Tag Archives: Internet

Why Most People Say They’re Addicted to the Internet [INFOGRAPHIC]

Are you addicted to the Internet?

If so, you’re not alone. Some 61% of people feel addicted to the Internet and are unable to quit browsing, according to an informal survey.

Opinion pollster SodaHead surveyed 602 visitors to its site Feb. 16. about whether they experience Internet addiction, and found that many people are self-diagnosed addicts.

Women experience addiction more than men, with 64% of women compared with 55% of men reporting the symptoms of addiction.

Interestingly, respondents addicted to other behaviors were less likely to be addicted to the Internet. Only 48% of smokers, compared with 65% of non-smokers, experience addiction. The margin between drinkers and non-drinkers was narrower, with 57% of drinkers and 64% of non-drinkers describing themselves as Internet addicts.


SEE ALSO: Afraid of Losing Your Phone? You May Have Nomophobia, Like Half the PopulationAmong respondents who felt addicted, teenagers between 13 and 17 were worst off, with 73% reporting addiction. As respondents get older, they reported subsequently less addiction, with the exception of those 65 and over, who feel more addicted than their counterparts between 45 and 64.

The poll found that the Internet users who spend the most time online were the least likely to be Internet addicts. Those between 45 and 54, on average, spend the most time each week online, reporting almost 40 hours of browsing each week. Teens, who feel the most addicted spend the least amount of time online, reporting only 22.3 hours per week of use.

Do you consider yourself an Internet addict? How many hours do you spend online each week? Let us know in the comments.

Data Transmission for the Internet of Tomorrow

Electrical engineers in Bochum have succeeded in developing a new concept for ultrafast semiconductor lasers. The researchers make clever use of the intrinsic angular momentum of electrons, called spin, to successfully break the previous speed barriers. The new spin lasers have the potential to achieve modulation frequencies of well above 100 GHz in future. This is a decisive step towards high-speed data transmission, e.g. for the Internet of tomorrow.

The researchers report on their results in the journal Applied Physics Letters, published by the American Institute of Physics.

Optical data transmission: the basis of our information society

Optical data transmission by semiconductor lasers is a basic prerequisite for the globally networked world and today’s information society. The ever increasing degree of networking and the desire to exchange larger amounts of data are the driving force behind the development of ever faster optical data transmission systems. The maximum speed of conventional semiconductor lasers has long been a limiting factor – typical modulation frequencies are currently at levels well below 50 GHz. Continue reading Data Transmission for the Internet of Tomorrow

Social networks now used to abuse, monitor and control women

Social networks now used to abuse, monitor and control women

Various forms of technology are being used by abusive partners to monitor and control women, particularly younger women, such as their mobile phone calls and texts being monitored and social media and technology being used to stalk and control them.

Women’s Aid today reported it received 3,575 disclosures of abuse via the National Freephone Helpline and there have been 48,000 visits to its website – a 52pc increase.

“Leaving a relationship does not always end abuse,” Women’s Aid director Margaret Martin explained.

“Almost a fifth of women continued to be abused, stalked and harassed by former partners. These women disclosed how they are bombarded with texts and calls often telling them, in explicit detail, how they will be attacked or even killed. Some women disclosed that their current or ex-boyfriends were stalking them on social networking sites.”

The Women’s Aid Helpline responded to 10,055 calls in 2010. There were 430 one-to-one support visits and 164 court accompaniments. There were 8,351 incidents of emotional abuse disclosed and 3,031 incidents of physical abuse.

The figures for 2010 indicate that 57pc of calls were by first-time users of the service.

Technology used as a form of emotional abuse

Forms of emotional abuse included women being stalked and constantly monitored both while in the relationship and after they leave; women being harassed continuously by phone, text messages and through social networks; women’s access to internet either curtailed or monitored; women threatened with weapons, threats by the abuser to kill the woman, the children or other family members; women threatened that their children will be abducted and taken overseas and women’s and children’s pets being intentionally harmed in front of them.

