Pipelines, Bahnlinien und Gebäuden drohen schwere Schäden durch tauenden Permafrost Klimawandel gefährdet arktische Infrastruktur - scinexx | Das Wissensmagazin
Zerstörerische Schmelze: Einem Drittel aller Infrastrukturen in der Arktis drohen schwere Schäden durch tauenden Permafrost. Schon bis 2050 könnten hunderte Kilometer Bahnlinien, Öl- und Gaspipelines und Straßen, aber auch Gebäude und Industrieanlagen beschädigt oder zerstört werden, wie Forscher im Fachmagazin „Nature Communications“ berichten. Mehr als drei Millionen Menschen werden davon betroffen sein.
klimawandel  umwelt 
11 hours ago
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: in(Secure) messaging apps — How side-channel attacks can compromise privacy in WhatsApp, Telegram, and Signal
Messaging applications have been around since the inception of the internet. But recently, due to the increased awareness around mass surveillance in some countries, more users are installing end-to-end encrypted apps dubbed "secure instant messaging applications." These apps claim to encrypt users' messages and keep their content secure from any third parties. -==- However, after a deep dive into three of these secure messaging apps — Telegram, WhatsApp and Signal — we discovered that these services may not fulfill the promises they are meant to keep by putting users' confidential information at risk.
mobile  messenger  privacy 
11 hours ago
Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret - The New York Times
Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret
Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is.
data-dealer  mobile  privacy  security 
11 hours ago
Ausgerechnet die moderne Abgasreinigung erzeugt vermehrt ultrafeine Partikel Kohlekraftwerke als Ultrafeinstaub-Schleudern - scinexx | Das Wissensmagazin
Unterschätzte Feinstaubquelle: Ausgerechnet modernste Kohlekraftwerke stoßen mehr Ultrafeinstaub aus als bisher angenommen. Ihre Emissionen von Partikeln kleiner als 100 Nanometer übertreffen inzwischen sogar die von Städten und dem Straßenverkehr, wie eine Studie enthüllt. Die Folge davon: Die ultrafeinen Teilchen beeinflussen Wolkenbildung und Klima, fördern aber auch extreme Wettereignisse, wie die Forscher berichten.
klimawandel  umwelt 
11 hours ago
PhotoTAN banking on mobile devices is not secure › Friedrich-Alexander-Universität Erlangen-Nürnberg
Mobile banking is convenient – it can be used anywhere, any time, with a single device. More and more people are using this form of banking, and more and more banks are offering this service. The problem is that transactions made using smartphones are not secure. FAU computer scientists have demonstrated this by successfully hacking the photoTAN procedures of three banks. This comes just a year after they highlighted the flaws in the concept of single-device banking by manipulating Sparkasse’s pushTAN app.
banking  security  vulnerability 
Grief Is The Thing With Feathers by Max Porter – scar
Grief Is The Thing With Feathers is reminiscent of Hughes’ Crow but very much a work in its own right. It’s a strange little book and it wasn’t at all what I was expecting after reading the blurb.
Opinion | Macron’s Moment of Truth - The New York Times
Weeks of violent protest by France’s angry working poor are testing a president who promised the people reform but has failed to govern with them, rather than over them.
politik  frankreich 
3 days ago
EU-Innenminister segnen großflächige Internetzensur mit Uploadfiltern ab – netzpolitik.org
Die EU-Mitgliedstaaten ziehen mit der Kommission mit und sprechen sich für Uploadfilter, kaum bewältigbare Löschfristen und privatisierte Rechtsdurchsetzung aus. Im Kampf gegen mutmaßlich terroristische Online-Inhalte riskiert die EU, das Grundrecht auf Meinungsfreiheit erheblich einzuschränken. Nun ist das EU-Parlament am Zug.
meinungsfreiheit  zenzur 
5 days ago
Jonathan Eisen: Meet your microbes | TED Talk
Our bodies are covered in a sea of microbes -- both the pathogens that make us sick and the "good" microbes, about which we know less, that might be keeping us healthy. At TEDMED, microbiologist Jonathan Eisen shares what we know, including some surprising ways to put those good microbes to work.
biology  health  2012 
5 days ago
Christopher Soghoian: Government surveillance — this is just the beginning | TED Talk
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology with the capacity to break into computers, steal documents and monitor activity — without detection. This TED Fellow gives an unsettling look at what's to come.
privacy  security  surveillance  2013 
5 days ago
A Thanksgiving Week Gift for You: “Automated Customer Service” – Whatever
Merry Thanksgiving week! To show my appreciation for you, my readers, here’s a short story I wrote to read aloud while I was touring with The Consuming Fire. It’s called “Automated Customer Service,” and it’s what happens when, in the near future, something goes wrong with a household appliance and you have to navigate an automated call system to get help. For extra added fun I did an audio version as well, with my voice fiddled with just a bit to replicate the true automated customer service experience. Enjoy.
story  science-fiction 
8 days ago
Blockchain by Example in SQL Server – Benjamin Campbell – Medium
In this post I’m going to demonstrate how a blockchain works using nothing but SQL Server. I’m not suggesting this as an ideal implementation. I decided to make this demo self-contained since I’m focusing mostly on the schema and data, my target audience is database professionals, and SQL Server has all the required cryptographic functions.
blockchain  sql 
10 days ago
The Insect Apocalypse Is Here - The New York Times
Because insects are legion, inconspicuous and hard to meaningfully track, the fear that there might be far fewer than before was more felt than documented. People noticed it by canals or in backyards or under streetlights at night — familiar places that had become unfamiliarly empty. The feeling was so common that entomologists developed a shorthand for it, named for the way many people first began to notice that they weren’t seeing as many bugs. They called it the windshield phenomenon.
klimawandel  insekten 
13 days ago
Flurry (company) - Wikipedia
Flurry is a mobile analytics, monetization, and advertising company founded in 2005. The company develops and markets a platform for analyzing consumer interactions with mobile applications, solutions for marketers to advertise in-apps, as well as a service for applying monetization structures to mobile apps.[1] Flurry analyzes 150 billion app sessions per month.
data-dealer  mobile  analytics 
13 days ago
Euro consumer groups: We think Android tracking is illegal • The Register
Euro consumer groups: We think Android tracking is illegal
Pops open can of GDPR beef: Thanks to 'dark patterns' and 'nudging', no doesn't mean no
data-dealer  tracking 
13 days ago
What You Need to Know about rel=”noreferrer” Attribute - TechWyse 'Rise to the Top' Blog
If the rel=noreferrer attribute is added to a link, no referrer information will be leaked. The ultimate aim is not to pass the HTTP referrer header when a person clicks on the hyperlink. If no information is in the header, then it will not be tracked by analytics tools.
webdesign  webmaster  privacy 
16 days ago
Remote Access - Termux Wiki
Termux is capable of accessing remote devices by using some common tools. It is also possible to turn a device running Termux into remote controlled server.
android  ssh  termux 
18 days ago
Einzigartige Weihnachtszeit 2018
Auch 2018 bietet Schloss Drachenburg in Königswinter seinen Besuchern die "Einzigartige Weihnachtszeit" an den vier Adventswochenden. Unter dem Motto "Charles Dickens – Eine Weihnachtsgeschichte" begeben sich die Besucher auf eine Zeitreise ins 19. Jahrhundert. Am Samstag, 1. Dezember, öffnet das prachtvolle Schloss dann seine Tore und lädt die Besucher zu einer besonderen und entschleunigten Vor- und Weihnachtszeit ein.
Die rund 50 bewährten und neuen Aussteller begeistern die Gäste mit kulinarischen Köstlichkeiten, regionalen Produkten und einigen Überraschungen. An den vier Adventswochenenden heißt es für die Besucher: Fallen lassen, Einstimmen auf die Weihnachtszeit und dem Massenkonsum entfliehen. Im traumhaften Schlossambiente werden die Besucher an die Hand genommen und durch die Weihnachtswelt von Ebenezer Scrooge begleitet. Die Inszenierungen des Klassikers von Charles Dickens erweckt die Geister der Weihnacht und die vielen Figuren der Weihnachtsgeschichte zum Leben.
2018  region 
18 days ago
No One Wants to Talk About How Completely We Were Lied to - ExtremeTech
Two days ago, the New York Times published a comprehensive story on the degree to which Facebook fought all attempts to investigate its role in spreading Russian hoaxes and lies, both as it pertained to the 2016 election and well beyond. The story opens with Sheryl Sandberg, COO of Facebook, angrily accusing the then-security chief Alex Stamos of throwing the company “under the bus.” His crime? Being honest with Facebook board members about the fact that FB had failed to contain or even understand the deliberately inflammatory and false content shared on its service by agents of a foreign power in a deliberate effort to divide the American people. Its portrait of her and Mark Zuckerberg does not improve in the later paragraphs. This took place in September 2017, almost a year after the election and long after credible reports about the role social media had played in disseminating actual fake news had surfaced.
20 days ago
USB Type-C™’s Configuration Channel – Benson Leung – Medium
I’ve been getting questions about why certain kinds of USB adapters or cables work to charge new USB Type-C™ devices, and why other adapters are necessary to charge legacy devices from USB Type-C chargers.

