Showing posts with label net. Show all posts
Showing posts with label net. Show all posts

2022-03-27

many blog pages crawled but excluded from Google's index

2022.3.27: mis.cyb/net.google/
many blog pages crawled but excluded from index:

 . I was hoping that google indexed everything 

so if I had a quote from my blog,
I would be able to find all of my articles
that mention that quote.
. but there are over 170 pages excluded from being indexed;
some of them are possibly too trivial,
and some may be seen as disinfo,
(or taking on forbidden points of view).
. I gathered all the suppressed pages on one page
so that I could analyze what could be wrong with them.

2021-02-04

hrblock.com appearing to do free tax filing until I qualified for Saver's Credit

 2021.2.3: mis.cyb/net.hrblock.com/

hrblock.com pretending to do free tax filing until I qualified for Saver's Credit:

I tried HR free file from this link;

https://www.hrblock.com/online-tax-filing/free-online-tax-filing/

even after Fox news said H&R Block said

they were pulling out of the free e-file tax business.

[foxbusiness Jun 16, 2020]

https://www.foxbusiness.com/personal-finance/hr-block-irs-relationship-free-file

"Tax preparation company H&R Block 

has decided it will no longer participate

in an IRS sponsored program to provide

free filing options to low-income Americans."

. I was confused because H&R Block does indeed

still claim to provide some free service,

but their free offer didn't apply to me

because you can't have savers credit for free.

2020-01-06

least-hassle way to get cash from using Bing search

2020.1.6: aq.cyb/net.bing/
least-hassle way to get cash from using Bing search:
. google is an important search engine
being my only access to some finds;
but the Microsoft Rewards program
gives you amazon cash for searching with Bing.com;
so I set my browser's default search engine to bing,
and keep google in my bookmarks bar for quick access.
. during days of research or reading news online,
I have hundreds of simple questions that bing is good at,
such as word definitions and spellings,
along with most of my questions about
health, politics, and religion.
. there is a limit of 150 points per day;
at 5 points per search, that is 30 searches.
more about earning points.
. in 2020 I get $10 for 10,500 points (70 days);
practically, I earned about $20 in 1.5 years.

2019-11-25

how to avoid malware on flash drives

19.11.20: cyb/sec/how to avoid malware on flash drives:
co.quora:
. any computer is prone to infections from
visiting malware-infected websites or pdf's;
most usb peripherals contain firmware
that can be infected with malware,
so that a website can infect computer firmware;
then it can infect your flash drive firmware
which can then infect other computers.

2019-02-04

archive time for Google+

proj.cyb/net.gp/archive time for Google+:
2.4: summary:
. if you were a user of google plus social media
which is being discontinued
and you wanted to save some of your data
there are several ways,
but the easiest most complete way, Takeout,
may have a problem with its folder structure
that causes some of its html files to have bad links.
. in my case it help moving the subfolders from
google+stream/Photos/Miscellaneous Photos/,
into the folder google+stream/Photos/Photos from posts/.
. it gives you the option to put the takeout
on your google drive, but keep in mind,
if you want to look at the html files
you can't see their images on g'drive;
so you need to download it locally to test the takeout.

2018-02-19

creditkarma offers free credit monitoring and tax service but unresponsive

17.11.6: web.care/fin/creditkarma/
offers free credit monitoring and tax service but unresponsive:
2018: summary:
. creditkarma services are free,
and might alert you to identity theft
but the BBB says you get what you pay for
when it comes to customer service.

2016-02-14

omnity.io free search is very limited

2.13: news.web.cyb/net.omnity.io/contextual search:

. the free version of search at
https://www.omnity.io/
seems to have access to very little content:
after a dozen searches I got directed to only 3 sources,
wikipedia, patents, and clinical trials.
. it's main feature is contextual search:
if you upload a file then it will find similar items.

2015-02-15

@google warns rely only on printers

2.15: news.cyb/net/@google warns rely only on printers:
. Google is the king of cloud computing
but Google's vice-president Vint Cerf warned:
"If there are photos you really care about,
print them out."
. I have all my photos on Google Drive;
is he worried WWIII destroys Google servers?

2015-01-03

sharing via tech will kill you #psy

11.14: news.psy/sharing via tech will kill you:
Aris Theophilakis at TEDxOslo 2013:
1.3: summary of his talk:
. we are sharing too much
and being drowned in garbage;
we are seeing the same with food,
as the quantity has gone up,
the quality has gone down
and low food quality is making us
insulin resistant, and ruining our health .
. when you are always sharing
every trivial thing you are doing,
your behavior changes: less spontaneous .
. never being bored and alone
means you could be less creative .
. when distracted by so much trivia
we have less time to think critically
about what was really important to
our community or our future .




2014-12-30

#youtube is a poor socialization tool

7.28: pol/gemini/youtube is a poor socialization tool:
. youtube is a poor socialization tool; because,
there is no way to build credentials:
where are the videos of those in my chain of trust?
or the same political class I trust?
why can a channel owner delete my comments
rather than tag me as some class
such that my comment remains invisible
only to those of an opposite class?
. what if there is political pressure
to turn youtube into a tower of babble
rather than a self-organizing palace of instruction ?
what would happen to our political system
if youtube pointed everyone at the
Dr.JudyWood's of the 9/11 topics?
 

2014-06-07

DARPA's automated internet disinfectant

6.4: news.cyb/sec/DARPA's automated internet disinfectant:
Mike Walker, DARPA program manager
on Reddit.com:
In April of 2014,  insurers started selling insurance products
that covered physical harm generated by cyber effects
-- Google "cyber insurance" "property damage".
In May of 2014,
Sky News reported that over 42,000 London cars
-- nearly half of the cars stolen in the city of London --
were stolen with hacking.
The networked civilization we are building
is going to need to be able to make
strong promises about the safety of software,
because it won't just be guarding our data security
-- it will be guarding our physical security.
If we're going to be able to make strong promises about
software safety, we're going to need automation
that can investigate software in a
uniform, scalable and effective manner.
We know that expert auditors can't get there
-- IBM/Rational points out that our civilization crossed
1 trillion lines of code in the early 2000's.
Operating systems weigh in above 40 million lines
under constant development.
The problem is too big and it’s moving too fast.
We also know that today's automation is
losing every contest of wits to experts
-- in the wake of Heartbleed,
not a single automation product has come forward to say
that this flaw could have been detected
without expert annotation or intervention.
CGC is open technology development
on the problem of software safety,
a problem seen by the DoD
-- and everyone with a vested interest in our connected future.
cybergrandchallenge/about:
. What if a purpose built supercomputer
could scour the billions of lines of code we depend on,
find and fix the toughest flaws,
upend the economics of computer security,
and level the playing field
between attackers and defenders?
co.reddit comment:
. a lot invested in the [stale] attack/defense model
of computer security competition.
I've heard arguments from many players
that the current model of attack/defense CTF
[capture the flag competitions] is "stale". 
Mike Walker:
. great innovation is happening in the CTF community:
see Build It / Break It / Fix It,
funded by the National Science Foundation.
6.7: my response:
. what is stale is the attack/defense model;
because, the chip firmwares have backdoors;
you need to secure the hardware;
then you can analyze the software;
but, at least with DECREE
they are promoting a microkernel OS
that can guarantee isolation between app's?
(well, the interface is tiny, if not the Trusted Code Base).
. unfortunately what they have in mind
is to use their simple OS only for
easily managing the budding automation competition;
then they plan to evolve the winning buds
for auto-fixing today's software on today OS's.
. but, what can they do for firmware breaches?
. they are trying to show concern about cybercrime
without actually blocking the backdoors used by NSA .

2014-02-09

Metapedia judged by its 9-11 coverage

6: news.cyb/net.wiki/alternative to wikipedia/Metapedia:
summary:
. Metapedia is a wikipedia supplement:
here to do things that can't be done there .
. one thing you can't do in wikipedia
is talk about Dr. Judy Wood as being
a serious part of the 9/11 truth movement;
but, Metapedia doesn't even mention her
or her beam weapons evidence,
although Metapedia editors are hardly
main-line 911truthers either
since they blame 9/11 on a Jewish Conspiracy
rather than neocon-CIA-NSA imperialism
or a Liberal Conspiracy bent on
challenging the Muslim globalists
by stealing Zion from them
and handing it back to the Jewish people,
in order to start the Final World War
to choose the world leader
and give that leader the power to
implement global surveillance
and enforce peace throughout the world .

2013-12-28

rate businesses for accessibility

9: news.cyb/net.ableroad/rate businesses for accessability:
AbleRoads, via web and smartphone apps,
ableroad.com/ allows us to review public spaces
and rate them for accessibility
by those who have require assistance for
mobility, vision, hearing, or cognitive abilities.
AbleRoad users see ratings by
both Yelp and AbleRoad reviewers,
and users of the AbleRoads app
can also write Yelp rating .

2013-12-15

you want my wot?!

11.4: pos.cyb/net.mywot/you want my wot?!
. after I found out I really need to
integrate mywot into chrome browser
in order to post reviews of sites;
I was not so sure I felt safe
having them read my every link;
and, with malware so good at cracking any site,
what is the purpose of a service like mywot
that pretends today's safe site
is likely to be tomorrow's safe site ?
12.15:
. simply trust who you have to;
and have separate virtual machines
for each level of trust;
eg, have at least these levels:
# banks,
# the pit for everyone else .
. when I want to use my bank,
I restart my chromebook
to have its verified boot flush the malware .

