computer addiction

Is the Internet Replacing Your Memory?

Posted on


Woman on laptop

– Google, Facebook, Internet Movie Database, and many other sources of information on the Internet are changing the way in which we remember.

Whether it’s an actor’s name that is on the tip of your tongue, or even a loved one’s birthday, all you have to do is type in some key words and you often can have your answer.

As a result of this instant access, growing numbers of us may actually be outsourcing our memories. It’s called the “Google effect,” and it is documented online in the journal Science.

“Google is just another form of external memory,” says Betsy Sparrow, PhD, an assistant professor in the department of psychology at Columbia University in New York City.

Most of us have some go-to experts for this topic or that. For example, you may go to your husband if you need information on sports, a co-worker for cooking advice, and a best friend to remind you of upcoming birthdays or college memories.

These people serve as our external memory for choice topics, she says. Search engines, however, are akin to having a really well-rounded phone-a-friend if you were a contestant on the game show Who Wants to be a Millionaire.

“The Internet is much more ubiquitous,” she says. “You can find anything at any time very quickly with a lot less effort,” Sparrow says.

As a result, “we do have a little bit of a dependence on it, and we expect to get information when we want to know it,” she says.

Internet’s Impact on Ability to Recall Facts

Sparrow and colleagues conducted four experiments to see how our reliance on search engines or smart phones affects our ability to recall. In one of the experiments, students typed in answers to trivia questions. Some thought their work would be saved while others thought it would be deleted. Participants who thought their information would be erased remembered more than those who thought they could just hit “save.”

During another experiment, volunteers were told that all of the information they typed into the computer could be saved, and they were given generic file names such as facts and data. They were then asked to write down on a sheet of paper as many of the answers as they could remember and in which folders the information was stored. Participants were more likely to remember where the information was stored than the actual information.

“I was surprised by the magnitude of the difference between prioritizing where to find things over the things themselves,” Sparrow says. This epitomizes the so-called Google effect because we now tend to remember where things are and how to find them as opposed to the actual information.

This shift away from memorizing may ultimately help people improve their comprehension and become better learners, she says.

“Memory is so much more than memorization,” she says. The Google effect may allow us to free up more space on our internal hard drives and focus on processing as opposed to memorizing.

Neuropsychologist Mark Mapstone, PhD, University of Rochester Medical Center in Rochester, N.Y., isn’t sure the Google effect is such a good thing for our memories.

“This is not as good for us from a brain perspective,” he says. “If you download your information to a device, you are not using your brain to make connections as you should be.”

That said, “When you don’t burden your memory with rote remembering, it does free up activity for more complex thinking,” he says.

SRC

Facebook song: ‘I delete them, but they add me again’

Posted on


(Credit: Video screenshot by Boonsri Dickinson/CNET)

One Facebook user is expressing her annoyance with the social network–not through a Facebook status update, but by posting a parody song on YouTube.

One of the points Australian singer Madelaine Zammit stresses in the song is the randomness of friendship requests, singing about a 40-year-old man trying to add her as a friend. Zammit, a high school student, sang her song live during an Australian morning show and it took off from there. “I thought only my friends would watch it and like we’d have a laugh about it. Then it got to be over 300,000 hits. I didn’t think it would,” she told the morning show.

Zammit’s second video on YouTube (watch it below) is much better than her first (not even sure what she’s saying in this one). Does she want to be a singer in the future? “I can’t imagine doing anything else because, like, schoolwork, I don’t find very interesting. Music would be heaps good to do in the future,” she told the morning show hosts.

Her rapid-fire lyrics perhaps reflect the frenzied nature of checking updates, poking crushes, and liking the latest cat video. “I get distracted then go scrolling up and down the feed/Then notice all the people that I really wished I didn’t have to meet/I don’t like skinny guys with little muscle who think they’re strong.”

Zammit set out to write a funny song and decided to write about Facebook, in part because she knew a lot of people would relate. Hers is not the first tune about Facebook, however. Lynnea Malley sings about her digital stalker tendencies. And Kate Miller-Heidke sings about a former lover: “You wanna be my friend on Facebook? Are you f*cking kidding?”

FOR MORE COOL NEWS, PLEASE

FOLLOW “COMPUTER ADDICTED” PAGE IN FACEBOOK:CLICK HERE

i am a beggar hood_photoshoot_deadbj_BIJAY ACHARYA movie review

Posted on


 “I AM A BEGGAR_HOOD”
Nepali Documentary movie by “bijay acharya”[DEADBJ]
aimed to be released on 2013-2014 A.D.