This post will explain why and will do a deeper dive into USB Type-C’s Configuration Channel (CC).
hardware  usb 
20 days ago
METTIS Metz fährt Busway in LeMet' - 2mecs
Auf zwei Linien von annähernd 18 km Streckenlänge fahren Busse in Straßenbahn-Optik. Sie verkehren auf eigenen Fahrstreifen und haben an Ampeln Vorrang-Schaltung. Gebaut wurden die 27 Fahrzeuge des „Bus à haut niveau de service“ (BHNS, Busway oder BRT Bus Rapid Transit) mit einer Kapazität von jeweils 150 Passagieren vom belgischen Hersteller Van Hool (Typ Equi.City, wie sie auch in Parma und Barcelona eingesetzt werden).
auto  frankreich  verkehr 
21 days ago
Die Blockchain und die Zensur | Notizblog
Ich mach mich ja oft über Blockchain-Enthusiasten lustig — und ab und zu denke ich: Ja, absolut zurecht. Jetzt springt auch noch die US-Bürgerrechtsbewegung ACLU auf den Blockchain-Zug auf — und lässt Edward Snowden erklären, warum die Technik so super ist.
blockchain  critique 
21 days ago
Blogger: User Profile: Graf von Blickensdorf
Dieser Blog dient vor allen Dingen der Förderung des Adels, der Kultur und des Humors und wird erstellt von Lo Graf von Blickensdorf, Künstler, Journalist, Cartoonist und Autor der Bücher "Werden Sie doch einfach Graf!" und "Abnehmen mit Torte", erschienen im Rotbuch Verlag und Hey!publishing. Wer einen Rechtschreibfehler findet, darf ihn behalten.
blog  cartoon 
22 days ago
Suchmaschinen: Datensicher suchen mit DuckDuckGo, Qwant und Co.
Kann man das Web durchsuchen, ohne die eigene Privatsphäre zu gefährden? Eine ganze Reihe von Anbietern präsentieren sich als datenschutzfreundliche Alternative zu Google, Bing und Co. Sie lassen sich bequem im üblichen Browser oder über eine eigene App nutzen.
search-engine  privacy 
23 days ago
Suchmaschine DuckDuckGo: Googlen ohne Google - SPIEGEL ONLINE
Ein einziger Konzern hat die Internetsuche in weiten Teilen der Welt fest im Griff. Die Suchmaschine DuckDuckGo will an Googles Dominanz gar nicht viel ändern. Sie soll vielmehr eine Nische füllen: mit praktischen Funktionen und Datenschutz.
2012  DuckDG  search-engine 
23 days ago
A leaky database of SMS text messages exposed password resets and two-factor codes – TechCrunch
A security lapse has exposed a massive database containing tens of millions of text messages, including password reset links, two-factor codes, shipping notifications and more. -==- The exposed server belongs to Voxox (formerly Telcentris), a San Diego, Calif.-based communications company. The server wasn’t protected with a password, allowing anyone who knew where to look to peek in and snoop on a near-real-time stream of text messages.
hack  security  sms 
24 days ago
ProtonMail - Swiss-based private email
Official subreddit for ProtonMail, an secure email service based in Switzerland. ProtonMail is privacy-focused, uses end-to-end encryption, and offers a clean user interface and full support for PGP and standalone email clients.
email  privacy  security 
25 days ago
How to Build a Low-tech Internet - LOW-TECH MAGAZINE
Wireless internet access is on the rise in both modern consumer societies and in the developing world. [...] If we want the internet to keep working in circumstances where access to energy is more limited, we can learn important lessons from alternative network technologies. Best of all, there's no need to wait for governments or companies to facilitate: we can build our own resilient communication infrastructure if we cooperate with one another. This is demonstrated by several community networks in Europe, of which the largest has more than 35,000 users already.
internet  lowtech 
25 days ago
How to Downsize a Transport Network: The Chinese Wheelbarrow - LOW-TECH MAGAZINE
For being such a seemingly ordinary vehicle, the wheelbarrow has a surprisingly exciting history. This is especially true in the East, where it became a universal means of transportation for both passengers and goods, even over long distances. -==- The Chinese wheelbarrow - which was driven by human labour, beasts of burden and wind power - was of a different design than its European counterpart. By placing a large wheel in the middle of the vehicle instead of a smaller wheel in front, one could easily carry three to six times as much weight than if using a European wheelbarrow.
