Jump to content

utpal11's Content - Page 5 - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

utpal11

Advanced Members
  • Posts

    160
  • Joined

  • Last visited

  • Days Won

    12
  • Feedback

    100%
  • Points

    22,650 [ Donate ]

Everything posted by utpal11

  1. Awesome Giveaway !!! I apply for bemaniso Thanks + Rep added as you deserve for it... Congrates....
  2. Tracker Name : Empornium Signup Link : http://torrents.empornium.me/register.php Genre : XXX Closing Date : N/A Additional Information : Stats: Enabled Users: 210,698 Users active today: 38,998 Users active this week: 82,279 Users active this month: 122,846 Total Data: 286.952 TB New Torrents last day: 232 Torrents: 118,903 Requests: 9,355 Snatches: 43,063,623 Peers: 1,551,206 Seeders: 1,438,870 Leechers: 112,336 Seeder/Leecher Ratio: 12.80
  3. Tracker Name : Postfile Signup Link : http://postfile.org/signup.php Genre : General Closing Date : N/A Additional Information : New Tracker
  4. Nice GA @ Hawk1 I apply for it.. Thanks Added, Rep Added
  5. Facebook has acquired LiveRail - a tech start-up that helps companies place more relevant ads in the videos that appear on their websites and apps. LiveRail also provides a real-time bidding platform for marketers looking to place ads on online videos. The firms did not reveal the financial terms, but some reports indicate that Facebook paid between $400m and $500m (£233m and £291m) to buy the firm. Online video advertising is forecast to grow robustly in the coming years. "More relevant ads will be more interesting and engaging to people watching online video, and more effective for marketers too," Brian Boland, vice president of ads product marketing and atlas at Facebook, said in a blog post. "Publishers will benefit as well, because more relevant ads will help them make the most out of every opportunity they have to show an ad." According to LiveRail, it delivers more than seven billion video ads per month. Growing importance The online and mobile ad sector has been growing rapidly in recent years. According to a study published in April, more than £1bn was spent on mobile ads in the UK alone in 2013, a rise of 93% on the previous year. Some other estimates suggest that online video advertising revenues are likely to hit $6bn in the US this year. As a result, a growing number of firms - especially social networking platforms such as Facebook and Twitter - have been looking at ways to attract more advertisers and tap into the sector's growth. Earlier this year, Facebook said it would start serving ads to third-party mobile apps via a new advertising network. Twitter, acquired MoPub mobile advertising exchange last year. MoPub acts as a mediation service, allowing marketers to manage the placement of ads across several networks, including Facebook's. Analysts said that given their large user base, social networks were likely to get a big share of this growing market. "It is no longer about saying, 'My ad was was seen by so many people,'" said Sanjana Chappalli, Asia-Pac head of LEWIS Pulse, a firm specialising in digital marketing. "But it is now about knowing who those people are and how they have responded to the information fed to them. "And on that front, social networks enjoy a tremendous advantage over everyone else." she added. Meanwhile, Google's AdMob and Apple's iAds platforms and several other smaller firms are also competing to provide the adverts shown on mobile phones and tablets. Millennial Media, Flurry and Nexage are among the firms promoting their own versions of "programmatic buying" - a way for firms to target their ads at a specific type of consumer via a chosen type of app at an appropriate time and geographic location.
  6. An expert on digital currencies from Ernst & Young claimed that Bitcoin doesn’t have to replace normal currency to have a future. The expert described a number of myths around the currency, one of which was its position as a replacement for “fiat” money. Fiat currency is essentially currency the government decrees to be legal tender. And Bitcoin was obviously not created as a replacement for fiat currency. There are many people talking about how Bitcoin is going to take over, or how it doesn’t have the properties lending to it being used widely. The currency was really created to be used in electronic commerce and for micro transactions. If you remember this, the future risks for the currency take on a different shape. At the moment, many experts are concerned with such problems as price volatility and the deflationary nature of Bitcoin. Since there will only ever be 21 million Bitcoins, it has led some to fear that the currency will have a “deflationary” element, leading to each unit getting more valuable over time. Deflation is usually blamed for the “lost decade” in Japan, and Ernst & Young emphasized that it adheres to the mainstream economic view that mild positive inflation is healthy for a national currency. However, when talking about using Bitcoin as an ecommerce tool, deflation seems to be not necessarily problematic. Instead, the experts highlighted problems of speed and fraud control as the most pressing priorities for the virtual currency. To prevent fraud, the Bitcoin network has to “confirm” transactions every ten minutes. This is one of the weaknesses with Bitcoin – the problem is that you generally have to wait for 5 to 6 transaction confirmations before making sure that your money hasn’t been spent twice, which can take up to 40 or 50 minutes. Some businesses have decided that speed is worth the risk. One pub in London takes Bitcoin and accepts unconfirmed transactions as payment, for example. However, not every retailer is able to that – especially if they are selling goods more expensive than beer. Ernst & Young believes that there are definite possible gains in Bitcoin, in terms of lowered transaction costs. On the other side, there are also some significant negatives, in terms of accountability and how to deal with anonymous users and how to regulate in the market.
