Direkt zum Hauptbereich

Posts

Es werden Posts vom Januar, 2016 angezeigt.

How to build a little #spambot in #R

A very short R-script to build a spam bot: library ( twitteR )   ckey <- "1234mykey" csecret <- "1234mysecret" atoken <- "45678mytoken" asecret <- "56789othersecret"   setup_twitter_oauth ( ckey , csecret , atoken , asecret )   LISTTopic <- twListToDF ( searchTwitter ( '#BigData' , n= 10 ) ) View ( LISTTopic ) LISTNames <- unique ( LISTTopic$screenName ) text.examples <- c ( "I am a bot, but I appreciate your work!" , "Data is the new bacon!" , "There are only 10 kinds of people: Those understanding binary code and others." , "Data is like people – interrogate it hard enough and it will tell you what you want to hear." , "Data that is loved tends to survive." ) for ( i in 1 : length ( LISTNames ) ) { message.text <- paste0 ( "Hi @" , LISTNames [ i ] , &q

Die Datafizierung des öffenlichen Raums

#360° Kameras werden unser Leben veränder Ein Trend auf der diesjährigen Consumer Electronics Show (CES) in Las Vegas sind 360°-Kameras. Firmen wie Nikon, Ricoh und 360fly stellen Kameras für den Konsumentenbereich vor, die mit Hilfe extrem gekrümmter Linsen in alle Richtungen gleichzeitig filmen. Gopro zeigt eine Kombination aus 6 Kameras. Nikon KEYMISSION 360 360°-Kameras mit ihrem Rundumblick verändern die Art, wie Filme aufgenommen werden. Es wird nicht mehr ein Objektiv gezielt auf einen Ausschnitt gerichtet, sondern die Kameras laden dazu ein, einfach alles auf einmal aufzuzeichnen, so dass der Nutzer später individuell entscheiden kann, welchen Ausschnitt er betrachten will. 360fly (links BRG-Helmmodul) Selbstverständlich landet das Filmmaterial nicht in einer privaten Videosammlung, sondern wird gleich in den Sozialen Netzwerken geteilt. Youtube und Facebook bieten bereits einen eigenen Kanal für 360°-Videos an. Wenn sich diese Artikel als Massenware

@ctmagazin reveals spooky IP-camera hack

Thousands of home surveillance cameras are open to everyone and their owners do not know!                                                                            Germany’s biggest discounter has sold thousands of home surveillance cameras you can control over the internet. It is a nice gadget: When you are away, you can lock in to your camera and see what is going on at home. It has even a microphone and infrared sight. The bad news: When connected to the net, the camera opens automatically port 80 in your network. This means everyone who knows your private IP can connect to the camera. There you will find a user interface with a login. Next bad news: In the standard configuration you can login with username “admin” and without (!!!) password. Once you are logged in, you can see what the camera sees, turn the camera to different directions, take pictures and hear what the camera hears. c’t says, the camera even reveals your WLAN-password. How dangerous is this? Well, let’

News from the #cyberwar in #Ukraine

#Blackout, #Bots and #Trolls On December, 23th, 2015, parts of the electricity infrastructure in Ukraine were attacked by hackers. The result was a blackout for approx. 700K people. According to @wired and @ZEIT , the hack was launched with a malware called blackenergy. This is a framework that can be equipped with different exploits. In the attack a „killdisc“ feature was used that destroys the boot sector on a hard disk and thereby makes the computer useless. In addition, wired reports that there had been a denial of service attack on the telephone hotlines of the energy companies: Many people called the hotlines and made wrong statements about the location of blackouts so that the companies could not know what was really going on. This case reminds of a cyberattack in the Russian-Georgian war in 2008 when the energy infrastructure in Georgia was taken down: The target is similar, the exploit seems to be an update and at least for the telephone denial of service attack, m