<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:georss='http://www.georss.org/georss'><id>tag:blogger.com,1999:blog-13763634</id><updated>2009-04-26T00:51:41.909-04:00</updated><title type='text'>Blog of UberDragon - Web Development Geek</title><subtitle type='html'>From the creator of UberDragon Networks and currently working as a Web Division Manager, this blog journals his personal &amp;amp; professional life; online, at work, at home, &amp;amp; everywhere in between.</subtitle><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/index.php'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default?start-index=26&amp;max-results=25'/><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.uberdragon.net/atom.xml'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>60</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-13763634.post-3828100285571900901</id><published>2009-04-20T01:23:00.002-04:00</published><updated>2009-04-20T01:26:12.404-04:00</updated><title type='text'>Not-So-Secret Holiday Hints at Change for Marijuana Advocates</title><summary type='text'>Happy 4/20 everyone! Today a reprint from the New York times article By JESSE McKINLEY  Published: April 19, 2009      &lt;!--NYT_INLINE_IMAGE_POSITION1 --&gt;            SAN FRANCISCO — On Monday, somewhere in New York City, 420 people will gather for High Times magazine’s annual beauty pageant, a secretly located and sold-out event that its sponsor says will “turn the Big Apple into the Baked Apple </summary><link rel='related' href='http://www.nytimes.com/2009/04/20/us/20marijuana.html' title='Not-So-Secret Holiday Hints at Change for Marijuana Advocates'/><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/3828100285571900901/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=3828100285571900901&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/3828100285571900901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/3828100285571900901'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2009/04/not-so-secret-holiday-hints-at-change.html' title='Not-So-Secret Holiday Hints at Change for Marijuana Advocates'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-938494443497970594</id><published>2009-04-11T10:28:00.002-04:00</published><updated>2009-04-11T11:10:48.093-04:00</updated><title type='text'>Diggbar - Are you for it?  Against it?  Or just don't care?</title><summary type='text'>A little over a week ago, digg.com introduced their new Diggbar url shortener service.  It was instantly a hit as the internet began instant adoption.  The ingenious functionality of simply putting digg.com/ before any URL was a huge hit and gauranteed easy adoption.  But within a couple of days their were rumors flying that the diggbar was stealing page rank, valuable SEO was being lost!  And </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/938494443497970594/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=938494443497970594&amp;isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/938494443497970594'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/938494443497970594'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2009/04/diggbar-are-you-for-it-against-it-or.html' title='Diggbar - Are you for it?  Against it?  Or just don&apos;t care?'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-8729776064240242051</id><published>2009-04-10T09:50:00.001-04:00</published><updated>2009-04-10T09:54:11.812-04:00</updated><title type='text'>My Letter to CT House Rep: Demetrios</title><summary type='text'>As we work toward marijuana reform around the country and especially here in Connecticut, I thought I'd share a letter I received and then replied to from CT House Rep Giannaros:Thanks Shane.The bill was voted successfully out of the Judiciary Committee.I am not sure when it will be debated. I am leaning in favor of itdepending on the specific language at the end.However, the Governor seems to be</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/8729776064240242051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=8729776064240242051&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/8729776064240242051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/8729776064240242051'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2009/04/my-letter-to-ct-house-rep-demetrios.html' title='My Letter to CT House Rep: Demetrios'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-7582182227939885620</id><published>2009-04-09T13:17:00.006-04:00</published><updated>2009-04-09T16:34:10.800-04:00</updated><title type='text'>UberDragon is back! - as a marijuana advocate???</title><summary type='text'>First, to any of you wondering what in the world happened to me..  I'm still here.  I lost my drive to blog regularly as life, family and work simply didn't allow much time for it.  To be honest, all of those things still stake claim to the majority of my time.I'm back because I need to be.  Recently I was asked by a prospective client if I could help them with their online strategy, specifically</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/7582182227939885620/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=7582182227939885620&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/7582182227939885620'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/7582182227939885620'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2009/04/uberdragon-is-back-as-marijuana.html' title='UberDragon is back! - as a marijuana advocate???'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-1462247707472131042</id><published>2007-02-17T19:01:00.000-05:00</published><updated>2007-02-17T19:02:23.445-05:00</updated><title type='text'>Microsoft Applies For Patent Telling You If A Website Is On A List Of Phishing Sites</title><summary type='text'>It seems that every few days when new patents are announced there are a few gems from Microsoft. Take, for example, Microsoft's latest patent application on Phishing Detection, Prevention, and Notification. If they truly came up with an innovative way to stop phishing attacks, that would be interesting. Instead, it appears that the patent is for looking at the URLs found in an email or visited by</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/1462247707472131042/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=1462247707472131042&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/1462247707472131042'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/1462247707472131042'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2007/02/microsoft-applies-for-patent-telling.html' title='Microsoft Applies For Patent Telling You If A Website Is On A List Of Phishing Sites'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-2452104226494532071</id><published>2007-02-16T07:52:00.001-05:00</published><updated>2007-02-16T07:52:41.154-05:00</updated><title type='text'>New Drive-By Attack Taking Over Home Routers</title><summary type='text'>Researchers at Symantec are warning users that if they haven't changed the default password on their home wireless router, they should finally just DO IT.  Symantec's Zulfikar Ramzan issued a warning Thursday that hackers are lacing phony Web sites with malicious code that actually will log into and mess with your home broadband router. He's coined a term for it: Drive-By Pharming.   "I believe </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/2452104226494532071/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=2452104226494532071&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/2452104226494532071'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/2452104226494532071'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2007/02/new-drive-by-attack-taking-over-home.html' title='New Drive-By Attack Taking Over Home Routers'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-116748714101882051</id><published>2006-12-30T08:58:00.000-05:00</published><updated>2007-02-15T20:27:31.656-05:00</updated><title type='text'>Computer Temp Betrays Annonymous Computers</title><summary type='text'>Wired is carrying a story about a method developed by security researchers to identify computers hiding behind anonymity services. From the article: 'His victim is the Onion Router, or "Tor" — a sophisticated privacy system that lets users surf the web anonymously. Tor encrypts a user's traffic, and bounces it through multiple servers, so the final destination doesn't know where it came from. </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/116748714101882051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=116748714101882051&amp;isPopup=true' title='16 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116748714101882051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116748714101882051'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/12/computer-temp-betrays-annonymous.html' title='Computer Temp Betrays Annonymous Computers'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>16</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-116650289508922890</id><published>2006-12-18T23:33:00.000-05:00</published><updated>2007-02-05T05:47:43.820-05:00</updated><title type='text'>Malicious Hackers Sleeping? Or Better At Hiding Their Tracks?</title><summary type='text'>No wonder various organized online crime gangs are recruiting young hackers to join their ranks.  It appears that they're in need of an injection of fresh creativity, according to at least one report. Apparently, there hasn't been much innovation in the malware space in the last few months, as malicious hackers have focused mainly on reusing old scamming code with a few tweaks, rather than coming</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/116650289508922890/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=116650289508922890&amp;isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116650289508922890'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116650289508922890'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/12/malicious-hackers-sleeping-or-better.html' title='Malicious Hackers Sleeping? Or Better At Hiding Their Tracks?'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-116558173169350809</id><published>2006-12-08T07:39:00.000-05:00</published><updated>2007-01-19T14:33:51.073-05:00</updated><title type='text'>Kids Have Discovered Music Swapping Via Mobile Phones</title><summary type='text'>Sometimes it just takes a little longer for the delusions of the entertainment industry to be proven incorrect. Three and a half years ago, just as the mobile music market was taking off thanks to ringtones, a few of us were suggesting it wouldn't last.  What makes mobile content any different than other content?  The economics of the content are the same, and it seemed like only a matter of time</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/116558173169350809/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=116558173169350809&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116558173169350809'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/116558173169350809'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/12/kids-have-discovered-music-swapping.html' title='Kids Have Discovered Music Swapping Via Mobile Phones'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115466129790110774</id><published>2006-08-03T23:12:00.000-04:00</published><updated>2006-08-03T23:14:58.036-04:00</updated><title type='text'>Now The Internet Makes You Neglect Family And Chores?</title><summary type='text'>Over the years, there have been plenty of (usually easily discredited) studies that claimed the internet was bad for you. Perhaps the most famous, was the Carnegie Mellon study done in 1998 that got the NY Times treatment, claiming that people online were lonely and depressed. Of course, it wasn't hard to pick apart the study's methodology (including the fact that they only interviewed people in </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115466129790110774/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115466129790110774&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115466129790110774'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115466129790110774'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/08/now-internet-makes-you-neglect-family.html' title='Now The Internet Makes You Neglect Family And Chores?'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115457633546702016</id><published>2006-08-02T23:37:00.000-04:00</published><updated>2006-08-02T23:38:55.480-04:00</updated><title type='text'>"MacBook" Hack Targets Airport Cards</title><summary type='text'>Washington Post computer security blogger Brian Krebs passes along a new vulnerability showcased at the annual Black Hat conference in Las Vegas. And it's present on MacsThe creators of the exploit, Jon Ellich and David Maynor, have basically discovered a way to get in through the back door of many computers that have wireless cards, because the drivers themselves are not secure. Oh, and they </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115457633546702016/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115457633546702016&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115457633546702016'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115457633546702016'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/08/macbook-hack-targets-airport-cards.html' title='&quot;MacBook&quot; Hack Targets Airport Cards'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115405614337945577</id><published>2006-07-27T23:08:00.000-04:00</published><updated>2006-08-16T23:35:09.636-04:00</updated><title type='text'>Google Puts Pressure on Made-for-AdSense Sites</title><summary type='text'>Have you heard of what's called "click arbitrage"?It works very simply: you buy lots of visitors by bidding the minimum amount per click on AdWords. The visitor ends up at a site that has been developed to display more expensive AdSense ads.So, you spend 10 cents on a click per visitor, and hope that visitor clicks on an ad that generates you more than the 10 cents in income.Google's coming down </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115405614337945577/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115405614337945577&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115405614337945577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115405614337945577'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/07/google-puts-pressure-on-made-for.html' title='Google Puts Pressure on Made-for-AdSense Sites'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115342173454720974</id><published>2006-07-20T14:54:00.000-04:00</published><updated>2006-08-15T12:59:36.430-04:00</updated><title type='text'>The MySpace SWF Hack</title><summary type='text'>This past weekend, popular social networking site MySpace suffered from a self-propagating virus in its personal profile system. By simply visiting an infected profile, you could have your own MySpace profile overwritten with code that would infect others.Like any high profile site that hosts user-generated content, MySpace must balance the sometimes conflicting requirements of freedom and </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115342173454720974/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115342173454720974&amp;isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115342173454720974'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115342173454720974'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/07/myspace-swf-hack.html' title='The MySpace SWF Hack'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115310551555889156</id><published>2006-07-16T23:04:00.000-04:00</published><updated>2006-08-17T00:53:05.323-04:00</updated><title type='text'>They Said "Get It On eBay", I Doubt This Is What They Meant</title><summary type='text'>The idea of using security exploits to make some cash certainly isn't anything new -- online extortion schemes have been fairly popular, even if script kiddies are killing the margins. But apparently discovering security vulnerabilities and selling them off to the highest bidder is a growth industry, according to one security firm, even being brazen enough to put them up on eBay. It's hardly </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115310551555889156/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115310551555889156&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115310551555889156'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115310551555889156'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/07/they-said-get-it-on-ebay-i-doubt-this.html' title='They Said &quot;Get It On eBay&quot;, I Doubt This Is What They Meant'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115261918446589689</id><published>2006-07-11T07:59:00.000-04:00</published><updated>2006-08-16T15:12:08.573-04:00</updated><title type='text'>Judge Explores Why Telco Mergers Were Allowed</title><summary type='text'>A few weeks ago we noted that famous anti-trust lawyer Gary Reback was pushing the courts to look into whether or not the big telcos broke the law in getting their various mergers approved. It appears those efforts have paid off. Federal District Judge Emmet Sullivan has now asked the Department of Justice for more info, noting that to his untrained eyes, the mergers definitely seem harmful to </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115261918446589689/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115261918446589689&amp;isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115261918446589689'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115261918446589689'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/07/judge-explores-why-telco-mergers-were.html' title='Judge Explores Why Telco Mergers Were Allowed'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115147132117388694</id><published>2006-06-28T01:05:00.000-04:00</published><updated>2006-08-17T04:05:30.763-04:00</updated><title type='text'>How Can The Same Senators Vote Against Net Neutrality, But For Broadcast Flag?</title><summary type='text'>Those who are against adding any language to the latest Telecom Act on net neutrality keep saying it's important not to regulate the industry -- because government involvement leads to inefficient results that could strangle the technology. That's a defensible position (though, there are reasonable responses to it). However, what makes no sense at all is for a Senator to declare that net </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115147132117388694/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115147132117388694&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115147132117388694'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115147132117388694'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/06/how-can-same-senators-vote-against-net.html' title='How Can The Same Senators Vote Against Net Neutrality, But For Broadcast Flag?'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115046053748101895</id><published>2006-06-16T08:21:00.000-04:00</published><updated>2006-06-16T08:22:17.503-04:00</updated><title type='text'>People Like Their iPods On The Toilet (But Not In The Toilet)</title><summary type='text'>While some are considering laws that would ban driving while iPodding, it seems that iPodding while in the bathroom has at least a few proponents. Unlike talking on your mobile phone, using your iPod from your porcelain potty is a more solitary act -- one less likely to offend others. Apparently, it's become a big enough deal that someone has created a special toilet paper holder that is actually</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115046053748101895/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115046053748101895&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115046053748101895'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115046053748101895'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/06/people-like-their-ipods-on-toilet-but.html' title='People Like Their iPods On The Toilet (But Not In The Toilet)'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-115026009574829183</id><published>2006-06-14T00:41:00.000-04:00</published><updated>2007-02-15T09:27:49.856-05:00</updated><title type='text'>Microsoft Patches Plug 21 Security Holes</title><summary type='text'>Microsoft today released a dozen security updates to fix at least 21 vulnerabilities in its Windows operating system and other software, including 12 flaws Redmond labeled "critical," its most severe warning level.Today's patch bundle is the largest yet for 2006, and includes a huge patch rollup that mends at least eight different flaws -- four of them critical -- in nearly all versions of </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/115026009574829183/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=115026009574829183&amp;isPopup=true' title='30 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115026009574829183'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/115026009574829183'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/06/microsoft-patches-plug-21-security.html' title='Microsoft Patches Plug 21 Security Holes'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>30</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114987406870623645</id><published>2006-06-09T13:26:00.000-04:00</published><updated>2006-06-09T13:27:48.706-04:00</updated><title type='text'>Don't Just Plug Random Crap Into Your Computer</title><summary type='text'>There's been a lot of talk about how iPods and other portable devices pose a security risk to companies, as employees may store important company documents of them. Now there's fear that such devices could upload malware and infect corporate systems. A team of security specialists recently demonstrated exactly how such an attack might work. First they collected a bunch of cheap USB drives, the </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114987406870623645/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114987406870623645&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114987406870623645'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114987406870623645'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/06/dont-just-plug-random-crap-into-your.html' title='Don&apos;t Just Plug Random Crap Into Your Computer'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114959440137938138</id><published>2006-06-06T07:45:00.000-04:00</published><updated>2006-06-09T13:24:17.463-04:00</updated><title type='text'>Another Court Recognizes Site Owners Aren't Liable For Site Comments</title><summary type='text'>It happens all too often that some website owner in the US is sued with claims of libel over comments on that site in an open forum. We usually point to Section 230 of the Communications Decency Act, and note that it's pretty clear that service providers of such forums are not liable for content they didn't write themselves. We also like to point to a 9th Circuit ruling, noting that, even when </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114959440137938138/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114959440137938138&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114959440137938138'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114959440137938138'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/06/another-court-recognizes-site-owners.html' title='Another Court Recognizes Site Owners Aren&apos;t Liable For Site Comments'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114855866657024103</id><published>2006-05-25T08:03:00.000-04:00</published><updated>2006-05-25T08:04:26.590-04:00</updated><title type='text'>Da Vinci Game Is Clueless.</title><summary type='text'>You'll find the puzzles in The Da Vinci Code game to be intricate and challenging. If you have recently sustained a major head injury.The creators of the video-game version (for PlayStation 2, Xbox and PC) of Dan Brown's perennially best-selling thriller did, to their credit, realize that any Da Vinci game should be built around the logic puzzles and cryptic riddles that form the core of the </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114855866657024103/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114855866657024103&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114855866657024103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114855866657024103'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/05/da-vinci-game-is-clueless.html' title='Da Vinci Game Is Clueless.'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114355158219101844</id><published>2006-03-28T08:12:00.000-05:00</published><updated>2006-03-28T08:13:02.223-05:00</updated><title type='text'>Mr. Google Goes To Washington</title><summary type='text'>In Silicon Valley, there's generally a general dislike for the politics of Washington DC -- and the concept that firms should need to hire "lobbyists" is pretty distasteful. Unfortunately, though, it's very much necessary for a larger company these days. The NY Times is the latest to cover Google's efforts on K Street. However, while other industries and large companies have pretty well-defined </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114355158219101844/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114355158219101844&amp;isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114355158219101844'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114355158219101844'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/03/mr-google-goes-to-washington.html' title='Mr. Google Goes To Washington'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114338750788922421</id><published>2006-03-26T10:37:00.000-05:00</published><updated>2006-03-26T10:39:19.853-05:00</updated><title type='text'>Police Use MySpace to ID Suspects</title><summary type='text'>Associated PressBOULDER, Colorado -- Detectives used profiles posted on the MySpace social networking website to identify six suspects in a rape and robbery that began when a party turned violent, leaving blood "in almost every room of the house," officials said.Six men were arrested in connection with the Feb. 23 rampage, and a seventh suspect was being sought, Detective Ali Bartley said Friday.</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114338750788922421/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114338750788922421&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114338750788922421'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114338750788922421'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/03/police-use-myspace-to-id-suspects.html' title='Police Use MySpace to ID Suspects'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114303310717305408</id><published>2006-03-22T08:06:00.000-05:00</published><updated>2006-03-22T08:11:47.186-05:00</updated><title type='text'>Yahoo Messenger Head Fake? It's Not About The Price...</title><summary type='text'>Funny... I thought that Yahoo had announced their Yahoo-messenger-as-Skype-killer offering back in December. However, today they're getting more life out of the story by launching the beta along pretty much the same lines they had outlined before. As I noted at the time, this shouldn't be about "cheap calls." That's not a differentiation battle that can be won -- it's simply a race to the bottom.</summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114303310717305408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114303310717305408&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114303310717305408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114303310717305408'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/03/yahoo-messenger-head-fake-its-not.html' title='Yahoo Messenger Head Fake? It&apos;s Not About The Price...'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13763634.post-114294432459533057</id><published>2006-03-21T07:29:00.000-05:00</published><updated>2006-03-21T07:32:04.613-05:00</updated><title type='text'>Former Hacker Irks Microsoft in EU Dispute</title><summary type='text'>Carl Bialik from WSJ writes: "The Wall Street Journal profiles Neil Barrett, 'a former computer hacker who once infiltrated the system controlling a telescope at a Hawaii laboratory' and is now an expert witness causing problems for Microsoft in its antitrust battle with the European Union. Barrett 'has helped put the British glam rocker Gary Glitter behind bars for pedophilia. And he also has </summary><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/114294432459533057/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=13763634&amp;postID=114294432459533057&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114294432459533057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13763634/posts/default/114294432459533057'/><link rel='alternate' type='text/html' href='http://blog.uberdragon.net/2006/03/former-hacker-irks-microsoft-in-eu.html' title='Former Hacker Irks Microsoft in EU Dispute'/><author><name>UberDragon</name><uri>http://www.blogger.com/profile/01853955906053434685</uri><email>noreply@blogger.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry></feed>