14T01:20:00.000-08:002011-02-14T01:20:39.837-08:00How unique are your usernames?* Monday, February 14, 2011<br />
* By Robert Lemos<br />
<br />
By creating a distinctive username—and reusing it on multiple websites—you may be giving online marketers and scammers a simple way to track you. Four researchers from the French National Institute of Computer Science (INRIA) studied over 10 million usernames—collected from public Google profiles, eBay accounts, and several other sources. They found that about half of the usernames used on one site could be linked to another online profile, potentially allowing marketers and scammers to build a more complex picture the users.<br />
<br />
"These results show that some users can be profiled just from their usernames," says Claude Castelluccia, research director of the security and privacy research group at INRIA, and one of the authors of a paper on the work. "More specifically, a profiler could use usernames to identify all the site [profiles] that belong to the same user, and then use all the information contained in these sites to profile the victim."<br />
<br />
A scammer could use this information to build a profile of a person and then target them with convincing phishing messages—perhaps referring to specific purchases on another website. The INRIA researchers developed a way to determine how unique a username is, and a method of connecting usernames based on the information published to different sites.<br />
<br />
Those who have more unique usernames are more vulnerable. "The other 50 percent of users are more difficult to link because their usernames have 'low' entropy and could in fact be linked to multiple users," says Daniele Perito, a doctoral candidate at INRIA, who was involved with the work. The INRIA researchers <a href="http://planete.inrialpes.fr/projects/how-unique-are-your-usernames/">have created a tool</a> that can check how unique a username is, and thus how easily an attacker could use it to build a profile of a person.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-80986800402489229132011-02-11T02:16:00.000-08:002011-02-11T02:16:09.493-08:00Lost iPhone? - Lost passwords!<div dir="ltr" style="text-align: left;" trbidi="on"><iframe allowfullscreen="" frameborder="0" height="390" src="http://www.youtube.com/embed/uVGiNAs-QbY" title="YouTube video player" width="400"></iframe></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-80830758018272505602010-12-15T05:14:00.000-08:002010-12-15T05:14:44.039-08:00OPENBSD backdoored by FBI?List: openbsd-tech<br />
Subject: Allegations regarding OpenBSD IPSEC<br />
From: Theo de Raadt <deraadt () cvs ! openbsd ! org><br />
Date: 2010-12-14 22:24:39<br />
Message-ID: 201012142224.oBEMOdWM031222 () cvs ! openbsd ! org<br />
[Download message RAW]<br />
<br />
I have received a mail regarding the early development of the OpenBSD<br />
IPSEC stack. It is alleged that some ex-developers (and the company<br />
they worked for) accepted US government money to put backdoors into<br />
our network stack, in particular the IPSEC stack. Around 2000-2001.<br />
<br />
Since we had the first IPSEC stack available for free, large parts of<br />
the code are now found in many other projects/products. Over 10<br />
years, the IPSEC code has gone through many changes and fixes, so it<br />
is unclear what the true impact of these allegations are.<br />
<br />
The mail came in privately from a person I have not talked to for<br />
nearly 10 years. I refuse to become part of such a conspiracy, and<br />
will not be talking to Gregory Perry about this. Therefore I am<br />
making it public so that<br />
(a) those who use the code can audit it for these problems,<br />
(b) those that are angry at the story can take other actions,<br />
(c) if it is not true, those who are being accused can defend themselves.<br />
<br />
Of course I don't like it when my private mail is forwarded. However<br />
the "little ethic" of a private mail being forwarded is much smaller<br />
