Kim Dotcom has new “Mega” domain, says this one won’t be shut down

After the government of Gabon shut down his Me.ga domain , Kim Dotcom needed a new country to let him host the domain that will be home to the successor of file-sharing site Megaupload. That country will be New Zealand, as Dotcom is now the owner of Mega.co.nz . The exact same site that was originally hosted at Me.ga can now be found at the New Zealand domain. On Twitter, Dotcom announced “New Zealand will be the home of our new website: http://Mega.co.nz – Powered by legality and protected by the law.” When Gabon shut down Me.ga, Dotcom blamed “the reach of the US and Vivendi,” as the Me.ga domain was provided by Gabon Telecom, a subsidiary of the Vivendi entertainment company. Although New Zealand police raided Dotcom’s house 10 months ago because of criminal copyright charges filed against him in the US, he seems confident that New Zealand won’t shut down the domain itself. Ultimately, getting a domain will probably be among the least challenging aspects of running Mega, which is expected to launch in January. But Dotcom has a plan for that too. To avoid copyright charges, Dotcom promises Mega “encrypts and decrypts your data transparently in your browser, on the fly,” and that the encryption keys are only controlled by the user, not Mega. And to avoid the reach of the Digital Millennium Copyright Act, Dotcom plans to run his servers with hosting services outside the US. Read on Ars Technica | Comments

View post:
Kim Dotcom has new “Mega” domain, says this one won’t be shut down

Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

For a while, it seemed that Wi-Fi was becoming a victim of its own success. In many cities, there are numerous active Wi-Fi networks on those preciously few non-overlapping channels—that’s in addition to microwaves, bluetooth, cordless phones, and baby monitors, which all share the 2.4GHz band. But since about 2007, Apple has also built support for 802.11n Wi-Fi on the 5GHz band into its computers and Airport line of Wi-Fi base stations. Now, the iPhone 5 and the latest iPod touch also have that support. (The iPad has had it since day one.) So, how do you set up a Wi-Fi network that makes the most of this confluence of Wi-Fi bands? Not created equal First of all, it’s important to realize that the two bands are created very differently. The 2.4GHz band suffers from lack of non-overlapping channels and interference from other devices. But the lower frequencies pass through walls and floors reasonably well. The 5GHz band on the other hand, has a much larger number of channels—and they don’t overlap—but the higher frequencies have reduced range, even in open air. In addition to this, Apple only supports using two channels as a single, double-speed wide channel in the 5GHz band. If all else is equal, 5GHz is twice as fast as 2.4GHz. Read 12 remaining paragraphs | Comments

More:
Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

Judge blocks California’s new ban on anonymity for sex offenders

ax2groin On Tuesday, voters in California overwhelmingly approved Proposition 35, which ratcheted up penalties for those convicted of sex crimes, including human trafficking. The proposition included a provision requiring registered sex offenders to disclose to law enforcement all of their Internet connections and online identities. On Wednesday, two of the 73,900 registered sex offenders in the state who would be affected by the law filed a lawsuit challenging the constitutionality of these provisions. The two plaintiffs argued that forcing them to expose their online identities would violate their First Amendment right to speak anonymously. Their appeal is supported by the American Civil Liberties Union of Northern California and the Electronic Frontier Foundation. Late on Wednesday, Judge Thelton Henderson granted a temporary restraining order barring the law from going into effect until he had time to consider the plaintiffs’ constitutional arguments. Read 6 remaining paragraphs | Comments

More here:
Judge blocks California’s new ban on anonymity for sex offenders

Report: Microsoft going to production with 7-inch “Xbox Surface”

