Tuesday, August 30, 2011

An update on attempted man-in-the-middle attacks



Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it).

Google Chrome users were protected from this attack because Chrome was able to detect the fraudulent certificate.

More @ bit.ly/qzemez

Microsoft UI has officially entered the realm of self-parody



This is genuinely Microsoft’s idea of a “streamlined”, “optimized” UI for Windows Explorer. They were so proud of it they wrote a blog post about it.

The post is a sort of masterpiece of crazy rationalization, but I think my favourite part may be this screenshot:


 Here, they proudly overlay the UI with data from their research into how often various commands are used. They use this to show that “the commands that make up 84% of what users do in Explorer are now in one tab”. But the more important thing is that the remaining 50% of the bar is taken up by buttons that nobody will ever use, ever, even according to Microsoft’s own research. And yet somehow they remain smack bang in the middle of the interface. The insanity is further enriched by this graph:


She wanted it, thats why she got down on her knees and went dogie style @ 0:17

Another failed mail ordered bride

Sunday, August 28, 2011

So you want to be a video game programmer?

This post is a sequel of sorts to my How do I get a job designing video games. The good new is — if you’re a programmer — that nearly all video game companies are hiring programmers at all times. Demand is never satisfied. And the salaries are very very competitive.

The bad news is that it takes a hell of a lot of work to both be and become a great game programmer. Or maybe that isn’t such bad news, because you absolutely love programming, computers, and video games, right? If not, stop and do not goto 20.

I’m going to break this post down into a number of sub-posts, so this first one is going to be on what kinds of programming video game teams need. I’ll have followup posts on things like “how to get started” and “the interview.”

There are a couple of broad categories of programmers working on video game teams. If programmer is your player class, then the following types are your spec. Programmers are all warlocks and mages so instead of “demonology” or “frost” you can choose from below. (NOTE: if you don’t get this joke, you don’t play enough video games) This is the real world however, and many programmers dual (or even triple) spec — i.e. they handle multiple specialties.

More @ bit.ly/rbGzAM

Antivirus Software Pioneer Gets Dose of Reality

John McAfee knows about risk. A mathematician by training, in the late 1980s he developed the antivirus computer software program that has become a household name. In the 1990s he pioneered instant-messaging. In both cases, he grew bored and cashed out. At his peak, he was reportedly worth about $100 million.

"I don't know and that's the honest truth, eventually you have so many resources that a tiny fluctuation in the market can make you worth ten million dollars more in the morning and ten million dollars less in the evening," he explained of his ever-changing net worth.

Like many wealthy Americans, McAfee was hit hard with the simultaneous collapse of real estate, stocks and Wall Street investment banks. But he got whacked more than most, since much of his fortune was tied up in luxury properties.

"Oddly enough, when real estate markets crash, it's the higher end properties that crash the most ... simply because they're not necessities," he said. "My father always said, 'Real estate, you can't lose in real estate' ... you know, oddly enough you can."

Last Saturday, auctioneers worked up bids for his 80-acre retreat in the high desert of Rodeo, N.M. With a private airstrip and hangar, it's a slice of paradise, and it's all up for grabs.
"Everything that you see, from the real estate, the house, the automobiles, artwork, furniture, the entire ball of wax," McAfee told ABC News.

Raising the stakes for McAfee, it's an absolute auction: The highest bid wins, no matter how low it is. "It means if only one person shows up and they bid fifty cents, that's the amount of money I get," he said.

McAfee's net worth dropped from within the ballpark of $100 million to less than $10 million, he told ABC News. But instead of feeling a sense of loss, he says he feels free.

"I feel a sense of freedom," he said. "People think that it's a joy to own things. But it really isn't."
McAfee has sold his private twin-engine plane, beachfront property in Hawaii and a Colorado mansion in the shadow of Pike's Peak. His posh New Mexico getaway is the last property to hit the auction block.

"At one point, I had five houses in five different locations and it's impractical, it's almost insane to have that much real estate," he conceded. "You can only be in one place at a time."

 

McAfee: 'We Are the Ultimate Consumer Society'

McAfee admits that he got caught up in the culture of consumption.

"We are the ultimate consumer society," he said. "If you succeed within that culture, then you're simply more bonded to it. You feel like, 'Yes, I've got all this money, the ability to get things' ... and so you just do it. People buy yachts, they buy jets, they buy multiple homes."

McAfee himself indulged his whims and passions, spending millions to promote the sport of aero-trekking: tiny motorized kites that enthusiasts fly to explore the remotest corners of the country.
He built an aero-trekking playground in the Rodeo desert, which was auctioned off for $405,000 -- along with the vintage airstream trailers where his aero-trekking friends, known as "the sky gypsies," would stay, as well as his own customized camper, once owned by Howard Hughes.

More @ abcn.ws/qFgB7Q

....................


..............................


Saturday, August 27, 2011

Simple Security for Wireless

In early August, at the Def Con conference -- a major annual gathering of computer hackers -- someone apparently hacked into many of the attendees' cell phones, in what may have been the first successful breach of a 4G cellular network. If early reports are correct, the incident was a man-in-the-middle (MITM) attack, so called because the attacker interposes himself between two other wireless devices.

Coincidentally, a week later, at the 20th Usenix Security Symposium, MIT researchers presented the first security scheme that can automatically create connections between wireless devices and still defend against MITM attacks. Previously, thwarting the attacks required password protection or some additional communication mechanism, such as an infrared transmitter.

Showcasing novel ways to breach security is something of a tradition at Def Con. In previous years, MITM attacks had been launched against attendees' Wi-Fi devices; indeed, the MIT researchers demonstrated the effectiveness of their new scheme on a Wi-Fi network. But in principle, MITM attacks can target any type of wireless connection, not only between devices (phones or laptops) and base stations (cell towers or Wi-Fi routers), but also between a phone and a wireless headset, a medical implant and a wrist-mounted monitor, or a computer and a wireless speaker system.

Key change

Ordinarily, when two wireless devices establish a secure connection, they swap cryptographic keys -- the unique codes they use to encrypt their transmissions. In an MITM attack, the attacker tries to broadcast his own key at the exact moment that the key swap takes place. If he's successful, one or both of the devices will mistake him for the other, and he will be able to intercept their transmissions.