“There is a common misconception that violence and abuse only occurs in older and more established relationships, where women are married or living with, and/or have children with their abusive partner,” said Martin.

“Our experience and national and international research shows that young women are also at risk of violence and abuse from their boyfriends.

“In a national survey on domestic violence, almost 60pc of those who had experienced severe abuse in intimate relationships first experienced it when they were under the age of 25. More chilling data from resolved homicide cases show that of the 39 women aged between 18 and 25 years who were killed since 1996, 53pc were murdered by a boyfriend or former boyfriend.”

The figures reflect a recent statement from Keir Starmer, the DPP in the UK which said young women aged between 16 and 19 in the UK are at the highest risk of sexual assault, stalking and domestic abuse, creating a “risk of a whole new generation of domestic violence.”

Martin said one in five Irish women who have ever been in a relationship experience physical, emotional, financial or sexual abuse.

“In 2010, we responded to over 10,000 calls on our helpline. We heard from thousands of women living with abuse and fear. Fear of being choked or strangled, fear of the next beating or cutting remark that is designed to erode their confidence and put them down. Women being gagged to silence their screams. Women whose abusive partners repeatedly threaten to kill them, their children and themselves.

“Jeering the women and telling them not to bother telling anyone – that no one will believe them. All too often, these women feel completely isolated and alone, unaware that there is help available. We know that about one-third of women never tell anyone about the abuse they suffer. Instead, these women try to survive and protect themselves and their children on their own.”

John Kennedy

How to avoid falling for scams, phishing and bot masters

Denial of service attack illustration

One botnet can send up to 30 billion emails a day


We recently saw the destruction of a ‘botnet’, a collection of computers around the world that are, without the knowledge of their owners, dedicated to sending out spam messages – unsolicited offers for dodgy deals.

After it was taken down the volume of spam messages being sent each day dropped an enormous amount, according to security researchers.

We are going to investigate what a botnet is, why it’s important to keep your computer secure to avoid becoming part of one, and the link between botnets and organised crime.

Phishing and spam
It used to be the case that computer viruses were written by people with nothing more malicious on their minds than vandalism, at worst. But nowadays most viruses and other forms of malicious software are created by or for criminals who use them to extract or extort money from unsuspecting internet users.

One example most of us will have come across is the ‘phishing’ email, which arrives in a user’s inbox and suggests that their account at some bank or other, or Ebay or Paypal, has been breached, or is up for renewal or otherwise needs to be validated. By clicking on the link in the email, the user is taken to the criminal’s own website instead of the genuine login page.

The user then enters their username and password and this is then used by the criminal to break into the user’s account either to directly steal money, or for other uses – if it’s an Ebay account, it may be used to set up fake auctions or to place fake bids on the criminal seller’s own auctions, for instance. Similarly, conventional spam emails usually offer dubious health treatments, super-cheap watches and get-rich quick schemes.

What these have in common is that both sets of emails are being distributed by botnets, collections of computers (known as ‘bots’, short for robots) under the control of a criminal.

The old way to send spam
Before the days of botnets, spammers would send email from their own computers, or using services that would send out millions of emails at a time for them. But anti-spam techniques improved and could detect and filter all the emails coming from a single PC.

Spam and phishing are volume businesses – they depend on sending out millions (or even billions) of messages in the hope that a tiny percentage of recipients will click on them. If you are sending enough emails, even that tiny percentage is worth big money.

What spammers needed was a way to distribute very large numbers of emails that were impossible to trace to a single source. The solution was provided by unscrupulous programmers, hired by organised criminals to create viruses.

Instead of creating a virus that steals information, the new type of virus installs a piece of code that instructs an infected computer to churn out thousands of emails. Because the computers are distributed across the world, the resulting emails are harder to identify as a single spam attack.

How does it work?
To begin with, the operator (the ‘bot master’ or ‘herder’) will send out emails containing viruses to a large group of people – this itself may be done by a botnet.

Users who open the email attachments and run them will have their computers taken over, but there may not be any signs that this has happened.