When Microsoft first revealed its Surface tablet back in June , many in the rumor mill were expecting the company to reveal a gaming-focused “Xbox Surface,” based on leaked documents pointing to such a tablet. Those rumors have resurfaced again, with The Verge reporting  today that Microsoft is working on a final implementation of a 7-inch tablet tuned for gaming. The Verge’s unnamed source says the previously leaked specs for the tablet were indeed accurate, meaning the system would include a 7-inch, 1280×720 screen, 288MB of RAM, and a “custom IBM engine for scale-out workloads.” Those specs could be altered to allow for different models independent of one specific hardware architecture, however. The tablet will supposedly run a small Windows kernel rather than the full version of Windows that the 10-inch Surface tablet uses, and will work in conjunction with a “stationary computing device” that could be a next-generation Xbox, as outlined in another leaked Microsoft document from the summer . The Verge claims that the full console will be built by contract manufacturers like Pegatron and Foxconn, but that the tablet will be built by the same secret manufacturing process used for the Surface. The Xbox tablet would be released in 2013, ahead of a next-generation console. Read 1 remaining paragraphs | Comments

View original post here:
Report: Microsoft going to production with 7-inch “Xbox Surface”

Kim Dotcom now plans to give New Zealand free broadband pipe to US

The route of the proposed trans-Pacific fiber link. Pacific Fibre On the heels of the announcement of Megaupload’s pending resurrection as Me.ga , Kim Dotcom has come up with a yet another way to promote himself, annoy the US and New Zealand governments, and rally public support in his battle to stop his extradition and end the copyright infringement case against him: he wants to give everyone in New Zealand free broadband service. The core of the plan is to revive the failed Pacific Fibre , an effort to create a broadband link from Australia and New Zealand directly to the US by way of a submarine cable to Los Angeles. The effort went bankrupt in August before reaching its goal. Dotcom’s plan is to complete the link, and to sell high-speed connections to government, businesses and foreign telecommunications companies—while giving New Zealand ISPs free access to provide connectivity for individual residents. “For every foreign user downloading from NZ (paid),” Dotcom posted on Twitter, “a Kiwi can download from outside NZ (free). The key: Storing data foreign users want in NZ.” Dotcom contends that the high-speed link would make New Zealand an attractive location for data centers; the country’s current shortage of global connectivity makes it an “Internet backwater,” he said. Read 9 remaining paragraphs | Comments

See the original article here:
Kim Dotcom now plans to give New Zealand free broadband pipe to US

How Georgia doxed a Russian hacker (and why it matters)

Aurich Lawson On October 24, the country of Georgia took an unusual step: it posted to the Web a 27-page writeup  (PDF), in English, on how it has been under assault from a hacker allegedly based in Russia. The paper included details of the malware used, how it spread, and how it was controlled. Even more unusually, the Georgians released pictures of the alleged hacker—taken with his own webcam after the Georgians hacked the hacker with the help of the FBI and others. The story itself, which we covered briefly earlier this week , is fascinating, though it remains hard to authenticate and is relayed in a non-native English that makes for some tough reading. But what caught my eye about the whole cloak-and-dagger tale is the broader points it makes about hacking, jurisdiction, and the powerful surveillance devices that our computers have become. It’s also an example of how hacks and the alleged hackers behind them today play an increasing role in upping geopolitical suspicions between countries already wary of one another. Georgia and Russia have of course been at odds for years, and their conflict came to a head in a brief 2008 war; Russia still maintains a military presence in two tiny breakaway enclaves that Georgia claims as its own. Read 29 remaining paragraphs | Comments

See more here:
How Georgia doxed a Russian hacker (and why it matters)

First look: Pandora 4.0, the new mobile frontier

Enlarge / Pandora 4.0: the new look Pandora Here comes Pandora 4.0, a big remake of the music service’s mobile listening environment. If you are a Pandora fan, get ready for expanded playlist, station-making, lyric-reading, personal profile, and social networking power on your smartphone. The new service creates a “unifying” experience across web and mobile devices, the company proclaims. It also represents about six or seven years of planning, thinking, and development for the outfit. Back in 2005, iPhone and Android mobile gadgets were gleams in the eye of Apple and Google. Pandora, however, was transforming radio and music distribution with its sophisticated “genome” powered song recommendation algorithm. Millions of users were clicking thumbs up or down to millions of tunes on, well, millions of Pandora channels. By 2007, Pandora was a huge hit. It was, however, mostly a desktop computer hit. “We started thinking about creating a mobile service in 2004,” Pandora CTO Tom Conrad told us in an interview. “We wanted to unify the Pandora experience.” That meant an experience that was easy from the start, that allowed users to individualize their environment and get more of what they wanted, and that was “ubiquitously available.” Read 16 remaining paragraphs | Comments