5-8 PEOPLE NEEDED FOR PLAYING SERIOUS and MOST IMPORTANT ROLE. aNYONE INTERESTED ? LET US KNOW HERE IN THIS PAGE
http://www.facebook.com/pages/I-Am-a-Beggar-Hood/213491665353341

Goal of movie : To give Catchy Dailouges,Scenes, and FX effects in Nepali Cinematic Field.
Director : Bijay Acharya [deadbj]
Film Length : About 30-35 Minutes

Anonymous Declares War On The City Of Orlando

Posted on


The hacktivist group Anonymous may be setting its sights on the city of Orlando, Florida next, if an anonymous press release which has landed in our inbox is to be believed (see bellow). The group is threatening to take down a different city-related website every day, starting with Orlando Florida Guide, which doesn’t even appear to be owned by the city of Orlando (it isregistered to an organization called Utopia, administered by a man named Steven Ridenour). So any random website extolling the virtues of Orlando could be targeted.

The DDOS attacks are justified in the press release as retaliation for the repeated arrests of members of a non-profit group called Food Not Bombs, which feeds homeless people in a park without a permit. The leader of the group, Keith McHenry, was also recently arrested.

“This is a declaration of war,” writes Anonymous in its press release describing “Operation Orlando.” It warns the entire city that “Anonymous will now begin a massive campaign against you and your city web assets. Everyday we will launch a new DDoS attack on a different Target.” Its first target will be Orlando Florida Guide, which it threatens to take down between 10 AM and 6 PM tomorrow. No reason is given as to what the site or its owner did to incur the wrath of Anonymous, other than its local boosterism. It’s not even the City of Orlando‘s official website.

Commander X@OpOrlando2011
Commander X

We have a Target, there will be an assault and take down at 10:00 AM ET tomorrow. Media should watch for a Press Release tonight. #OpOrlando

Anonymous Press Release – Operation Orlando

June 27, 2011

The City of Orlando has ignored our warnings, and our generous offer of a cease fire. On Wednesday last you not only arrested two more people for feeding but you arrested the worldwide President of Food Not Bombs Keith Mchenry. This is a declaration of war.

Henceforth there will be no more cease fires, no more attempts to get you to resolve this issue with human decency. We will now treat you like the human rights abusers that you are.

Anonymous will now begin a massive campaign against you and your city web assets. Everyday we will launch a new DDoS attack on a different Target. We will continue to E-Mail millions of people in 50 countries with the Boycott Orlando campiagn [sic] message.

In our experience a government that acts this way is also corrupt. We therefore call on any government or police employee who has evidence of any kind of wrongdoing to consider disclosing it to http://www.LocalLeaks.tk an organization that specializes in dealing with local disclosures.

We have said what we have to say. The media has many press releases and communiques from us. From now on we will DO not talk. Journalists should follow the Twitter for that days targeted take down or other un-planned assaults.

Tomorrow morning at exactly 10:00 AM ET Anonymous will remove from the world wide web http://www.orlandofloridaguide.com and it shall remain down until 6:00 PM ET. We will also E-Mail Bomb and Black Fax the owners of this site, identified as one Utopia, Inc.

We Are Anonymous – We Are Everywhere – We Are Legion – We Never Forget – We Never Forgive

FREE Keith McHenry

EXPECT US — Anonymous

FOLLOW “COMPUTER ADDICTED” PAGE IN FACEBOOK:CLICK HERE

Now You Can Reach Out & Smack Someone On Facebook [VIDEO]

Posted on


Getting frustrated with your Facebook pals? Now you can take it out on their profile pics with RageGage Connect, a goofy Facebook-aware USB gadget that you pound with your fist. Then you can post the grisly results.

As you bang on the padded and unbreakable RageGage on your desk, you’ll hear convincing sound effects and see a cartoon fist punching out your friend on-screen.

Open up your virtual can of whoop-ass on that unfortunate victim, and the Facebook picture gets more and more shattered as you continue your ersatz assault. When you figure the poor soul has had enough, you’re free to further humiliate, sharing those battle pics with all those who might be interested.

I have a RageGage here, and after a quick download of the RageGage Connect software, I was ready to begin the beating. Although I’m not at all frustrated with my colleagues and exude nothing but peace and love, I tried it on my esteemed Mashable friend Brian Anthony Hernandez (with his permission), and look what happened to the poor guy:

 

 

 

Ouch. Although it looks more like you’re breaking the screen than your friend’s face, you get the idea.

Besides being repelled by the sheer violence, I wish the RageGage Connect applet was more tightly integrated with Facebook — as it stands, you do all your pic-picking using the separate applet that asks for permission to access your Facebook data, a worrisome prospect for some users.

RageGage inventor Ian Campbell says he got tired of that “like” button on Facebook and needed the exact opposite: “I wanted a ‘Smack’ button, but what we’ve put into RageGage Connect is even better … and much more gratifying!”

There’s an additional use for the device: you can just bang on it and register your rage level on Facebook, warning others to steer clear until your rampage subsides. And you don’t have to be connected, either. As you can see in the video below, the $20 RageGage works well on its own, taunting you with an annoying voice as you pound on it. Much like a “test your strength” hammer you’d see at a carnival, it registers your force with a group of blinking LEDs.

MORE

 

Hackers break into Tony Blair’s webmail server, disclose former PM’s address book

Posted on


Tony Blair

A hacking group known as TeaMp0isoN have published private information belonging to former Prime Minister Tony Blair.

TeaMp0isoN have been in the news recently for allegedly hacking into a web site they claimed belonged to a member of LulzSec.

This time they targeted a webmail server used by Tony Blair in December of 2010. It is unclear why they waited for so long to disclose the breach and there is no evidence as of yet to confirm their story.

The information disclosed includes “Tony Blair Office Members Information, Tony Blair Address & Phone Book (Includes family, friends, MPs & lords) and Katie Kay Curriculum vitae (Tony Blairs special adviser).”

Screen capture of stolen Blair address book

Information on Mr. Blair’s friends and colleagues includes names, home addresses, home, work and cell phone numbers and email addresses. Additionally Mr. Blair’s National Insurance Number (NIN) and Ms. Kay’s CV (resume) are also included in the dump.

We don’t know what specific flaws were exploited in this attack, but seeing that it is a webmail server the most likely method was SQL injection. It is extremely important to keep web servers patched and up to date, especially if they are running Linux using commonly exploited CMSs, webmail solutions and blogging software.

TeaMp0isoN logo

This attack like many we have reported on this year appears to be politically motivated. The TeaMp0isoN attackers called Mr. Blair a war criminal in a Twitter post and much of the language used is derogatory.

LulzSec hacks Arizona police over immigration issues

Posted on


Creative Commons photo courtesy of beej55

The latest in a string of attacks by a hacker group known as Lulz Security (LulzSec) targeted the Arizona police today. The hackers exposed user names and personal information of law enforcement officers as well as sensitive documents housed on their servers.

While rumors surfaced about a supposed kingpin of LulzSec being arrested by New Scotland Yard this week, their intimidation tactics continue, and we have no idea who the next target will be.

As usual many of the dumped passwords were easy to guess or crack, showing that too many people believe it can’t happen to them. It is increasingly apparent that using software and encryption to create and protect unique passwords for every website is necessary.

That LulzSec exposed these passwords suggests they were either unencrypted, or used an insecure hashing algorithm. This is bad in and of itself, but far worse if the victims used the same passwords elsewhere.

While many of us are frustrated with the current state of corporate security and would like to affect change in a meaningful way, we control our own destiny. Most of us reside within nations that have democratic governments and can participate in shaping our futures through legal means.

In my view, the hacker ethic is to empower people with understanding and to use our collective intelligence to advance our ideas. Destroying privacy by exposing the information of innocent victims doesn’t advance anything.

The Social Network writer Aaron Sorkin quits Facebook

Posted on


Aaron Sorkin, the writer of The Social Network, the Oscar-winning film about Facebook, has left the social-networking site.

The 50-year-old revealed he had left Facebook during a discussion at the Cannes Lions International Festival of Creativity this week.

The Social Network writer Aaron Sorkin has left Facebook The Social Network writer Aaron Sorkin has left Facebook (Pic: Getty)

Sorkin said he had joined the site during the making of The Social Network but had since quit his account.

The West Wing writer won an Oscar for his screenplay of David Fincher’s film but during a discussion with The Wire’s producer and writer David Simon at Cannes, Sorkin said he had a problem with some aspects of social media, including the way people absorb news through Twitter.

‘I have a lot of opinions on social media that make me sound like a grumpy old man sitting on the porch yelling at kids,’ he admitted.

Sorkin isn’t the first person associated with The Social Network to quit the popular site. Jesse Eisenberg, who played Facebook’s founder Mark Zuckerberg in the film, joined under a fake name during the film’s production but left soon after.

‘I joined under a fake name and was sent a message from Facebook suggesting people I should befriend,’ the actor said.

‘One of them was a girl my sister was friends with in high school. I don’t know how they found her, no idea. I signed off right then.’

The Social Network won three Oscars for Best Adapted Screenplay, Best Original Score, and Best Film Editing at the 83rd Academy Awards in February.

Read more: http://www.metro.co.uk/film/867250-the-social-network-writer-aaron-sorkin-quits-facebook#ixzz1QD5KVOSe

Beware shortcuts for getting more followers on Twitter

Posted on Updated on


There are various different ways of getting more followers on Twitter.

The easiest method is to be a celebrity. It doesn’t matter if you tweet anything interesting, you’ll probably find a fair number of people will follow you regardless.

Alternatively, you could try to tweet something that people find useful or amusing or informative on a regular basis. If you put in the hours, write great tweets and be yourself then you may find others are happy to follow you and engage with you online.