  7. Higher phone bills are coming to all, warns dissenting commissioner. The Federal Communications Commission voted today to devote an extra $5 billion over the next five years toward expanding Wi-Fi networks in schools and libraries. "The effort will potentially provide a 75 percent increase in Wi-Fi funding for rural schools over the next five years and a 60 percent increase for urban schools, delivering Wi-Fi to an additional 10 million students in 2015 alone," the commission said in an announcement. Wi-Fi networks are needed to deliver wireless Internet access to the tablets and laptops students increasingly use in classrooms. The $5 billion over five years is in addition to E-rate's annual budget of $2.4 billion. The plan was approved 3-2, with Democrats led by Chairman Tom Wheeler voting in favor and Republicans voting against. The majority said the plan will modernize the nation's E-rate program, which provides discounted telecommunications services, Internet access, and equipment to eligible schools and libraries. It is paid for by the Universal Service Fund, which in turn is funded by US residents through surcharges on phone bills. The FCC's order today was accompanied by a Notice of Proposed Rulemaking which seeks comment on the "Long-term program funding needs necessary to meet goals and funding targets established in the Order," according to an FCC fact sheet. The majority seems to believe that extra surcharges won't be necessary. In the next two years, $2 billion will be made available "through improved financial management practices that free up excess reserves," the FCC announcement said. "For the following three years, the program will target $1 billion annually to Wi-Fi—while continuing to ensure funding is available for broadband connectivity to schools and libraries—by phasing out support for non-broadband services, such as pagers and phones, and through increased efficiencies." Republican Commissioner Ajit Pai is doubtful, saying during today's meeting that "any talk of fiscal responsibility will be short-lived. In five months, maybe six, we’ll be back at this table discussing how much to increase Americans’ phone bills. Universal service contribution rates have jumped 60 percent under this administration. What’s a few billion dollars more?" The FCC is also aiming to simplify the application process to make it easier for schools and libraries to apply. Even here, though, Pai said that "schools and libraries generally still have to fill out a 17-page application to receive funding." They'll also have to follow "specialized procurement rules," wait months to receive any funding comments, and decide how to spend E-rate funds "up to a year before the school year begins." Pai argued that schools and libraries should be given more leeway to make their own decisions on how to spend the money. In a less controversial move, the FCC today also voted to make up to $100 million available for "experiments" that will help the agency expand rural broadband. This includes "$75 million to test construction of networks offering service plans providing 25 Mpbs downloads and 5 Mbps uploads."
  8. The UK is rushing through Parliament what it calls an emergency law that will ensure it retains access to people's phone and internet records, it said on Thursday. The BBC calls the rush job a "highly unusual move", with the legislation set to take up a mere seven days, instead of the typical months-long consideration to which a bill would normally be subjected. The Liberal Democrats (the smaller of the two political parties in the UK's coalition government) had already successfully blocked plans for the earlier, similar, much-reviled Communications Data Bill - commonly known as the Snooper's Charter. The rush job for this new bill comes in response to the European Court of Justice's (ECJ) having in April struck down an EU directive - the Data Retention Directive - that required telecoms to store the communications data of EU citizens for a minimum of six months and a maximum of two years. That directive was introduced in 2006, after the London and Madrid bombings, to help fight organised crime and terrorism, but the ECJ ruled that it violated human rights. The idea of the directive going away has been grating on the UK powers - particularly given that privacy advocates such as the Open Rights Group have recently been pushing service providers to start destroying data. Prime Minster David Cameron, who's reportedly secured the backings of all three major parties for the "emergency" Data Retention and Investigatory Powers Bill, says that if the collected data is deleted or no longer collected, "criminals and terrorists" are going to be tougher to go after. Cameron says the emergency law will also "clarify" police and security services' powers to bug suspects' phones when they've got a warrant issued by the home secretary. Some companies are already turning down requests to hand over data, he told the BBC: Some companies are already saying they can no longer work with us unless UK law is clarified immediately. Maybe Cameron has all three parties backing him on this new iteration of the snooper's charter, but he's still outraged some MPs, who said on Thursday morning that they hadn't even seen the bill yet. Labour MP Tom Watson, for one, said on Twitter that the new law will be "railroaded" through parliament next week: Statement on Comms Data and Interception confirmed for this morning. MPs have not seen the BIll that will be railroaded through next week. — tom_watson @Tom_watson) July 10, 2014 @Tom_watson Statement on Comms Data and Interception confirmed for this morning. MPs have not seen the BIll that will be railroaded through next week. Meanwhile, privacy advocates are calling this so-called emergency a theatrical stunt. Jim Killock, from the Open Rights Group, told the BBC that it's neither terrorists nor paedophiles that have lit a fire under the government; rather, it's the fact that groups like his are actually expecting telecoms to make good on the EJC's ruling: The government knows that since the ECJ ruling, there is no legal basis for making internet service providers retain our data, so it is using the threat of terrorism as an excuse for getting this law passed. The government has had since April to address the ECJ ruling but it is only now that organisations such as ORG are threatening legal action that this has become an 'emergency'. The emergency bill addresses collection of metadata, which can potentially include the time, duration, location, originator and recipient of phone or internet messages. It does not, Cameron stressed, include legal obligations for telecoms to preserve content. The bill does, however, also cover "legal intercept" rules, for when authorities are empowered to listen in on conversations. In those circumstances, snooping authorities need a warrant, signed by either the foreign secretary, the home secretary, the secretary of state for Northern Ireland, the defence secretary or the cabinet secretary for justice for Scotland. The emergency law includes a sunset provision: it will be ended in 2016, at which time government will have to look at it again. Cameron stressed that the emergency bill isn't granting powers that weren't already there: I want to be very clear that we are not introducing new powers or capabilities - that is not for this parliament. This is about restoring two vital measures ensuring that our law enforcement and intelligence agencies maintain the right tools to keep us all safe. Nick Clegg, leader of the junior coalition Liberal Democrats party, said that the emergency bill is not just another snooper's charter. The differences between old and new legislation: the number of bodies able to obtain data from telecoms will be restricted, with some losing their access rights altogether and councils having to go through a single central authority, according to the Huffington Post. The law doesn't deal with communications interception and monitoring done by the UK's intelligence agency, GCHQ. The bill also includes measures meant to increase transparency and oversight. Beyond the sunset clause and the increased government scrutiny it entails, these measures also include: The creation of a new Privacy and Civil Liberties Oversight Board to scrutinise the impact of the law on privacy and civil liberties. Annual government transparency reports on how these powers are used, similar to those put out by Facebook, Google, Yahoo and other companies. The appointment of a senior former diplomat to lead discussions with the US government and internet firms to establish a new international agreement for sharing data between legal jurisdictions. A restriction on the number of public bodies, including Royal Mail, able to ask for communications data under the Regulation of Investigatory Powers Act (RIPA). In spite of the government's reassurances about most people being safe from having the actual content of their communications spied on, metadata of course provides ample details about even innocent people. The Washington Post's recent analysis of the US National Security Agency (NSA)'s surveillance shows that clearly: the paper found that 9 of 10 spied-on account holders weren't intended targets of surveillance but were still swept up in the net cast to catch somebody else. As critics pointed out about the earlier snooper's charter, the system could be abused by law enforcement agencies that could conduct fishing expeditions rather than targeted surveillance against specific individuals. In fact, Sir Paul Kennedy, the Interception of Communications Commissioner, told MPs at the time the bill was drafted that the law would justify investigating criminal infractions as mild as fly tipping - i.e., illegal dumping - and that setting a “crime threshold” would be difficult. Top political figures in the UK tried to revive the snooper's charter about a year ago, with spectacularly bad timing: smack in the middle of the earliest Snowden revelations about US surveillance. Now, they've scaled back in an attempt, apparently, just to hang on to the snooping powers that the EJC decided were a violation of human rights. Will the new bill present a more palatable approach to privacy? Will the wealth of data that the bill retains the right to amass still present an opportunity for the government to build profiles about individuals' browsing or calling habits? Will the amassed data still wind up in databases as a powerful lure for cybercrooks who might want to steal it so as to abuse private information or even to blackmail individuals - as in, we know when and how often you called so-and-so. What will you pay for that info not to get out? Those were the objections to the snooper's charter and the emergency bill is being given precious little time for those same concerns to be discussed.
  9. "Content Store" connects phone users to companies that pay AT&T for their data. AT&T's Sponsored Data program—in which content providers pay AT&T not to count the use of their services against customers' data limits—is about to get a lot easier to use. AT&T is partnering with a company called Syntonic Wireless, which yesterday announced "the Syntonic Sponsored Content Store for eligible AT&T mobile subscribers." "The Syntonic Sponsored Content Store is integrated with AT&T’s Sponsored Data service and gives content providers an effortless way to offer sponsored application connectivity to AT&T mobile data customers," Syntonic's announcement said. This isn't an app store, though. "The content in the store is not apps, but rather links to mobile websites," according to FierceWireless. Smartphone owners visiting the links through Syntonic's service would not be charged with data usage. Syntonic CEO Gary Greenbaum told FierceWireless that Syntonic's technology defines policies for how content is tracked and billed, then translates the policies into network rules. This ensures that data is billed to the "sponsor" rather than the user. Only 35 pieces of content are in the store for now, but they include some big names like "Airbnb, Amazon, eBay, ESPN, Etsy, Expedia, Facebook, MLB.com, Open Table, Rolling Stone, The New York Times, and Yelp," FierceWireless writes. A closed beta test "will start next week for Android smartphone users. Syntonic is currently inviting people to register for access. An iOS and tablet version of the store will be rolled out over the next few weeks." AT&T's Sponsored Data was already being used by advertisers who want to exempt their advertisements from counting against customers' data allotments. Sponsored Data is clearly marked and can be used within both websites and applications, according to AT&T. "For example, a customer may access an application for healthcare from their insurer. Within the application, there is an educational video," AT&T says. "The customer sees the AT&T Sponsored Data name, identifying that the video is sponsored. When the customer clicks the icon to play the video, the data usage incurred while watching the video is not applied to the customer’s monthly data allowance." The Sponsored Data scheme has been criticized by consumer advocacy groups who say AT&T is using data caps to "threaten the open Internet" and add to the cost of startups trying to get in front of consumers. T-Mobile has rolled out a similar program in which certain music streaming services are exempt from data limits, but T-Mobile says it is not charging the streaming companies.
