Apryl is a classically trained pianist who began playing music at age 3. She plays many instruments and has a serious love for music Medieval and Renaissance era music. According to her about page
Apryl Knight brings years of experience and enthusiasm to all of her performances. She has been playing music since she was 3 years old, starting with piano and voice, then flute, and continuing to add expertise in other instruments until it would be impossible to list them all here. Some of the instruments she plays include bowed psaltery, flute, pennywhistle, bodhran, guitar, pianonomicon, and voice. She also dances, winning awards for her bellydancing and performing with gfire and Desert Passion Middle Eastern Dance Company. When not performing, she teaches piano and music theory.
I was lucky enough to catch up with Apryl at Gen Con 2014. Listen in as we discuss:
- Her musical backgroud
- Where to find her on the Internet
- The instruments she plays
- Her influences
- Her interest in women who wrote in the era
- Her thoughts on the new media order
- The Tolstin Troubadours
- Her albums
- Her advice to aspiring musicians
You can find Apryl Knight on the web at:
2012.04.30 -Monday Night Tech Net News and Opinion
Hello indienation listeners join Brian, Lumpy, OmniDragon, Cleta, Knowles217 and our special guest John Atkinson (Aka B00) For Tech Net News and Opinion as we bring you Copyright and hacking news in this show. You can find B00 at:
We started off with a set from Gavin Salkeld
- She Rox
Hasbro Offers Nerf Blogger Free Samples, Sends Lawyers And Investigators Instead
This horror story comes from a Nerf fan who says he was contacted by a Hasbro product manager who wanted his mailing address to send him free samples of a rare-in-Australia Nerf gun to offer as a promotional giveaway on his blog. He gave it to her, and soon after got something in the mail from Hasbro: a legal nastygram. It wasn’t the nastiest of legal grams in fact he made a point to say how nice it was and he he decided to comply with its request that he take down some photos of an unreleased Nerf gun from the blog, which Hasbro claimed were copyrighted and confidential. And he never did get that free nerf gun.
Cultural Insanity: You Can’t Show A Painting In A Movie Without Paying The Copyright Holder
An article from The NY Times has yet another ridiculous bit of copyright law, the fact that moviemakers have to license artwork, even if they own the physical piece to show it in a movie. And it gets even worse, when you find out that the ridiculous position of the Artists Rights Society (think the RIAA/MPAA for artists) is that the newly released 3D version of Titanic needs a new license, because its use of artwork is somehow not covered by the original license:
It is there in the new 3-D version of “Titanic,” as it was in James Cameron’s original film: a modified version of Picasso’s painting “Les Demoiselles d’Avignon” aboard the ship as it sinks. Of course that 1907 masterpiece was never lost to the North Atlantic. It has been at the Museum of Modern Art for decades — which is precisely the reason the Picasso estate, which owns the copyright to the image, refused Mr. Cameron’s original request to include it in his 1997 movie. But Mr. Cameron used it anyway. After Artists Rights Society, a company that guards intellectual property rights for more than 50,000 visual artists or their estates, including Picasso’s, complained, however, Mr. Cameron agreed to pay a fee for the right to use the image. With the rerelease of “Titanic,” the society wants Mr. Cameron to pay again, asserting that the 3-D version is a new work, not covered under the previous agreement.
China deletes accounts on Twitter-like service as part of social media crackdown
Just two days after President Obama and the United States government hit Syria and Iran with new sanctions “to hold accountable those who assist in or enable such [human rights] abuses through the use of information and communications technology,” China has now stepped up its online crackdown in the wake of a political scandal. China has been embroiled in a massive political scandal involving Bo Xilai, a Chinese politician who had been seen as a rising star in the Chinese Communist Party prior to his abrupt downfall over obstruction of justice charges in a murder case involving his wife, as well as local political disputes. Last month, Bo was removed as party chief of the southwestern city of Chongqing. However, on Tuesday, as discussion of the case continues to explode across the Internet, the Chinese clone of Twitter, Sina Weibo, deleted the accounts of several users, “including that of Li Delin, a senior editor of the Chinese business magazine Capital Week, whose March 19 post helped fuel rumors of a coup in Beijing,” according to The Wall Street Journal Li has since been detained by Chinese authorities.
