29,000 Sex Offenders on Myspace Get the Boot

For those who were wondering, there were almost 30,000 sex offenders on MySpace who were computer literate enough to use the service, but dumb enough to use their real names. How many are still there using fake names I wonder.
Tags: Consequences, Families, If You Only Knew, Kids, PoliceUse Virtual Credit Cards to Control How Companies Use and Store Your Credit Card

A virtual credit card is a short term working credit card that has restrictions such as payout amounts, time of use, or merchants who are allowed to debit it. Using these, if the company you're buying from data-brokerings you for your card number, it won't matter because the number they have is worthless after the set period of time or number of transactions etc. JTAG ERROR: No lifehacker_ht index defined.... [Click here to read the rest of this post]
Tags: Identity TheftHarry Potter Leaker May Be Found Due to Hidden Data in His Images

Here's a warning to you all: companies hide tracking information in your media and if you don't know about it and do something about it, you may get some pretty nasty results. Now, in this case, it's a good thing because there's no justification for leaking Harry Potter BEFORE it's public release. That just hurts the writer and others involved. But if this wasn't immoral activity but protected free speech, .... [Click here to read the rest of this post]
Tags: Consequences, If You Only KnewSender Controlled E-mail – Self Destructing or Single Read E-mail

Ever send an e-mail and then have second thoughts? What about wanting to make sure that the e-mail you send doesn’t get shared beyond your original recipient. Using the same technique that spammers do to bypass filters and verify e-mail accounts, BitString uses images for the content of messages. Since the reader has to load the image (which is stored on the BitString server) to view the message, if the .... [Click here to read the rest of this post]
Verichip – The Human Tracking RFID People – A Summary

Verichip is the first major company to try to make a market out of implanting people with a hard to remove tracking device. They tout it as a "security" device in that it can be used for proximity detection in sensitive areas and can be used to link to medical information in an emergency where the patient can't speak for themselves (for a yearly fee of course). Considering that the .... [Click here to read the rest of this post]
Tags: RFIDSAIC Security Goof Threatens 580,000 Military Personnel

A common story. With a common worthless response:
SAIC spokespeople said that several employees were placed on leave after the incident was disclosed, and that it contracted data security company Kroll Inc. to provide free identity theft protection for all affected individuals for one year.
Opt Out of Comcast Arbitration While You Can

While I usually throw out anything Comcast sends with the bill, this time I noticed an arbitration notice that says that you only have a little bit of time to opt out before you become bound to an arbitration agreement. What does that mean? It means that you're giving up your right to sue them for incompetence (which is a pretty big deal considering how incompetent they can be). If .... [Click here to read the rest of this post]
Tags: Families, Police, Your RightsRIAA Loses Again – Everyone Cheers

There’s too many points to summarize without copying the content directly, but here’s a small post with a lot of links to information about a girl who moved to dismiss a RIAA lawsuit and seems to have won.
Tags: Good StuffHunting Down a Virus Writer – Fun For Everyone!

This guy took personal offense to a virus writer who's stupid prank messed up the computer of one of his friends. So he decided to hunt the virus writer down using only information he was able to find on the Internet with Google. He goes through where he looked, what he found, and what it meant. Important lesson: This is how easy it is to profile you online. JTAG ERROR: .... [Click here to read the rest of this post]
Tags: Consequences, Families, If You Only Knew, PoliceHotmail Deletes Attachments to Save Bandwidth?

It has long been suspected that there is a silent policy that makes Hotmail automatically delete the majority of attachments to save on bandwidth and internal disk space. Therefore it really doesn't matter if every client has access to 2GB of storage since they don't deliver the attachments to fill that space up anyway. If that truly is the case, then Microsoft may be liable for .... [Click here to read the rest of this post]


