Friday, February 24, 2006

RED HERRING | Google Desktop Boycott Urged

RED HERRING | Google Desktop Boycott Urged: "The Electronic Frontier Foundation, a digital rights advocate, has issued a warning to consumers about using an enhancement to Google Desktop that stores copies of the contents of their hard drives on the search company�s servers."

RED HERRING | Gartner Warns on Google App

RED HERRING | Gartner Warns on Google App: "Research firm Gartner warned businesses to either disable or carefully manage the feature in Google Desktop that allows users to temporarily store virtual copies of the contents of their hard drives on Google�s servers.

Gartner�s warnings focus primarily on companies currently using Google Desktop Enterprise Edition, but the firm also warns corporations planning to deploy Google�s or any other desktop search technology (see Google Upgrades Desktop)."

All Gay Directory: Gay sites, gay sex sites.

All Gay Directory: Gay sites, gay sex sites.: "ALL GAY DIRECTORY
Gay sites: Gay amateurs sites, Nude men , Free gay sex photos,
Naked Boys, Gay sex videos, Gay male porn, Male escorts, Travel sites, gay links."

gay search engine bent links, gay lesbian bisexual transgender links

gay search engine bent links, gay lesbian bisexual transgender links: " ART (63)
Fine art, photograhy, painters, artists, sculptors, erotic art, erotic artists
GAY_BARS_CLUBS (62)
gay lesbian bars clubs by locality worldwide.
GAY_CAMPING (2)
gay and lesbian camping grounds, campsites, camping groups, supplies
GAY_HISTORY (105)
gay lesbian bisexual and transgender history, museums, art galleries, historical organisations and their locality
GAY_LESBIAN_EVENTS (68)
gay lesbian events, gay lesbian dance parties, gay pride events, gay lesbian workshops, gay film festivals
GAY_NEWS_PUBLICATIONS (37)
gay lesbian bisexual transgender news publications, magazines, local papers by locality
GAY_TRAVEL (886)
Gay travel, lesbian travel, gay & gay friendly accommodation, gay lesbian travel guide, gay lesbian holidays, gay lesbian tours, tour guides.
GLBT_BUSINESS (41)
gay lesbian bi transgender business, associations, organisations and business locality guide.
GLBT_COMMUNITY (261)
gay lesbian bi transgender community organisations, glbt support groups, glbt politics, glbt law, glbt activists, glbt advice, glbt education, glbt anti-violence organisations by locality
GLBT_ENTERTAINMENT (25)
online gaming, online casinos humor, drag, entertainers, online gaming, online casinos.
GLBT_LITERATURE (16)
Authors of glbt literature, fiction, non-fiction, poetry, short stories
GLBT_ONLINE_SHOPPING (133)
gay lesbian bisexual transgender bookstores, vidoes, dvd, gay online shopping
GLBT_RELIGION_SPIRITUALITY (74)
Gay lesbian bisexual transgender spirituality and religion
GLBT_SOCIAL_&_SPORTS (95)
glbt sporting events, glbt"

EPIC - Tools for Protecting Online Privacy

EPIC - Tools for Protecting Online Privacy: "EPIC online Guide to Practical Privacy Tools"

U.S. Copyright Office - 128-Bit Browsers

U.S. Copyright Office - 128-Bit Browsers: "Copyright Law of the United States of America
and Related Laws Contained in Title 17 of the United States Code"

United States House of Representatives, 109th Congress, 2nd Session: Educational Links

United States House of Representatives, 109th Congress, 2nd Session: Educational Links: "

Tying It All Together
The legislative process is explained.
How Our Laws Are Made
A detailed text description of the legislative process.
How Our Laws Are Made by Chapter
The above document, broken down into chapters.
Enactment of a Law
The Declaration of Independence
The full text of the Declaration of Independence.
Early Congressional Documents
A list of Early Congressional Documents from the Constitutional Convention and the Continental Congress.
The Federalist Papers
A list of titles of the 85 Federalist Papers.
The Constitution of the United States
The full text of the U.S. Constitution.
Foreword and Historical Notes.
Introductory information about the U.S. Constitution, written by the Hon. Jack Brooks.
Bill of Rights
The full text of the Bill of Rights.
Other Amendments to the Constitution
The full text amendments 11 through 27 to the Constitution that have been ratified.
Amendments Not Ratified
The full text of amendments to the Constitution that have been proposed but not ratified.
U.S. Congressional Documents and Debates, 1774-1875
A century of lawmaking for a new nation.
Historical Information
From the Office of the Clerk of the House.
Historical Documents
From the Library of Congress. "

OATH | initiative for open authentication

OATH | initiative for open authentication: "OATH is an industry-wide collaboration to develop an open reference architecture by leveraging existing open standards for the universal adoption of strong authentication."

Wednesday, February 22, 2006

digg

digg: "latest front page stories"

What Does a Chinese Keyboard Look Like? - How they type in the PRC. By Daniel�Engber

What Does a Chinese Keyboard Look Like? - How they type in the PRC. By Daniel�Engber: "What Does a Chinese Keyboard Look Like?"

YouTube - Broadcast Yourself.

YouTube - Broadcast Yourself.: "Broadcast yourself. Watch and share your videos worldwide!"

WikiHome - codebook - JotSpot

WikiHome - codebook - JotSpot: "Lawrence Lessig first published Code and Other Laws of Cyberspace in 1999. After five years in print and five years of changes in law, technology, and the context in which they reside, Code needs an update. But rather than do this alone, Professor Lessig is using this wiki to open the editing process to all, to draw upon the creativity and knowledge of the community. This is an online, collaborative book update; a first of its kind.
Once the project nears completion, Professor Lessig will take the contents of this wiki and ready it for publication. The resulting book, Code v.2, will be published in late 2005 by Basic Books. All royalties, including the book advance, will be donated to Creative Commons. "

BBC - Radio Five Live - Audio Archive

BBC - Radio Five Live - Audio Archive

Identity Woman � Catalyst: Logic of Identity - Bob Blakley Chief Scientist IBM

Identity Woman � Catalyst: Logic of Identity - Bob Blakley Chief Scientist IBM: "Definition
Privacy: is the ability to lie about yourself and get away with it."

Wednesday, February 15, 2006

Grubb Properties - Apartments - Sterling Brook

Grubb Properties - Apartments - Sterling Brook: "APARTMENTS - STERLING BROOK"

WADND.COM - World Association of Domain Name Developers official website

WADND.COM - World Association of Domain Name Developers official website: "The Board discussed the progress of the law suit against ICANN and Verisign. It was reported that a Voluntary Dismissal had been taken as to ICANN as we accomplished a failure to approve the Settlement Agreement between ICANN and Verisign at the Vancouver ICANN meeting. The Board voted unanimously to take a Voluntary Dismissal as to Verisign now that the pass through charge has been eliminated and the �cap� can only be raised a certain number of times over the course of the contract rather than annually."

VeriSign, ICANN Sued Over .com

VeriSign, ICANN Sued Over .com: "ICANN and .com registry operator VeriSign (Quote, Chart) discovered that they were the subject of two federal lawsuits filed Monday alleging price-fixing and antitrust activities related to a proposed agreement regarding .com and the existing .net contract. "

Opposition to ICANN/VeriSign Proposal Grows

Opposition to ICANN/VeriSign Proposal Grows: "Eight of the world's largest domain registrars have sent an open letter to ICANN Chairman Vint Cerf, stating their formal opposition to the revised proposition with VeriSign for continued control of the Internet registry. "

VeriSign, ICANN Settle Dispute

VeriSign, ICANN Settle Dispute: "VeriSign (Quote, Chart) reached an agreement with the Internet Corporation for Assigned Names and Numbers (ICANN) over a lawsuit filed by the company in 2004."

EnterpriseNetworkingPlanet - Standards & Protocols

EnterpriseNetworkingPlanet - Standards & Protocols Networking & communications: standards & protocols

ISP-Lists Email Discussion List Community

ISP-Lists Email Discussion List Community: "The ISP-Lists is where Internet professionals gather to discuss all the myriad aspects of running a successful ISP business. The ISP-Lists are the world's largest online forum for IP and IT business professionals -- the premiere place to ask questions, share ideas, and review resources."