history  technology 
25 days ago
Passive WIFI Surveillance and Access Point Hijacking — ENISA
To reduce user burden when re-connecting to known AP, devices typically cache credentials and SSIDs and scan for nearby APs. If a known AP is discovered, the device re-connects automatically to it. Although APs periodically announce their SSID and it is possible to scan them passively, the preferred way for scanning is active scanning by the client using WIFI probe request frames. A probe request is essentially a broadcast question: "Is AP with SSID xxxx listening? Please respond".
security  wifi  vulnerability 
27 days ago
Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities
While examining the functionality of three vendors' device tracker products, a number of issues surfaced that leak personally identifying geolocation data to unauthorized third parties. Attackers can leverage these vulnerabilities to locate individual users' devices, and in some cases, alter geolocation data for those devices. The table below briefly summarizes the twelve vulnerabilities identified across three products.
bluetooth  privacy  vulnerability 
28 days ago
CSU-Chef Horst Seehofer: Politiker ohne Verantwortung | FR.de
Horst Seehofer hat bei seinem Feldzug gegen Angela Merkel dem Ansehen von Parteien, Politikern und dem Staat geschadet wie kaum ein Minister vor ihm. Eine Analyse von FR-Chefredakteur Arnd Festerling.
29 days ago
Jemens Reichtum als Kriegsgrund? Zweiter Versuch | Telepolis
Fragen wir uns noch einmal: Was steckt hinter dem Saudi/Emirati/US/GB-Krieg gegen den Jemen wirklich? [...] Trotzdem: Die an meinem Artikel vorgebrachte Kritik ist zum Teil berechtigt. Durch die zahlreichen Reaktionen hoffentlich etwas gewiefter geworden, stelle ich in diesem neuen Beitrag mein Untersuchungsmikroskop nunmehr entsprechend schärfer ein. Wohl wissend, dass allein schon auf diese Ankündigung hin viele Leser abschalten werden. Doch für die schreibe ich eh nicht.
29 days ago
Twitter CEO Jack Dorsey Says Follower Count is Meaningless - Slashdot
In a fireside chat in New Delhi, India, Twitter CEO Jack Dorsey said Monday the "follower count" metric on the social platform is meaningless. Talking in front of a live audience, the Twitter co-founder said it was probably unwise to include and emphasize on the follower count on his social network, a move he said the company did not realize while implementing it back in the day. "Back then, we were not really thinking about all the dynamics that could ensue afterwards," he said.
social-media  twitter 
29 days ago
Exosomes 'swarm' to protect against bacteria inhaled through the nose
Bacteria are present in just about every breath of air we take in. How the airway protects itself from infection from these bacteria has largely remained a mystery—until now. When bacteria are inhaled, exosomes, or tiny fluid-filled sacs, are immediately secreted from cells which directly attack the bacteria and also shuttle protective antimicrobial proteins from the front of the nose to the back along the airway, protecting other cells against the bacteria before it gets too far into the body.
gesundheit  health 
4 weeks ago
CSS Border-Radius Can Do That? – 9elements – Medium
How to create very cool effects with a rarely used feature. TL/DR: When you use eight values specifying border-radius in CSS, you can create organic looking shapes. WOW. No time to read it all ? — we made a visual tool for you.
css  webdesign 
4 weeks ago
Google’s stealthy sign-in sentry can pick up pilfered passwords – Naked Security
The second, apparently timed to coincide with 31 October, was that Google is yet again modifying the background security checks it performs during accounts sign-in as well as modifying its recovery process in the event of unauthorised access. There’s also important news if you’re a hold-out against enabling JavaScript. -==- The main tweak is that Google is upping its detection of people pretending to be you. If you’re unwittingly tricked into handing over your Google username and password in a phishing attack, all isn’t lost. Google thinks it can distinguish a sign-in by the phishing attacker from a sign-in by you.
google  security 
5 weeks ago
Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
The researchers tested these methods against well known and popular SSD drives such as the Crucial MX100, Crucial MX200, Crucial MX300, Samsung 840 EVO, Samsung 850 EVO, Samsung T3 Portable, and Samsung T5 Portable and were able to illustrate methods to access the encrypted drive's data.
encryption  hardware  SSD  vulnerability 
5 weeks ago
Serdar Somuncu | Aktuell - Oliver Polak - eine Analyse
In den letzten Tagen geistert eine Debatte durch die Medien, in der es mal wieder um die Frage geht ab wann etwas beginnt Antisemitismus zu sein und bis wann es nur ein harmloser Witz ist. Opfer dieser absurden Debatte wurde diesmal der Fernsehmoderator Jan Böhmermann. [...] Das Motto meines Programmes lautet nicht umsonst ,,Jede Minderheit hat ein Recht auf Diskriminierung". Es ist eine bewusst gewählte Umkehrung der Verhältnisse. Es ist ein Statement gegen geheuchelte Political correctness und all diejenigen, die ihr Engagement gegen Fremdenfeindlichkeit und Antisemitismus zum oberflächlichen Fetisch gemacht haben.