Unlike with other malicious software, there may be no reason to think that your computer is being used for malicious acts, other than a slowing down of internet speed, or general computer speed. However, both of those are common even on uninfected computers so it’s not easy to judge.

Once the computer is infected with the ‘bot’, it will connect to the bot master’s computer somewhere on the internet. When a spammer or criminal wants to use the botnet they will pay to hire it for a set period.

For as long as the spammer continues to pay, the botmaster will instruct all the computers in the botnet to continue sending out spam. The authorities are on the case, as are technology and security companies.

Microsoft-coordinated raids by US Marshals in March saw the end of the Rustock botnet, which controlled up to two million computers and was sending up to 30 billion emails a day. At its most potent in 2010 it was responsible for nearly two thirds of all spam sent.

Our verdict
The way to stay safe online is the same as ever: first, treat email attachments with suspicion, even if they appear to come from friends, and don’t click on links in email unless you know for sure that they are legitimate.

Ensure your security or anti-virus program is up-to-date, working properly and running regular scans.

Use the latest release version of your web browser and make sure Windows (or whatever operating system you are using) has all the latest updates installed.


Read more: http://www.computeractive.co.uk/ca/news/2041872/avoid-falling-scams-phishing-bot-masters#ixzz1O0qugCxW
Software, gadgets, magazines and more in our webstore. Click here to see our latest offers.

Contact me at : contactme.bijay@gmail.com




Twitter Plans To Launch Photo-Sharing Service [REPORT]

The rumor mill has been churning Monday afternoon with reports that Twitter is working on its own photo-sharing service that would compete with the likes of Twitpic and Yfrog.

TechCrunch first reported the tip, citing multiple unnamed sources, Monday afternoon. And now All Things D seems to have confirmed the story as well, going so far as to say the service will be announced this week. ATD‘s story also cites unnamed sources, but claims the announcement will be made at its own conference, D9, this week in Rancho Palos Verdes, California.

It wouldn’t come as too huge of a surprise if these reports turn out to be true. After Twitter asked developers tostop building third-party clients, the company announced its acquisition of TweetDeck. Although it took months for those rumors to finally be confirmed too, so we may be hearing this rumors for some time before Twitter makes any official announcement.

We’ve reached out to Twitter for a comment and will update this post when we learn more. UPDATE: Twitter’s spokespeople have responded, and they’re not commenting on the report. 

News by : Emily Banks

Posted on Computer Addicted by : Bijay Acharya

Contact me at : contactme.bijay@gmail.com




Code in the Cloud: Programming Google AppEngine

Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being built as multi-user services that run in data centers around the world.

Code in the Cloud: Programming Google AppEngine will teach you what you need to make the shift to cloud development using Google’s AppEngine—a powerful, easy-to-use framework for developing cloud-based services.

The cloud is a platform for creating services, a new kind of application that can reach more users and provide those users with more capabilities than a desktop application ever could.

Building applications as cloud services makes them scalable: cloud applications can easily and smoothly adapt from running on a single computer for a single user to running on thousands of computers for millions of users.

This book will teach you what a cloud service is, and how it differs from traditional applications. It shows you how to build a cloud service by taking advantage of the services that AppEngine makes available to you, and by using iterative development of a simple application to guide you through the different aspects of AppEngine development, using either Python or Java.

Through the process of working on a simple application, you’ll learn about how to build an application as a service; how to manage persistent data using AppEngine; how to build dynamic, interactive user interfaces that run in a user’s web-browser; how to manage security in a web application; and how to interact with other services running in the AppEngine cloud.

Contact me at : contactme.bijay@gmail.com




Internet, HBO Gets Social With HBO Connect

Premium cable network HBO soft-launched HBO Connect on Tuesday, a new “second screen” experience that aims to augment the social experience surrounding shows like True Blood, Game of Thrones and Entourage. The site is accessible now, but will launch more features in June as the summer season gets underway.