than the "big ethic" of government paying companies to pay open source<br />
developers (a member of a community-of-friends) to insert<br />
privacy-invading holes in software.<br />
<br />
----<br />
<br />
From: Gregory Perry <Gregory.Perry@GoVirtual.tv><br />
To: "deraadt@openbsd.org" <deraadt@openbsd.org><br />
Subject: OpenBSD Crypto Framework<br />
Thread-Topic: OpenBSD Crypto Framework<br />
Thread-Index: AcuZjuF6cT4gcSmqQv+Fo3/+2m80eg==<br />
Date: Sat, 11 Dec 2010 23:55:25 +0000<br />
Message-ID: <8D3222F9EB68474DA381831A120B1023019AC034@mbx021-e2-nj-5.exch021.domain.local><br />
Accept-Language: en-US<br />
Content-Language: en-US<br />
X-MS-Has-Attach:<br />
X-MS-TNEF-Correlator:<br />
Content-Type: text/plain; charset="iso-8859-1"<br />
Content-Transfer-Encoding: quoted-printable<br />
MIME-Version: 1.0<br />
Status: RO<br />
<br />
Hello Theo,<br />
<br />
Long time no talk. If you will recall, a while back I was the CTO at<br />
NETSEC and arranged funding and donations for the OpenBSD Crypto<br />
Framework. At that same time I also did some consulting for the FBI,<br />
for their GSA Technical Support Center, which was a cryptologic<br />
reverse engineering project aimed at backdooring and implementing key<br />
escrow mechanisms for smart card and other hardware-based computing<br />
technologies.<br />
<br />
My NDA with the FBI has recently expired, and I wanted to make you<br />
aware of the fact that the FBI implemented a number of backdoors and<br />
side channel key leaking mechanisms into the OCF, for the express<br />
purpose of monitoring the site to site VPN encryption system<br />
implemented by EOUSA, the parent organization to the FBI. Jason<br />
Wright and several other developers were responsible for those<br />
backdoors, and you would be well advised to review any and all code<br />
commits by Wright as well as the other developers he worked with<br />
originating from NETSEC.<br />
<br />
This is also probably the reason why you lost your DARPA funding, they<br />
more than likely caught wind of the fact that those backdoors were<br />
present and didn't want to create any derivative products based upon<br />
the same.<br />
<br />
This is also why several inside FBI folks have been recently<br />
advocating the use of OpenBSD for VPN and firewalling implementations<br />
in virtualized environments, for example Scott Lowe is a well<br />
respected author in virtualization circles who also happens top be on<br />
the FBI payroll, and who has also recently published several tutorials<br />
for the use of OpenBSD VMs in enterprise VMware vSphere deployments.<br />
<br />
Merry Christmas...<br />
<br />
Gregory Perry<br />
Chief Executive Officer<br />
GoVirtual Education<br />
<br />
"VMware Training Products & Services"<br />
<br />
540-645-6955 x111 (local)<br />
866-354-7369 x111 (toll free)<br />
540-931-9099 (mobile)<br />
877-648-0555 (fax)<br />
<br />
http://www.facebook.com/GregoryVPerry<br />
http://www.facebook.com/GoVirtual<br />
<br />
<br />
<br />
FOUND HERE : <a href="http://marc.info/?l=openbsd-tech&m=129236621626462&w=2">http://marc.info/?l=openbsd-tech&m=129236621626462&w=2</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-40803687426618981802010-12-15T05:12:00.000-08:002010-12-15T05:12:43.309-08:00Skype's Biggest Secret RevealedFor eight years, Skype enjoyed selling the world security by obscurity. We must admit, really good obscurity. I mean, really really good obscurity. So good that almost no one has been able to reverse engineer it out of the numerous Skype binaries. Those who could, didn’t dare to publish their code, as it most certainly looked scarier than Frankenstein.<br />
<br />
The time has come to reveal this secret. http://cryptolib.com/ciphers/skype contains the greatest secret of Skype communication protocol, <a href="http://cryptolib.com/ciphers/skype">the obfuscated Skype RC4 key expansion algorithm in plain portable C</a>. Enjoy!<br />
<br />