5 weeks ago
Everything You Need To Know About Black Lab Linux | UbuntuPIT
We are going to talk about Black Lab Linux. Obviously, it is a very popular 64 bit Linux based operating system. This operating system is very much useful for commercial desktop and server environment. The team creates this operating system for doing educational and business task with high comfort and that is why it works better on these cases also.
linux  ubuntu 
5 weeks ago
Mastodon is big in Japan. The reason why is… uncomfortable | … My heart’s in Accra
The enthusiasm earlier this year about Mastodon centered on the idea that the new distributed service could be like Twitter without as much harassment and hate speech. And indeed, using Mastodon is a lot like using Twitter – specifically, using Twitter through the excellent Tweetdeck client, which Rochko admits was his design inspiration – the structure of the service is sharply different from a centralized service like Twitter.
censorship  mastodon  social-media 
5 weeks ago
The Decentralized Web — MIT Digital Currency Initiative
A report by the MIT Digital Currency Initiative and the Center for Civic Media -==- The Web is a key space for civic debate and the current battleground for protecting freedom of expression. -==- And yet, since its development, the Web has steadily evolved into an ecosystem of large, corporate-controlled mega-platforms which intermediate speech online. In many ways this has been a positive development; these platforms improved usability and enabled billions of people to publish and discover content without having to become experts on the Web’s intricate protocols.
paper  social-media  web 
5 weeks ago
What is iBeacon? A Guide to Beacons | iBeacon.com Insider
The term iBeacon and Beacon are often used interchangeably. iBeacon is the name for Apple’s technology standard, which allows Mobile Apps (running on both iOS and Android devices) to listen for signals from beacons in the physical world and react accordingly. In essence, iBeacon technology allows Mobile Apps to understand their position on a micro-local scale, and deliver hyper-contextual content to users based on location. The underlying communication technology is Bluetooth Low Energy.
apple  bluetooth  IoT 
5 weeks ago
Abmahngefahr DSGVO ? – basic
In einer Mischung aus Eigeninteressen haben Verbände, Netz-Speaker, Politiker, Medienmacher und Rechtsanwälte die Angstmeute bewusst und gezielt vor sich dahergetrieben, wie eine Herde Schafe. Da sich auch Blogger ohne jegliches Gefühl für ihre Mitverantwortung – wer publiziert trägt für Dritte Mitverantwortung, nicht nur für seine eigenen, zumeist langweiligen AdSense-Einnahmen – in das Jammertal haben mitreißen lassen, ist mein Mitgefühl maximal begrenzt.
DSGVO  blogging 
5 weeks ago
USB-C Was Supposed to Be a Utopia, But It's Become a Nightmare | Digital Trends
When the transition to USB-C began, we were all promised a better life. Connections would be faster and simpler. One connection to end all connections. The reality of what happened couldn’t be further from that dream. -==- USB-C is a mess. The way manufacturers implement and communicate its features is confusing — and downright misleading at times. This wasn’t how it was supposed to be.
hardware  usb 
5 weeks ago
Kostenvergleich: Elektroauto oder Verbrenner - was ist günstiger? - ecomento.de
Elektroauto-Kostenvergleich des ADAC: Voll-Stromer “überraschend günstig”
auto  elektro 
5 weeks ago
So you want to reform democracy – Civic Tech Thoughts from JoshData – Medium
People are rationally ignorant. We want to live our lives. If everyone had to participate in every vote, there would be no time left to live. People don’t want a direct democracy.
politik  technology 
5 weeks ago
4 Wahrheiten über Elektroautos im Winter - drivestyle.at
Elektromobilität und die kalte Jahreszeit – eine schwierige Beziehung. Fakt ist: Über die Praxistauglichkeit von Elektroautos bei Minustemperaturen kursieren unzählige Fake News. Höchste Zeit also, das Thema seriös aufzuarbeiten und Klarheit in das Thema zu bringen.
auto  elektro 
5 weeks ago
Hacking | elkemental Force
I am joining the ranks of self-proclaimed productivity experts: Do you feel distracted by social media? Do you feel that too much scrolling feeds transforms your mind – in a bad way? Solution: Go find an online platform that will put your mind in a different state. Go hacking on hackthebox.eu.
hacking  pentesting  social-media 
5 weeks ago
Cyber Something | elkemental Force
You know you have become a dinosaur when you keep using outdated terminology. Everybody else uses the new buzz word, but you just find it odd. But someday it will creep also into your active vocabulary. Then I will use the tag cyber something, like stating that I work with cyber-physical systems.