2013-12-07

Community-based internet with wireless_mesh_networks

12.5: news.cyb/net/Community-based internet with wireless mesh networks:
. there is software available
that allows our wifi routers to form meshes
with the wifi routers of our neighbors
so we can internet with them
and make use of their out-of-community connection .
... meshing makes a lot of noise
and is unreliable compared to;
better to plan point-to-point networks .

alternatives to wikipedia

12.4: web.cyb/net.wiki/alternatives to wikipedia:
. when considering alternatives to wikipedia
it is more than just a source of info,
it's something that can be edited by the public .
. we need a replacement for wikipedia
that doesn't shun conspiracy theorists;
and esp'ly the replacement must
allow mention of Dr. Judy Wood .
. the replacement should make categories per page,
according to what class of references are allowed:
# sources citable by academics,
# source trusted by the mainstream,
# sources considered to be on the fringe .

2012-09-26

internet with both privacy and security

7.26: co.apt/cyb/sec/cloud computing is not easy:
. I thought cloud computing would be a breeze;
it was just like SOA, right?
only SOA is on a private network,
while cloud computing is using a public network .
. can that even be done securely?
[ it seems like shifting code tech should do it .
. being able to initialize the session
might be complicated .]

7.8: sci.cyb/sec/how to get secure internet?:
. can there be secure communications networks
that are also self healing ?
how can we support openware and anonymity too?
to be anonymous you simply get another service to
send the message for you
but for openware that depends on
whether we need OS cooperation for the security .
[9.26:
. openware-based internet depends on
whether we need OS cooperation for the security?
I don't think the problem is software,
so, having openware wouldn't make the net more secure .
. there are 2 problems:
# denial of service:
. it's too easy for too many machines to be
owned by malware .
# id theft:
. it's too easy to spoof being someone else .
the solution?:
. there should be special hardware available
in order to authenticate your id;
if you don't have that box,
then you can't do banking, credit-card shopping,
and if there's a denial of service attack,
then you can't get through;
because, nodes stop forwarding your messages .]

7.10: news.cyb/sec/
DOD says we can have both privacy and security:
Cybersecurity and American power 7.9:
At an American Enterprise Institute (AEI) event
U.S. Army Gen. Keith B. Alexander
urged us to support cybersecurity legislation
being pushed through Congress .
. it asks internet service providers to
help federal anti-virus software,
by searching all emails for viral signatures,
and reporting malware event parameters
(malware signature, source address, destination address).
. when asked about china's role in the motivation
he reminded us that there is a high cost from malware
due to intellectual property loss via cyber espionage.
"Symantec placed the cost of IP theft
at $250 billion a year .

The director of the National Security Agency (NSA)
and chief at the Central Security Service (CSS)
reemphasized an immense problem the U.S. is facing:
cybercrime has been "the greatest
transfer of wealth in history,"
Alexander said in a statement.
global cybercrime is $114 billion annually
($388 billion when you factor in downtime),
and McAfee estimates that
$1 trillion was spent globally under remediation.
[ you might think the reason we are such targets
is that our foreign policy is so offensive
to so many bright communists and liberals
but, we'd be in the same danger anyway,
because there's so much money to be gained
from cracking our banks and intellectual property .
9.26:
. when they talk about remediation costs
they are referring to having their hands tied
by an internet that is inherently insecure;
I wonder what the cost would have been
if we had just rebuilt the internet from scratch
with security in mind .
. can the surveillance proposed by this legislation
make up for the lack of a dual system,
one that promotes anonymity,
and the other that promotes reliability? ]

