FANDOM


1019 - What is a browser anyway?!
Aired
Wednesday, July 15, 2009
Duration
38:28
Hosts
Tom Merrit, Jason Howell Co-hosts: Natali del Conte & Molly Wood (in for Rafe Needleman)
Producer
Jason Howell
Guests
none


Bill Gates wonders why Google would want to make a browser-based operating system. In fact, he wonders what exactly a browser is, anyway. We also have some crazy Steve Ballmer quotes and some crazy stats of how many people respond to spam.


Stories CoveredEdit

Bill Gates on Google’s Chrome OS

http://news.cnet.com/8301-13860_3-10286308-56.html


Ballmer: What IS this thing!?

http://paidcontent.org/article/419-microsofts-microsofts-ballmer-on-google-chrome-os-who-knows-what-this-t/


Gates: Natal to bring gesture recognition to Windows, too

http://news.cnet.com/8301-13860_3-10286309-56.html

http://news.cnet.com/8301-13860_3-10286772-56.html


TechCrunch receives confidential Twitter documents from hacker

http://www.techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/


Comcast offers HBO, Cinemax on the Web and on-demand

http://arstechnica.com/media/news/2009/07/comcast-welcomes-hbo-cinemax-to-online-offerings.ars


CBS is first broadcast network to sign on for “trial” period

http://paidcontent.org/article/419-cbs-signs-on-for-comcast-broadband-trial-first-broadcast-network/


Google Voice coming to Android, BlackBerry

http://news.cnet.com/8301-17939_109-10286763-2.html


Apple cops to OS 3.0 Wi-Fi, Bluetooth problems

http://reviews.cnet.com/8301-19512_7-10285817-233.html


New service converts torrents into PNG images

http://tech.slashdot.org/story/09/07/15/1314253/New-Service-Converts-Torrents-Into-PNG-Images


12 percent of e-mail users have actually tried to buy stuff from spam

http://arstechnica.com/web/news/2009/07/12-of-e-mail-users-try-to-buy-stuff-from-spam-e-mail.ars


State Dept. to Clinton: Please let us use Firefox

http://news.cnet.com/8301-13505_3-10287084-16.html


VoicemailEdit

Steve from Seattle on economics


Pastor Hudson on Verizon Store


EmailsEdit

Hey Buzz Hosts,

All the talk yesterday about Netflix possibly being purchased by Amazon really made me think about how Netflix is predominately a tech company and how funny it is that my grandparents have a Netflix subscription. You see, my grandparents have never had a computer, Internet, cable, or satellite. They don't see any need for modern technology and really couldn't care less about it. That was until my family introduced them to Netflix. My grandparents still don't have a computer, but they are in love with Netflix. They have developed their own hack to manage their que without a computer. My grandma writes down the movies she wants and calls my mother about once a week to have her add them to the Que. My grandmother manages her Que, with shipping dates, by paper and pencil. This speaks very highly of Netflix's shipping reliability as my grandmother can tell you with accuracy when her next movie will arrive without having access to her account. I also like the set up, since I get to use the streaming feature of their account on my XBOX 360.

I've include two photos of my grandparents' "Que."

Pic #1 and Pic #2.

I thoroughly enjoy the show. Thanks for keeping my up to date on the tech world!


-Clayton from Oklahoma.



Hey BOL-

In episode 1018, you mentioned what would child between Netflix and Amazon? Its already out there: RokuPlayer. After all, they both joined forces to get more content and even cross promote each other to sell more boxes. I even have an account with both and just got a RokuPlayer. Maybe they could iron out more included content if Amazon does buy them, but I enjoy what they both currently offer on the RokuPlayer.


Kevin in Pittsburgh



The Risky Business podcast has the presentation of the security researchers (hilarious, actually), and an interview with them, both discussing the 2 keystroke capture techniques you talked about on the show. There are a few points that will get missed by mainstream reporting because these are corporate security researchers, not end-user security researchers.


1) An attacher who wants to use either of these method is going to choose a valuable target that meets the functionality of the attack. E.g., many, many ATMs use the PS2 keyboard interfaces required by the electrical fluctuation attack, making this a perfect exploit to capture pin #s. Niether attack is presented as a possible for use against individuals at home or in coffee shops.


2) The point is that sensors, such as those used to detect small electrical fluctuations and physical vibrations, are becoming cheaper and more sensitive every day, and these and other methods will be more and more viable proportionally.


http://risky.biz/netcasts/rb2/rb2-shakacon-presentation-hackers-freakin-laser-beams-their-heads-presentation

http://risky.biz/netcasts/rb2/rb2-shakacon-interview-hackers-freakin-laser-beams-their-freakin-heads


Ben

The Sysadmin in Minneapolis who listens to lots & lots of security podcasts.

After The CreditsEdit

Buzz Out Loud Episode Guide Navigation
2010 | Jan
2009 | Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
2008 | Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
2007 | Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
2006 | Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
2005 | Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec