Neat Image Resizing Technique

Just because it's cool: an image resizing technique that doesn't stretch or skew the important features. It's a little hard to describe, but the point is that when you resize a webpage, images either get cut off or stretched. No longer. Think, desktop wallpaper. Not only can it be shrunk, it can be expanded. Neat neat neat. JTAG ERROR: No slashdot_ht index defined

Movie Theater Narc’ing

This is actually kind of cool. If you are handed one of these remotes and someone is being loud and obnoxious or if the picture/sound quality is off in a movie, you can just hit the button instead of having to leave the movie to find someone to deal with it. Of course, these remotes don’t have microphones so the management will have to guess what your problem is. Either way, it’s kind of a cool concept.

RFID Tollbooths – False Billing, Serious Consequences

Besides being annoying and costing you money, errors at RFID toll booths can get you into all kinds of interesting spots. One girl was refused a job for having 30 outstanding tickets for going through the pass in her jeep without paying. The problem is, she’s never owned or driven a jeep. Is anyone surprised by this?

Blackle? Google with a Black Theme

Someone suggested that Google could save a lot of energy around the world if they used black as their background color (because white is the most intense color that a monitor can produce where black is the absense of light). So some company created Blackle (which is powered by Google though not RUN by Google). Their “about” page says that they’re all about saving electricity and being green, but I’m wondering if they don’t modify the ads that you see thus making their focus about a completely different kind of green…

Summary of Deep Packet Inspection and Net Neutrality

Here’s a great summary of both deep packet inspection and net neutrality and why they’re important. The short of it is that if a company can inspect your internet packets, they can figure out what you’re doing. This lets them charge more for certain types of traffic than others. The companies will be able to use their vast resources of technical and number crunching experts to find the best way to nickel and dime you while keeping you from getting just angry enough to do anything about it. If you can’t imagine what this would be like, think of how Internet service is charged on cell phones now (per minute, or by over-all download) or remember what it was like before AOL changed the landscape by going to unlimited access for a single monthly fee (which was a major reason many people started to use the Internet). History shows that people don’t like having to worry about how they use a service and what the charges will be. Who has the time? What if every cable channel was unlocked and you get charged by how long you stay on any station, but you don’t know what the fees are (sure they’re in an agreement or pricelist somewhere, but you don’t memorize these things). That’s pretty much what the Internet will be like if Net Neutrality doesn’t pass.

Supermarkets Treat You Like A Criminal – Fingerprints for Food

Some supermarkets now have fingerprint readers in lieu of credit card payments. You have to supply your fingerprint and attach your credit card to it, but then you can pay just by touching your finger to the reader. There are many problems with this: 1) In theory, they’re promising only to take the “data points” not the fingerprint, but if they use the same data points as other companies, then the data points are the same as your fingerprint. If every company uses different data points, as data from each breach is combined, it create a better and better picture of your actual fingerprint. 2) Unlike a credit card that can be re-issued or changed, fingerprints can’t. 3) You don’t leave impressions of your credit card everywhere you touch like you do with your finger. Fingerprints can be used for tracking and accountability that you shouldn’t have to be responsible for unless you’re a criminal. 4) There was nothing wrong with the system that was there before. Swiping a credit card is actually easier and faster than putting your finger on a reader and entering a PIN. 5) The more people that use the system, the more problems they will have with false matches (where your finger and someone elses are too close to distinguish. Granted that the PIN solves this problem to a degree, but these companies will have to add more and more data points to the algorithm to make the system work. The more data points they use, the closer to storing your actual fingerprint. This is bad, bad news. I wonder when the first “fingerprint data breach” will happen. Tags:

Use Virtual Credit Cards to Control How Companies Use and Store Your Credit Card

A virtual credit card is a short term working credit card that has restrictions such as payout amounts, time of use, or merchants who are allowed to debit it. Using these, if the company you're buying from data-brokerings you for your card number, it won't matter because the number they have is worthless after the set period of time or number of transactions etc. JTAG ERROR: No lifehacker_ht index defined Tags:

Sender Controlled E-mail – Self Destructing or Single Read E-mail

Ever send an e-mail and then have second thoughts? What about wanting to make sure that the e-mail you send doesn’t get shared beyond your original recipient. Using the same technique that spammers do to bypass filters and verify e-mail accounts, BitString uses images for the content of messages. Since the reader has to load the image (which is stored on the BitString server) to view the message, if the sender wants to take it back, all they have to do is ask BitString to delete the image. As long as the image is destroyed before the reciever opens the e-mail, they can be assured that it’s never been read. Also, since BitString can track how many accesses are made for the image and what IP is requesting it, you can lock it to one individual either by specifying that after the first read of the image, it will be deleted. That will prevent forwarding of the message to your recipients friends. That’s pretty cool.

Microsoft to Browse Your Personal Files, Send You Spam

I've blogged about how Microsoft has a wealth of spyware on your computer (Vista) for "piracy" reasons, but this is altogether far more sinister. Feel free to read the article itself, but this is bad, bad news. What they're going to do is scan the content of your files, e-mail, music, and system status alerts to profile you and target you with ads. Penny Arcade covered this concept in one of their comics titled "Advertising in the Future". That was last October. (For non-gamers, the comic describes a situation where two guys are playing a game, but see different in-game advertising based on the contents of their Internet browser history). Tags:

Harry Potter Book Leaked Online

This isn't that surprising. Rather than type in every word, someone photographed every page which makes for a hard read, but it can be done. I'm actually against this practice. I think that leaking TV shows, music, movies, and such before they're released hurts the authors far more than is tolerable. It also creates headaches for the people who want to wait and get the real experience (because more and more people start talking about it thus increasing your odds of having the story spoiled). The reason I bring this up is that I don't want to give people the impression that I'm a copyright hater (due to my hate for the business practices of the RIAA and mpaa. Let's keep this in perspective shall we? What I'm against is DRM and abusive business practices (like the RIAA lawsuits).

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

internet safety Tutorial
|INDEX|next: Online Addiction

General Safety

Avoid fake and nasty websites with my search engine trick.
Watch out for online addiction. Getting lost in fun online activities can be just as addiction as any drug.
So you want to write, publish, or share information online? Be careful. Things you say may be lost or forgotten, but things put on the Internet never are.
Don't fall for the well-known (or the new scams either) bad guys use to trick you into give away data or money.

Account Protection

Want to make an account with some online service? Read this first!
The newest, biggest risk online? Account hijacking! Don't become a victim by allowing your account to be taken over and learn to recognize when someone else has been.
Be sure transmission security is active before entering a name, password, credit card number, or other important information online.

... or check out any of my other guides and tutorials by clicking here!

How to Avoid Bogus Websites

There are bogus websites out there hoping you'll hit them by accident or using phishing to trick you into coming to them. Learn my simple trick to avoid these sites!

[Click for full description]

Online Addiction

Concerned about online addiction? You should be. Learn the types, the signs, and the preventions.

[Click for full description]

The Consequences of Posting Online

It's fun to post online. What you think, what you feel. But words typed and posted on the Internet can come back to bite you more than anything you could say with your mouth.

[Click for full description]

Tricks and Scams

Just because you won't willing give up data doesn't mean that I can't trick you out of it. Don't fall for these well known tricks!

[Click for full description]

Account Creation Tips

When you create an account with an online site, you should know a few things first.

[Click for full description]

Account Hijacking

One of the newest threats we face is the risk of someone getting control of your online account and using it against you and the people you know. Do everything you can to prevent that from happening!

[Click for full description]

Using HTTPS For Secure Login and Payment Online

Making online accounts is useful and fun, but doesn't mean much if someone can capture your login information and use it against you. Make sure to use this simple trick to prevent that from happening.

[Click for full description]