Sabrina Caluori, the director of marketing and social media at HBO, gave Mashable Connect attendees a sneak-peek at HBO Connectearlier this month. Along with the multi-platform HBO Go offering, HBO Connect helps flesh out the cable network’s digital plans.

HBO has dabbled with social initiatives and outreach campaigns in the past — including promotions withcheckin service GetGlue. But HBO Connect is the best showing from the network to date, in terms of aggregating content and social options for users all in one place.

The site is dedicated into five key sections:

  • Pulse
  • Feeds
  • Conversations
  • Visualizers
  • Connections

Pulse, Feeds and Visualizers





The HBO Connect homepage is the “Pulse” of the site. This page acts as a real-time hub for what HBO-related content is being shared and clicked on across the web.

The Feeds section is a customized Twitter listing from various programs, allowing users to browse streams, filter based on keywords, trending topics or related services and filter through specific users lists.

The Feeds page also provides users with quick access to GetGlue checkins, official Facebook and Twitter status updates, and videos from the YouTube channel. Users that are logged in to HBO Connect via Twitter (Facebook is another login option) can create their own tweets, retweet the tweets of others or send replies, all from the website.

Visualizers are interactive, dynamic visualizations of trending topics, keywords and hashtags. These topics can be moved around the screen. Users can hover over Twitter avatars to see their tweets on those topics.

For True Blood believers, HBO is doing a special microsite TBwithdrawal.com, which displays tweets with hashtags such as #tbwithdrawal and #waitingsucks in real-time.

Conversations and Connections





The “Conversations” section has the potential to be the most interesting element of the site. These conversations will allow fans to interact with the people who work on the HBO shows themselves — both actors and creative talent — in live Q&A sessions and live Twitter commentaries.

HBO already has a bunch of conversations planned for the summer, including chats with Wendell Pierce fromTreme, Thomas Jane from Hung, Janina Gavankar from True Blood and writers Jane Espenson (Game of Thrones) and documentarian Alexandra Pelosi.

What’s most compelling about these live commentaries and Q&A sessions is that they will be timed alongside replays of popular programming and archived for re-watching. In other words, users that want to catch up on a Twitter commentary with a costume designer or writer from their favorite show can do that alongside a rerun, instead of having to interrupt the flow of the show the first time it debuts.

At Mashable Connect, Sabrina Caluori explained that the inspiration for the Twitter commentaries came from Howard Stern. The self-proclaimed “king of all media” decided to live tweet a commentary of the movie, Private Parts as it aired on HBO one Saturday afternoon, a concept the folks at HBO thought was a great idea.

The “Connections” component of HBO Connect is a quick offering of the various ways users can interact and connect with various programs, movies and series on HBO. This includes fast links to blogs, Facebook and Twitter pages, GetGlue checkins, YouTube pages and more.

Desktop to Start, Other Platforms in the Future





Right now, HBO Connect is a desktop-only experience. Caluori told us that the goal was to launch the desktop version first, see what fans like, and then look at bringing the most popular and effective features to other platforms.

Still, we can’t help but notice that the site — built by RED Interactive Agency — is perfectly aligned with the greater HBO.com and HBO Go brands. The colors, iconography and user experience is consistent across all the HBO properties, which makes us hopeful that this experience will come to the iPad and other platforms sooner rather than later.

It isn’t clear at this point if HBO is going allow the HBO Connect experience to sit atop HBO Go or if the two sites will remain separate experiences. We would like the have the option — at some point — to use the two in the same frame. Now that most HBO subscribers have access to so much content through the web browser, being able to turn on the social layer at will could be a real defining feature.

HBO hopes that programs like HBO Connect will keep viewers engaged even when their favorite shows aren’t on the air. We think it’s a good start.

HBO Connect is still in beta and we expect the service and features to evolve and improve over time. Still, we have to say we’re impressed with the hard work the network has put into the app. The social experience and network connections feel natural. It’s a nice way to approach social without potentially irritating your viewers — viewers that in HBO’s case, pay a monthly subscription fee for the service.

Contact me at : contactme.bijay@gmail.com