More here:
First look: Pandora 4.0, the new mobile frontier

Facebook tries cloaking probe into data leak involving 1 million accounts

Facebook officials told a blogger to keep their discussions with him private as they investigate claims he acquired names and e-mail addresses belonging almost one million account holders for $5 through a publicly available service online. “Oh and by the way, you are not allowed to disclose any part of this conversation,” member’s of Facebook’s platform policy team said during a tape-recorded telephone conversation, according to a blog post published by Bogomil Shopov, who describes himself as a “community and technology geek” who lives in Prague, Czech Republic. “It is a secret that we are even having this conversation.” Shopov said Facebook officials set up the conversation after an earlier blog post claiming he purchased data for one million Facebook users online for just $5. The blogger said it was impossible for him to determine exactly how recent the data was, although several of the entries he checked contained accurate e-mail addresses for people he knew. In addition to containing names and e-mail addresses, the cache he purchased also contained profile IDs. In an e-mail to Ars, Shopov said he suspects the data came from a third-party developer. The website selling the information has since removed the post that advertised the data, but for the time being it’s still available in Google cache . Read 6 remaining paragraphs | Comments

Read the original post:
Facebook tries cloaking probe into data leak involving 1 million accounts

Better on the inside: under the hood of Windows 8

Windows 8’s most obvious—and most divisive—new feature is its user interface . However, it would be a mistake to think that the user interface is the only thing that’s new in Windows 8: there’s a lot that’s changed behind the scenes, too. Just as is the case with the user interface, many of the improvements made to the Windows 8 core are motivated by Microsoft’s desire to transform Windows into an effective tablet operating system. Even those of us with no interest at all in tablets can stand to take advantage of these changes, however. For example, Windows 8 is more power efficient and uses less memory than Windows 7; while such work is critical to getting the software to run well on low-memory tablets with all-day battery life, it’s equally advantageous for laptop users. The biggest single piece of technology that is new to Windows 8 is, however, squarely Metro focused: it’s a large set of libraries and components called WinRT. I’ve already written extensively about what WinRT is, so I won’t be getting into that here, but there are system capabilities that WinRT apps can use (or are forced to use) that are interesting in their own right. Read 77 remaining paragraphs | Comments

See more here:
Better on the inside: under the hood of Windows 8

Storage Spaces explained: a great feature, when it works

Windows Home Server was never a particularly popular product, but it did bring some interesting features to the table for the few who used it and became fans. One of these features was called Drive Extender, and its claim to fame was that it allowed users to pool their system’s hard drives so that they were seen by the operating system as one large hard drive. This obviated the need to keep track of the amount of free space across several disks, and it also allowed users to automatically mirror their data to multiple disks at once, keeping their files safe in the event of drive failure. Microsoft killed Drive Extender not long before pulling the plug on the Windows Home Server entirely , but the intent behind it lives on in Windows 8’s new Storage Spaces feature: “Storage Spaces is not intended to be a feature-by-feature replacement for that specialized solution,” wrote Microsoft’s Rajeev Nagar in a blog post introducing the feature, “but it does deliver on many of its core requirements.” In essence, Storage Spaces takes most of Drive Extender’s underlying functionality and implements it in a way that is more technically sound; early versions of Drive Extender sometimes corrupted data when copying files between drives and mangled file metadata, but the underlying filesystem improvements made to support Storage Spaces should make it much more robust, at least in theory. Read 40 remaining paragraphs | Comments

See the article here:
Storage Spaces explained: a great feature, when it works