BOL 1019: What is a browser anyway?!

Bill Gates wonders why Google would want to make a browser-based operating system. In fact, he wonders what exactly a browser is, anyway.

Bill Gates wonders why Google would want to make a browser-based operating system. In fact he wonders what exactly a browser is anyway. We also have some crazy Steve Ballmer quotes and some crazy stats of how many people respond to spam.

Podcast


Subscribe now: iTunes (audio) | iTunes (video) | RSS (audio) | RSS (video)

EPISODE 1019

Bill Gates on Google's Chrome OS
http://news.cnet.com/8301-13860_3-10286308-56.html

Ballmer: what IS this thing!?
http://paidcontent.org/article/419-microsofts-microsofts-ballmer-on-google-chrome-os-who-knows-what-this-t/

Gates: Natal to bring gesture recognition to Windows too
http://news.cnet.com/8301-13860_3-10286309-56.html
http://news.cnet.com/8301-13860_3-10286772-56.html

TechCrunch receives confidential Twitter documents from hacker
http://www.techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/

Comcast offers HBO, Cinemax on the Web and on-demand
http://arstechnica.com/media/news/2009/07/comcast-welcomes-hbo-cinemax-to-online-offerings.ars

CBS is first broadcast network to sign on for "trial" period
http://paidcontent.org/article/419-cbs-signs-on-for-comcast-broadband-trial-first-broadcast-network/

Google Voice coming to Android, BlackBerry
http://news.cnet.com/8301-17939_109-10286763-2.html

Apple cops to OS 3.0 Wi-Fi, Bluetooth problems
http://reviews.cnet.com/8301-19512_7-10285817-233.html

New Service Converts Torrents Into PNG Images
http://tech.slashdot.org/story/09/07/15/1314253/New-Service-Converts-Torrents-Into-PNG-Images

12% of e-mail users have actually tried to buy stuff from spam
http://arstechnica.com/web/news/2009/07/12-of-e-mail-users-try-to-buy-stuff-from-spam-e-mail.ars

State Dept. to Clinton: Please let us use Firefox
http://news.cnet.com/8301-13505_3-10287084-16.html

VOICEMAIL
Steve from Seattle on economics

Pastor Hudson on Verizon Store

EMAIL
Hey Buzz Hosts,
All the talk yesterday about Netflix possibly being purchased by Amazon really made me think about how Netflix is predominately a tech company and how funny it is that my grandparents have a Netflix subscription.
You see, my grandparents have never had a computer, Internet, cable, or satellite. They don't see any need for modern technology and really couldn't care less about it. That was until my family introduced them to Netflix.
My grandparents still don't have a computer, but they are in love with Netflix. They have developed their own hack to manage their que without a computer. My grandma writes down the movies she wants and calls my mother about once a week to have her add them to the Que. My grandmother manages her Que, with shipping dates, by paper and pencil. This speaks very highly of Netflix's shipping reliability as my grandmother can tell you with accuracy when her next movie will arrive without having access to her account.
I also like the set up, since I get to use the streaming feature of their account on my XBOX 360.
I've include two photos of my grandparents' "Que."
Pic #1 and Pic #2.
I thoroughly enjoy the show. Thanks for keeping my up to date on the tech world!

-Clayton from Oklahoma.

**********

Hey BOL-
In episode 1018, you mentioned what would child between Netflix and Amazon? Its already out there: RokuPlayer. After all, they both joined forces to get more content and even cross promote each other to sell more boxes. I even have an account with both and just got a RokuPlayer. Maybe they could iron out more included content if Amazon does buy them, but I enjoy what they both currently offer on the RokuPlayer.

Kevin in Pittsburgh

**********

The Risky Business podcast has the presentation of the security researchers (hilarious, actually), and an interview with them, both discussing the 2 keystroke capture techniques you talked about on the show. There are a few points that will get missed by mainstream reporting because these are corporate security researchers, not end-user security researchers.

1) An attacher who wants to use either of these method is going to choose a valuable target that meets the functionality of the attack. E.g., many, many ATMs use the PS2 keyboard interfaces required by the electrical fluctuation attack, making this a perfect exploit to capture pin #s. Niether attack is presented as a possible for use against individuals at home or in coffee shops.

2) The point is that sensors, such as those used to detect small electrical fluctuations and physical vibrations, are becoming cheaper and more sensitive every day, and these and other methods will be more and more viable proportionally.

http://risky.biz/netcasts/rb2/rb2-shakacon-presentation-hackers-freakin-laser-beams-their-heads-presentation
http://risky.biz/netcasts/rb2/rb2-shakacon-interview-hackers-freakin-laser-beams-their-freakin-heads

Ben
The Sysadmin in Minneapolis who listens to lots and lots of security podcasts.

 

Join the discussion

Conversation powered by Livefyre

Don't Miss
Hot Products
Trending on CNET

HOT ON CNET

Up for a challenge?

Put yourself to the real tech test by building your own virtual-reality headset with a few household items.