But am I even right about the emergence of new terms? I am going to ask Google Trends!
sprache  statistik 
5 weeks ago
Maps Mania: Global Warming of the Seas
Global warming has led to rising water temperatures around the world. Reuters has released an interactive globe which visualizes how the sea temperature is rising and how this is affecting marine life around the world.
klimawandel  umwelt  maps 
5 weeks ago
New org-mode mobile client is out and it's name is "Organic" : emacs
different approach to files content - it's more like a browser with edit features, so when you press on headline it will open new screen with this headline as root, then you can use slider on top to fold/unfold whole levels of ascendants. If you want edit headline - press it with two fingers or use batch mode
android  app  orgmode 
6 weeks ago
Wordsmith.org : The magic of words. word, language, quote, quotation, anagram, dictionary, words, languages, quotes, quotations, anagrams, dictionaries
Welcome to Wordsmith, the home of: A.Word.A.Day • discover the magic of words • Pangram Finder • find pangrams in anything • Internet Anagram Server • find the wisdom of anagrams • The Anagram Times • all the news that's fit to anagram • Wordsmith Books • our books on words • Wordsmith Chat • live chat with authors • The Wordserver • lookup services • Listat • list stats
sprache  writing 
6 weeks ago
Parasitismus: 10 Parasiten, die Tiere zu Zombies machen - Spektrum der Wissenschaft
Neuroparasiten befallen gezielt das Nervensystem ihres Wirts und manipulieren dieses für ihre eigenen Zwecke. Der Parasit hat deshalb gar kein Interesse, seinen Wirt zu töten. Im Gegenteil, er muss behutsam vorgehen, um ihn optimal auszunutzen. Nur so kann er sein Ziel, die Fortpflanzung, erreichen. Wir stellen 10 Parasiten vor, die ihre Wirte zu regelrechten Marionetten machen können.
biologie  chemie  verhalten 
6 weeks ago
Self without body: Texual self-representation in an electronic community | Giese | First Monday
This paper examines how a textual mode of communication has combined with the new technologies of computer-mediated communication (cmc) to produce interesting new opportunities for social interaction and presentation of self. These opportunities are in turn used in ways that promote the process of community in a text-based electronic environment. This paper first examines some of the common textual adaptations this electronic communications environment engenders. It then examines how one Internet newsgroup, alt.cyberpunk, developed a cooperative narrative in which participants made presentations of self that, in other venues, might be considered "fictional" but must be accepted at face value in a way similar to the manner in which presentations of self are accepted within physical environments. The paper concludes that these new opportunities for self-presentation are engendered by the tightened feedback loop that cmc technologies bring to a textual mode of communication. "Real-time" textual interaction engenders a novel new social environment.
excavation  cyberpunk 
6 weeks ago
unconnected: steve's letters Archives
Net-dwellers awake! Civilization is encroaching on the fragile Internet. Overpopulation and over-regulation threaten the existence we have enjoyed all these billions of cycles. Telcos are staking claims to parts of this territory. Lawyers already think it's in their pocket. Librarians are putting up guard rails and sign posts, distributing little guide books, while even some of our very own are installing stop lights, electric fences, taser fields to control and monitor traffic patterns, naughty packets, and new nodes.
6 weeks ago
See Me, Hear Me | WIRED
Much to the chagrin of, say, members of the Internet Wilderness Society, multimedia development is fast encroaching on Internet back country: ASCII domination is being challenged by the likes of Mosaic and Internet video capability. While it helps to have a Sun SPARCstation and an MBONE (Multicast Backbone) feed, garden variety Mac and Windows machines (the Swiss army knives of the Internet) are worthy companions as you embark on video and audio online expeditions. Your computer will need its own numeric Internet address: SLIP and PPP will work, but they can be so sluggish that your connection will be reminiscent of a drive up a steep mountain road behind a Winnebago.
excavation  history  internet 
6 weeks ago
Hanks Welt; Kirchensteuer
Die Immunisierung der Amtskirche beruht auf der Sicherheit ihrer Repräsentanten, die Finanzierung sei nachhaltig gesichert. Dreht man ihnen den Geldhahn zu, würde dies eine positive Erschütterung auslösen.
gesellschaft  politik 
6 weeks ago
Usenet Interview with Brian Reid - Usenet History
A former Backbone Cabal member, Brian Reid was instrumental in the creation of the alt.* hierarchy. He received the Association for Computing Machinery's Grace Murray Hopper Award in 1982 for his doctoral thesis at Carnegie-Mellon University, in which he designed the Scribe word processing system, [...]
