Amazon’s new Prime Reading gives Prime members all they can read

 Amazon launched another benefit for Prime members today: Prime Reading, which lets users read from a section of over a thousand Kindle books, digital magazines, short stories, comics and more for free as part of their subscription. It’s essentially a version of Kindle Unlimited with a pared down catalog (Unlimited boasts over one million books, magazines and audiobooks) but without… Read More

Continue reading here:
Amazon’s new Prime Reading gives Prime members all they can read

Games console/phone refurbishing kit with specialized case-opening tools

Thinkgeek have teamed up with Ifixit to create a Game Console & Electronics Refurbishing Kit , with all the tools you need to crack the case on most games consoles, phones and other gadgets. The 3.5lb box also includes a bunch of cleaning stuff for removing scuffs and marks, to spruce up your old gear to look like the day you unboxed it. Game Console & Electronics Refurbishing Kit gives you both opening and cleaning tools Works with * Xbox One (also Xbox 360) * PlayStation 4 (also PS Vita, PS3, PSP, PS2, and the original PlayStation) * Wii U (also Wii), NES, SNES, Gamecube, N64 * Nintendo 3DS (also DSi, DS Lite, and the Nintendo DS) * Dreamcast * Game Boy Advance SP (also Game Boy Advance, Game Boy Cartridges) * PC building and repair * Smartphone repair * and a bazillion other electronic devices Includes: * 26 Bit Driver Kit   * 4 mm Driver Handle – rubberized for a sturdy grip and magnetized to hold bits and screws   * 60 mm Driver Extension – increase your reach into smaller devices   * Metal Tweezers – grab hold of small screws and components   * 26 bits in the following sizes:     * Flathead sizes 1.5, 2, 2.5, 3 mm     * Phillips sizes #000, #00, #0, #1, #2     * Torx sizes T4, T5, T6     * Torx Security sizes TR7, TR8, TR9, TR10, TR15, TR20 (compatible with non-security)     * Hex sizes 1.5, 2, 2.5, 3, 4 mm     * Tri-wing sizes #0, #1     * Spanner size U3.0   * Anti-Static Wrist Strap   * Dust Blower   * ESD-safe Tweezers (electrostatic damage)   * Plastic Spudger   * Metal Spudger Set   * Xbox 360 Opening Tool   * Cleaning Swabs   * Plastic Opening Tools   * Surface Detailing Block (great for refreshing old or dirty plastic parts)   * German Detailing Eraser with Brush   * Pencil Sharpener   * Small ESD-safe Brush (electrostatic damage)   * Large ESD-safe Brush (electrostatic damage)   * 1/4″ Driver Handle     * Phillips #2     * Flathead 6 mm     * Game Bit 4.5 mm (Nintendo Nut Setter #6)     * Game Bit 3.8 mm (Nintendo Nut Setter #8) Game Console & Electronics Refurbishing Kit        

View article:
Games console/phone refurbishing kit with specialized case-opening tools

Researchers show method for de-anonymizing 95% of “anonymous” cellular location data

Unique in the Crowd: The privacy bounds of human mobility , a Nature Scientific Reports paper by MIT researchers and colleagues at Belgium’s Universite Catholique de Louvain, documents that 95% of “anonymous” location data from cellphone towers can be de-anonymized to the individual level. That is, given data from a region’s cellular towers, the researchers can ascribe individuals to 95% of the data-points. “We show that the uniqueness of human mobility traces is high, thereby emphasizing the importance of the idiosyncrasy of human movements for individual privacy,” they explain. “Indeed, this uniqueness means that little outside information is needed to re-identify the trace of a targeted individual even in a sparse, large-scale, and coarse mobility dataset. Given the amount of information that can be inferred from mobility data, as well as the potentially large number of simply anonymized mobility datasets available, this is a growing concern.” The data they studied involved users in an unidentified European country, possibly Belgium, and involved anonymized data collected by their carriers between 2006 and 2007. Anonymized Phone Location Data Not So Anonymous, Researchers Find [Wired/Kim Zetter]

More here:
Researchers show method for de-anonymizing 95% of “anonymous” cellular location data

DDoS storm breaks records at 300 Gbps

The Internet has been groaning under the weight of a massive distributed denial of service (DDoS) attack on the Domain Name Service, apparently aimed at anti-spam vigilantes Spamhaus, in retaliation for their blacklisting of Dutch free speech hosting provider Cyberbunker. At 300 mbps, the DDoS is the worst in public Internet history. “These things are essentially like nuclear bombs,” said Matthew Prince, chief executive of Cloudflare. “It’s so easy to cause so much damage.” The so-called distributed denial of service, or DDoS, attacks have reached previously unknown magnitudes, growing to a data stream of 300 billion bits per second. “It is a real number,” Mr. Gilmore said. “It is the largest publicly announced DDoS attack in the history of the Internet.” Spamhaus, one of the most prominent groups tracking spammers on the Internet, uses volunteers to identify spammers and has been described as an online vigilante group. In the past, blacklisted sites have retaliated against Spamhaus with denial-of-service attacks, in which they flood Spamhaus with traffic requests from personal computers until its servers become unreachable. But in recent weeks, the attackers hit back with a far more powerful strike that exploited the Internet’s core infrastructure, called the Domain Name System, or DNS. As bad as this is, it could be a lot worse. An anonymous paper called Internet Census 2012: Port scanning /0 using insecure embedded devices reports on a researcher’s project to scan every IPv4 address for publicly available machines that will accept a telnet connection and yield up a root login to a default password. The researcher reports that 1.2 million such devices are available online (s/he compromised many of these machines in order to run the census). These machines are things like printers and routers with badly secured firmware, visible on the public net. They are often running an old version of GNU/Linux and can be hijacked to form part of a staggeringly large botnet that would be virtually unkillable, since the owners of these devices are vanishingly unlikely to notice that they are silently running attackware, and the devices themselves are completely unregarded. Firm Is Accused of Sending Spam, and Fight Jams Internet [NYT/John Markoff & Nicole Perlroth] ( via Hacker News )

View post:
DDoS storm breaks records at 300 Gbps

RPG inside an Excel workbook

Cary Walkin , an accountant in Toronto, knows a thing or two about Excel. So great is his expertise that he was able to create a full-fledged RPG inside of its scripting environment, called Arena.Xlsm. I couldn’t get it to run in LibreOffice, but it sounds like it’s very featurful and fun, provided that you’re willing to use Microsoft products: * Random enemies: Over 2000 possible enemies with different AI abilities. * Random items: 39 item modifiers result in over 1000 possible item combinations and attributes. * An interesting story with 4 different endings depending on how the player has played the game. * 8 boss encounters, each with their own tactics. * 4 pre-programmed arenas followed by procedurally generated arenas. Each play-through has its own challenges. * 31 Spells. There are many different strategies for success. * 15 Unique items. Unique items have special properties and can only drop from specific enemies. * 36 Achievements. * This is all in a Microsoft Excel workbook. Arena.Xlsm Released! ( via Digg )

View article:
RPG inside an Excel workbook