  10. Xbox, Surface remain safe, even without the device focus. Microsoft CEO Satya Nadella sent a company-wide (and public) e-mail to mark the start of the company's 2015 financial year. The message announces a forthcoming reorganization and a shift in focus away from the "devices and services" that Steve Ballmer pushed toward the end of his time at the company. It's not entirely clear what that new focus really is, however. Nadella isn't doing away with his "mobile first, cloud first" mantra, as mathematically challenged as it is, and "mobile first, cloud first" still seems to feel a lot like "devices and services." The lynchpin of the mobile experience is the device; the raison d'être of the cloud is to provide services. The e-mail reinforces some themes that we've already seen from the company in past months. Nadella says that Microsoft's apps will be "built for other ecosystems," a policy that's already extant with apps including OneDrive, Skype, and most recently, Office. The parallel positioning of Visual Studio as an environment that's increasingly suitable for cross platform development lines up neatly with this. Organizationally, the e-mail includes a few concrete details. In particular, it says that there will be fewer internal processes and fewer people involved in making each decision, reducing the bureaucracy that Microsoft has been criticized for in the past. Consistent with this, Nadella intends to "flatten the organization" and "develop leaner business processes." More vaguely, he talks about*enhanced training and greater opportunities for people to change positions. There's widespread speculation that the company will be announcing layoffs in the next few months—the many tens of thousands of Nokia employees would appear to be a ripe target for downsizing—and a broader commitment to retraining could be part of a plan to retain some staff even if their positions have been eliminated. There's also a new focus on customers. More than just a focus—"[Microsoft] will obsess over [its] customers," from engineering to sales and marketing. In spite of the de-emphasis on devices, Nadella says explicitly that the Xbox is safe, writing that the company "will continue to vigorously innovate and delight gamers with Xbox." Other first party hardware doesn't seem to be going away either, with the Microsoft CEO saying, "We will build first-party hardware to stimulate more demand for the entire Windows ecosystem." Overall, however, the most striking thing about the e-mail was how little it really said. It's about 3,000 words that fail to set a clear direction and appear almost contradictory. The disavowal of the "devices and services" mantra may be an attempt by Satya Nadella to consign Steve Ballmer's legacy to the past, but the continued focus on "mobile first, cloud first," combined with the clear statement that first-party hardware remains part of Microsoft's plan for the future, suggests that the perception of change is perhaps more important than actually changing anything.
  11. Unlike Comcast, Verizon is unable to quickly set up network connections to Netflix. It’s been 10 weeks since Verizon and Netflix struck a deal in which Netflix will pay the ISP for a direct connection to its network. Yet customers are still complaining about bad performance. The reason is that Verizon and Netflix haven’t set up enough connections to make much of a difference, and Verizon has said work may not be completed until the end of 2014. Instead of remaining quiet while they build out the necessary infrastructure, Netflix and Verizon have taken shots at one another. The latest comes from Verizon VP David Young, who wrote a blog post today that aims to dispel what he calls “the congestion myth.” “A few weeks ago, Verizon received an e-mail from a customer in Los Angeles asking why he was not getting a good experience watching Netflix on his 75Mbps FiOS connection,” Young wrote. “He was understandably confused by some of the misleading public accounts that inaccurately suggest widespread congestion that could affect Netflix traffic on Verizon’s network. Worse still were claims that Verizon is deliberately 'throttling' Netflix traffic. This customer wanted to know what was going on and why his performance wasn’t what he hoped. We, too, wanted to get to the bottom of the problem.” Young went on to say that there is “no congestion anywhere within the Verizon network” but that there is congestion in the links between Netflix’s transit providers and Verizon. Those links, of course, haven't*being upgraded because transit providers such as Cogent refused to pay Verizon to build out extra infrastructure. Instead, Netflix eventually agreed to pay for a direct connection, which should eliminate the transit providers' role in bringing traffic from Netflix to Verizon. Verizon's infrastructure squad moves slowly Netflix also*agreed to pay Comcast for a direct connection, and performance on that network improved almost immediately after the deal was announced. So why, 10 weeks after the Netflix/Verizon deal, is there still congestion at interconnection points? As we reported last month, Comcast was able to establish*the connections quickly because it spent months working with Netflix to prepare*the necessary infrastructure even before the companies*agreed to monetary terms. That includes a few hundred*10 Gigabit Ethernet ports spread across*10 carrier-neutral Internet exchange points. Compared to Comcast, Verizon’s infrastructure team was unprepared for the deal. In June, a Verizon statement said, “we will be incrementally rolling it out starting next month and progressing through the fourth quarter.” At the time, Verizon and Netflix had set up a test connection in Dallas and*were working on setting up peering connections in 13 cities. The connections apparently aren't ready yet, and Young today blamed Netflix for continuing to send*traffic over congested links. It’s customary for Verizon to “negotiate reasonable commercial arrangements with transit providers or content providers to ensure a level of capacity that accommodates their volume of traffic," he wrote. “Such arrangements have been common practice for content delivery networks in the Internet ecosystem for many years, and Netflix is fully capable of taking the necessary and customary steps to ensure that its connections match its traffic volumes." That’s true as far as it goes, but the statement doesn’t mention that Netflix already capitulated to Verizon's terms more*than 10 weeks ago. We asked Verizon spokespeople today how much progress has been made setting up the connections but the company declined comment. Young’s