history  interview  usenet 
7 weeks ago
Image Sharing for Everyone -==- A free and ethical photo sharing platform.
images  opensource  social-media 
7 weeks ago
USENET Traffic Flow Maps - Mappa.Mundi Magazine - Map of the Month
Knowledge of how much data traffic flows between different points on the globe is pretty much non-existent today. There are very few publicly available traffic maps and those there are tend to be country-level aggregations [1] or just limited to a single company’s network. In fact, it is likely that we knew more about data flows in cyberspace ten years ago than we do today. One of the most notable traffic mapping projects, from an era before the Internet went mainstream in the mid 90s, was undertaken by Brian Reid. Starting in 1986, he produced very detailed maps of traffic flows for the USENET network for nearly a decade.
history  usenet 
7 weeks ago
Mobile development suite: How to use Termux + my setup
Termux is a debian chroot for Android, grossly oversimplifying. It has its own package manager, utils and runs on ARM/ARM64 and X86/64. I’ve used this app to solve all sorts of tasks, from programming, reading, doing homework and generally being productive.
android  termux 
7 weeks ago
Get organized at the command line with Calcurse | Opensource.com
Do you need complex, feature-packed graphical or web applications to get and stay organized? I don't think so. The right command line tool can do the job and do it well.
calendar  opensource  gtd 
7 weeks ago
Umweltbelastung: Streit um Diesel-Pkw geht am Problem vorbei - Spektrum der Wissenschaft
Die Lkw-Flotte, Kleintransporter und Busse emittieren – so wie sie heute unterwegs sind – unserer Berechnung nach mehr als 50 Prozent der Stickoxide in deutschen Innenstädten. Die Einsparmöglichkeiten sind dort deswegen viel größer als bei den Diesel-Pkw, die nur ein Drittel der Stickoxide verursachen
stickoxid  umwelt 
7 weeks ago
Fakten über Dihydrogenmonoxid (DHMO)
Dihydrogenmonoxid (DHMO) ist eine farblose und geruchlose Chemikalie, manchmal auch bezeichnet als Dihydrogen Oxid, Hydrogen Hydroxid, Hydronium Hydroxid oder einfach Hydritsäure. Seine Basis ist das instabile Radikal Hydroxid, eine Komponente, die in vielen ätzenden, explosiven oder giftigen Stoffen vorkommt, wie z. B. Schwefelsäure, Nitroglizerin und Ethyl-Alkohol.
gesundheit  humor  funny 
7 weeks ago
„Diskriminierend ist das auf jeden Fall“ – humanistisch!net
Der Sprachwissenschaftler Anatol Stefanowitsch ist Autor des vor kurzem erschienenen Buchs „Eine Frage der Moral: Warum wir eine politisch korrekte Sprache brauchen“. Er meint, im Wort „konfessionslos“ zeige sich ein klassischer Mechanismus diskriminierender Sprache, wie er in rassistischen und anderen menschenfeindlichen Begriffen zum Ausdruck kommt. Er sagt auch, das Thema diskriminierungsfreie Sprache sollte schon in der Schule behandelt werden.
7 weeks ago
"Augenblick mal: Die Welt geht unter, aber wir reden darüber, ob die AfD gestärkt wird?", sagt Klaus Töpfer - n-tv.de
Was ist wichtiger: Prinzipientreue oder Pragmatismus? Der frühere Umweltminister Klaus Töpfer hält nichts davon, wenn Politiker "mit großem Aplomb" zurücktreten, weil sie ihre Positionen nicht durchsetzen können. Dabei wünscht er sich eine deutlich radikalere Klimapolitik. Über die politische Gegenwart sagt er: "Ich bemühe mich sehr, nicht in Verzweiflung zu verfallen."
klimawandel  umwelt 
7 weeks ago
BCG vaccine can reverse Type 1 diabetes to almost undetectable levels, eight-year study shows
US researchers found that just one jab, followed by a booster four weeks later, brought down average blood sugar levels to near normal within three years, and the effect lasted for the following five years.
7 weeks ago
WebPerl | Run Perl in the browser with WebPerl!