Password protection can thwart MITM attacks, assuming the attacker doesn't know the password. But that's not always a safe assumption. At a hotel or airport that offers Wi-Fi, for instance, all authorized users are generally given the same password, which means that any one of them could launch an MITM attack against the others. Moreover, many casual computer users find it so complicated to set up home Wi-Fi networks that they don't bother to protect them; when they do, they often select passwords that are too simple to provide much security. That's led to the marketing of Wi-Fi transmitters with push-button configuration: To establish a secure link, you simply push a button on top of the transmitter and a corresponding button (or virtual button) on your wireless device. But such systems remain vulnerable to MITM attacks.

"None of these solutions are quite satisfactory," says Nickolai Zeldovich, the Douglas Ross (1954) Career Development Assistant Professor of Software Technology, who developed the new security scheme together with Dina Katabi, the Class of 1947 Career Development Associate Professor of Computer Science and Engineering, as well as postdoc Nabeel Ahmed and graduate student Shyam Gollakota, all of MIT's Department of Electrical Engineering and Computer Science. "The cool thing about this work is that it takes some insight from somewhat of a different field, from wireless communication -- actually, fairly low-level details about what can happen in terms of wireless signals -- and observes that, hey, if you assume some of these properties about wireless networks, you can actually get stronger guarantees."

More @ bit.ly/qfshwd

Sunday, August 21, 2011

Linux Journal goes 100% digital

What is the last print issue I should expect to see?The last issue printed was the August 2011 issue.

I have a U.S. print subscription. What happens?As long as we have your email address, you don’t need to do anything. If you are concerned that we do not have your email address, or if you prefer to receive notifications at another email address, please visit linuxjournal.com/updateaccount. On the 1st of every month, you will receive a notification via email to download the latest issue of Linux Journal.

I have an international print subscription. What happens?As long as we have your email address, you don’t need to do anything. If you are concerned that we do not have your email address, or if you prefer to receive notifications at another email address, please visit linuxjournal.com/updateaccount. Your current subscription term will be extended based on the remaining value of your subscription. For example, if your current remaining subscription value is $52.13 USD (say you paid $69.50 and received 3 copies), the term will be extended by 21 issues based on the issue value of $2.46.

I have a print + digital (“combo”) subscription. What happens?You don’t need to do anything; we already have your email address. Your current subscription term will be extended based on the remaining value of your subscription. For example, if your current remaining subscription value is $29.63 USD (say you paid $39.50 and received 3 copies), the term will be extended by 12 issues based on the issue value of $2.46.

I already have a digital-only subscription. Does this announcement affect me?
You don’t need to do anything, and you will continue to receive your digital subscription. However, if you would like to upgrade to the new, enhanced online digital edition from Texterity, simply visit linuxjournal.com/updateaccount. There is no additional charge for upgrading.

When will I see my first digital issue?Current subscribers can expect to see the September 2011 issue of Linux Journal in their e-mail inboxes on Friday, August 19, 2011. If for any reason you do not receive your copy by the end of that day, please e-mail gm@linuxjournal.com with your full name and postal code.

More @ bit.ly/pGjO48

How Google+ Is Like Twitter—but Not in a Good Way

Tech blogger Robert Scoble, the king of the early-adopter crowd, has posted some thoughts about what he likes and doesn’t like about using Google+, and some of his points hit home with me as well. And the more I thought about the new social network and the things it doesn’t do very well, the more similar it seemed to the issues that have also been dogging Twitter for some time. Like Twitter, the Web giant has to figure out how to solve some pretty challenging problems—including the "noisy stream" issue, the problems of search and discovery, and, of course, how to keep people from going away and never coming back.

As more than one person (including Scoble himself) has noted, he isn’t exactly the average user of social tools. As someone with hundreds of thousands of followers, who jumps on every new Web or social tool that comes along—in some cases dominating those new services to the point where they become almost unusable, as some found with FriendFeed—Scoble is definitely an "edge case." But at the same time, that makes him a little like the canary in a coal mine: He can highlight problems that may only become obvious for others much later.

More @ buswk.co/rnIEuC

No-Tech Hacking

Hacker Attack

Hackers: Outlaws and Angels

The Secret History of Hacking

In the Realm of the Hackers

Unauthorized Access

Thursday, August 18, 2011

Psycho Crusher, FTW!



Company Scans Your Books For a Dollar – Ship ‘Em In, Get a PDF via Email


Someday my grandchildren will ask me what a printed book looks like. Hell, at the rate we’re going, my children will probably ask the same question. The physical to digital conversion of books just got a lot cheaper with the launch of 1DollarScan.com, based in San Jose, California. An offshoot of the immensely successful BookScan in Japan, 1DollarScan does exactly what its name implies: it scans your documents for a dollar. 100 pages of a book, 10 pages of a business document, 10 business card, etc – you just mail the text in and 1DollarScan will email you back a PDF. While the transition away from print media has been proceeding a pace for a while now, a cheap book scanning service in the US means that thousands of personal libraries will be converted to ones and zeroes, pushing us ever closer to a world where all printed books (Gutenberg to Gladwell) belong in a museum.

Yusuke Ohki started BookScan after he laboriously converted his personal library of 2000+ volumes into digital documents. Now the company has 200+ employees who do nothing but that, and reportedly the service is so popular in Japan there’s an extensive waiting list. 1DollarScan promises to bring the same dependable, quick, and hopefully popular service to the US with its freshly debuted Silicon Valley headquarters. The following video was made for BookScan, not 1DollarScan, so it’s only available in Japanese, but you can see the basic components of the technology in action. Send, slice, scan, and email. From book to PDF in about two weeks. We’ve seen better machines, but 1DollarScan makes scanning books simple, and simple sells.

More @ bit.ly/ph0xn2

Candle flames contain millions of tiny diamonds


(PhysOrg.com) -- The flickering flame of a candle has generated comparisons with the twinkling sparkle of diamonds for centuries, but new research has discovered the likeness owes more to science than the dreams of poets.

Professor Wuzong Zhou, Professor of at the University of St Andrews has discovered tiny diamond particles exist in candle flames.

His research has made a scientific leap towards solving a mystery which has befuddled people for thousands of years.

Since the first candle was invented in ancient China more than 2,000 years ago, many have longed to know what hidden secrets its flames contained.

Dr Zhou’s investigation revealed around 1.5 million diamond nanoparticles are created every second in a candle flame as it burns.

The leading academic revealed he uncovered the secret ingredient after a challenge from a fellow scientist in combustion.

Dr Zhou said: “A colleague at another university said to me: “Of course no-one knows what a candle flame is actually made of.

“I told him I believed science could explain everything eventually, so I decided to find out.”
Using a new sampling technique, assisted by his student Mr Zixue Su, he invented himself, he was able to remove particles from the centre of the flame – something never successfully achieved before – and found to his surprise that a candle flame contains all four known forms of carbon.

Dr Zhou said: "This was a surprise because each form is usually created under different conditions."
At the bottom of the flame, it was already known that hydro-carbon molecules existed which were converted into carbon dioxide by the top of the flame.

But the process in between remained a mystery.

Now both diamond nanoparticles and fullerenic particles have been discovered in the centre of the flame, along with graphitic and amorphous carbon.

The discovery could lead to future research into how , a key substance in industry, could be created more cheaply, and in a more environmentally friendly way.

Dr Zhou added: “Unfortunately the diamond particles are burned away in the process, and converted into carbon dioxide, but this will change the way we view a candle flame forever.”

The famous scientist Michael Faraday in his celebrated 19th century lectures on “The Chemical History of a Candle” said in an 1860 address to the light: “You have the glittering beauty of gold and silver, and the still higher lustre of jewels, like the ruby and diamond; but none of these rival the brilliancy and beauty of flame. What diamond can shine like flame?”

Rosey Barnet, Artistic Director of one of Scotland’s biggest candle manufacturers, Shearer Candles, described the finding as "exciting".

She said: "We were thrilled to hear about the discovery that diamond particles exist in a candle flame.

More @ bit.ly/rheXW7

........................


......................


..........................


................................


First Flaws in the Advanced Encryption Standard Used for Internet Banking Identified

Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts.

The attack is a result of a long-term cryptanalysis project carried out by Andrey Bogdanov (K.U.Leuven, visiting Microsoft Research at the time of obtaining the results), Dmitry Khovratovich (Microsoft Research), and Christian Rechberger (ENS Paris, visiting Microsoft Research).

The AES algorithm is used by hundreds of millions of users worldwide to protect internet banking, wireless communications, and the data on their hard disks. In 2000, the Rijndael algorithm, designed by the Belgian cryptographers Dr. Joan Daemen (STMicroelectronics) and Prof. Vincent Rijmen (K.U.Leuven), was selected as the winner of an open competition organized by the US NIST (National Institute for Standards and Technology). Today AES is used in more than 1700 NIST-validated products and thousands of others; it has been standardized by NIST, ISO, and IEEE and it has been approved by the U.S. National Security Agency (NSA) for protecting secret and even top secret information.

More @ bit.ly/oXBHHB

New Anti-Censorship Scheme Could Make It Impossible to Block Individual Web Sites

A radical new approach to thwarting Internet censorship would essentially turn the whole web into a proxy server, making it virtually impossible for a censoring government to block individual sites.

The system is called Telex, and it is the brainchild of computer science researchers at the University of Michigan and the University of Waterloo in Canada. They will present it Aug. 12 at the USENIX Security Symposium in San Francisco.

"This has the potential to shift the arms race regarding censorship to be in favor of free and open communication," said J. Alex Halderman, assistant professor of computer science and engineering at U-M and one of Telex's developers.

"The Internet has the ability to catalyze change by empowering people through information and communication services. Repressive governments have responded by aggressively filtering it. If we can find ways to keep those channels open, we can give more people the ability to take part in free speech and access to information."

Today's typical anticensorship schemes get users around site blocks by routing them through an outside server called a proxy. But the censor can monitor the content of traffic on the whole network, and eventually finds and blocks the proxy, too.

"It creates a kind of cat and mouse game," said Halderman, who was at the blackboard explaining this to his computer and network security class when it hit him that there might be a different approach -- a bigger way to think about the problem.
Here's how Telex would work:

Users install Telex software. Halderman envisions they could download it from an intermittently available website or borrow a copy from a friend.

Internet Service Providers (ISPs) outside the censoring nation deploy equipment called Telex stations.
When a user wants to visit a blacklisted site, he or she would establish a secure connection to an HTTPS website, which could be any password-protected site that isn't blocked. This is a decoy connection. The Telex software marks the connection as a Telex request by inserting a secret-coded tag into the page headers. The tag utilizes a cryptographic technique called "public-key steganography."

"Steganography is hiding the fact that you're sending a message at all," Halderman said. "We're able to hide it in the cryptographic protocol so that you can't even tell that the message is there."
The user's request passes through routers at various ISPs, some of which would be Telex stations. These stations would hold a private key that lets them recognize tagged connections from Telex clients. The stations would divert the connections so that the user could get to any site on the Internet.
Under this system, large segments of the Internet would need to be involved through participating ISPs.

More @ bit.ly/pNB1xv

Wednesday, August 17, 2011

..........................



Planet of Slums, Age of Riots

Tottenham, Chile, Tunis…

There are too many to count

Oakland, Brixton, Taybat al-Imam…

We almost can’t keep the names straight.

Clichy-sous-Bois, Caracas, Los Angeles…

The phrase “riot in London” echoed strangely in my ear, prompting only muted interest. I have been present for a few riots in London and in nearby Cambridge, marches against the war and the perennial Mayday battle between anarchists and the Metropolitan Police. From these to the more recent anti-cuts marches which ended in sporadic clashes with police, my interest has gradually waned, and when I most recently heard this phrase “riot in London,” I expected it would be followed by yet another description of a ritualized protest, with some marchers “kettled” and some anarchists fighting police. This is not simply a criticism: I was not not excited, but I was certainly not excited either.
Instead, the details began to emerge: the immediate spark was the police murder of a Black man, Mark Duggan, who was shot to death by police, and the beating of a 16-year old woman demanding answers from police about Duggan’s death. The fuel for the fire had been long accumulating, however: institutionalized racism in the form of poverty, police stop-and-search methods, and more recent Conservative Party cutbacks in the name of “austerity,” this year’s chosen catchword if “revolution” doesn’t eclipse it entirely. 

The similarities with other serious waves of social rebellion then began to emerge with increasing clarity. This was both about Mark Duggan and it was not (here we can agree with the British Prime Minister David Cameron, albeit toward the opposite end), just as the recent rebellions in Oakland in 2009 were both about more than Oscar Grant, just as 2008 Athens was about more than Alexandros Grigoropoulos, 1992 L.A. was about more than Rodney King, the 1965 Watts Rebellion about more than Marquette Frye, and so on. And like these previous moments, the London rebellions are spreading with a degree of spontaneity and a flexibility of organizational forms that has left police utterly confounded. There have already been more than 1,000 arrests, and as hysterical media outlets up the rhetorical ante with talk of “guerrilla warfare,” the police are gearing up for far more.

Mob Hysteria

When economic violence reaches a certain point, social counter-violence soon follows, and yet it is rarely the bankers or the politicians, the purveyors of global austerity measures, who bear the brunt. It begins with name-calling, and no name has more political and historical resonance than “the mob,” the most traditional of slurs. From Philadelphia to London, we are told, the specter of the mob looms, and to the image of the “baying mob,” that keystone of journalistic integrity The Sun has also added the image of the “trouble-making rabble.” 

Irrational, uncontrollable, impermeable to logic and unpredictable in its movements, these undesirables have once again ruined the party for everyone, as they have done from Paris 1789 to Caracas 1989. In Fanon’s inimitable words: “the masses, without waiting for the chairs to be placed around the negotiating table, take matters into their own hands and start burning…”

To use the word “mob” is a fundamentally political gesture. It is an effort by governing elites and conservative forces to delegitimize and denigrate popular resistance, to empty it of all political content by drawing a line of rationality in the sand. To make demands is reasonable, but since “the mob” is the embodiment of unreason, it cannot possibly make demands. Never mind the very clearly political motivations that sparked the rebellions around London, as well as the growing and equally political concerns about economic inequality and racist policing: these have been well documented, no matter how little many Britons want to hear it. 

But I want to address directly the idea that the riots are fundamentally irrational, as the smear of “the mob” would symbolically insist. Let’s listen closely, let’s block out the torrent of media denunciation and hear what the rebels are saying themselves:

Argument 1: Nothing Else Has Worked, This Might. 

When ITV asked one young rebel what, if anything, rioting would achieve, his response was as matter-of-fact as it was profound:

“You wouldn’t be talking to me now if we didn’t riot, would you?... Two months ago we marched to Scotland Yard, more than 2,000 of us, all blacks, and it was peaceful and calm and you know what? Not a word in the press. Last night a bit of rioting and looting and look around you.”

As another put it: “you can’t do nothing that’s normal for it to happen right.” In other words, legitimate discontent has not been heard through official channels, and so those suffering turn to unofficial ones. If someone has an effective counter-argument to this, I’m all ears. This is not to suggest that the rebellions have a singular logic shared by every participant, but that there is logic to be found nonetheless.

This isn’t the only time riots have worked, either: in 2009 Oakland, it was riots and only riots that led to the arrest, prosecution, and conviction of BART police officer Johannes Mehserle for the death of Oscar Grant. And this effectiveness extends to the tactical, while the left marches and is surrounded by police, these street rebels have proven far less susceptible to tactics like “kettling”: as The Guardian put it, 

roaming groups of youths cannot be effectively kettled. And unlike activists they will often return to the site of trouble, seeking direct confrontation with police.The looters appear to have been more savvy. Large groups targeting shops have been melting into a nearby estate in seconds at the first sound of sirens arriving.

Argument 2: The Rich Can Do It, Why Can’t We?

Poor people aren’t stupid enough not to have noticed what’s been going on in the world around them. As capitalist crisis has set in a massive redistribution of wealth has taken place, with banks and investors bailed out at the expense of the population, effectively rewarding them for predatory behavior and leveraging national debt into economic growth. The rich line their profits as essential services and benefits are slashed, and faced with such obvious “looting,” we are somehow expected not to notice.

This is about youth not having a future… a lot of these people are unemployed, a lot of these people have their youth center closed down for years, and they’re basically seeing the normal things: the bankers getting away with what they’re getting away with… this is the youth actually saying to themselves, guess what? These people can get away with that, then how come we can’t tell people what we feel?

As one young female looter told The Sun, “We’re getting our taxes back,” and as another told The Guardian, “The politicians say that we loot and rob, they are the original gangsters.”
Argument 3: Locating the Riots.

Essential to the imagery of the irrational mob is the insistence that the bulk of the destruction is centered on working-class communities, and here the logic is fundamentally colonial. The poor and the Blacks can’t be trusted: look what they do to their own. Incapable of governing themselves, they must be taught civilization, by blows if necessary. Here again Oakland resonates, as after the riots there a solitary African braid shop, one of many whose windows were smashed, became the media symbol of the ‘irrationality’ of rioters hell-bent on destruction and nothing more. It is worth noting that the poor rarely “own” anything at all, even in their “own” communities.

To break this narrative, we must read the actions of the rebels as well as listening to their words. While working-class communities have indeed suffered damage (we should note that working-class communities always bear the brunt of upheaval), there has been less talk of more overtly political targeting: police stations burned to the ground, criminal courts windows smashed by those who had passed through them, and the tacitly political nature of youth streaming into neighboring areas to target luxury and chain stores. On just the first night, rioters in Tottenham Hale targeted “Boots, JD Sports, O2, Currys, Argos, Orange, PC World and Comet,” whereas some in nearby Wood Green ransacking the hulking HMV and H&M before bartering leisurely with their newly acquired possessions. 

This tendency was seemingly lost on analysts at The Guardian, who were left scratching their heads when the riot locations did not correspond directly to the areas with the highest poverty. And it’s not just the lefty news outlets that let such details slip: Danny Kruger, ex-adviser to David Cameron observed that:  “The districts that took the brunt of the rioting on Monday night were not sink estates. Enfield, Ealing, Croydon, Clapham... these places have Tory MPs, for goodness’ sake. A mob attacked the Ledbury, the best restaurant in Notting Hill.” 

While refusing to denounce the rebellions, socialist thinker Alex Callinicos nevertheless suggests that such looting is “a form of do-it-yourself consumerism… reflecting the intensive commodification of desires in the neoliberal era.” This view misses the far more complex role of the commodity during a riot, which was as evident in Oakland as in Venezuela: not only is the looting of luxury consumer items far more complex than Callinicos suggests, but the argument of looting as consumerism would have a hard time explaining both the destruction of luxuries and appropriation of necessities that often ensues

Despite the ideological deployment of the specter of mob hysteria, in the words of one observer, there is “nothing mindless” about the London rebellions.

