
Remember..
Territorial claims are not official till somebody plants a flag in the chest of one of the locals
192 publicly visible posts • joined 25 Jun 2009
" We collect some basic data in server logs, like your web request, the data sent in response to that request, the Internet Protocol address, the browser type, the browser language...." Ghostery Terms of service
Ghostery BTW is not some kids bedroom project funded by goodwill it's owned by a company called Evidon inc.. and their about us page makes interesting reading...
I just don't see how my privacy is protected when a third party is monitoring all my internet traffic.
You gotta get 'em all! - Just saying 'Cookies' is frankly misleading to most of the public.
There's a dozen different techniques for storing data inside a users browser and unless you are amongst the Uber paranoid who has javascript + Flash disabled then your at risk of having your browser footprint profiled for good measure as well. Not as specific as a cookie but often as good enough.
Scuttlebut is that later that drunken night in the bar night Larry Niven bet that Hubbard could not start a religion and it went from there.
BTW .. I've read Battlefield Earth and found it to be a real joy when compared to his sprawling ten book epic "The Invaders Plan".
Wether you suck or blow don't let the fan on the CPU or graphics card spin up in the airflow, the voltages produced can & often do fry some hardware. Personally I use a dust-buster and 1" soft paintbrush. Newbies of course go for the can of compressed air and bitterly regret launching the subsequent cloud of toxic cr#p.
The kudos of first secret agent with own in-body (electronic) computer goes to Colonel Steve Austin from the novel "Cyborg" circa 1972. If you cannot get an old copy then the "Cobra" trilogy by Timothy Zahn (1985-88) is an excellent Mil-Spec reboot of the concept.
Could we do something similar with today's technology? probably... The human brain is an adaptive and resilient organ with several volunteers already sporting basic implants into their audio & visual areas without serious side-effects. Micro-surgery has also come a long way with repairing peripheral nerve bundles so no great leap of faith or technology is required to augment the relatively slow chemical reflexes of the human nervous system with a layer of electronic communication.
Talkie Toaster - Red Dwarf
TIM - from "The Tomorrow People" Thames TV circa 1970
BOX - from "Starcops" BBC TV 1987
Small Soldiers - MilSpec AI chips put into toys 1998
PS: @Peter R. 1
The 'Hogfather' was done as a movie a few years back and yes you do get to see HEX in action having a chat with Death.
those employed to protect the networks demonstrated a level of incompetence far greater than McKinnon did trying to cover his tracks. If you want somebodies head on a chopping block start with the guards who were asleep at their post. Whilst crucifying an amateur investigator serves as an example to deter others but it does not fix the root of the americans problem.
Am close to percussive instruction with the staff at a Mac authorised repair outfit in South Wales after they claimed the wife's Macbook that went in for a stuck power button (and would not turn OFF) was 'diagnosed' as a blown motherboard with a £500+ quote to restore her Appley goodness.
The use of colourful often vulgar language to convey an imperative or gravitas to statement is not exactly a new concept, who can forget the Duke of Edinburgh's classic “Fuck off or I’ll have you shot.” during his 1976 Hong Kong tour.
IMHO this offering is not swearing but merely the deranged rambling of somebody in dire need of professional help. Good artists use such terms sparingly as spice for the content not as a substitute for content.
The full horror of how far down the rabbit hole goes ...
- Standard HTTP Cookies
- Local Shared Objects (Flash Cookies)
- Silverlight Isolated Storage
- Storing cookies in RGB values of auto-generated, force-cached
PNGs using HTML5 Canvas tag to read pixels (cookies) back out
- Storing cookies in Web History (Browser History sniffing hack -> Now plugged in most new browser versions )
- Storing cookies in HTTP ETags
- Storing cookies in Web cache (CSS & Javascripts dynamically created with unique names)
- window.name caching
- Internet Explorer userData storage
- HTML5 Session Storage
- HTML5 Local Storage
- HTML5 Global Storage
- HTML5 Database Storage via SQLite
HTTP Authentication and Java also have possibilities according to some.
Then you have 'Cloudflare', used by many sites as free caching/ bandwidth boost that's basically Phorm in reverse so instead of the ISP doing the traffic slurping it's grafted onto the sites themselves. Not forgetting the iframes from Social Networking sites.