6-6-2011 – 31-5-2011


 

 

 

 

Scientists close in on antimatter – study

 Posted by Caspertwin on June 5, 2011 at 7:17 PM Comments comments (0)

SCIENTISTS said toda…

Read Full Post »

 

 

Internet back online in Syria; violent protest videos surface

 Posted by Caspertwin on June 5, 2011 at 7:07 PM Comments comments (0)

Internet access came back online in Syria on Saturday after two-thirds of networks in the country became unreachable from the rest of the world in the midst of street protests on Friday. As the strife-ridden country once again became visible to the online world, videos of snipers apparently firing on peaceful demonstrators began to surface, like the unsettling clip below,…

Read Full Post »

 

 

 

 

 

 

 

 

Complaints of harassment for Facebook

 Posted by Caspertwin on June 5, 2011 at 12:11 PM Comments comments (0)

Send complaints of harassment or unwelcome contact to ” abuse@facebook.com
“, Facebook will acknowledge receipt of your complaint and begin
addressing your complaint within 24 hours of receipt. Facebook will
report back to you within 72 hours of receiving your email complaint to
inform you of the steps Facebook has taken to address the complain…

Read Full Post »

 

 

Cyberattacks also targeted Gmail rivals: Trend Micro

 Posted by Caspertwin on June 4, 2011 at 10:14 PM Comments comments (0)
SAN FRANCISCO – Internet security firm Trend Micro warned on Friday that cyber attackers have attempted to infiltrate Web-based email services run by Microsoft and Yahoo! as well as Google.

As US federal agents investigate…

Read Full Post »

 

 

North Korea denies being behind bank cyber attack

 Posted by Caspertwin on June 4, 2011 at 10:13 PM Comments comments (0)

SEOUL, South Korea – North Korea on Sunday rejected allegations by the rival South that it was behind a cyber attack that paralyzed the computer network of a South Korean bank last month and accused Seoul of inventing a conspiracy to justify physical confrontation.

The accusation that North Korean hackers were responsible for bringing down Nonghyup bank was the same type of fabricatio…

Read Full Post »

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Al-Qa’ida commander Ilyas Kashmiri ‘killed by drone’

 Posted by Caspertwin on June 4, 2011 at 9:42 PM Comments comments (0)

A US drone strike ha…

Read Full Post »

 

 

Australia Joins China In Censoring The Internet

 Posted by Caspertwin on June 4, 2011 at 10:38 AM Comments comments (0)

Dec 30, 2007

The Australian Government has announced that they will be joining China as one of the f…

Read Full Post »

 

 

 

Australian government secret ACMA internet censorship blacklist, 6 Aug 2008

 Posted by Caspertwin on June 4, 2011 at 10:31 AM Comments comments (0)

Summary

This list contains 2395 webpages or site variations derived from the those secretly banned by the Australian Communications and Media Authority (A…

Read Full Post »

 

 

Is the Internet Filter Australia’s Berlin Wall

 Posted by Caspertwin on June 4, 2011 at 10:29 AM Comments comments (0)

December 17, 2009

By GAVIN HEATON (Servant of Chaos)

Read Full Post »

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Recover From Identity Theft

 Posted by Caspertwin on June 4, 2011 at 12:04 AM Comments comments (0)

Take steps to respond to and recover from identity theft as soon as you suspect it.

Read Full Post »

 

 

How Scammers use Information Harvested from Phishing Scams

 Posted by Caspertwin on June 4, 2011 at 12:02 AM Comments comments (0)

Scammers are able to use information stolen from victims in a variety of ways. They may:

  • Take over the victim’s account.
    After the scammers have harvested information such as passwords, user names and account numbers, they are able to directly access the vic…

Read Full Post »

 

 

 

 

 

 

 

Phishing Definition

 Posted by Caspertwin on June 3, 2011 at 11:44 PM Comments comments (0)

Phishing is a way of attempting to acquire sensitive information such as usernames,

Read Full Post »

 

 

Malware Definition

 Posted by Caspertwin on June 3, 2011 at 4:05 PM Comments comments (0)

Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior…

Read Full Post »

 

 

Computer virus Definition

 Posted by Caspertwin on June 3, 2011 at 3:54 PM Comments comments (0)

Read Full Post »

 

 

Facebook Chat Emoticons

 Posted by Caspertwin on June 3, 2011 at 8:09 AM Comments comments (0)

While playing with Facebook Chat I wonder…

Read Full Post »

 

 

Double jeopardy Law change

 Posted by Caspertwin on June 3, 2011 at 4:47 AM Comments comments (0)

Victoria’s double jeopardy laws to be reworked

KILLERS who think they got away with murder will have to look over their shoulder as Victoria’s double jeopardy laws are reworked this year.

Crimes – such as the Walsh St murders of constables Steven Tynan and Damian Eyre – could be reopened with the same suspec…

Read Full Post »

 

 

Australia Constitution Act (The Constitution)

 Posted by Caspertwin on June 3, 2011 at 4:33 AM Comments comments (0)

For full Australia Constitution Act http://www.youmeunity.org.au/download/media/14

 

 

Australia concerns with double jeopardy

 Posted by Caspertwin on June 3, 2011 at 4:27 AM Comments comments (0)

Australia, concerns with double jeopardy have come to be expressed at common law in differing ways by an evolutionary process which has crossed ..Full Report

 http/www.parliament.nsw.gov.au/prod/parlment/publications.nsf/0/89c20d04902f4102ca256ecf00098187/$FILE/16-03.pdf

 

 

 

 

 

 

 

 

 

 

Cyber spies hack into computers of Julia Gillard and ministers

 Posted by Caspertwin on June 3, 2011 at 3:24 AM Comments comments (0)

THE parliamentary computers belonging to the…

Read Full Post »

 

 

 

 

 

 

 

 

 

 

Romanian men jailed for ATM card skimming

 Posted by Caspertwin on June 3, 2011 at 3:11 AM Comments comments (0)

TWO Romanian men use…

Read Full Post »

 

 

 

 

 

 

 

Apple’s iPhone and iPad hacked in just six minutes

 Posted by Caspertwin on June 2, 2011 at 6:15 AM Comments comments (0)

 

RESEARCHERS have exp…

Read Full Post »

 

 

Facebook Dislike button spreads fast, but is a fake – watch out!

 Posted by Caspertwin on June 2, 2011 at 5:51 AM Comments comments (0)

 Don’t be too quick to click on links claiming to “Enable Dislike Button” on Facebook, as a fast-spreading scam has caused problems for social networking users this weekend.

 

Read Full Post »

 

 

Android (operating system)

 Posted by Caspertwin on June 2, 2011 at 5:41 AM Comments comments (0)

 

 

 

 

 

 

 

 

Julian Assange interview: Why the US will stop at nothing to silence me . . .

 Posted by Caspertwin on June 1, 2011 at 10:40 PM Comments comments (0)

 

Julian Assange scratches his chin and then downs a generous gulp of his pint. “They called me a cat abuser. Now I don’t like cats as it turns out, but as far as I know I’ve never ‘abused’ one,” he says, lo…

 

Read Full Post »

 

 

 

 

Windows Live Account Deactivation Scam

 Posted by Caspertwin on June 1, 2011 at 8:28 AM Comments comments (0)

 

This morning I checked my email and I saw an email entitled “[WindowsLive E-mail : Hotmail alert mansur_ehmad@hotmail.com]‏”. I thought this email has been sent by Windows Live. But it wasn’t …

 

Read Full Post »

 

 

 

 

Phones may cause cancer, says World Health Organisation agency

 Posted by Caspertwin on June 1, 2011 at 3:28 AM Comments comments (0)

 

A respected international panel of experts now says mobile phones are possible cancer-causing agents, putting them in the same category as the pesticide DDT, petrol engine exhaust and coffee.

 

 

Read Full Post »

 

 

Telco crackdown takes aim at tricky advertising terms

 Posted by Caspertwin on June 1, 2011 at 3:26 AM Comments comments (0)

 

TELCOS will be banne…

Read Full Post »

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s