“An Insurrection of the Masses”

British media has by now largely closed ranks against the rebellion, providing a seamless tapestry of denunciation that oscillates between the violently reactionary and the comically hysterical. But this was not without first making a serious mistake, an error in judgment that pried open but the tiniest crack into which stepped a man who has since become a focal point for resistance to the media hype. Darcus Howe, nephew of the Trinidadian Marxist C.L.R. James, seems to have inherited his uncle’s acute capacity for seeing through the racist hype about “mobs” and discerning the political kernel of seemingly apolitical daily acts of resistance, of recognizing the new even amid the crumbling shell of the old.

When asked in a live BBC interview to characterize the recent outbursts, How spoke the following words:

I don’t call it rioting, I call it an insurrection of the masses of the people. It is happening in Syria, it is happening in Clapham, it’s happening in Liverpool, it’s happening in Port of Spain, Trinidad, and that is the nature of the historical moment…

When Howe refused to follow the self-generating script, one so well-known that no orders for its reading usually need be given, the flailing BBC correspondent turned first to bad logic and then to ad hominem attack. If Howe was attempting to explain the context of the rebellions he must also be condoning their effects, and wasn’t he, by the way, himself a rioter as a youth? He wasn’t, as a matter of fact, but he was certainly accused of being one: Howe was tried for affray and riot at the Old Bailey in 1971 only to be acquitted. After Howe’s later release on charges of assaulting a police officer, Linton Kwesi Johnson penned a tribute, “Man Free,” which featured the following words
Him stand up in the court like a mighty lion, him stand up in the court like a man of iron, Darcus out of jail, Shabba!

(A video of the interview recorded from a living room has spread like wildfire, with more than 2.3 million hits as I write, and the Beeb has since been forced to apologize, blaming unspecified “technical issues”).

More @ bit.ly/nuNLFP

Open Revolt Spreads Across Britain

A fourth night of riots have spread across Britain, including the cities of Birmingham, Wolverhampton, West Bromwich, Greater Manchester and Salford. The riots were sparked by police brutality and systemic ongoing violence against the working class and poor.

More @ bit.ly/o60C0e

..............................................


..........................


Tuesday, August 16, 2011

Undeletable Cookies

A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie:
Researchers at U.C. Berkeley have discovered that some of the net’s most popular sites are using a tracking service that can’t be evaded -- even when users block cookies, turn off storage in Flash, or use browsers’ “incognito” functions.
The Wired article was very short on specifics, so I waited until one of the researchers -- Ashkan Soltani -- wrote up more details. He finally did, in a quite technical essay:
What differentiates KISSmetrics apart from Hulu with regards to respawning is, in addition to Flash and HTML5 LocalStorage, KISSmetrics was exploiting the browser cache to store persistent identifiers via stored Javascript and ETags. ETags are tokens presented by a user’s browser to a remote webserver in order to determine whether a given resource (such as an image) has changed since the last time it was fetched. Rather than simply using it for version control, we found KISSmetrics returning ETag values that reliably matched the unique values in their 'km_ai' user cookies.
 More @ bit.ly/qaSi6k

Book Excerpt: Ghost in the Wires



In his newly published autobiography, America’s most famous ex-hacker, Kevin Mitnick, tells his own story for the first time. In this excerpt, Mitnick describes his 1992 investigation into the mystery hacker “Eric,” who’d begun pumping him for information. Mitnick’s spy-versus-spy duel with the hacker would launch a chain of events destined to turn Mitnick into the most-wanted computer criminal in the country.

Revelations

We’re told that our medical records are confidential, shared only when we give specific permission. But the truth is that any federal agent, cop, or prosecutor who can convince a judge he has legitimate reason can walk into your pharmacy and have them print out all of your prescriptions and the date of every refill. Scary.

We’re also told that the records kept on us by government agencies — Internal Revenue Service, Social Security Administration, the DMV of any particular state, and so on — are safe from prying eyes. Maybe they’re a little safer now than they used to be — though I doubt it — but in my day, getting any information I wanted was a pushover.

I compromised the Social Security Administration, for example, through an elaborate social engineering attack. It began with my usual research—the various departments of the agency, where they were located, who the supervisors and managers were for each, standard internal lingo, and so on. Claims were processed by special groups called “Mods,” which I think stood for “modules,” each one perhaps covering a series of Social Security numbers. I social engineered the phone number for a Mod and eventually reached a staff member who told me her name was Ann. I told her I was Tom Harmon, in the agency’s Office of the Inspector General.

I said, “We’re going to be needing assistance on a continuing basis,” explaining that while our office was working on a number of fraud investigations, we didn’t have access to MCS — short for “Modernized Claims System,” the amusingly clumsy name for their centralized computer system.
From the time of that initial conversation, we became telephone buddies. I was able to call Ann and have her look up whatever I wanted — Social Security numbers, dates and places of birth, mother’s maiden names, disability benefits, wages, and so on. Whenever I phoned, she would drop whatever she was doing to look up anything I asked for.

Ann seemed to love my calls. She clearly enjoyed playing deputy to a man from the Inspector General’s Office who was doing these important investigations of people committing fraud. I suppose it broke the routine of a mundane, plodding workday. She would even suggest things to search: “Would knowing the parents’ names help?” And then she’d go through a series of steps to dig up the information.

On one occasion, I slipped, asking, “What’s the weather like there today?”

But I supposedly worked in the same city she did. She said, “You don’t know what the weather is!?”
I covered quickly. “I’m in LA today on a case.” She must have figured, Oh, of course — he has to travel for his work.

We were phone buddies for about three years, both enjoying the banter and the sense of accomplishment.

If we had ever met in person, I would have given her a kiss to thank her for all the wonderful help she gave me. Ann, if you read this, your kiss is waiting.

I guess real detectives must have a lot of different leads to follow up when they’re working a case, and some of the leads it just takes time to get to. I hadn’t forgotten that Eric’s apartment rental contract was in the name of a Joseph Wernle; I just hadn’t pursued that lead yet. This was one of the several times while playing detective that I would turn to my Social Security chum, Ann.

She went on the MCS and pulled up an “Alphadent” file, used to find a person’s Social Security number from his or her name and date of birth.
I then asked for a “Numident,” to get my subject’s place and date of birth, father’s name, and mother’s maiden name.