Stop Verisign DNS Abuse - Signatures

Stop Verisign DNS Abuse - Signatures: "Stop Verisign DNS Abuse "

IETF Home Page nss

IETF Home Page nss: "The Internet Engineering Task Force"

DNSO

DNSO: "There is no single organization that meets the exact requirements for the Domain Name Support Organization ('DNSO') specified in the Bylaws of the reconstituted Internet Assigned Numbers Authority (IANA), also known as the Internet Corporation for Assigned Names and Numbers (ICANN). Therefore, such an organization must be formed. "

Welcome to the DNSO WebSite

Welcome to the DNSO WebSite: "Generic Names Supporting Organization
of
ICANN
(Please Note: this www.dnso.org site is no longer active. The new GNSO site is at .) "

GNSO | Home

GNSO | Home: "Generic Names Supporting Organization "

Public Interest Registry - Home

Public Interest Registry - Home: "When people need to know, they go to .ORG. .ORG is the Internet home of noncommercial organizations, including nonprofit and nongovernmental organizations, philanthropies, charities, religious organizations, educational and cultural institutions, arts organizations, sports clubs, and others, who create .ORG Web sites and e-mail addresses.

It is the people who visit .ORG Web sites, turning to them for information and assistance.

And it is the Public Interest Registry (PIR), which manages the .ORG top-level domain name and maintains the database of all .ORG Internet addresses."

Internet Architecture Board - IAB Documents

Internet Architecture Board - IAB Documents: "This document contains a number of observations on the implications of the use of wildcards in DNS zones, and makes some recommendations concerning their use.
The contact person for the IAB on this statement is Harald Alvestrand 19 September 2003
IAB Commentary:
Architectural Concerns on the use of DNS Wildcards
There are many architectural assumptions regarding DNS behavior that are not specified in the IETF standards documents describing DNS, but which are deeply embedded in the behavior of Internet protocols and applications. These assumptions are inherent parts of the network architecture of which the DNS is one component.
It has long been known that it is possible to use DNS wildcards in ways that violate these assumptions.
Recent deployments of DNS wildcards with A records at high levels in the DNS tree have shown by experience that the cost of violating these assumptions is significant. In this document we provide an explanation of how DNS wildcards function, and many examples of how their injudicious use negatively impacts both individual Internet applications and indeed the Internet architecture itself.
In particular, we recommend that DNS wildcards should not be used in a zone unless the zone operator has a clear understanding of the risks, and that they should not be used without the informed consent of those entities which have been delegated below the zone. "

Monday, February 13, 2006

To the Best of Our Knowledge

To the Best of Our Knowledge: "To The Best of Our Knowledge
from Wisconsin Public Radio
John Brown was a terrorist, a man who led a raid in Kansas that butchered five unarmed men. He was also, arguably, of the few white people in 1850s America who was totally color blind. According to a new book he was 'the man who killed slavery and sparked the Civil War.' So, was John Brown a 'good terrorist'? In this hour of To the Best of Our Knowledge we'll consider the legacy of this most complicated historical figure."

Friday, February 10, 2006

CIA - The World Factbook -- Contributors and Copyright Information

CIA - The World Factbook -- Contributors and Copyright Information: "The Factbook is in the public domain. Accordingly, it may be copied freely without permission of the Central Intelligence Agency (CIA). The official seal of the CIA, however, may NOT be copied without permission as required by the CIA Act of 1949 (50 U.S.C. section 403m). Misuse of the official seal of the CIA could result in civil and criminal penalties."

Central Intelligence Agency

Central Intelligence Agency: "What's New at CIA.gov"

Civil Rights - Law and History/The Establishment of the Civil Rights Division

Civil Rights - Law and History/The Establishment of the Civil Rights Division: "In 1957, Congress enacted the first civil rights law since the period following the Civil War. The Civil Rights Act of 1957 created the authority for establishing a civil rights office at the Department of Justice. "

DanaSoft - The Most Popular FREE Signature on the Internet!

DanaSoft - The Most Popular FREE Signature on the Internet!

Wednesday, February 08, 2006

: "What is the Internet, Anyway?"

Family Relationship Chart

Family Relationship Chart: "Family Relationship Chart!"

Tuesday, February 07, 2006

Internet & Networking: Selected IETF RFCs

Internet & Networking: Selected IETF RFCs: "What is the Internet, Anyway?. " and many other popular RFCs.