Why publish it now? - It so happened that some of our code got leaked a couple of months ago. We contacted Skype reporting the leak. Only weeks later, our code is already being used by hackers and spammers and we are abused by Skype administration. I do not want to go into any finger-pointing details here, but naturally, we do not wish to be held responsible for our code being abused. So we decided that the time has come for all the IT security experts to have it. Why let the hackers have the advantage? As professional cryptologists and reverse engineers, we are not on their side. Skype is a popular and important product. We believe that this publication will help the IT security community help secure Skype better.<br />
<br />
However, for the time being, we are not giving away a licence to use our code for free in commercial products. Please contact us if you need a commercial licence.<br />
<br />
It is not all security by obscurity of course. There is plenty of good cryptography in Skype. Most of it is implemented properly too. There are seven types of communication encryption in Skype: its servers use AES-256, the supernodes and clients use three types of RC4 encryption - the old TCP RC4, the old UDP RC4 and the new DH-384 based TCP RC4, while the clients also use AES-256 on top of RC4. It all is quite complicated, but we’ve mastered it all. If you want to know more, come to Berlin for 27C3 to hear all the juicy details on how to use this function to decrypt Skype traffic.<br />
<br />
With best regards,<br />
Skype Reverse Engineering TeamUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-50360708183324093742010-11-25T06:26:00.000-08:002010-11-25T06:26:27.468-08:00Facebook: 20% of users' news feeds, links to malicious softwareOne fifth of Facebook users are exposed to malware contained in their news feeds, claim security researchers.<br />
<br />
Security firm BitDefender said it had detected infections contained in the news feeds of around 20% of Facebook users.<br />
<br />
By clicking on infected links in a news feed, users risk having viruses installed on their computer.<br />
<br />
Facebook said it already had steps in place to identify and remove malware-containing links.<br />
<br />
BitDefender arrived at its figures by analysing data from 14,000 Facebook users that had installed a security app, called safego, it makes for the social network site.<br />
<br />
In the month since safego launched, it has analysed 17 million Facebook posts, said BitDefender.<br />
<br />
The majority of infections were associated with apps written by independent developers, which promised enticements and rewards to trick users into installing the malware, BitDefender said.<br />
Trusted community<br />
<br />
These apps would then either install malware used for spying on users or to send messages containing adverts to the users' contacts.<br />
<br />
Facebook has a thriving community of independent developers who have built apps for the social network.<br />
<br />
The vast majority enable users to tweak their Facebook pages, adding widgets, games or extra functions, such as delivering daily horoscope predictions.<br />
<br />
Facebook said it had processes and checks in place to guard against the risk of malware.<br />
<br />
"Once we detect a phony message, we delete all instances of that message across the site," the site said in a statement.<br />
<br />
Crooks have targeted social networks, such as Facebook and Twitter because of their vast number of users, said Rik Ferguson, a security researcher for anti-virus maker Trend Micro.<br />
<br />
"Because social networks are based on a community of people you trust, they're an attractive target for malware writers," said Ferguson. "You're more likely to click on a link from someone you trust."<br />
<br />