Joseph Wernle had been born in Philadelphia, to Joseph Wernle Sr. and his wife, Mary Eberle.
Ann then ran a DEQY (pronounced “DECK wee”) for me—a “detailed earnings query,” giving a person’s work history and earnings record.
Huh? . . . What the hell!?

Joseph Wernle Jr. was forty years old. According to his Social Security records, he had never earned a penny.

He had never even held a job.

What would you have thought at this point?

The man existed, because Social Security had a file on him. But he had never had a job and never earned an income.


The more I dug into his background, the more intriguing the whole thing seemed to get. It didn’t make sense, which just made me all the more determined to find out what the explanation could be.

More @ bit.ly/o2JD6Z

.........................



Saturday, August 13, 2011

..............................................


DigiTrill.com Exclusive Virgo Peridot Booty Shake

show up and show out!

Think Windows is insecure? You're wrong, says security firm Kaspersky.

Conventional wisdom has it that Windows and products from Microsoft are extremely unsafe, easy targets for hackers. That conventional wisdom is wrong, according to security firm Kaspersky Lab's recent quarterly malware report, which found not a single Microsoft-related threat in the top ten.
The Kapersky Lab quarterly report has this to say about Microsoft products:
For the very first time in its history, the top 10 rating of vulnerabilities includes products from just two companies: Adobe and Oracle (Java), with seven of those 10 vulnerabilities being found in Adobe Flash Player alone. Microsoft products have disappeared from this ranking due to improvements in the automatic Windows update mechanism and the growing proportion of users who have Windows 7 installed on their PCs.
So if you're running Windows --- especially Windows 7 --- you don't need to worry that you're a sitting duck.

More @ bit.ly/qZMnM3

Violent video game effects on aggression, empathy, ... a meta-analytic review

Meta-analytic procedures were used to test the effects of violent video games on aggressive behavior, aggressive cognition, aggressive affect, physiological arousal, empathy/desensitization, and prosocial behavior. Unique features of this meta-analytic review include (a) more restrictive methodological quality inclusion criteria than in past meta-analyses; (b) cross-cultural comparisons; (c) longitudinal studies for all outcomes except physiological arousal; (d) conservative statistical controls; (e) multiple moderator analyses; and (f) sensitivity analyses. Social-cognitive models and cultural differences between Japan and Western countries were used to generate theory-based predictions. Meta-analyses yielded significant effects for all 6 outcome variables. The pattern of results for different outcomes and research designs (experimental, cross-sectional, longitudinal) fit theoretical predictions well. The evidence strongly suggests that exposure to violent video games is a causal risk factor for increased aggressive behavior, aggressive cognition, and aggressive affect and for decreased empathy and prosocial behavior.

More @ 1.usa.gov/9ogEzg

Friday, August 12, 2011

Change the World

The Zeitgeist Movement - The Transition

Leaked AT&T Letter Demolishes Case For T-Mobile Merger

Yesterday a partially-redacted document briefly appeared on the FCC website --accidentally posted by a law firm working for AT&T on the $39 billion T-Mobile deal (somewhere there's a paralegal looking for work today). While AT&T engaged in damage control telling reporters that the document contained no new information -- our review of the doc shows that's simply not true. Data in the letter undermines AT&T's primary justification for the massive deal, while highlighting how AT&T is willing to pay a huge premium simply to reduce competition and keep T-Mobile out of Sprint's hands.

We've previously discussed how AT&T's claims of job gains and network investment gained by the deal aren't true, with overall network investment actually being reduced with the elimination of T-Mobile. While AT&T and the CWA are busy telling regulators the deal will increase network investment by $8 billion, out of the other side of their mouth AT&T has been telling investors the deal will reduce investment by $10 billion over 6 years. Based on historical averages T-Mobile would have invested $18 billion during that time frame, which means an overall reduction in investment.

Yet to get the deal approved, AT&T's key talking point to regulators and the press has been the claim that they need T-Mobile to increase LTE network coverage from 80% to 97% of the population. Except it has grown increasingly clear that AT&T doesn't need T-Mobile to accomplish much of anything, and likely would have arrived at 97% simply to keep pace with Verizon. AT&T, who has fewer customers and more spectrum than Verizon (or any other company for that matter), has all the resources and spectrum they need for uniform LTE coverage without this deal.

For the first time the letter pegs the cost of bringing AT&T's LTE coverage from 80% to 97% at $3.8 billion -- quite a cost difference from the $39 billion price tag on the T-Mobile deal. The letter highlights how the push for 97% coverage came from AT&T marketing, who was well aware that leaving LTE investment at 80% would leave them at a competitive disadvantage to Verizon. Marketing likely didn't want a repeat of the Luke Wilson map fiasco of a few years back, when Verizon made AT&T look foolish for poor 3G coverage.

The letter also notes that AT&T's supposed decision to "not" build out LTE to 97% was cemented during the first week of January, yet public documents (pdf) indicate that at the same time AT&T was already considering buying T-Mobile, having proposed the deal to Deutsche Telekom on January 15. In the letter, AT&T tries to make it seem like the decision to hold off on that 17% LTE expansion was based on costs. Yet the fact the company was willing to shell out $39 billion one week later, combined with AT&T's track record with these kinds of tactics, suggests AT&T executives knew that 80-97% expansion promise would be a useful carrot on a stick for politicians.

More @ bit.ly/pvVv5b

Fighting the (credit card processing) System

Score one for the little guy. In the opaque world of credit card processing, good deals are no longer the exclusive domain of the WalMarts, thanks to new startup, FeeFighters.

"Smaller guys have always gotten ripped off," explained Sheel Mohnot (TPR'02), FeeFighter's Director of Marketing.

"The pricing models are tiered for different types of credit cards. It's confusing and often full of bait and switch."

FeeFighters, co-founded by Carnegie Mellon alum Josh Krall (CS, CFA'01), offers an online marketplace where payment processors are held to strict guidelines. In just a few minutes, a merchant can enter information and receive clear, one-tier, competing bids.

Mohnot states that customers can save an average of 40 percent on their credit card processing fees. More than 20,000 customers have already used the service.

He adds that processors are eager to participate due to intense industry competition. Even with lower margins, each incremental customer adds to the processor's bottom line.

"We literally get at least five emails a day from processors asking to be in our marketplace," said Mohnot. "We include only the top processors that can service our customers with absolutely honest pricing and great service."

FeeFighters is the only company of its kind. Online lookalikes merely gather merchant information as leads to sell.