blog post didn’t shed any light on when significant numbers of customers can start seeing improvements. “We are working aggressively with Netflix to establish new, direct connections from Netflix to Verizon’s network,” Young wrote. “The benefit of these direct connections will be two-fold. First, Verizon customers who use Netflix will have a significantly improved experience as Netflix traffic flows over non-congested links. Early tests indicate that this is the case. The other benefit will be that the congestion that we are seeing today on those links between these middleman networks and our L.A. border router will likely go away once the huge volume of Netflix traffic is routed more efficiently. This will improve performance for any other traffic that is currently being affected over those connections.” Netflix has tried to rally customers to its cause, telling people who experience streaming trouble that “The Verizon network is crowded right now.” Today, the company repeated its call for rules that prevent ISPs from charging interconnection fees to content companies. “We'd like to thank Verizon for laying out the issue so nicely,” a Netflix spokesperson said in a statement sent to Ars. “Congestion at the interconnection point is controlled by ISPs like Verizon. When Verizon fails to upgrade those interconnections, consumers get a lousy experience despite paying for more than enough bandwidth to enjoy high-quality Netflix video. That's why Netflix is calling for strong net neutrality that covers the interconnection needed for consumers to get the quality of Internet they pay for.” Netflix did not offer any update on when the peering links with Verizon will be established.
  12. Fraudulent credentials for additional domains may also exist in the wild. Microsoft has issued an emergency update for most supported versions of Windows to prevent attacks that abuse recently issued digital certificates impersonating Google and Yahoo. Company officials warned undiscovered fraudulent credentials for other domains may still be in the wild. Thursday's unscheduled update effectively blocks 45 highly sensitive secure sockets layer (SSL) certificates that hackers managed to generate after compromising systems operated by the National Informatics Centre (NIC) of India. That's an intermediate certificate authority (CA) whose certificates were automatically trusted by all supported versions of Windows. Millions of sites operated by banks, e-commerce companies, and other types of online services use such cryptographic credentials to encrypt data passing over the open Internet and to prove the authenticity of their servers. As Ars explained Wednesday, the counterfeit certificates pose a risk to Windows users accessing SSL-protected sections of Google, Yahoo, and any other affected domains. "These SSL certificates could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against Web properties," a Microsoft advisory warned. "The subordinate CAs may also have been used to issue certificates for other, currently unknown sites, which could be subject to similar attacks." Computers running version 8, 8.1, RT, RT 8.1, Server 2012, Server 2012 R2, Phone 8 or Phone 8.1 of Windows will receive the revocation update automatically. An automatic updater for revoked certificates already enabled in these versions will update the Windows Certificate Trust list without requiring users to take any action. People using Windows Vista, 7, Server 2008, or Server 2008 RS may or may not already have the automatic updater installed. Users who don't have the updater already, or who are unsure about its status, can install it or make sure it's installed by following the instructions here. At the moment, there is no way for systems running Windows Server 2003 to revoke the fraudulent certificates. Thursday's advisory flagged 45 separate URLs that were vulnerable to spoofing by counterfeit certificates that stemmed from a recent hack of an India-based CA. The bogus certificates covered various subdomains for Google, Yahoo, yahoo-inc.com, yahooapis.com, static.com, and gstatic.com. The unscheduled update will hardwire the revocation of these specific certificates directly into Windows, a measure that prevents attackers from bypassing real-time certificate verification checks performed by the online certificate status protocol. As Ars reported on Wednesday and Microsoft warned Thursday, security experts haven't ruled out the possibility that the hackers generated additional fraudulent certificates covering the same or different domains. Even after receiving Thursday's patch, Windows machines will continue to automatically trust any bogus credentials that have yet to be discovered. The update revokes trust in three intermediate certificates belonging to NIC, a move that will cause all domain certificates, including an unknown number of legitimate ones, issued under them to be invalid. The collateral damage from this move could create problems for people attempting to access SSL-protected sites relying on one of the NIC intermediate certificates. Microsoft could have eliminated the risk posed by any undiscovered certificates by updating its Certificate Trust list to remove root certificates from India's Controller of Certifying Authorities (CCA), which oversees the compromised NIC. That move would have caused many more legitimate sites to display SSL errors, a consideration that likely drove Microsoft's decision to revoke only individual domain certificates known to be fake. Microsoft's options are starkly contrasted by those available to engineers of Google Chrome. Granular controls in that browser allowed it to accept only a small subset of CCA-authorized certificates, all carrying India's .in top level domain. Windows users should ensure as soon as possible that their systems are updated. Even then, they should remember that they remain susceptible to any certificates that have not yet been detected. Especially cautious Windows users should consider accessing SSL-protected domains using the Firefox browser or Thunderbird e-mail app, which don't rely on Microsoft's Certificate Trust list. Microsoft's Enhanced Mitigation Experience Toolkit may also offer some additional protection. As noted earlier, Chrome for Windows is immune to most attacks, since CCA-authorized certificates are limited to the .in top level domain. People using default versions of Mac OS X, Linux, and other operating systems are also immune since they don't trust CCA-authorized sites. This post was updated to correct misstatements about the status of any undiscovered certificates generated under the NIC intermediate certificates.
  13. The UK Commissioner’s Office claimed that they expect to receive complaints from people requesting to remove their name from Google’s search results. Google found itself between the hammer and the anvil, as while the recent court ruling demanded that it remove names from the searches, these moves are criticized by those who claim the company is removing links that are still relevant. In order to comply with the court ruling over the so-called “right to be forgotten”, the tech giant has implemented a system where individuals can request particular links be removed from searches. Only the search results were altered, the web pages with the information remained. Or at least this was what the company promised. However, some British users have already complained that Google removed search results that were still relevant. Now the UK’s Commissioner became the arbiter for disputes between search engines and people who want links removed and is expecting other complaints from people seeking to get their names removed from the search results. Although there has been no complaints thus far, the potential is good, based on the sheer volume of requests Google is receiving, (around 1,000 per day across EU). However, the Commissioner clarified that publishers and other third parties won’t be able to complain about it – only the individuals affected by the content of the page. A few days ago the Guardian complained about the removal of a number of 4-year-old pages from its index via name-based search, and the company had to reinstate them. The problem is that the removal of links may appear very controversial. For instance, there are worrying members of a pressure group about Collins & Bone, a UK company which 4 years ago was seeking for investors for a business of renovating houses and renting them to students. However, the investigation by the UK government found out that the founders of the company should be disqualified from directorships for a total of 28 years. These were one of the first people to request information about them be removed, and the campaigners who say they were defrauded are afraid that it may soon happen. As for other search engines operating in Europe, there were not many comments or effort to do what Google is doing. Microsoft’s Bing, for example, didn’t clarify how it was going to deal with such requests from EU citizens.
  14. A Washington DC restaurant owner has launched a lawsuit against the tech giant for an incorrect Google Maps listing which lead to a decline in customers and forced the administration to lay off staff and finally shut down. The 40-year-old Serbian Crown restaurant was known for its exotic meats, including lion, but suddenly suffered a 75% drop in customers over the weekend two years ago. The owner, an Italian immigrant Rene Bertagna, had to lay off staff and eventually close the restaurant in a few months. He had no idea what could cause such a decline, because he was unaware of his Google Maps listing until one day, when a regular customer called his and asked why they are closed on Saturday, Sunday and Monday. It turned out that the Google Maps listing had falsely shown the restaurant shut over the weekend and Monday, which used to be the restaurant’s busiest days and kept it profitable. The owner blames the tech giant for allowing the listing for the Serbian Crown to be sabotaged and failing to do enough to verify the changes. Bertagna launched a lawsuit against Google in Virginia federal court, claiming that he had never used the Internet or Google Maps. Although he finally hired an Internet consultant who took control of the Google Places listing and corrected the information about the restaurant, it was too late and he couldn’t save his business. In fact, this isn’t the first time Google Maps listings were sabotaged. For instance, it is known that thousands of hotel listings were also hijacked six months ago, changing their listings to point to an external website. The matter is that anyone with a Google+ account is able to submit a change to any detail of a Google+ Local page, be it a listed website address, phone number, physical address or name of the place. Google claims that all the changes are submitted for review before the real changes are made, but that was not enough to stop abuse in the past. Business listings are created using commercial mailing list databases, after which businesses can claim a listing and curate it for free. But if a business ignores it, users are able to change its details without the place’s knowledge. That’s what happened with Serbian Crown. Legal experts believe that the lawsuit is unlikely to result in any impact on Google due to the crowdsourced nature of Google Maps. Google’s lawyer claimed that the restaurant “should not be permitted to vex the company or the court with such meritless claims”, in a motion to dismiss the lawsuit.
  15. The first and only Bitcoin ATM in Central Asia was installed in small cafe in Kyrgyzstan’s capital, Bishkek. The ATM converts dollars into Bitcoins, which are increasingly used in online transactions. The ATM’s owner, an Italian financial analyst Costa, believes that his machine could impact the way one million migrant workers transfer their earnings home from Kyrgyzstan. According to estimations of the World Bank, migrant remittances totaled the equivalent of 31% of Kyrgyzstan’s GDP in 2013. Most of that money was transferred via expensive, fee-based services like Western Union and its Russian and CIS analogues. Costa, a former analyst with Goldman Sachs, is sure that Bitcoin represents a low-cost, secure and confidential alternative. The world’s most popular cryptocurrency was invented by a group of anonymous Internet users five years ago and is not controlled by national governments or banks. Bitcoin offers a P2P encrypted payment system which could be readily converted into cash. However, the currency is very popular as a payment method, with more and more stores and companies accepting it in exchange for products or services. There are no fees or they are nominal. The value of Bitcoin depends on supply and demand, and the rate is currently about $640. However, the cryptocurrency also faces some hurdles, starting with a lack of understanding. In the meantime, the Italian financial analyst views Kyrgyzstan as a very attractive place to implement a Bitcoin facilitated transactional system due to the country’s relative weakness in regulatory systems. The country suffers a lack of legacy financial systems and the government seems open to try new things. The dark side of the experiment is that the local Customs Union, which currently consists of Russia, Belarus and Kazakhstan, and which Kyrgyzstan is expected to join by next year, doesn’t seem to approve. Its current members have already taken cautiously negative views of cryptocurrencies, though none of them have issued outright Bitcoin bans thus far. But in this region, anything perceived to challenge centralized state control may die fast without a proper support. Costa sees his investment as proof of his enthusiasm – of course he doesn’t expect to recoup the machine for several years, earning a nominal fee off each transaction, but the fact is that without any advertising, several users have already tried the machine out within the first days. Hopefully, Bitcoin can find a comfortable home in Bishkek.
  16. Tracker Name :Demonoid Signup Link :http://www.demonoid.ph/register.php Genre : General Closing Date : N/A Additional Information : Good General Tracker
  17. Tracker Name : EagleTorrents Signup Link : http://www.eagletorrents.net/index.php?page=agree Genre : General Closing Date : N/A Additional Information : Movies/Tv
  18. Tracker Name : SeedGames Signup Link : http://www.seedgames.org/signup.php Genre : Games Closing Date : N/A Additional Information :Games Private Tracker
  19. Last year Adobe announced a shift away from boxed products in favor of a cloud-based subscription model. Now the U.S.-based company says that not only does it have more than 2.3 million cloud subscribers, but it has also seen a drop in piracy. Exactly how much is "hard to measure" but Adobe products still lead the way with pirates. There can be little doubt that Adobe products are a crowd pleaser among digital creatives. Designers love them, photographers and videographers do too, and Adobe’s Photoshop, Flash and Acrobat brands are recognized worldwide. But while millions of people use Adobe’s premium products, not everyone pays for that privilege. Unauthorized Photoshop releases have been appearing on computers worldwide for 25 years and other Adobe products are regularly pirated close to their launch. Over time this has led Adobe to invest substantial sums of money on anti-piracy measures including DRM and even legal action. But there are other ways to deal with the problem. In May last year and much to the disappoint of Adobe’s millions of pirate ‘customers’, the company announcemend that it would be changing the way it does business. Boxed products, a hangover from the last decade and earlier, would be phased out and replaced with a cloud-based subscription model. On the one hand, many pirates heard the word “cloud” and associated that with a lack of local machine control, something that can cause issues when trying to run unlicensed software. Adobe, on the other hand, appeared to be looking at product development and the piracy problem from a different angle. While attempts at hacking its cloud service would present another technical barrier to piracy, with its new offering the tech giant also looked towards making its product more affordable. A few dollars a month rather than $700 in one go was aimed at providing an economic reason for even the most budget-restricted not to pirate. But has the strategy worked? According to new comments from Fabio Sambugaro, VP of Enterprise Latin America at Adobe, unauthorized use of the company’s products is definitely down since the cloud switch. “Piracy has fallen,” Sambugaro says. “It’s hard to measure, but we’ve seen many companies seeking partnerships that in the past wouldn’t have done so.” According to information released to investors last month, Adobe exited quarter two this year with 2,308,000 subscribers of its Creative Cloud service, an increase of 464,000 over the first quarter of 2014. The company attributed 53% of the company’s quarter two revenue to “recurring sources” such as its Creative and Marketing Cloud services. So have the pirates given up on Adobe? In a word, no. One only has to scour the indexes of the world’s most popular torrent sites to see that Photoshop, Photoshop Lightroom, Illustrator, Premiere, Indesign, After Effects and Acrobat Pro all take prominent places in the charts of most-popular torrents. No surprise then that on The Pirate Bay, Photoshop CS6 – the last version of Photoshop before the cloud switch – is king of the software downloads by a long way. Also, and contrary to fears aired by pirates alongside Adobe’s original strategy change announcement, the cloud has not made it impossible to run unauthorized versions of Photoshop CC 2014, for example. Expected functional restrictions aside, torrent sites have plenty of working copies of Creative Cloud releases, but is this necessarily a bad thing? There are those who believe that some level of piracy is useful as a try-before-you-buy option on a traditionally expensive product such as Photoshop. But what makes this notion even more interesting today is that Adobe’s switch to the cloud – and its much lower price point for entry – may see people investing a few dollars a month for increased functionality and a simple life, instead of one spent jumping through hoops with an inferior and oftentimes awkward product. And Adobe knows it. “I do not think people who pirate our software do it because they are bad people, or because they like to steal things. I just think that they decided that they can not afford it,” said Adobe’s David Wadhwani previously. “And now, with the switch to subscriptions and with the ability to offer software at a cheaper price, we see that the situation is beginning to change and we’re excited.” Richard Atkinson, Corporate Director of Worldwide Anti-Piracy, admitted last year that the company would move away from “enforcement-led anti piracy” to a “business-focused pirate-to-pay conversion program.” If the company is to be believed, that is now paying off. Source
  20. 8 Jul 2014 - Bonus Points - Added by cr0nus We have just added another way to earn bonus points. You will receive 15 points for each new subtitle you upload Here are some other ways to earn them: ºUploading a new torrent = 15 points ºFilling a request = 10 points ºComment on torrent = 3 points ºSaying thanks = 2 points ºRating a torrent = 2 points ºMaking a post = 1 point ºStarting a topic = 2 points ºIdling in IRC = .5 points per hr ºSeeding = 1 point/hour per torrent
  21. 2014.07.10 - 开放邀请及限时邀请通知 | Open Invitation and Time-Limited Invitation 各位会员, 为庆祝CMCT重生四周年,本站计划于7月15日开放邀请系统,届时所有等级在发烧及以上的会员都能发送邀 请。等级在发烧及以上的会员还将同时获得一枚限时邀请,限时邀请使用期限截至7月31日。7月31日以后本 站将根据情况继续关闭邀请系统或者调整允许发送邀请的等级。 CMCT-PT管理组 2014年7月10日 We will open invitation system on July 15th. All members whose class are at least Elite are welcom to invite friends joining ourtracker by that time. In the meantime all members whose class are at least Elite will get ONE time-limited invitation which will expire on July 31st. After July 31st, we will close our invitation system again or elevate the invitation class. Happy CMCT Reunion Day! CMCT-PT Staff 07/10/2014
  22. Awesome Giveaway !!! I apply for awesome rare trackers, PTN ( Piratethenet) I am looking for a long time and applied in lots of GA, but, failed to get it. So, request to consider if there is any space in your decision. Thanks added Rep Added Decision is yours. Thanks in advance...
  23. Tracker Name : Blackcats-Games Signup Link : https://www.blackcats-games.net/signup.php Genre : Games Closing Date : Limited offer Additional Information : Good Game related tracker
  24. A team of researchers has announced it has transmitted data over traditional copper telephone lines at a record speed of 10 gigabits per second (Gbps). Bell Labs said it used two pairs of 30m (98.4ft)-long standard phone cables to achieve the speed in its laboratory. It suggested the tech could eventually be adapted to offer 1 Gbps in real-world uses. That could reduce the amount of expensive fibre optic cable needed to boost internet speeds in cities. "It will enable operators to provide internet connection speeds that are indistinguishable from fibre-to-the-home services, a major business benefit in locations where it is not physically, economically or aesthetically viable to lay new fibre cables all the way into residences," said Bell Labs' owner, Alcatel-Lucent. "Instead, fibre can be brought to the curbside, wall or basement of a building and the existing copper network used for the final few metres." However, one analyst noted that the tech would not solve the problem of slow net speeds for many other users. "The problem that rural properties have is that they are usually very far away from the nearest telephone exchange - you can usually measure it in miles," said Chris Green, principal technology analyst at the Davies Murphy Group consultancy. "The speed jumps that Bell Labs have managed to achieve drop away at much shorter distances. "In order to get any of these speeds you would need to be close enough to your exchange - or fibre optic cable connected to it - that you could pretty much throw a stone at it from your door." Mr Green added that even in many parts of major cities, BT often only provides "fibre to the cabinet", rather than "fibre to the home" - and many properties would be too far away from a phone cabinet to benefit. Even so, he acknowledged the tech could significantly cut the cost of offering ultrafast broadband to those who would qualify. Faster, shorter Bell Labs said a team of engineers at its Antwerp, Belgium offices developed a technology called XG-Fast to achieve the speed record, building on the existing G.fast specification. To do this it developed kit that uses a wider frequency range of up to 500 MHz to transmit data, rather than the 106 MHz range used by G.fast. The trade-off, however, is that XG-Fast only works over shorter distances than its predecessor. So, while G.fast offers 700 megabits per second over 100m, XG-Fast can offer either a one-way data transfer of 10 Gbps over 30m or the prospect of a simultaneous 1 Gbps upload and 1 Gbps download over 70m. While Alcatel-Lucent can claim this is a new record for copper cables, it is still a fraction of 1.4 terabits per second speed it achieved last November in a test carried out with BT over a fibre optic cable link running between London's BT Tower and a research campus in Suffolk. Quick conversions Data speeds are usually described in terms of bits: 1,024 bits = 1 Kilobit 1,024Kb = 1 Megabit 1,024Mb = 1 Gigabit 1,024Gb = 1 Terabit Data storage is usually described in terms of bytes: 8 bits = 1 byte 1,024 bytes = 1 Kilobyte 1,024KB = 1 Megabyte 1,024MB = 1 Gigabyte 1,024GB = 1 Terabyte So, a 10 Gbps connection would allow you to transfer 75GB of data over the course of a minute, or the equivalent of about 110 full CDs worth of music.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.