<a href="http://www.bbc.co.uk/news/technology-11827856">http://www.bbc.co.uk/news/technology-11827856</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-8449559745494125652010-11-06T16:13:00.000-07:002010-11-06T16:13:06.320-07:00INSIGHT: Virtual Battlefield in Cyber War<object width="480" height="385"><param name="movie" value="http://www.youtube.com/v/Q7pbqV8L9kg?fs=1&hl=el_GR"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/Q7pbqV8L9kg?fs=1&hl=el_GR" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="400" height="385"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-64977398191384058502010-09-11T10:33:00.001-07:002010-09-11T10:33:47.870-07:00GPU vs CPU<object width="480" height="385"><param name="movie" value="http://www.youtube.com/v/XtGf0HaW7x4?fs=1&hl=el_GR"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/XtGf0HaW7x4?fs=1&hl=el_GR" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="480" height="385"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-82604303603291298882010-07-29T04:20:00.002-07:002010-07-29T04:20:42.091-07:00Street Slide: Browsing Street Level Imagery<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/K-_T949uSwU&hl=el_GR&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/K-_T949uSwU&hl=el_GR&fs=1" width="425" height="344" allowScriptAccess="never" allowFullScreen="true" wmode="transparent" type="application/x-shockwave-flash"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-62759769313685703372010-07-20T00:50:00.001-07:002010-07-20T00:50:18.929-07:00WikiLeaks<object width="446" height="326"><param name="movie" value="http://video.ted.com/assets/player/swf/EmbedPlayer.swf"></param><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always"/><param name="wmode" value="transparent"></param><param name="bgColor" value="#ffffff"></param><param name="flashvars" value="vu=http://video.ted.com/talks/dynamic/JulianAssange_2010G-medium.flv&su=http://images.ted.com/images/ted/tedindex/embed-posters/JulianAssange-2010G.embed_thumbnail.jpg&vw=432&vh=240&ap=0&ti=918&introDuration=15330&adDuration=4000&postAdDuration=830&adKeys=talk=julian_assange_why_the_world_needs_wikileaks;year=2010;theme=new_on_ted_com;theme=a_taste_of_tedglobal_2010;theme=media_that_matters;theme=war_and_peace;event=TEDGlobal+2010;&preAdTag=tconf.ted/embed;tile=1;sz=512x288;" /><embed src="http://video.ted.com/assets/player/swf/EmbedPlayer.swf" pluginspace="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" wmode="transparent" bgColor="#ffffff" width="446" height="326" allowFullScreen="true" allowScriptAccess="always" flashvars="vu=http://video.ted.com/talks/dynamic/JulianAssange_2010G-medium.flv&su=http://images.ted.com/images/ted/tedindex/embed-posters/JulianAssange-2010G.embed_thumbnail.jpg&vw=432&vh=240&ap=0&ti=918&introDuration=15330&adDuration=4000&postAdDuration=830&adKeys=talk=julian_assange_why_the_world_needs_wikileaks;year=2010;theme=new_on_ted_com;theme=a_taste_of_tedglobal_2010;theme=media_that_matters;theme=war_and_peace;event=TEDGlobal+2010;"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-67762468217034690522010-07-11T14:39:00.001-07:002010-07-11T14:39:57.110-07:00Animated 3D models extracted from single-camera video<object id="flashObj" width="486" height="412" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9/2227271001?isVid=1" /><param name="bgcolor" value="#FFFFFF" /><param name="flashVars" value="videoId=111128510001&playerID=2227271001&domain=embed&dynamicStreaming=true" /><param name="base" value="http://admin.brightcove.com" /><param name="seamlesstabbing" value="false" /><param name="allowFullScreen" value="true" /><param name="swLiveConnect" value="true" /><param name="allowScriptAccess" value="always" /><embed src="http://c.brightcove.com/services/viewer/federated_f9/2227271001?isVid=1" bgcolor="#FFFFFF" flashVars="videoId=111128510001&playerID=2227271001&domain=embed&dynamicStreaming=true" base="http://admin.brightcove.com" name="flashObj" width="486" height="412" seamlesstabbing="false" type="application/x-shockwave-flash" allowFullScreen="true" swLiveConnect="true" allowScriptAccess="always" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-36456999384830679232010-07-02T05:18:00.000-07:002010-07-02T05:18:30.964-07:00Diaspora demo<object height="225" width="400"><param name="allowfullscreen" value="true" /><param name="allowscriptaccess" value="always" /><param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=13026173&server=vimeo.com&show_title=1&show_byline=1&show_portrait=0&color=&fullscreen=1" /><embed src="http://vimeo.com/moogaloop.swf?clip_id=13026173&server=vimeo.com&show_title=1&show_byline=1&show_portrait=0&color=&fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="225"></embed></object><br />
