Post pics


Get more battery life from your iphone or ipad

On November 6, 2011, in Uncategorized, by Jorge Espinosa

I know that this article is a bit off-topic for my blog but so many of my friends have been complaining about the battery life on their iphone since they upgraded to IOS5 that I felt it was worth sharing this trick.  There appears to be a bug in IOS 5 which makes the phone constantly check the time zone in the background.  As a result your battery rapidly looses charge when you are not using the phone.  Here is the trick to turn that off until a fix comes from apple.

Go to settings->location services-> scroll all the way to the bottom to system services->turn off setting time zone.  That is it.

I have noticed a substantial increase in my standby time.  Hope it does the same for you.

LulzSec responds to the FBI’s raid by releasing confidential documents

On June 23, 2011, in Uncategorized, by Jorge Espinosa

This morning LexNimbus reported on an FBI raid which took down numerous legitimate corporate accounts by seizing servers in an attempt to track a single account allegedly belonging to a hacker group called LulzSec.  Tonight LulzSec responded to the raid by releasing a huge number of hacked Arizona police documents on The Pirate’s Bay, a popular hacking site.  The message attached to the file states as follows:

We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.

The documents classified as “law enforcement sensitive”, “not for public distribution”, and “for official use only” are primarily related to border patrol and counter-terrorism operations and describe the use of informants to infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest movements.

Every week we plan on releasing more classified documents and embarrassing personal details of military and law enforcement in an effort not just to reveal their racist and corrupt nature but to purposefully sabotage their efforts to terrorize communities fighting an unjust “war on drugs”.

Hackers of the world are uniting and taking direct action against our common oppressors – the government, corporations, police, and militaries of the world.

See you again real soon! ;D

Clearly the FBI still has more hunting to do.  Hopefully their search will not take them to any servers containing our reader’s files.

Does Facebook exploit children? A New York court will decide.

On May 6, 2011, in Uncategorized, by Jorge Espinosa

Scott Nastro, a resident of Brooklyn in New York city has filed a class action suit against social networking giant Facebook on behalf of his minor son.  In JN v. Facebook, Inc., Civ.Action No. 11-cv-2128 (USDENY 2011), Nastro is citing the New York Civil Rights Law, which prohibits the use of a person’s picture for advertising purposes without their permission.  In the case of minors, Nastro says that Facebook must obtain the consent of parents or guardians.

“In the course of using the names and likenesses of Facebook members in advertising, Facebook regularly and frequently includes the names and likenesses of minors without obtaining consent for that use,” reads the complaint.  “Children are a large marketing audience, so that endorsements that include the names and likenesses of other children in advertisements and solicitations generate a great increase in the revenue and profits to Facebook.”   The complaint goes on to state ”Facebook, Inc. appears to be continually seeking new ways to use the names and likenesses of its members, including children, for its own marketing purposes.”

The type of ads that the suit refers to are called social ads.  A Facebook user indicates that he likes a product or service. Facebook then publishes an add on the side of the page which shows the person’s photo and promotes the product.  These types of ads are a major source of income for Facebook.  No special consent is sought from parents when minors choose these ads.

The lawsuit is based on a law found in many states which protects the rights of persons to protect the use of their name or image for commercial purposes.  Typically these right of privacy laws require written consent for use of the image.  In the case of minors, consent is usually required from the parent.

According to the Reuters report a Facebook spokesman responded to the suit in an e-mail “[w]e believe this suit is completely without merit and we will fight it vigorously.”

Glossary of Terms

On April 8, 2011, in Uncategorized, by Jorge Espinosa

Below you will find a glossary of Internet and cloud related terms.  This glossary is a work in progress and will be kept accessible in the menu on the upper bar of this blog.  The glossary will be updated regularly to include new terms as they develop.

Cloud Computing

The process of providing on-line services, including software, storage and infrastructure services, so that the user is separated and insulated from the burden of procuring, managing and maintaining the underlying technical infrastructure.  The National Institute of Standards and Technology definition may be found here.

Computer Virus

A program that can copy itself in order to propagate in a computer or from computer to computer over a network.  Viruses can be benign or malicious and can be used to propagate other forms of malware such as adware or spyware.

Enterprise Cloud – a private cloud operated by a company for its own internal use.

European Commission Model Clauses

A set of model clauses published by the European Commission to assist in drafting agreements in compliance with Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

HAAS – Hardware as a service often used to mean IAAS.


Infrastructure as a service.  The delivery of  networked services including the storage, software and other services as a full functional infrastructure for the user.


Short for Internetwork.  The name given to a network of networks all interconnected using standard Internet Protocol Suite (TCP/IP).  Often people confuse the Internet with the world wide web.  However, the world wide web and its hypertext linked documents is only one of various technologies that operate on the Internet (Usenet, Archie, Gopher, FTP).

ISO/IEC 27001

is an internatonally accepted Information Security Management System (ISMS) standard.  The standard, which was published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), provides certifiable guidelines for assessing information system security.

Open Source Software

Open source software (as an alternative to commercial software), is software whose source code is published and made available to the public, enabling anyone to copy, modify and improve the software.

Open Virtualization Format

DSP0243 Open Virtualization Format (OVF) V1.1.0.  Designated as ANSI INCITS 469 2010, this specification describes an open, secure, portable, efficient and extensible format for the packaging and distribution of software to be run in virtual machines.


Platform as a service.  An operating system platform and services which are provided over the Internet.  Similar to IAAS but includes the ability to host and develop applications on the platform.

Private Cloud

Enterprise specific cloud service accessible only by users with specific access permissions.

Public Cloud – public access cloud service accessible by the public at large.  (e.g. Gmail)


Software as a service.  Software provided over the Internet where the software resides on the remote server.

SAS 70

Statement on Auditing Standards (SAS) No. 70.  A widely recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA).

Trusted Cloud

A non-standardized marketing term used by various vendors to suggest segregated services which provide a higher level of trust or security than other cloud services.