But if both of those options sound far too tricky, you might be tempted to try the Twitter equivalent to a “get rich quick” scheme in your hunt for more followers.

Take these messages which are currently appearing on Twitter, for instance:

Get more followers tweets

GET MORE FOLLOWERS MY BEST FRIENDS? I WILL FOLLOW YOU BACK IF YOU FOLLOW ME - [LINK]

If you are tempted to click on the link, you will be taken to a webpage which offers you a service that promises hundreds or thousands of new followers. Many different websites exist like this, here’s just two of the sites we have seen being used in the current campaign.

Get more followers webpages

Although the graphics differ, the basic template of the site remains the same – including options to either pay for a VIP plan or try out a free service that promises hundreds of new followers.

I must admit I smelt a rat, and so I created a brand new Twitter account to see what would happen if I tried out the “free trial”.

Get more followers username and password request

Hello hello.. what’s this? The pages ask you to enter your Twitter username and password. That should instantly have you running for the hills – why should a third-party webpage require your Twitter credentials? What are the owners of these webpages planning to do with your username and password? Can they be trusted?

In the bottom right hand corner, they admit that they are not endorsed or affiliated with Twitter.

Now obviously I wasn’t going to handle over the password for my @gcluleyTwitter account, so I entered the login details for the test account I had just created instead.

Before I knew it, I was presented with a familiar Twitter dialog box asking me if I really wanted to grant an application access to my Twitter account.

Get more followers authorise app

Common sense would hopefully tell you to step back at this point, and not allow the app’s authorisation. But if you’re hungry for new followers maybe you would continue, oblivious to the risks.

But sadly, some people are too keen for new followers. And they pay the price in the form of a message promoting the followers service is posted to their feed. In this way, the links can spread rapidly between Twitter users.

Get more followers tweets

What surprised me the most however is that I started to get many more followers on my test Twitter account. Other, seemingly random, Twitter user began to follow my test account in huge swathes and my account began to follow seemingly random people in return.

Although this may seem like a good thing, it isn’t. After all, the rogue app has now made your account follow scores of seemingly random Twitter users – if you have no interest in what they have to say, you’re going to find that pretty irritating.

Blue birdFurthermore, if you’re just playing a numbers game on Twitter you’re fooling no-one but yourself. It doesn’t actually matter how many people in total follow you on Twitter – what’s much more important is how many people arelistening to what you’re saying on Twitter.

It’s no good, for instance, if you have five million Twitter followers but there aren’t actual people sitting behind them, reading what you have to say.

In other words, these “get more followers fast” apps are a waste of time. You’re not interested in what random people are saying on Twitter, so why should random people care about what you have to say?

Furthermore, whose to say that some of these new people who you are following are not cybercriminals, planning to tweet out malicious links or spam messages in your direction?

So, what should you do?

Well, if you fell for the trap and granted the rogue application access to your Twitter account, revoke its rights immediately by going to the Twitter website and visiting Settings/Applications and revoking the offending app’s rights.

Revoke Twitter application

But don’t forget that you entered your username and password on the third-party website too! That means you should consider your password to now be compromised, and you should change it as soon as possible.

Remember – the fact that you gave them your username and password means they could in theory log into your account and read any of the information you store up there – including your email address and your private direct messages.

If you take no action against attacks like this, don’t be surprised if the unknown parties who now have control over your Twitter account use it to commit crimes or cause a nuisance.SRC

China building GFW-free cloud computing zone for tech companies and startup

Posted on


Local Chinese press Southern Weekend reports that China is building a ‘cloud computing’ Special Administrative Region (SAR), a special hi-tech industrial zone for tech companies and startups to have complete, uncensored access to the Internet.

The Cloud SAR is a RMB 1 billion ($US 154m) project being built in Chongqing, south-western China. Perhaps the most noteworthy feature of this industrial zone is that it will be free from China’s infamous Internet-filtering system so as to enable tech companies to be on par with the developments around the world in cloud computing. It will be using an Internet connection that is isolated from the mainland network so no data would have to go through the Great Firewall of China.

Sounds too good to be true, right? Because it is. And it doesn’t come without a big “but”. According to the report, this place will strictly be exclusive to foreigners and no local Chinese enterprises will be allowed. In fact, Chinese citizens are not allowed to enter the area, and the working employees will have to pass through strict security checks before entering their workplace.

Cloud computing is becoming popular around the world, with US and European companies locating servers in Japan, Singapore, Hong Kong and India to reduce costs. China, although popular for its cheap labor, couldn’t take advantage of the cloud computing business due to the restrictions on Internet access.

The Chinese Government has approved a Special Administrative Region in order to build an international data center hub. Foreign investors can carry out offshore operations in the SAR with unrestricted Internet access and unlike in other parts of China can hold 100% of the company’s shares.