Archive for January 31, 2013

Does Twitter’s Vine have a porn problem?

vine-twitter

But Twitter’s new video-sharing app, Vine, is under scrutiny after early adopters started using it to flash six-second porn clips to the app’s users and to the larger Twitter community.

READ: On Data Privacy Day, Twitter and Google focus on government requests

It’s an issue that has Twitter scrambling to appease concerns. And it’s raising questions about how Apple, the only place where smartphone users can download the app, will respond after recently banning other apps that provide access to sexual content.

The issue gained attention Monday when Vine users noticed a video of what was described as hard-core pornography showcased in the prominent Editor’s Picks section of the mobile app.

READ: Twitter must identify racist, anti-Semitic posters, French court says

Users took to the comment section of that video to complain. Twitter apologized Monday, saying it was a mistake.

Mom: Vine can expose kids to bad content

“A human error resulted in a video with adult content becoming one of the videos in Editor’s Picks, and upon realizing this mistake we removed the video immediately,” the company said in a statement sent to CNN. “We apologize to our users for the error.”

Released Thursday, Vine is a Twitter-owned app that lets users create and share videos lasting up to six seconds. As with photo-sharing app Instagram, Vine users can follow other people, whose posted videos show up in a feed on their phones or can be shared on Twitter and Facebook. The app is available only for the iPhone, iPad and iPod touch.

Vine’s Apple-only status raises interesting questions. Just last week, Apple banned image-sharing app 500px from its App Store because it could give users access to sexual content. The 500px app features artistically rendered nudes among lots of other photos, but so do other apps with user-generated content, such as Tumblr, which remain available on Apple’s iOS mobile system.

READ: Will Twitter war become the new norm?

The Vine app is rated 12+ on iTunes for “infrequent/mild sexual content or nudity,” among other reasons, meaning it’s deemed appropriate for users 12 or older. As of Monday, it was the fifth most popular free app in the App Store.

Apple did not immediately reply to a message seeking comment for this story. Vine had been listed on Apple’s own Editor’s Choice list as early as Monday morning, but appeared to have been removedby Monday afternoon.

Apple observers Monday were noting the strange position the company finds itself in. Apple has famously kept tight reins on what appears in its App Store and on its mobile operating system in general. The late CEO Steve Jobs famously argued that control on the front end delivers a user experience free from porn, spam and other digital unpleasantness.

But as the digital Web grows and evolves, it’s becoming tougher to parse the blurry line between apps that promote adult content (and which are turned down or banned by Apple as a matter of course) and those which simply provide access to such fare.

What, for example, is the distinction between the banned 500px app and the app for Tumblr, the blogging platform which, among its millions of blogs, includes many that host explicit sexual content?

“From the start, Apple has said they’d get the App Store wrong, and come across things they didn’t anticipate, but that they’d learn and grow,” said Rene Richie, editor of Apple-centric blog iMore, in a post Monday. “This particular problem has been around for years, but as social sharing has become easier, it’s come to the surface again.”

Interestingly, it was just a little less than a year ago that Apple banned Viddy, a video-sharing app that has been compared to Vine, because it gave access to user-generated adult videos. The Viddy app was eventually returned to the App Store.

On Twitter’s end, the anything-goes aspect of Vine jibes with the site’s overall philosophy. Compared to Facebook, which believes social sharing is best when tied to a user’s true identity and real-world networks, Twitter allows its users to register under fake names and has fought governments and law-enforcement agencies seeking user information.

As such, Twitter has taken a more hands-off approach on adult content. It’s not hard to hunt down hashtags its users are employing to share adult content on a daily basis. (#TwitterAfterDark becomes a trending topic on the site nearly every day — clicker beware).

By contrast, searching for several suggestive hashtags (such as #naked or #porn) on Instagram, the popular photo-sharing app bought by Facebook last year, render no results. Because Instagram is an Apple-like closed environment, sexually explicit images are difficult, if not impossible, to find there.

By Monday afternoon, hours after Vine had apologized and deleted the porn video from its Editors Picks, what uproar there was online was subsiding.

As some observers noted, Vine isn’t otherwise experiencing anything new in the tech world.

“As virtually every new video or photo-sharing service has shown us since the dawn of the Internet, from Flickr to ChatRoulette, it’s very difficult to keep these sites or apps G-rated. So the companies either learn how to police it well, like Flickr does, or they wither and die, as ChatRoulette did,” wrote The Atlantic Wire’s Adam Clark Estes in a post titled “Vine has a porn problem because, of course it does.”

In a statement to CNN, Twitter noted what had already become apparent on the app — that users can report videos they deem inappropriate.

“Videos that have been reported as inappropriate have a warning message that a viewer must click through before viewing the video,” a spokesperson said in the statement. Reported videos that are determined to violate Vine guidelines will be removed from the site and the user account that posted them may be terminated, according to the statement.

