summaryrefslogtreecommitdiff
path: root/old/published/Webmonkey/Monkey_Bites/2007/02.26.07/Mon/reboot.txt
blob: 7e9695e462bb55a714c9d3870763a5669662ea8a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
<img alt="Any_key_3" title="Any_key_3" src="http://blog.wired.com/photos/uncategorized/any_key_2.jpg" border="0" style="float: right; margin: 0px 0px 5px 5px;" />The Morning Reboot:


*	The BitTorrent movie/TV download store [launches today][1]. BitTorrent has opted for a rental scheme with prices ranging from $3 to $4 with a 24 hour viewing period. Are Mike and I the only ones who think download rentals are going to absolutely bomb? BitTorrent claims that it has decided not to sell films for now because the prices demanded by the studios were too high.

[1]: http://hosted.ap.org/dynamic/stories/D/DOWNLOADING_MOVIES?SITE=WIRE&SECTION=HOME&TEMPLATE=DEFAULT "BitTorrent to Launch Movie, TV Downloads"

*	According to a new survey conducted by the Pew Internet Project [one-third of Americans have tried wireless internet][2]. That's it?

[2]: http://today.reuters.com/news/articlenews.aspx?type=internetNews&storyid=2007-02-25T212605Z_01_N25183464_RTRUKOC_0_US-WIRELESS-INTERNET.xml&src=rss "A third of U.S. surfers tried wireless"

*	The New York Times [reports][3] that Google is in talks with a number of companies, including our own corporate overlords, Conde Nast, to syndicate video content on websites. The videos would appear inside Google ad boxes and advertisements will run during or after the content.

[3]: http://www.nytimes.com/2007/02/26/technology/26google.html?ex=1330146000&en=5ac917a42d06e4cc&ei=5088&partner=rssnyt&emc=rss "Google in Content Deal With Media Companies"

*	Version number three of the Creative Commons licensing scheme [has arrived][4]. The new licenses main serve to clear up differences between U.S and international versions.

[4]: http://creativecommons.org/weblog/entry/7249 "Creative Commons:  Version 3.0 Launched"

*	Tor, the anonymous internet service, may be vulnerable to attack. Via [Slashdot][5]: "A group of researchers have written a paper that lays out an [attack against Tor][6] (PDF) ... The essential avenue of attack is that Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network."

[5]: http://yro.slashdot.org/yro/07/02/25/1913219.shtml "Tor Open To Attack"
[6]: http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf "Tor attack PDF"