And FeeFighters is getting ready to launch a new product — a more powerful and flexible gateway for merchants to accept online payments.

Mohnot was inspired to join the startup world during his CMU days, where he began running side businesses.

More @ bit.ly/ob19Ir

....................................................


........................


...................................................




Windows Laptop Makers Can’t Catch Up to the MacBook Air

The PC world is buzzing lately about how laptop manufacturers are struggling to compete with Apple’s MacBook Air, which has exploded in popularity since the introduction of the third-gen model in 2010. This year’s fourth-gen update is proving to be the must-have laptop of the year. For every laptop manufacturer not named “Apple”, the race is on to make new super-thin and super-light laptops. Intel calls them Ultrabooks, and the name is catching on, despite being sort of silly.

Here’s a question for you: why didn’t HP, Dell, Acer, Samsung, or some other huge PC manufacturer build the Air before Apple? The answer is: they did. Sony’s X505 was a razor-thin laptop weighing less than 2 pounds, and it came out in 2003! More recently, Dell introduced the Adamo in 2009, and later that year the even thinner Adamo XPS. These laptops didn’t sell. Sony’s cost over three grand. Dell’s were also too expensive, and the battery life was pitiful. Instead of fixing those problems, Dell killed the Adamo line. Sony and Dell built nearly-great products with critical flaws and instead of challenging their engineers and designers to find ways to address those flaws, they concluded that nobody really wanted these systems. Apple didn’t give up, though. Drive too thick and too slow? Apple commissioned a special case-less SSD that could fit in its slim design. It worked to make the motherboard smaller, the components cheaper, and crammed as much lithium polymer battery as it could fit in the case. By 2010, the Air had evolved from an overpriced, underpowered status toy to the must-have computer of our day.

My point here is not simply that PC manufacturers are quitters. It’s that they have the entirely wrong mindset to build must-have products. Several times a year, I have meetings with major PC manufacturers about their upcoming product lines, and the tenor is always the same: “Our customers told us this is what they want, and our market research says this is what people are buying, so we made this great product to address that market!” There’s nothing inherently wrong with that, but you’ll never set any trends that way. If you want to make the product that everyone else compares their product to, you have to go outside the envelope. You have to take a risk to build something nobody has told you they want, because they don’t know they want it yet, and then you have to invest in it and stick with it until you get it right. The real irony here is that their marketing departments are constantly striving to find differentiators: ways to set their products apart from the pack. If every company is building products to address the same set of market research data, you’re not going to get differentiated products.

Building a better Air - or even just a cheaper one - is proving to be difficult. Those unibody aluminum chassis on MacBooks make them really rigid despite the thin design, and Apple has booked solid all the lathes capable of carving a laptop body out of a single block of metal. Challengers like the Samsung Series 9 have metal bodies, but without the satisfying stiff feel and seamless edges of one carved from a single chuck of alloy. Of course, the Series 9 is also quite expensive. When one of the main reasons people don’t buy a Mac these days is because they can’t buy one for less than $1,000, pricing your Mac alternative well above that price doesn’t do you any favors.

There are other pretenders to the ultrabook throne coming this fall. There’s the Asus UX51, and the Acer Aspire 3951. Rumor has it HP will unveil an ultrabook soon. What do all these systems have in common? They’re too late. Yes, the ultra-thin form factor made popular by the Air is rising in popularity, and if priced right some of these systems will sell pretty well. Sales numbers notwithstanding, they’ll suffer the ignominious fate of being labeled also-rans. They’ll be “MacBook Air-like.” The problem with PC manufacturers is not that they can’t build a computer as good as the hottest Apple thing, it’s that they’re constantly trying to. Apple is in the driver’s seat.

If you aim at a fast-moving target, you’re sure to hit behind it. While HP, Acer, Asus, and others are worrying about how to make a MacBook Air killer, Apple is busy redefining the rest of its laptop line. Intel is kicking in $300M to drive the ultrabook category with new inventions and new, cheaper SSDs will help drive costs down. By the time all the PC manufacturers figure out how to make a cheaper laptop that is as thin, light, and long-lived as a MacBook Air, everyone will be drooling over the new MacBook Apple will have just introduced. I suppose we can’t expect a lot of creativity and focus from companies that think a random string of letters and numbers make for appropriate product names.

Here’s a bit of free advice for the PC manufacturers: lose the optical drive. No, not just in your upcoming ultrabooks, in everything. I’ve asked four PC makers this year why they’re still putting DVD drives in their 13-to-15 inch laptops while struggling to make them thinner and lighter. They all said the same thing: “our customers say they aren’t ready for that yet.” Well of course they’re not! If you wait until the world tells you an optical drive isn’t worth the tradeoff in thickness, weight, and space for a bigger battery, you’ll be marketing laptops just like everyone else’s. I’d make a million dollar bet Apple’s next generation of MacBook Pro won’t have optical drives in its 13 and 15 inch models, and they’ll be so slim and sleek and light everyone will want one. Then Dell, HP, Acer, Asus, Samsung, Sony, and the others will follow suit six months later, looking like they can’t come up with an idea until after Apple does.

More @ bit.ly/raetaq

Extreme concentration of wealth in US economy has led to central planning

"Really fascinating piece by +John Robb (via +Glyn Moody (@glynmoody)) outlining the idea that concentration of wealth in the US has led to what is, in essence, a centrally planned economy, with all the ills that entails. This is one of those eye-opening connect-the-dots pieces that everyone should read.

Robb writes:


"Of course, the misallocation due to centralized decision making wasn't supposed to be a vulnerability of the West. To allocate resources in our economy, we had a conceptually more efficient mechanism: markets. Markets are supposed to be a mechanism that allows massively parallel decision making.

"Those assumptions are proving false. The succession of market bubbles, the global financial collpse of 2008, and the recent US debt problem is prima facie evidence that gross misallocation has occurred for decades. The wealth of the West, particularly the US, is being spent on the wrong things year after year, decade after decade. We are now as fragile as the Soviet Union in the late 80's.

"What happened?

"Central planning took over the decision making process in the US, both through the growth of government and through an unparalleled concentration of wealth...


"The parallels between the rapid growth of US government bureaucracy and the Soviet bureaucracy is straight forward. As more and more of US economy was controlled by a narrow group of decision makers allocating government resources, the more sluggish the entire economy became (most of this was due to massive growth and mis-allocation in entitlements and defense). Further, the ability of government bureaucracies to extend their decision making to remaining majority of the economy through regulatory action, is also a form of centralization. However, even with all of this government growth, it's is still not enough to account for the level of misallocation we are seeing.