<a href="http://vimeo.com/13026173">Diaspora Message Propagation (pre-alpha!)</a> from <a href="http://vimeo.com/user3612554">daniel grippi</a> on <a href="http://vimeo.com/">Vimeo</a>.<br />
<br />
Demo video using a bunch of different diaspora seeds. They are all on different servers, and all friended with the same person. When you have that person send out 10 messages in rapid succession, you can see how fast their friends are updated.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-75314619340447845962010-06-30T10:59:00.000-07:002010-06-30T10:59:31.675-07:00Augment my Card. Live beta<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz4j6rn-KfdVt6-FP0NcsV7b6BSwyD4CzVgH5SYclDmza9t47lgDp9Y7_UzkLW6HyfxHowhLeH0BU9vk0cjO8aHZPwvLXKaYcDdNYD8Fpi_ugaIUmFSaKI56MZ00GJGgRZ36-JyfBy0IfH/s1600/index.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz4j6rn-KfdVt6-FP0NcsV7b6BSwyD4CzVgH5SYclDmza9t47lgDp9Y7_UzkLW6HyfxHowhLeH0BU9vk0cjO8aHZPwvLXKaYcDdNYD8Fpi_ugaIUmFSaKI56MZ00GJGgRZ36-JyfBy0IfH/s320/index.png" width="320" /></a></div><br />
<div style="text-align: center;">Check my new website:</div><div style="text-align: center;"><a href="http://www.augmentmycard.com/">http://www.augmentmycard.com/</a></div><div style="text-align: center;">about Augmented Reality Business Cards.</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-88749607595937560992010-06-02T02:48:00.000-07:002010-06-02T02:48:32.470-07:003d_data_with_a_gesture TED<object width="400" height="326"><param name="movie" value="http://video.ted.com/assets/player/swf/EmbedPlayer.swf"></param><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always"/><param name="wmode" value="transparent"></param><param name="bgColor" value="#ffffff"></param><param name="flashvars" value="vu=http://video.ted.com/talks/dynamic/JohnUnderkoffler_2010-medium.flv&su=http://images.ted.com/images/ted/tedindex/embed-posters/JohnUnderkoffler-2010.embed_thumbnail.jpg&vw=400&vh=240&ap=0&ti=872&introDuration=15330&adDuration=4000&postAdDuration=830&adKeys=talk=john_underkoffler_drive_3d_data_with_a_gesture;year=2010;theme=tales_of_invention;theme=technology_history_and_destiny;theme=new_on_ted_com;theme=presentation_innovation;theme=what_s_next_in_tech;theme=a_taste_of_ted2010;event=TED2010;&preAdTag=tconf.ted/embed;tile=1;sz=512x288;" /><embed src="http://video.ted.com/assets/player/swf/EmbedPlayer.swf" pluginspace="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" wmode="transparent" bgColor="#ffffff" width="446" height="326" allowFullScreen="true" allowScriptAccess="always" flashvars="vu=http://video.ted.com/talks/dynamic/JohnUnderkoffler_2010-medium.flv&su=http://images.ted.com/images/ted/tedindex/embed-posters/JohnUnderkoffler-2010.embed_thumbnail.jpg&vw=400&vh=240&ap=0&ti=872&introDuration=15330&adDuration=4000&postAdDuration=830&adKeys=talk=john_underkoffler_drive_3d_data_with_a_gesture;year=2010;theme=tales_of_invention;theme=technology_history_and_destiny;theme=new_on_ted_com;theme=presentation_innovation;theme=what_s_next_in_tech;theme=a_taste_of_ted2010;event=TED2010;"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-58320261537151654442010-05-19T00:57:00.001-07:002010-05-19T00:57:32.033-07:00Facial Expression Test<object width="400" height="288"><param name="movie" value="http://www.dailymotion.com/swf/video/x6pfz7_image-metrics-driven-facial-animati_tech"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed type="application/x-shockwave-flash" src="http://www.dailymotion.com/swf/video/x6pfz7_image-metrics-driven-facial-animati_tech" width="400" height="288" allowfullscreen="true" allowscriptaccess="always"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-24892381815138581072010-05-17T15:03:00.000-07:002010-05-17T15:03:06.887-07:00From Zero to Million Users<img style="visibility:hidden;width:0px;height:0px;" border=0 width=0 height=0 src="http://counters.gigya.com/wildfire/IMP/CXNID=2000002.0NXC/bT*xJmx*PTEyNzQxMzM2ODEwNTcmcHQ9MTI3NDEzMzY5Mjk2NCZwPTEwMTkxJmQ9c3NfZW1iZWQmZz*yJm89NGNlYWRiMTA2YzQ1/NDRlMWEyZDU2ZDEyOGQ5MDM4MTQmb2Y9MA==.gif" /><div style="width:400px" id="__ss_3966965"><strong style="display:block;margin:12px 0 4px"><a href="http://www.slideshare.net/adamsmith1/from-zero-to-a-million-users-dropbox-and-xobni-lessons-learned" title="From Zero to a Million Users - Dropbox and Xobni lessons learned">From Zero to a Million Users - Dropbox and Xobni lessons learned</a></strong><object id="__sse3966965" width="400" height="300"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=web2-0talkcopy-dhversion-withfontfinal-100504124328-phpapp02&stripped_title=from-zero-to-a-million-users-dropbox-and-xobni-lessons-learned" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed name="__sse3966965" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=web2-0talkcopy-dhversion-withfontfinal-100504124328-phpapp02&stripped_title=from-zero-to-a-million-users-dropbox-and-xobni-lessons-learned" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="400" height="300"></embed></object><div style="padding:5px 0 12px">View more <a href="http://www.slideshare.net/">presentations</a> from <a href="http://www.slideshare.net/adamsmith1">Adam Smith</a>.</div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-18679104620195814012010-05-17T00:27:00.000-07:002010-05-17T00:27:57.175-07:00RSA Animate - Drive<object width="400" height="300"><param name="movie" value="http://www.youtube.com/v/u6XAPnuFjJc&hl=el_GR&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/u6XAPnuFjJc&hl=el_GR&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="400" height="300"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-24935219865662778182010-05-12T00:46:00.001-07:002010-05-12T00:47:20.220-07:00Text 2.0<object width="400" height="300"><param name="movie" value="http://www.youtube.com/v/8QocWsWd7fc&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/8QocWsWd7fc&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="400" height="300"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-72801369243337539582010-05-06T03:47:00.001-07:002010-05-06T03:47:38.416-07:00Google Chrome Speed Test<object width="400" height="300"><param name="movie" value="http://www.youtube.com/v/nCgQDjiotG0&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/nCgQDjiotG0&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="400" height="300"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-39835734624605792042010-05-04T00:54:00.001-07:002010-05-04T00:55:00.470-07:00BumpTop<object height="300" width="400"><param name="movie" value="http://www.youtube.com/v/6jhoWsHwU7w&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/6jhoWsHwU7w&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="400" height="300"></embed></object>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-272446491715339540.post-55359755432404439032010-05-04T00:50:00.001-07:002010-05-04T00:50:03.839-07:0010/GUI<object height="220" width="400"><param name="allowfullscreen" value="true" /><param name="allowscriptaccess" value="always" /><param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=6712657&server=vimeo.com&show_title=1&show_byline=1&show_portrait=0&color=&fullscreen=1" /><embed src="http://vimeo.com/moogaloop.swf?clip_id=6712657&server=vimeo.com&show_title=1&show_byline=1&show_portrait=0&color=&fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="220"></embed></object><br />
<a href="http://vimeo.com/6712657">10/GUI</a> from <a href="http://vimeo.com/user1415432">C. Miller</a> on <a href="http://vimeo.com/">Vimeo</a>.Unknownnoreply@blogger.com0