Digital Libraries: Metadata Resources

Digital Libraries: Metadata Resources: "DIGITAL LIBRARIES: Metadata Resources"

SC32 WG2 Metadata Standards Home Page

SC32 WG2 Metadata Standards Home Page

Saturday, February 04, 2006

Elements Graphics

Elements Graphics: "Remember: All CSS codes must be held in between the two tags! CSS codes usually go in the section. "

Elements Graphics

Elements Graphics: "Remember: All CSS codes must be held in between the two tags! CSS codes usually go in the section. "

Elements Graphics

Elements Graphics: "If there weren't any eggs, would you still come to this site?"

Center for the Study of the Public Domain

Center for the Study of the Public Domain: "Center for the Study of the Public Domain"

Google Video

Google Video This is a MUST see.

Hurra Torpedo - Google Video

Hurra Torpedo - Google Video

Troll XP

Troll XP

Friday, February 03, 2006

Index of /media

Index of /media: "Index of /media"

Tiananmen - Google Search

Tiananmen - Google Searchthis will show you the tanks, unless Google takes it down.

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall: "Thus, image searches for Tiananmen throws up innocuous images of fountains and temples" Google would not allow me to post this post with the last one even though they are in the same sentence!

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall: " type in Tianenmen, Tienanmen or Tiananman and you see tanks and protesters. "

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall: "Thus, image searches for Tiananmen throws up innocuous images of fountains and temples; type in Tianenmen, Tienanmen or Tiananman and you see tanks and protesters. "

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall

Custom PC: Custompc: News: Bloggers discover hole in Google's Chinese wall: "Thus, image searches for Tiananmen throws up innocuous images of fountains and temples; type in Tianenmen, Tienanmen or Tiananman and you see tanks and protesters. "

SPF: A Sender Policy Framework to Prevent Email Forgery

SPF: A Sender Policy Framework to Prevent Email Forgery: "SPF: Sender Policy Framework
The Anti-Forgery solution
That's making the world a
Safer place for email."

How Reverse DNS Works

How Reverse DNS Works: "How Reverse DNS Works
or, 'Almost a Reverse DNS FAQ'"

Office of Fair Trading - Scams

Office of Fair Trading - Scams: "The OFT is running a 'stamp out scams' campaign throughout February"

CyberCitizen

CyberCitizen: "The Cybercitizen Awareness Program educates children and young adults on the danger and consequences of cyber crime. By reaching out to parents and teachers, the program is designed to establish a broad sense of responsibility and community in an effort to develop smart, ethical and socially conscious online behavior in young people."

PC Pro: News: No more idolisation of cyber criminals

PC Pro: News: No more idolisation of cyber criminals: "'In a democracy in general, we can't have the police everywhere,' said Michael Vatis, director of the FBI's National Infrastructure Protection Center, which is responsible for cyber-crimes. 'One of the most important ways of reducing crime is trying to teach ethics and morality to our kids. That same principle needs to apply to the cyber world.'"

InformationWeek | Software Development | Open Ajax Project Promotes Common Tools | February 2, 2006

InformationWeek | Software Development | Open Ajax Project Promotes Common Tools | February 2, 2006: "Boloker pointed out that Ajax is an early technology, but core pieces became standard years ago. The industry just created a different way of programming to the browser using HTML and JavaScript. Open Ajax framework supports run times from Dynamic HTML known as Dojo DHTML to JavaScript OpenRico to Zimbra, such as Zimlet APIs.
Ajax, short for Asynchronous JavaScript and XML, is a type of 'Rich Internet Application.' "

Wednesday, February 01, 2006

FREE411.COM

FREE411.COM: "Copyright 2005. 1-800-FREE411 is a service of Jingle Networks, Inc. The contents of this website are the copyrighted materials
of Jingle Networks, Inc. and may not be used in any form without permission."

Livermore's Centennial Light Live Cam

Livermore's Centennial Light Live Cam: "This page updates every 10 seconds." Longest burning lightbulb

Urban Legends Reference Pages: Computers

Urban Legends Reference Pages: Computers: "Computers are not only now an integral part of our daily lives, they've also become the primary means by which urban legends and other pieces of misinformation are now spread -- everything from 'stupid computer user' stories to virus warning hoaxes (and the occasional real warning). "