unhosted.org

7.10: news.cyb/net.unhosted.org:
@GoogleAppsDev
Tell us what it would take for you to
use "nothing but the web"
- google apps developer../2011/09/
. one reply was:
Unhosted.org-- to separate web apps from user data,
I must be in control of my data.
Once I put my data in the hands of a
third party web service or application,
I am no longer in control.
Unhosted.org ?
Unhosted.org is developing technology that will
put control of user data
back where it belongs: With the user.
Freedom from the web's monopolies
The web is not as open as it used to be:
monopoly platforms formed new proprietary layers on top of it.
But we create a better architecture for the web.
We break the package deal
»you get our app, we get your data«
with remoteStorage,
a cross-origin storage protocol
separating application servers from people's documents.
This enables everyone to use various web services
but keep their data in one place they choose and trust
– their remote storage,
their »home folder« for the web.
The applications will not run on servers you can't control,
but be pure Javascript which runs client-side, in your browser.
And app developers don't need to bother about
providing storage or managing user accounts.
Technically speaking, we define a protocol stack called remoteStorage.
A combination of WebFinger for discovery,
OAuth for authorization,
CORS (Cross-Origin Resource Sharing)
for cross-domain AJAX calls and GET, PUT, DELETE for synchronization.
We also work on its adoption through developing apps like
Libre Docs and Opentabs
as well as making existing apps and storage providers compatible.
If you speak French, there is also some info on Framablog en Français.
Unhosted is a movement by the people, for the people.
Everyone can participate, including you!
Libre Docs – liberate your ideas
libredocs.org
github.com/unhosted/libredocs
Remotestorage providers
github.com/unhosted/website/wiki/remoteStorage-providers
freemium providers:
    OwnCube recommended for end users!
    5apps recommended for javascript developers
domains that provide remoteStorage to their users:
    all Dutch universities
ways to run your own remoteStorage server:
    install pagekite on your computer
github.com/pagekite/plugins-pyUnhosted
    install ownCloud on a server
owncloud.org/
    coming soon: how to use your CouchDB instance as remoteStorage
pagekite
github.com/pagekite/plugins-pyUnhosted
. Unhosted.py is an HTTP server
implementing the bare minimum required for
the simple remoteStorage API from unhosted.org.
Hopefully this program will be useful for folks who want to
study how the remoteStorage protocol works
or as a development tool for people working on Unhosted apps.
As Unhosted matures,
Unhosted.py will hopefully also mature into a usable personal data-store
for people who want to store their Unhosted data on their own devices.
Getting started
Quick-start:
    Install pagekite.py
    In another console:
pagekite.py 6789 rs-YOURNAME.pagekite.me
You should now be able to use
whatever@rs-YOURNAME.pagekite.me
as a remoteStorage account.
If you prefer, you can also
use Unhosted.py without PageKite,
but you will need an SSL enabled
reverse HTTP proxy (such as Pound)
in order to comply with the protocol.
As far as I can tell,
hosting on http://localhost/ won't work.
Play!
5apps.com have written a nice Unhosted tutorial and test app
which works just fine with Unhosted.py.
Hacking
The file Unhosted.combined.py is combination of Unhosted.py
and the HttpdLite.py module it depends on.
For hacking, you'll want to check both out from github:
    Unhosted.py
    HttpdLite.py
The combined "binary" is generated using Breeder.
Where is my data?
Unhosted.py stores data in ~/.Unhosted.py/,
in a relatively intuitive directory structure:
~/.Unhosted.py/USER/CATEGORY/...
Each data folder will contain some regular files,
as well as a file named _RS_METADATA.js.
This meta-data file stores "real" names
for all keys, mime-types
and may store other meta-data in the future.
The meta-data file may also store key values as well,
if they are small and do not really "look like a file".
This is an optimization to reduce clutter and disk seeks
when working with small keys:
if the data is large or looks like an independent file,
it will be written as such to the filesystem,
although the name will probably be sanitized somewhat.
Note that changes to individual files of name:
_RS_METADATA.js
may be overwritten by Unhosted.py if it is running,
as it caches their contents in RAM.
Bugs
    Directory listings do not work yet.
    User names and passwords are ephemeral.
    _RS_METADATA.js could be overwritten by evil apps.
    Saving metadata fails sometimes due to a race condition.

2012-09-21

forums for bizarre ideas

7.8: news.adds/forums for bizarre ideas:
. forums for exploring bizarre ideas,
found while googling for aspirin-melatonin interactions .
AboveTopSecret.com:
AboveTopSecret.com is the Internet's largest and most popular
discussion board community dedicated to
the intelligent exchange of ideas and debate
on a wide range of "alternative topics"
such as conspiracies, UFO's, paranormal, secret societies,
political scandals, new world order, terrorism,
and dozens of related topics with
a diverse mix of users from all over the world.
unexplained-mysteries.com:
A to Z of the unexplained, paranormal phenomena, discussion forum,
sightings database, search engine and all the latest news
on everything unexplained.


2012-06-19

google-plus's "(just the right people)

5.28: pos.cyb/net.g'+/blocked/
stay popular to prevent thread erosion:

. if you get blocked from anyone,
you can't see them on
any threads they participate in,
so then this has the effect of
blocking your view of other posts,
because they expect you can see
who they're responding to:
. so keep remembering,
g'+ is not the place for free speech;
it's the place to listen, and learn!
. you'll need to walk softly,
and carry your big stick elsewhere,
or on a dual g'+ account (haven't tried that yet). 

5.26: mis.cyb/net.g'+/being blocked 
hides posts in threads you can still see:
. while googling for g'plus news,
searching for myself on plus.topsy.com,
I found some comments directed at me
that g'plus didn't inform me of? :