Megaupload’s Dotcom gets money and Mercedes back, involved in political scandal
Kim Dotcom the head of the file-sharing website Megaupload will be getting some of his assets returned to him in the order of:
1.NZ$750,000 ($614,000) in cash that was confiscated from him.
2.His Mercedes-Benz G55AMG worth NZ$250,000 ($204,000) with the license plate “POLICE.”
3.He receives an NZ$20,000 ($16,000) monthly living allowance off of the interest of his NZ$10 million ($8.19 million) of government bonds.
4. His wife, Mona, will also get her living expenses and medical bills paid (she recently gave birth), and she will have the use of her seized 2010 Toyota Vellfire, worth NZ$60,000 ($49,000). And also Since early April, Dotcom has had the use of his mansion, including the use of his swimming pool for exercise. He is also able to use the Internet. And the the New Zealand Herald reported that Dotcom claims to have donated NZ$50,000 ($41,000) to John Banks, the head of the ACT New Zealand political party and the current minister for Small Business and Regulatory Reform, during his 2010 campaign for mayor of the city of Auckland.
No Record Label, But Amanda Palmer Raises Over $100k In Just Six Hours On Kickstarter
Amanda Palmer has had many sucess stories on Techdirt in the past even including her celebration of the fact that she finally got dropped from a record label two years ago.She has done a bunch of fun projects now she has decided it was time to do a “traditional” studio album again. So… of course, she turned to Kickstarter to help put together funds, seeking $100,000 in 32 days. Instead, she got it in SIX HOURS. Kickstarter has become a very popular way to raise money for projects like this and the details of what she’s offering are, quite interesting as well.Amanda’s offering has a lot of cool goodies and opportunities (including live events) for backers, allowing them to self-select in to how they’d like to support her. A lot of the offering is vinyl focused, which isn’t that surprising, given the renewed popularity of vinyl these days, but also the ability to do more artistic work in combination with a vinyl release. Of course, not everyone has a record player… but they’ve got that covered. At some of the higher level packages, they’ll include a USB-enabled Crosley turntable which they’ll custom-paint for you, making it awesome.
- Not Done Dancing Yet
Court: Britain’s ISPs must block Pirate Bay
File-sharing site The Pirate Bay must be blocked by UK internet service providers, the High Court has ruled. The Swedish website hosts links to download mostly pirated free music and video. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media must all prevent their users from accessing the site. “Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists,” the British Phonographic Industry (BPI) said. A sixth ISP, BT, requested “a few more weeks” to consider their position on blocking the site. BPI’s chief executive Geoff Taylor said: “The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale. “Its operators line their pockets by commercially exploiting music and other creative works without paying a penny to the people who created them.”This is wrong – musicians, sound engineers and video editors deserve to be paid for their work just like everyone else.”
Release of exploit code puts Oracle Database users at risk of attack
Oracle has declined to patch a critical vulnerability in its flagship database product leaving their customers vulnerable to attacks almost all versions of the Oracle Database Server released in the past 13 years contain a bug that allows hackers to perform man-in-the-middle attacks that monitor all data passing between the server and end users who are connected to it according to Joxean Koret, a security researcher based in Spain. When Koret pressed Oracle to explicitly say if engineers planned to allow the bug to remain in current versions, an Oracle employee responded:
“To protect the interest of our customers, we do not provide these level of details (like versions affected) for the issues that are addressed as in-depth. The future releases will have the fix.”
Oracle released its own list of mitigations and strongly urged customers to implement them right away.
UK, US seize 36 domains tied to financial fraud
ritish and US authorities have moved to seize 36 domain names associated with websites being used to traffic in stolen payment card data. The UK’s Serious Organised Crime Agency (SOCA) said in a release issued today that the sites used Automated Vending Carts, a type of Web e-commerce software that allowed criminals to rapidly sell large volumes of credit card and banking account data. According to a report by Computerworld UK’s Anh Nguyen, two men in Britain were arrested on April 24 in a connected case. They were alleged to have made large-scale purchases of stolen payment data from AVC sites, and an AVC site operator in Macedonia was arrested by the Macedonian Ministry of the Interior’s Cyber Crime Unit.
90% of popular SSL sites vulnerable to exploits, researchers find
Less than 10 percent of the most popular websites offering Secure Socket Layer protection are hardened against known attacks that could allow hackers to decrypt or tamper with encrypted traffic, researchers said Out of the 200,000 sites examined, only 19,024 were configured to withstand an attack discovered in 2009 that allows attackers to inject data into encrypted traffic passing between two endpoints. What’s more, just 25 percent of the sites are able to withstand an experimental attack unveiled last year that allows attackers to silently decrypt data that is passing between a webserver and an end-user browser. He also said that SSL Pulse uncovered 19 private keys generated with 512-bit encryption, making them susceptible to brute forcing attacks that allow man-in-the-middle hackers to decrypt the protected traffic.
Microsoft patches major Hotmail 0-day flaw after apparently widespread exploitation
Microsoft quietly fixed a flaw in Hotmail’s password reset system that allowed anyone to reset the password of any Hotmail account last Friday. The company was notified of the flaw on April 20th and responded with a fix within hours—but not until after widespread attacks, with the bug apparently spreading “like wild fire” in the hacking community. Hotmail’s password reset system uses a token system to ensure that only the account holder can reset their password: a link with the token is sent to an account linked to the Hotmail account, and clicking the link lets the account owner reset their password. However, the validation of these tokens isn’t handled properly by Hotmail, allowing attackers to reset passwords of any account.
VMware confirms source code leak, LulzSec-affiliated hacker claims credit
VMware has confirmed a leak of source code from the ESX hypervisor. The code was posted on Pastebin on April 8 by a hacker calling himself “Hardcore Charlie.”VMware confirmed the theft yesterday, and said there is a “possibility that more files may be posted in the future.” The good news is that the code dates from 2003 to 2004. While VMware ESX is still heavily used, VMware is shifting customers to a newer hypervisor called ESXi, which has a smaller attack surface and is designed to be more secure.”The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers,” the company said. “VMware proactively shares its source code and interfaces with other industry participants to enable the broad virtualization ecosystem today. We take customer security seriously and have engaged internal and external resources, including our VMware Security Response Center, to thoroughly investigate. We will continue to provide updates to the VMware community if and when additional information is available.”
Google’s new search algorithm to crack down on “black hat webspam”
After changes to Google’s ranking and page layout algorithms they are pushing yet another update to its algorithms with the hopes of curbing “black hat webspam” from creeping into search results. The changes are targeted at sites engaged in tactics such as keyword stuffing, or “unusual linking patterns” where unrelated links are sprinkled throughout a fake or manufactured article. There have been at least nine major updates to Google’s “Panda” algorithms since they were introduced last February.
Backdoor in mission-critical hardware threatens power, traffic-control systems
Customers of Ontario, Canada-based RuggedCom have the bad news of there is a good chance those Internet-connected devices have backdoors that make unauthorized access a point-and-click exercise. Because the equiment that RuggedCom system is using has an undocumented account that can’t be modified and a password that’s trivial to crack. Researchers say, for years the company hasn’t bothered to warn the power utilities, military facilities, and municipal traffic departments using the industrial-strength gear that the account can give attackers the means to sabotage operations that affect the safety of huge populations of people.
Indicted BitTorrent group used FM, infrared receivers to record movies in theater
According to an indictment unsealed this week, the four alleged members of the BitTorrent movie release group IMAGiNE have now been charged with one count of “Conspiracy to Commit Criminal Copyright Infringement,” four counts of “Criminal Copyright Infringement,” and one count of “Distribution of a Work Being Prepared for Commercial Distribution.” Each count brings a maximum penalty of up to five years in prison. The group, which TorrentFreak called “one of the P2P scene’s most prominent release groups,” was busted up by federal authorities in September 2011. It is not very common for BitTorrent-related groups to be split apart with federal criminal charges brought against them. Court documents filed in the United States District Court for the Eastern District of Virginia report that the lead defendant, Jeramiah B. Perkins (aliases: “Butch Perkins,” “Stash,” and “theestas”) was arrested and then released on bail on Monday. The other defendants are Gregory Cherwonik, 53, of New York, Willie Lambert, 57, of Pennsylvania, and Sean Lovelady, 27, of California. The four are accused of running their BitTorrent ring from September 2009 to September 2011.
Skype exploit reveals user IP addresses
A simple Skype exploit can reveal IP addresses remote and local of any user. This Blog Post runs through the process of obtaining a user’s IP address apperently all someone has to do is start the process of adding a contact with a specific user name and instead of sending a confirmation the person can click on the information card to obtain the IP address of that particular user. But this only works if the user is on line and the IP address do not give a persons’s name or other specific information but does provide country and in some cases city of origin. Skype says they are looking into the issue
“We are investigating reports of a new tool that allegedly captures a Skype user’s last known IP address. This is an ongoing, industry-wide issue faced by all peer-to-peer software companies,” said a company representative. “We are committed to the safety and security of our customers and we are takings measures to help protect them.”
You can contact us at :
Comments and feedback are welcome. You can call us at (818)81-INDIE or hit us up with and email at firstname.lastname@example.org. You can follow us as @indienationfm on Twitter. You can also join our community on Facebook.
Be sure and circle us on Google Plus!
2012.04.23 – Monday Night Tech Net News and Opinion
Hello Indienation listeners join us as Brian, Lumpy, OmniDragon and Cleta bring you tonight’s Tech Net news and Opinion and as always Knowles217 joins us in Teamspeak. Tonight’s news consists of Tech, Copyright, Hacking and Prize worthty news. As always you can find us over on irc.geekshed.net in #indienation you can join us there.
2012.04.16 – Monday Night Tech Net News and Opinion
Hello, Indienation listener. Join Brian, Lumpy, OmniDragon, and Cleta as we bring you Tech Net News and Opinion. We have DukeNukem and Knowles joining us in Teamspeak tonight. Tonights news consits of Gaming , Copyright, Science, and Technology News, a show full of informative news and opinion.
We started the show off with some music from: Sick Of Sarah:
- Kiss Me
- Hello, Good Morning (Live – Sent Out to Lumpy)
Microsoft’s Xbox 360 Follow-up Rumored to Pack 16 Cpu Cores
Rumors are stating that Xbox 360’s follow-up is to have 16 CPU cores. The next generation of consoles may have a big focus on more CPU cores as Microsoft has rumored to be bringing it for the Xbox 360 follow-up, code named Durango. Sixteen cores seems like a bit over the top for a gaming system. Most current PC games struggle to max out even three cores on current high-end Intel Sandy Bridge processors that are expected to hit store shelves near the end of 2013, but it has been speculated the cores might be needed to drive the next generation of Microsoft’s Kinect 3D camera, which they speculate will be able to track multiple players, “down to their fingertips.” But, again, that’s just speculation on what a 16 core console could do.
Valve Looking to Hire Hardware Engineers for Unknown Project
According to Arstechnica, Valve is looking to hire some hardware engineers.
The job postings don’t go into any specifics on what kind of hardware Valve is looking for help with exactly, but the company says it wants to “invent whole new gaming experiences” that can “enhance” the kinds of software it’s already making. Some might immediately try to connect the job postings to recent rumors of a PC-based “Steam Box” game console designed to run Valve’s digital distribution service.
Why Are Video Game Sales Looking So Weak Lately? Blame Nintendo
If you keep up with the monthly reports on new video game hardware and software sales, you would have seen that 2012 has looked like a bloodbarg as sales were down 37 percent, 24 percent, and 26 percent for the first three months of the year, respectively, if compared to the same period in 2011. The suffereng is not equal across the industry. If you turned the numbers into a single word, it would be Nintendo. The Wii software segment is trending down 50 percent year over year and has been for the last 12 months. Sales are also down for the PS3 and Xbox 360, but significantly less than Nintendo.
Friendly Pirate Challenges Minecraft Creator to Quake 3 Battle
The Minecraft creator, Markus Persson was challenged a Quake 3 battle by a friendly pirate. Now, what happened is he had contacted this pirate about a website that was having his Minecraft install file available for download. So, he asked them to please take it down. Persson said he emailed the guy handing out Minecraft for free and asked him to take the site down. The pirate challenged Persson to Quake 3, and after he made a comment saying, “What a great guy,” he had already taken down the site and is also suggesting Quake 3 Death Match 17, a Qake 3 battle.
Thousands of New York Sex Offenders Blocked from Online Gaming Networks
They are calling it “Operation: Game Over.” New York state law requires convicted sex offenders to register their e-mail addresses, screen names, and other online aliases with the state. The article sites 3,580 users have been blocked from gaming networks.
Calling the project a first-of-its-kind effort to “ensure online video game systems do not become a digital playground for dangerous predators,” Schneiderman defended the need for the restrictions by highlighting the case of Richard Ketovic, a Monroe County, NY man who last month pled guilty to sexually abusing a 10-year-old boy after first making contact through Xbox Live.
We had a song from Jonathan Coulton:
- Code Monkey (Recorded Live at the Beachland ballroom)
Unfortunate: Appeals Court Revives Misguided Rosetta Stone Lawsuit Against Google
There have been numerous, silly lawsuits against Google for the fact that companies can buy AdWords ads based on trademarked terms.
These lawsuits are problematic on a few different levels. First, using trademarked keywords to trigger ads isn’t infringement. It’s a perfectly reasonable use. In the same way that a supermarket often places coupons for certain brands/products near competing products, advertising competitors is perfectly reasonable. Second, even if there is trademark infringement, it should be limited to the advertiser itself, not to Google, who is merely the platform.
The courts have said this to Rosetta Stone in the past even though they keep pursing this case.
MPAA Just Won’t Quit: Jumps into Legal Dispute to Argue Links & Embeds Are Infringing
This is, to put it mildly, crazy talk from an organization that still seems to have an institutional cluelessness about how the internet works. To be sure, there are a few different issues related to this case, which was really about porn company Flava Works suing the site MyVidster and its owner, Marques Gunter. MyVidster lets people link or embed videos from other sites. It did not host any of the content itself. In accordance with the DMCA’s notice and takedown provisions, Gunter would take down any embeds or links when he received a notice. However, the judge said that the site lost its DMCA safe harbor provisions because he did not take any further action, specifically because he did not cut off repeat infringers:
“It is true that service providers are not required to police their sites for infringement, but they are required to investigate and respond to notices of infringement—with respect to content and repeat infringers.” Now, it is absolutely true the DMCA requires that a site have a policy for terminating repeat infringers. But, it does not go so far as to say that they then need to proactively “investigate” content related to repeat infringers, as the court stated.
Court Says That Copying Code is Not Really Theft Under the Law
From the deprived-of-use dept., they say they’ve been pointing out for awhile that copyright is not property and that infringement is not theft, but people can’t seem to understand and let it go. Still insiting both claims are true, the court specifically cites the Dowling case, which we’ve discussed on many occasions, which makes clear that infringement is a different beast than theft.
The infringement of copyright in Dowling parallels Aleynikov’s theft of computer code. Although “[t]he infringer invades a statutorily defined province guaranteed to the copyright holder alone[,] . . . he does not assume physical control over the copyright; nor does he wholly deprive its owner of its use.” Id. at 217. Because Aleynikov did not “assume physical control” over anything when he took the source code, and because he did not thereby “deprive [Goldman] of its use,” Aleynikov did not violate the NSPA.
We played a song from Sudden Death featuring the great Luke Ski:
- The Geeks Come Out At Night
The First Universal Quantum Network
German scientists at the Max Planck Institute of Quantum Optics (MPQ) have created the first “universal quantum network” that could be feasibly scaled up to become a quantum internet. So far, their quantum network only spans two labs spaced 21 meters apart, but the scientists stress that longer distances and multiple nodes are possible.
Physicists Create First Long-Distance Quantum Link
For more than a decade, physicists have been developing quantum mechanical methods to pass secret messages without fear that they could be intercepted. But, they still haven’t created a true quantum network — the fully quantum-mechanical analog to an ordinary telecommunications network in which an uncrackable connection can be forged between any two stations or “nodes” in a network. Now, a team of researchers in Germany has built the first true quantum link using two widely separate atoms. A complete network could be constructed by combining many such links, the researchers say.
1.5 Million Pages of Ancient Texts to Be Made Accessible Online
This week the University of Oxford and the Vatican announced a plan to collaborate in digitizing 1.5 million pages of rare and ancient texts, most dating from the 16th century or earlier. The project is expected to span about 4 years and was made possible by a donation of £2 million (approximately $3.1 million) from the Polonsky Foundation—a charitable organization that supports higher education, medical research, and other general matters in the arts and sciences. Specifically, the texts will include pages from Oxford’s Bodleian Libraries and the Biblioteca Apostolica Vaticana (BAV)
Cameron Narrates Stunning Titanic Simulation
Just in case his billion-dollar blockbuster wasn’t realistic enough for you, not to mention the new $18 million 3D version, James Cameron has created another film about the Titanic, which presents its final minutes in stunning detail.
“From iceberg to bottom, it’s never been animated so precisely and so dramatically,” the Canadian ubermensch and premier Titanic obsessive says in the trailer to “Titanic: The Final Word With James Cameron,” which premieres on the National Geographic Channel on April 8.
We played some music from Sudden Death:
Man Uses Google Earth to Find Long-lost Mother
Sometimes, Google Earth might just help you find your way home. That is just what happened to a man that had been seperated from his family when he was 5 years old. He had went on a train trip with his brother in 1986 when he fell asleep and awoke 14 hours later in the notorious slum of Calcutta…without his brother. As he grew older, he desired to search for his family. After numerous hours searching on the web, he zoomed in on Google Earth and there it was – the place where he grew up. His mother did not believe that was her son at first, after 25 years of him being gone.
Microsoft Job Ads Reveal Html5 Version of Skype Coming to Web Browsers
Skype is already integrated with Facebook, with an app including instant messages, voice, and video calls. But Skype for Browsers won’t be restricted to Facebook.
“Team Rendezvous at Skype is looking for passionate, team-oriented and self-motivated Developers to help us bring Skype experience on to the Web,” Microsoft writes in the job postings. “You will have a chance to integrate existing Skype solutions on to the web with the support of the backend services built from the ground up using [the] latest Microsoft technologies. [The] result of your work will be used by hundreds millions of thankful users worldwide.”
Iran Moving Ahead with Plans for National Internet
Iran was on the top of a recent list of repressive regimes that most aggressively restrict Internet freedom.
In addition to developing its own Intranet system, Reporters Without Borders says that the Iranian government is also creating its own custom electronic mail service and a national search engine called Ya Haq (Oh Just One) that is intended to replace Google. In order to obtain an account on the state-approved mail service, users will have to register their identity with the government.
We had some music from the great Luke Ski:
- I Love You TIVO
We ended the show with a song from Aluminum Forest:
Comments and feedback are welcome. You can call us at (818)81-INDIE or hit us up with and email at email@example.com. You can follow us as @indienationfm on Twitter. You can also join our community on Facebook.
Be sure and circle us on Google Plus!
- 2012.04.09 – Monday Night Tech Net News and Opinion (indienation.fm)
- 2012.03.26 Monday Night Tech Net News and Opinon – Episode 15 (indienation.fm)
- Microsoft’s Xbox 360 follow-up rumored to pack 16 CPU cores (bhattibytes.wordpress.com)
Join Brian, Lumpy, OmniDragon and Cleta for tonights
news we started the show with some music from: Anouschka
Tech Net News and Opinion – Episode 016
We started tonight’s show with 3 songs from the wonderful Adrienne Pierce:
- Absinthe Minded
- Every sprinkler
- Laundry and Dishes
You can find Adrienne Pierce at:
Join Lumpy, OmniDragon and Cleta as we bring you Tonights Tech Net news and Opnion. News topics this week include Microsoft and child porn, Google and Facebook security issues, AOL selling off patents, some woman sues Apple and much more! Not to mention some great music.
2012.03.19 – Tech Net News and Opinion
We started tonights show with some music from
The Pistol Whipper Snappers
- Drugs Motorcyles And Texas
You can find them at:
- How Did I Google This
You can find them at:
And we played some music by:
You can find him at:
Lumpy, OmniDragon, Cleta, and Matt bring you tonights tech net and news.
Linux and Android, together at last
The latest Linux kernel 3.3 now includes code from Google’s Android project. Most people do not realize that their Android phone’s operating system is really Linux based. Android is merely a fork of the Linux kernel code that is overseen by Linus Torvalds on kernel.org. He announced, with the release of version 3.3 of the Linux Kernel, that the two sets of code are now combined which will mainline the release of patches and new features. The merge has been underway for months and this is merely an announcement of its completion.
Researchers find privacy and security holes in Android apps with ads
Researchers at North Carolina State University discovered that many of the libraries used in free Android apps to display the in-app advertisements are a possible threat to the users privacy. Hackers can use these libraries to bypass Android security and some make it possible to fetch and run code from the Internet. The research team examined 100,000 apps and found that nearly half included code to track the user’s GPS coordinates and that 1 out of 23 allowed data to be passed back to the advertiser.
Super-secret Google builds servers in the dark
In an article from Arstechnica.com, it has been discovered that Google goes to extreme measures to ensure the secrecy of their server designs and networking gear. They give their technical staff lights to go on their heads when working on these super secretive servers to ensure no prying eyes will be able to catch a glimpse of their custom hardware. According to Chris Sharp, Google unscrewed all the light bulbs inside of the hardware cages that house their equipment in the Equinix data center. They have also turned off all of the overhead lights and sent their workers in with miner’s helmets. Google refused to comment, but, with the high end gear being an important edge against their competitors, this behavior is not surprising.’
Google flushes heat from data center with toilet water
This past week Google announced that it is nor working with the Douglasville-Douglas County Water and Sewer Authority to cool its Douglas County, Georgia computing center with 100% recycled water. From taking showers to flushing their toilets, local residents are helping to cool the data center. During a time of drought, Google no longer has to worry about being short on fresh water. They also did not want to contribute to the water shortage. Michael Patton, the deputy director of water and waste water operations for the WSA stated that, “It’s a win-win for both us and for the community, too.”
We talked about Polina Kourakina and her fundraiser for her first full length album, This Erie key of A. Here is the link
indiegogo.com/polinak and you can click on the sidebar widget here on indienation.fm.
we played some music from the very talented
Polina Kourakina from her Wonderlust EP
- Liquor & Wine
You can find the beautiful Polina at:
Microsoft gives cops tools to detect child porn
The software giant along with a Swedish technology company has giving law enforcement agencies a digital tool that sifts through massive amounts of online images to help identify instances of child pornography. Child pornography is one of those rare crimes where perpetrators often post evidence of their illegal acts online.But the vast quantity of images circulating on the Web makes finding specific photos of child abuse a huge challenge.They reviewed more than 65 million images nd videos of child sexual exploitation reported by law enforcement since 2002.
Microsoft seeks patent on monetizing buttons of TV remote
It’s called “Control-based Content Pricing,” and the basic idea is dynamic pricing of the material that you are watching lets say you skip a bunch of commercials the price of what you are watching just went up and apperently it builds on an existing patent that was already issued to Microsoft last year.
Suspicions aroused as exploit for critical Windows bug is leaked
Attack code privately submitted to Microsoft to demonstrate the severity of a critical Windows vulnerability is circulating on the ‘Net, prompting the researcher who discovered it to say it was leaked by the software maker or one of its trusted partners. There is an Update on it that says it wasn’t:
Update: Aaron Portnoy, ZDI’s Manager of Security Research told Ars he’s sure the leak didn’t come from anyone with his company. There is another update on it that says the code match:
Update 2: Yunsun Wee, Director of Microsoft’s Trustworthy Computing division confirmed that the code appeared to be match vulnerability information shared with MAPP partners. He said exploit details have never leaked out of his company, and he added he was unaware of leaks involving other Microsoft partners, either.
We wished Jamie Holm from Sick of Sarah Happy Birthday!!
And played some of their music:
We played a couple of tracks Lumpy recorded live in Cleveland
at The Pirate’s Cove.
- Kiss Me
- Hello, Good Morning (sent out to Lumpy)
The Pirate Bay plans fleet of low orbit server drones to evade the authorities
In what reads like an April 1 missive, The Pirate Bay has announced that it plans to launch “Low Orbit Server Stations” that will act as a front line defense against future take-down attacks and censorship attempts on the world’s largest torrent site.
Details are sketchy, but it sounds like these low orbit servers will act as proxies that redirect users to geographically-hidden servers that host the actual torrent indexes and trackers.
Anonymous Releases Their Own Operating System, Complete with Hacking Tools, and You Should Not Download It
“”Because you could “end up in jail”.
The OS is based off Ubuntu and runs the MATE user interface. It comes complete with many built-in hacking tools that crack passwords, search for vulnerabilities in web sites,
Update: The AnonOps Twitter account claims the OS is fake and full of Trojans, so our dis-recommendations stands. They say if you are interested in testing security use BackTrack.
Lester Chambers, Successful Musician Who Received No Royalties From ’67 To ’94, Planning To Sue
From 1967 to 1994, he recieved no royalties whatsoever. There is a photo on the web site that he posted on Facebook. The author of the article said he almost didn’t publish this because he wasn’t sure if it was real. He published this photo. All you can see is this Gold record and the letter he wrote. Lumpy reads the letter,
“I am the former lead singer of a 60s band. I performed before thousands at Alanta POP2, Miami POP, Newport POP, Alantic POP.” I did not squander my money on drugs or a fancy home. I went from 1967-1994 before I saw my first royalty check. The music giants I recorded with only paid me for 7 of my albums. I have never seen a penny in royalties from my other 10 albums I recorded. Our hit song was licensed to over 100 films and T.V commercials without our permission. One major TV network used our song for a national commercial and my payment was $625 dollars. I am now 72 trying to live on $1200 a month. Sweet relief; a music chairty is taking donations for me. Only 1% of artists can afford to sue. I am the 99%”
You can see the photo in the link.
Bruce Springsteen, Another Pirate Remixer!
According to this techdirt article here is what he is saying
“For me, it was The Animals. … “We Gotta Get Out Of This Place” had a great bass riff, you know it had that—[plays riff on guitar]—and that was just a clock, a clock marking time. [sings the first few lines] That’s every song I’ve ever written. “Badlands”, “Prove It All Night”, “Darkness” was filled with Animals. Youngsters, watch this one. I’ll tell you how it’s done right now. I took “Don’t Let Me Be Misunderstood” [hums and strums the Animals riff, then transitions into his song Badlands]—It’s the same fucking riff man. Listen up youngsters: this is how successful theft is accomplished.”
Lumpy talked about this article from Techdirt.com
Where John Lennon said On Copying Others’ Music:
“It’s Not A Rip Off, It’s A Love In”
“Money’, ‘Twist ‘n’ Shout’, ‘You really got a hold on me’, etc. were all numbers we (the Beatles) used to sing in the dancehalls around Britain, mainly Liverpool. It was only natural that we tried to do it as near to the record as we could – I always wished we could have done them even closer to the original.”
Then we went on to some music from
- Crazy on You
- Magic Man
You can find Heart at:
Most all of their links are on their web site.
ISPs To Become Copyright Cops This Summer
We talked about this article Lumpy brought up about SOPA and the three strike programs where your ISP says hey we think you have been surfing torrents and doing things illegal so they are going to cut you off for lets say two months and you can’t get back online for two months, okay here is your second strike its going to be a year or some other abutory period and thats basically since the recording industry and the motion picture industry couldn’t get it made law they are just striking business deals with all the major internet service providers.
Then we ended the show with music from the very talented.
- Code Monkey
- I Feel Fantastic
- Creepy Doll
Creative Commons, Non-Commercial, Attribution, Share-Alike
Comments and feedback are welcome. You can call us at (818)81-INDIE or hit us up with an email at firstname.lastname@example.org. You can follow us as @indienationfm on Twitter. You can also join our community on Facebook.
Be sure and circle us on Google Plus!
- 2012.03.05 Monday Night Tech Net News and Opinon – Episode 12 (indienation.fm)
- 2012.02.27 – Tech Net News and Opinion – Episode 011 (indienation.fm)
- Tech Net News and Opinion 003 (indienation.fm)
Welcome to this week’s LumpCast. Remember, you can always join Lumpy live for the stream of the show on Fridays at 10 PM to Midnight almost every Friday night. This week, we swapped scheduled times with Friday Night Freak n’ Geek and aired at 8 PM EST. Listen in as Lumpy spins mostly the blues.
Tech Net News and Opinion – Episode 007 – 2012.01.30
In this week’s episode of Tech Net News and Opinion, we discuss, Newt Gingrich being sued for IP law violations, a super hot X-ray laser, capturing Wi-Fi passwords and fake projects at Apple. So tune in enjoy the music and our chat about the various news items.
The band is from Colorado Springs, Colorado
I came across this band over at Mevio’s Music Alley. I was in a hard rock mood and really enjoyed their tunes. I think you will too.