Just a very quick post. I was recently watching an episode of Click. On this program they have a feature showcasing some websites. This week 1 of those sites was BookBoon.com. Continue reading “Great Site For Free Books”
The obvious answer to this is course no however I did wonder for a while.
I recently signed up to Twitter (begrudgingly) and after a while I started to find people I really knew being suggested as people in my “Who To Follow” list.
This got me thinking, I have been very specific with the information that I have posted on Twitter. I have also been very specific with who I follow. None of my posts relate or are similar subjects to tweets by other people I know, nor do any of the people I follow (or follow me) have any relation to the people I know out in the real world. This of course got me somewhat confused as to how Twitter knew I had a link to these people. Continue reading “Are Twitter Psychic”
While doing my usual browsing of Amazon I came across Secrets and Lies by Bruce Schneier. I of course added this to my wish list and decided I would take another look at a later date. Some time later I decided to do a cull of my wish list. Unlike most people thou when I do a cull I tend to buy the item to remove it from my wish list.
When I bought the book I though that it was a bit of a gamble but looked ok so worth the risk. How more wrong could I be, this was certainly not a gamble at all.
Bruce starts the book by requesting that you read it numerous times so that the information sinks in and so that information obtained later in the book can be better understood.
The main part and bulk of the book explains many security concerns and explains why traditional thinking of security is incorrect (such as using a 256 bit encryption key is pointless and contains little security if the key was generated from for example the word password). Many aspects of security are covered within this ranging from network security to standard O/S security. At this point the book appears very negative and seems to suggest that there is little you can do to actually stop the impending security breaches.
Luckily as the book goes on the mood changes slightly and prepares you for methods to help combat the security implications that any system will have. These methods range from creating attack tree’s and how you can best decide on the viability of any attack vector and how to start bringing things into your favor instead of the intruders.
Since this book was written there have been many security breaches that have cost the companies involved large amounts of money both from lost revenue and the cost of picking up the pieces. For example this year Sony had a succession of attacks and the cost of the clean up was estimated to be around $140,000,000, this estimate could quite easily increase substantially as Sony’s insurer is also seeking methods for removing their own liability over the issue meaning that any law suits will come out of Sony’s pocket instead of the insurer.
A short while after this Lockheed Martin were found to have been compromised. On investigation it became clear that RSA had been compromised allowing someone to obtain information on the systems which aided in the Lockheed Martin compromise. As a result of this RSA were essentially forced to replace 40,000,000 secure ID devices.
It is not only the financial cost that these companies have suffered there is also the untold damages to their company profile with which the cost can never really be calculated.
Now you may be wondering my point at this stage, well the point is that if only the security of these companies read this book they may have been better prepared. The frightening thing however is that too many companies take security as an after thought. If the price is too high they decide to disregard the advice or not bother.
Although this is a 10 year old book this is certainly worth a read. You can learn so much from this book and it will completely change your perception of security. This book is highly recommended.
For those that are unaware .fi is the ccTLD for Finland. Unlike some ccTLD’s Ficora (they manage the fi regsitry, the site is available in Finnish, Swedish and English) have imposed many restrictions on who can and who cannot register .fi domain names. Continue reading “Registering .Fi Domain Names”
** This was originally written for Lion. More recent versions display the option differently. Instructions at the bottom **
Yesterday Apple officially released the final version of 10.7 of their OS named Lion. For those of you that have upgraded you will notice that when trying to scroll up a page you actually scroll down and vice versa.
This seems a very strange choice for a desktop OS but is perfect for the iPhone (maybe they are trying to cater more for touchscreen monitors). Continue reading “Mac – Mouse Scroll Inverted”
I am currently playing about with objective-c and came across the need to base 64 encode some text. The following is what I came up with however it can obviously do with some improving (note to self must plan code properly before jumping in).
On the 20th of April Sony found that they had a security breach within their services. 7 days later they closed the PSN network and the Quriocity service and announced that 75 million customer details have been stolen. Continue reading “When A Company Should Man Up”
Over the last 20 – 30 years the Music industry and computing industry have been dominated by a small metallic and plastic disc. This disc of course is a CD.
In late 70’s and early 80’s Sony developed and demonstrated this remarkable product to the world paving the way for music to be stored at a great quality for a cheap price. Unlike earlier methods for distributing music (such as the LP and tapes) this method was very strong. Continue reading “End Of An Era”
I have decided to open a Facebook page. https://www.facebook.com/freetherock
EDIT I have cleaned this up a bit and it is now looking a bit sparse. Some of the sites no longer exist and some sites removed the download.
If you are anything like me you will be fanatical about the music you listen too. Many people tend to prefer to download music freely from pirate sites however I prefer to get my music the legitimate way.
Getting music the legitimate way however can become very expensive. What follows is some free legitimate music. Free of course being the best price you can get.
Jamendo offers a large selection of free music ranging from many styles. I am of course only posting ones I have found that I really like but take a browse about you may like what you find.
- Diablo Swing Orchestra – The Butcher’s Ballroom (quite intriguing operatic style vocals)
- Doomsday – Kiss The Fire
- Excess Pressure – Of Dreams and Nightmares
- Fenrir – Frozen Flowers
- Pandemonium – Whispers
- Winterburst – Demo
Last.fm offer free music to listen too and download.
- The Suffering – Bitter Sweet The Suffering
- The Suffering – Unreleased Demo
- The Suffering – Uxfest Live 18.08.97
- Desolator – Mass Human Pyre (Demo, Facebook needed)
- Enslaved – The Sleeping Gods (EP)
- Goreboding Ether – Beyond Conjecture
- Gama Bomb – Tales From The Grave In Space
- Metal Hit Monthly Compilation (new 1 every month)
- Metallica – Numerous Live Concerts (29 at last count and are official downloads)
- The Obscene – The Torment of Sinners
- Sanhedrin – Salvation Through Sin
- Savage Messiah – Plague Of Conscience
- Tranqvillitas Maris – The Longing
- Various Artists – Winter Sampler 2011
- Various Artists – Roadrunner Records – Download Festival Sampler
- Various Artists – Roadrunner Records – Spring Sampler 2011
- Various Artists – This Is Armageddon – Century Media Sampler
- Windrider – A Warrior’s Tale
- Windrider – Muspelheim
- Windrider – To New Lands …
- Within The Fall – A Story To Be Told (Demo)
- Wormrot – Dirge
It may also be worth checking out Suicidal Depressive as well as they also post free music.
I will be trying to keep this up to date and of course I will be adding more all the time so do check back.
If you know of any free music that is not listed be sure to let me know by responding to this post.
THIS WAS WRITTEN A FEW YEARS AGO AND WILL BE REWRITTEN SHORTLY
Since the dot-com bubble burst in the early 2000’s the value and profile of domain names has again been on the increase. Apart from recent financial turmoil caused by the world recession the average value of domain names has increased dramatically and shows no sign of stopping.
Due to the higher profile of domain names and the value that this brought it has unfortunately resulted in a rather unsavoury side effect. The number of stolen and hijacked domain names has increased dramatically over the last few years.
Now many of you may be forgiven for wondering how a virtual item can be stolen or hijacked. Domains, as we know, are not tangible items and are more virtual items. Over the course of this article, I hope to make you aware of ways that can be used to steal your domain name. Only by knowing how domain names can be can we actually protect against it. Continue reading “Securing Your Domain Name”