Cool little cartoon from xkcd reflects a larger problem of pervasive ignorance and apathy regarding computer security. When we asked several netizens their thoughts, the most common answer was “I don’t know, and I don’t care.”
Read the Source: How To Build A ProxyHam Despite A Cancelled DEFCON Talk
So, it might not be all that troublesome to set this up. And its a great way to extend wifi into a dead area on your campus. Just don’t run it on the ham bands. Stay in the ISM part of 900 and I suppose with enough signal strength it would work okay… Even if it’s not the talk Of The Year at DEFCON.
The highly anticipated anonymity project may be the subject of a law enforcement gag order.
Now, I’m a radio amateur myself, and I have a fairly good idea about the FCC Rules and Regulations regarding what can and cannot be done under Part 97, which governs the service. I’m interested in this project because of its name, as well as its purpose.
Notice that the article mentions that the FCC was not in touch with the inventor. Apparently not even to give advice (not surprising, really). They are after all, a policy-making agency with an enforcement branch, but “prior restraint” doesn’t historically fit with the agency’s behavior.
Here’s news from Steve Gibson, the whiz kid from TWiT. In a nutshell, relax.
Abhishek tells us about the upcoming cataclysm as XP loses support from Microsoft, and what to do about it. FYI, I run Linux Mint and love it (dual boot with my Win7).