More @ bit.ly/pnFTXa

A History of Opium and Heroin Addiction in the United States Documentary (1972)

Welcome to the Cloud - "Your Apple ID has been disabled."

So Apple is America's most valuable company. They are, like everyone else, betting the company on the cloud. You may be familiar with the cloud, as it's where all your valuable stuff is. The stuff that you may lose access to at any moment.

The most valuable companies have your valuable data in the cloud. We may think the cloud is decentralized, but it's not. It's totally centralized. All the valuable data is now in one place with one password that's connected to your one bank account. We've centralized and simplified fraud and the public pays for it.

I've got email in Gmail, Music in Spotify, files in DropBox, documents in SkyDrive, photos in Flickr, and media and Apps in the Apple Cloud.
I got this email out of nowhere yesterday.
Dear Scott Hanselman,
Your Apple ID,
scott@hanselman.com, was just used to purchase 明珠三国OL from the App Store on a computer or device that had not previously been associated with that Apple ID.

If you made this purchase, you can disregard this email. This email was sent as a safeguard designed to protect you against unauthorized purchases.

If you did not make this purchase, we recommend that you go to iforgot.apple.com to change your password, then see Apple ID: Tips for protecting the security of your account for further assistance.
Regards,
Apple

After confirming the email path via headers and checking all the links as well as the HTML source of the email (seriously, you expect my Mom to do this?) I decided it was legit.
The phrasing of this email is irritating and wrong-headed. Here's why.
  1. They know it's a device they've never seen before.
  2. They let it happen anyway.
  3. They tell me it's for my good in a self-congratulatory way.
      This email was sent as a safeguard designed to protect you against unauthorized purchases.
  4. But, if I didn't make this purchase, rather than a Dispute button or Fraud link, they recommend I change my password.
Stunning.


I changed my password and went into the Apple Cloud of past purchases via the App Store. Note that it's "Not On This iPhone." It's actually not on any of my devices, because I never bought it.
If you look at the App, you'll note that it's got a sudden rash of negative reviews from folks who have apparently also been hit by this issue. Someone buys this app (no idea how) and then uses in-app purchase to steal money.

The part I can't get my head around is this. My password is/was rock solid. I use a password manager, my passwords are insane and have high entropy. Not to mention that Apples knows what devices I have and still allowed the purchase.

Next, I got a Paypal Email thanking me for my $40 purchase from Apple. As an interesting data point, I haven't received an iTunes receipt for these illicit purchases.
Instead, I look in iTunes. Odd that we have to go into iTunes to see purchase history instead of a website.

And there they are. A whole series of in-app purchases for an App I don't have on a phone that doesn't exist.

More @ bit.ly/p1gaE2

The desktop is not dead dammit

The demise of the traditional desktop PC has long been predicted. Well, those naysayers are flat-out wrong. In honor of the 30th anniversary of the PC, we give you six compelling reasons why.

For as long as I've worked for PCMag.com and its previous incarnation PC Magazine, people have crowed that the desktop PC is dead or dying. These days, with the proliferation of "Post-PC" tablets and micro-sized laptops, it does seem like the old-fashioned desktop PC is on its last legs. And yet, walk into any brick-and-mortar store selling computers, or go to any computer manufacturer's site, and you'll see that these stalwarts of a bygone era are still there, still being updated, still evolving. There are plenty of well-established reasons to use a desktop, including expandability, gaming prowess, etc. These are the traditional arguments for using a tower desktop PC that have been done to death in other columns and opinion pieces. But perhaps the most valid reasons why people are still drawn to a desktop PC may not be the most obvious. Here are six that you may not have thought about.  

1. Simple Ergonomics
 
Ever find you have pain in your shoulders from hunching over while working on a laptop or tablet? There you go. Using a tablet or laptop can be done comfortably with a reclining chair and a laptop stand, but just take a look around the next time you visit your local coffee shop. Chances are, the people blogging or updating their Facebook page have that elbows-in, head-tilted down posture from trying to use a laptop on a table meant for eating food on. Using a larger screen and a detached keyboard, as you would with a desktop, offers a more ergonomic body position for extended computing sessions.
 

2. Large Screens/HDTV
 
Speaking of larger screens, practical laptop screens top out at 17 inches with true 1080p resolution, but 21-, 24-, 27-, and 30-inch panels are the norm for desktop PCs. The 21- to 27-inch screens are common on all-in-one desktops, and the sky's the limit with external displays. You can even hook a desktop (or a laptop) up to a 65-inch HDTV for a truly immersive experience. Mo' screen, mo' better, in my opinion.
 


3. Storage, Storage, and Did I Mention Storage?

Tablets and SSD-equipped laptops commonly top out at 64GB of storage space, while laptops with traditional spinning drives top out at 1TB, and either of those options will cost you. You can buy a current desktop with space for at least two 1TB to 4TB drives for well under $500. While smaller drives help portability, your needs will outgrow 64GB, especially on your primary PC. A family of four will certainly have more than 20GB to 60GB of photos and home videos. Multiply the number of cameras by two for teenagers, and that extra space becomes paramount. That's before you factor in all those songs you'd ripped and downloaded from iTunes. Sure, you can store all this stuff on a shared hard drive on a NAS, but network storage can be intimidating to set up for a novice. You can store stuff on the Internet, but most online services charge subscription fees after the first couple of GB. Last, but not least, there's currently no storage that's faster than local internal hard drives, so you'll be waiting less time to become reacquainted with your memories.

4. Number Crunching

Wasting time is something you want to be doing actively (like surfing thechive.com), rather than inactively (waiting for a spreadsheet to finish calculating or for a flash Website to react). Just try to watch a 1080p video on You Tube on a single-processor nettop. There's a word for that: painful. As Flash videos and Websites become increasingly complex, you need the extra power that a quad-core processor affords you. Otherwise you'll be sitting there just waiting for the computer to recognize the mouse clicks and bring you to the next Flash-heavy page. Needless to say, people who deal with huge spreadsheets, multi GB graphic images, and videos will still want desktop PCs with multi-core processors and scads of system memory. Their livelihoods depend on it.
 
More @ bit.ly/nXPsYk