Vine’s terms of service ban illegal activity, harassment or abuse and behavior such as impersonating another user or violating trademark and copyright.

 

courtesy: http://edition.cnn.com/2013/01/28/tech/social-media/vine-porn-twitter/index.html

Apple releases new iPad with 128 GB of storage

apple_ipad_box

apple_ipad_boxApple added a new member to its iPad line on Tuesday, offering a 9.7-inch Retina iPad with 128 gigabytes of storage — doubling the tablet’s previous max capacity.

Everything else about Apple’s tablet is the same, including the dual-core A6X processor, 2 gigabtyes of RAM, and 10 hours of battery life.

 

To account for the added storage space, the 128 GB Wi-Fi model will now cost $799, while the LTE model will cost $929.

To offer some differentiation from its other iPads — which start at $329 for the iPad mini — Apple is targeting the new model primarily at professional users, including those in the architectural and medical fields who handle large files. Gamers, movie fans and avid magazine readers are also likely to appreciate the extra storage space.

The abrupt release marks a shift in how Apple (AAPLFortune 500) is updating the iPad. Instead of rolling out new iPads once a year or so, as it does with iPhones and iPods, Apple is now treating the iPad more like its Mac line, releasing incremental updates to existing models. (Tech blogs began publishing leaked reports about the new iPad two days ago.)

In late 2012, Apple released a fourth-gen iPad with new processor a mere six months after the release of the third-generation Retina iPad. Much like in this most recent update, all other specs remained the same.

Apple has not explicitly announced this strategy shift, so it’s an open question whether or not we’ll see a more significant iPad update this year.

The 128 GB iPad will be available starting on Tuesday, February 5. To top of page

 

courtesy: http://money.cnn.com/2013/01/29/technology/mobile/apple-ipad-128/index.html

 

Blackberry 10 handset to launch first in the UK

_65602131_phones

The first two handsets powered by the new Blackberry 10 operating system have been unveiled.

The Z10 is controlled via a 4.2in (10.7cm) touchscreen while the Q10 has a smaller 3.1in (7.9cm) screen and physical keyboard.

The UK will be the first to get the Z10 where it will launch on Thursday.

Its appeal could determine whether the firm – which has switched its name from Research In Motion to Blackberry – has a long term future.

The new operating system had originally been due for release last year. Canada and the UAE will get the Z10 in February and the firm said it should go on sale in the US in March.

“Two years ago we had to make a very serious decision,” chief executive Thorsten Heins told a press conference in New York.

Q10 handsetBlackberry said users had wanted a phone with a physical keyboard

“Adopt someone else’s platform or build a whole new one from ground up for Blackberry. And we made the tough call to go it alone.

“Bringing an entirely new platform to the market and ushering this company through a really difficult transition took careful planning and we absolutely knew it was risky.”

Shrinking share

According to data from IDC, Blackberry devices used to account for just over 19% of global smartphone shipments at the start of 2010 – but it suggests that figure had dropped to less than 4% by the end of last year.

“The devices are probably the firm’s last attempt to make in impact in this market,” Alexander Peterc, technology analyst at BNP Paribas, told the BBC.

“The firm’s market share has fallen because they haven’t had a product launch in a year and a half. BB7 – the previous system upgrade which was just incremental – was, let’s say, a failure.

“They still have a following in enterprise where they will probably find a reliable source of revenue for the next 12 months but it’s also crucial for them to generate at least a half-decent amount of traction with consumers.”

Touchscreen keyboard

The new user interface allows up to eight apps to run simultaneously, four of which can appear in small windows on the same screen – something the firm describes as “true multitasking”.

Michelle Fleury spoke to chief executive Thorsten Heins, and looked at the Blackberry 10′s ‘hub’ feature

During a demonstration executives said the intention was to let users “flow” through applications using swipes and other gestures rather than copy the “in and out” nature experienced when navigating rivals’ devices.

For example BB10′s Hub – which brings together emails, texts and other notifications – can be accessed by swiping up and then to the right from any app. The user then needs to reverse the gesture to return to where they were.

The BBM messaging app can now make audio and video calls as well as being able to share what is on one person’s screen with the other user’s device.

The Z10 is not RIM’s first to feature a touchscreen keyboard, but it has adopted new features to attract users more used to physical buttons.

These include a feature which learns the words and phrases the owner most often types and then uses this to suggest words which float above the keyboard and can be flicked into place.

It will also learn to anticipate and correct frequently made mistakes – such as if the user often hits the letter C when they mean to tap space.

 

courtesy: http://www.bbc.co.uk/news/technology-21261809

Chinese hackers hit NY times

hacker_0

It said the attacks coincided with its report into claims that the family of Chinese Premier Wen Jiabao had amassed a multi-billion dollar fortune.