WebPerl uses the power of WebAssembly and Emscripten to let you run Perl 5 in the browser! WebPerl does not translate your Perl code to JavaScript, instead, it is a port of the perl binary to WebAssembly, so that you have the full power of Perl at your disposal!
perl  web  www 
7 weeks ago
Lebensmittel: Nachhaltige Ernährung für zehn Milliarden | FR.de
Wissenschaftler haben untersucht, wie alle Menschen satt werden und gesund leben können, ohne Umwelt und Klima zu schädigen.
ernährung  klimawandel  umwelt 
7 weeks ago
There Is No Excuse to Keep Using Facebook – Member Feature Stories – Medium
The writing is on the wall. Facebook is detrimental to global discourse, has harmed democracies around the world, and, because of its dependence on advertising, has responded to criticism by making only minor, cosmetic changes. Mark Zuckerberg and his team will continue to allow the social network to be a haven for fake news, hoaxes, threats, and much, much worse. It’s gotten to the point that Zuckerberg said this summer that Holocaust deniers won’t be removed from the platform, and pages of known hoax or hate purveyors like InfoWars aren’t getting booted until the damage is long done.
social-media  walled-garden 
7 weeks ago
Forscher warnen vor Tracking via TLS | heise Security
TLS Session Resumption soll den Aufbau verschlüsselter Verbindungen beschleunigen. Es ermöglicht aber unter Umständen auch, den Anwender im Netz zu verfolgen.

Vier Forscher der Uni-Hamburg warnen vor einer bislang wenig diskutierten Gefahr für die Privatsphäre von Internet-Nutzern: Ausgerechnet die immer weiter um sich greifende Verschlüsselung der Daten mit TLS ermögliche es, die Anwender beim Surfen im Internet zu verfolgen, warnen Erik Sy und Kollegen.
2fhg  privacy  security 
7 weeks ago
Disk On Module: Gesteckte SSDs im Miniaturformat - Golem.de
Mach Xtreme Technology hat vier SSDs im DOM-Format vorgestellt. Diese Disks On Module sind sehr kleine Flash-Speicher, die direkt an den SATA-Anschluss des Mainboards gesteckt werden.
hardware  SSD 
7 weeks ago
The Enchanting History of Notre Dame Cathedral's Famous Gargoyles and Grotesques
Notre-Dame Cathedral in Paris is celebrated as one of the most exquisite examples of Gothic architecture. Constructed in the Middle Ages, the church has welcomed worshippers and sightseers for centuries, inspiring awe with its sky-high spires, ethereal stained glass windows, and spell-binding sculptures.
architecture  history  paris 
7 weeks ago
Veil: Die Datenschutz-Grundverordnung: des Kaisers neue Kleider -- NVwZ 2018, 686 - beck-online
Ein wenig erinnert der Hype um die Datenschutz-Grundverordnung (DS-GVO) an die Aufregung über des Kaisers neue Kleider in Hans Christian Andersens Märchen.1 Politiker, Datenschutzaufsichtsbehörden, betriebliche und behördliche Datenschutzbeauftragte, Rechtsanwälte, Unternehmensberater, IT-Spezialisten, Wissenschaftler, Privacy-Aktivisten und nicht zuletzt die Europäische Kommission – alle singen das Hohelied des neuen Datenschutzrechts. Zwar gibt es einige einsame Rufer, die in ihm ein „Frankenstein-Monster“,2 die „größte Katastrophe des 21. Jahrhunderts“,3 die „digitale Konterrevolution“4 oder die „Perfektion einer Sackgasse“5 sehen. Allein – das kleine Kind, das erkennt, dass der Kaiser nackt ist, lässt noch auf sich warten.
DSGVO  recht 
7 weeks ago
« earlier      
2017 2fhg @goodie @toread accessibility admin ai ajax algorithm amazon android animation apache app apple architecture art article articles artikel audio authentication auto backup biblio blog blogging bonn book books botanik browser cartoon certificate cgi coding collaboration comic common-lisp community cool critique cryptography css culture data-dealer database datenschutz debian del.icio.us design deutsch development dhtml dns documentation dsgvo ebook editor emacs email encoding encryption ernährung essay essen faq filesystem firefox flash forum foto fotografie framework frankreich free fun funny gallery game garten geek generator geschichte gesundheit gnupg google gpg gplus graphics gtd hack hal-faber hardware hausbau heise history howto html humor identity image imagemagick intel internet interview java javascript klimawandel knowhow kochen kultur kunst lang:fr language latex library linux lisp literature lvm mac macintosh mailing-list map math microsoft mobile mta mua museum music musik mysql network networking newsticker opensource openssl opinion oreilly orgmode osx palm paper password pdf people perl pflanzen pgp philosophy photography php pki politik portal postfix privacy productivity programming proxy psychology python recht reference region religion research resource review rezept rfid ruby satire science scripting sdw security social-media software spam sprache ssh ssl standard stock surveillance sysadmin technology tim-oreilly tips tool tools tour tracking tutorial ubuntu umwelt unicode unix urlaub usability usenet utility via:usenet video visualization vulnerability web web2.0 webdesign webmaster wiki wikipedia writing wwww xml xrefs ökologie

Copy this bookmark: