
OSCON: Energy + Awesome + Space Exploration + Hacking
I wanted to post these two keynotes from OSCON 2011. They really bring out the spirit of exploration, adventure, care, and doing things bigger than oneself. This is about doing things that go beyond the cat picture of the day. These presentations, well, I’ll let them speak for themselves. Absolutely great!

OS Bridge Day #1: Hacking for Freedom
Keynote: Hacking for Freedom
(Description of Hacking for Freedom)
Day #1 has kicked off with a bang. A keynote that really pulled at the heart strings for the love of freedom and liberty! The notion of technology being involved directly to those pushing for their freedom in other parts of the world is huge. Below I’ve snagged… read more…

Yes it is possible to resource starve a Cloud Computer
Over the weekend, my cloud computing infrastructure survived a major hacking attack. Here is what happened and what it took to recover it. This weekend my servers out in the cloud space fended off a major hacking attack across two of the systems that I have given the public access to use them. The attack […]

Turn your IPod, Iphone or soon the Ipad into a hacker system
For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products […]

An Open letter To Twitter – Dear Twitter, Come Back
Dear Twitter, You are a service with whom we stick around even though there were ample reasons to not do it. As a Twitter user from the days before mainstream users even started noticing you, I think I can take the liberty and vent my frustrations in the public. You are a fantastic person but […]

What Twitter Hack Should Warn Us About Google Profiles
As we move deeper and deeper into a Cloud based world, the cynics and critics use security as a weapon for spreading fear. They just touch the raw nerves of users who are still coming to terms with the new way of doing computing and try to exploit their anxiety about the new computing model […]

Twitter Hack Exposes Internal Company Documents
While there are issues with publishing information that someone got via a hacking attack, often at times the information can be useful in many ways. Over the weekend Techcrunch was sent an unsolicited e-mail from a hacker that contained over 300 internal Twitter documents, and an explanation on how the various accounts was hacked. Techcrunch […]
There’s a Reason We’re Called Early Adopters – That Don't Mean We Should Act Like Fools
The latest five minute maelstrom on the blogosphere was the widespread hacking of Twitter accounts. According to experts, some 700 or so Twitter accounts were hacked such that they appeared to be the property of a 23 year old female “adult entertainer” *ahem*. To their credit twitter fronted up and posted details of the breach. […]