The hackers used methods which have been “associated with the Chinese military” to target the emails of the report’s writer, the paper said.

China’s foreign ministry dismissed the accusations as “groundless”.

“To arbitrarily assert and to conclude without hard evidence that China participated in such hacking attacks is totally irresponsible,” said spokesman Hong Lei.

“China is also a victim of hacking attacks. Chinese laws clearly forbid hacking attacks, and we hope relevant parties takes a responsible attitude on this issue.”

Beijing has been accused by several governments, foreign companies and organisations of carrying out extensive cyber espionage for many years, seeking to gather information and to control China’s image.

‘China-based subterfuge’

According to the Times, the hackers first broke into their computer system in September, as the report on Mr Wen was nearing completion.

The report, which was dismissed as a “smear” by the Chinese government, said Mr Wen’s relatives had amassed assets worth at least $2.7bn (£1.7bn) through business dealings. It did not accuse the Chinese premier of wrongdoing.

China is sensitive about reports on its leaders, particularly when it comes to their wealth.

The New York Times said the hacking initially focussed on the computers of David Barboza, the paper’s bureau chief in Shanghai who wrote the report, and one of his predecessors, Jim Yardley.

Internet security firm Mandiant, which was hired by the Times to trace the attack, followed the hackers’ movements for four months, to try to establish a pattern and block them.

The hackers installed malware which enabled them to access any computer using the New York Times network, steal the password of every employee, and access 53 personal computers, mostly outside the Times offices.

They found the hackers began working for the most part at 08:00 Beijing time. They have not been able to establish how exactly the hackers broke into the system, but believe it may have been through a so-called spear-phishing attack, where an employee clicked on an email or link containing malicious code.

The security firm found that in an attempt to hide the origin of the attack, it had been routed through computers in US universities which, the paper said, “matches the subterfuge used in many other attacks that Mandiant has tracked to China”.

The BBC’s Damian Grammaticus: “On the day it (NY Times) published, its computers came under attack”

The Times said experts had found that the attacks “started from the same university computers used by the Chinese military to attack United States military contractors in the past”.

Mandiant’s chief security officer, Richard Bejtlich, said that “if you look at each attack in isolation, you can’t say, ‘This is the Chinese military’,” but that the similar patterns and targets of the attacks indicated a connection.

“When you see the same group steal data on Chinese dissidents and Tibetan activists, then attack an aerospace company, it starts to push you in the right direction,” he said.

The paper said no personal data of staff or customers was stolen and that no attempt was made to shut down its website.

“They could have wreaked havoc on our systems,” said chief information officer Marc Frons. But he said what they appeared to be looking for were “the names of people who might have provided information to Mr Barboza”.

There was also no evidence that sensitive emails or files on the Wen family had been accessed, or that the intruders had sought information unrelated to the Wen family, the paper said.

 

Courtesy: http://www.bbc.co.uk/news/world-asia-china-21271849

 

install NFS server Centos / Red hat

nfsundercover

1. Install NFS and Create Directories

The first step is to create a NFS server if one is not already set up. The client OS filesystem lives (is stored) on that NFS server. As part of the PXE boot process a host with a PXE boot enabled network card, will issue a broadcast for a an IP address, and be provided that IP assignement by DHCP server aloing with a optional field for a so-called ‘next-server’ and an initial boot image to chain load after the minimal boot image used by the network card (from ROM, or other source) . The host the retreives its files and configurations from the NFS share configured in this section.

Having spare disk space available in the NFS export becomes a necessity as one starts adding more than one variety of an installation, because the entire client system OS will be copied to the NFS server. Customarily, the end user /home is not carried in those images, but separately mounted. Go ahead and install the NFS packages if they aren’t already installed on your server.

 

# yum install nfs-utils nfs-utils-lib sytem-config-nfs

Next, create the directories that you will be needing later on. These will be the actual NFS shares specified. If you want to put these somewhere else, or you can to specify different names, do so. You can share them from anywhere. The first directory will host a server installation of CentOS4, and the second directory a CentOS installation with a desktop environment.

 

# mkdir -p /var/backup

 

2. Configure NFS Mounts

Now you need to create the actual shares with read-write permission and start the NFS server.

 

# vim /etc/exports
/var/backup              *(rw,sync,no_root_squash)

Start the NFS server and verify the NFS shares are ok and start the service. If NFS services are already running, then reload them.

 

# service nfs start (reload)
# chkconfig nfs on
# nfs-export -l

Client side Mount

edit your  /etc/fstab

# vi /etc/fstab

add this line

server_ip:/var/backup /mnt/backup nfs defaults 0 0

exit and run this

# mount -a

check the mount point with

 

#df -h