Speaks4Me turns images into speech

By (author unknown), Gizmag Emerging Technology MagazineApril 28, 2010 at 12:56AM

Speaks4me allows a user with severe learning disabilities to create audio phrases using dr...

A few years ago, while searching for a suitable product to help his severely autistic son Callum adequately express himself, speaks4me creator Steven Lodge came up with the idea for a computer-based interactive communication tool based on a successful and popular autistic learning system, but the technology to support the idea was not readily available. That’s now changed…
Continue Reading Speaks4Me turns images into speech

Tags: ,
,

Related Articles:

homemade pop tarts

By deb, smitten kitchenApril 27, 2010 at 08:54PM

pop tarts

I never had a Pop-Tart until college. I realize that for some people this may cause a shocked reaction on par with my husband’s the time I told him I’ve never watched Goonies before (or Jacob’s, upon discovering the internet). Obviously I grew up under a rock, right? Thus, given my proximity to concrete-like materials you’d think I have been better prepared for the texture of the one I purchased from the vending machine in the basement of my freshman dorm (not at 4 a.m. or anything, either, nope, not this angel!). But I was not. It was like particle board, but even particle board has a fresher aroma. It took two hands to break off a piece. I choked down my first bite, then chugged some water, convinced bits were stuck in my throat. Don’t you hate that?

mixed doughdough to chillrolling out the doughfaux-nutella, brown sugar and jam

I understand that if I had toasted it, my experience might have been better. And maybe the brown sugar cinnamon variety isn’t exactly the most vibrant. Also, it is entirely possible that a dusty dormitory basement doesn’t have, say, the packaged pastry turnover a large grocery store chain. But even at its most ideal, it could never be anything but a compromise for me: a dry, flavorless, glycerin, high fructose corn syrup, “artificial strawberry flavor”-ed version of what could be homemade and flawless.

brown sugar and nutella fillings

… Read the rest of homemade pop tarts on smittenkitchen.com


© smitten kitchen 2006-2009. |
permalink to homemade pop tarts | 388 comments to date | see more: Breakfast, Photo, Tarts/Pies

How I Would Better Protect My Mint.com Account [Personal Finance]

By Jason Owens, LifehackerApril 27, 2010 at 08:00PM

How I Would Better Protect My Mint.com Account

We’re no strangers to paranoia and online personal finance, but popular webapp Mint still won us over in the long run. Security professional and blogger Jason Owens offers tips for how he’d add extra layers of security to your sensitive Mint account.

About a month ago I wrote an article called “Mint.com in 2010 – Is it Safe?” As a new user I wanted to objectively evaluate real privacy and security considerations when using the site. And I tried to think about it from the perspective of a penetration tester. If I were trying to hack someone’s account, how could I try to get at a user’s information?

Note: In the first section, Owens discusses different ways one might attempt to hack your Mint account—using methods slightly different from our previous look at how easily your weak passwords can be hacked. If all you want to see are his tips for adding extra protection to your Mint account, click here to skip straight to that section.

The following is nothing new or really original. These are common techniques used, but may be new to you as a victim. If you routinely think about security when online, it’s unlikely you’d fall for this. However, for users who are unaware of some of the vulnerabilities below, there’s a likelihood of a successful hack.

The point of describing how your Mint.com account could currently be hacked is to a) make you aware of the possibilities and b) understand what you can do to protect yourself.

How I Would Try to Hack Your Mint.com Account

Brute Force Might Work, But…

Brute forcing the password is one way, but a bit ham-fisted. There is no account lockout or notification of failed attempts. Technically if I knew what a valid account was (which can be determined), I could have script run through a dictionary of passwords, and if that didn’t work have the script try by brute force until it got it. Assuming that Mint.com would not block the login attempts (which appears to be the case) if a user does not have a strong password or an attacker is able to guess the password before the victim changes it, the account will be compromised.

Hacking an account by brute force could be noisy, time-consuming, and not exactly elegant by some standards. It is possible, however, to do a targeted attack against someone using a combination of technical and social engineering.

A More Social Approach

Pieces to the compromise

  • Victim using WiFi
  • Victim is logged in to Mint.com
  • Victim checking email via POP or IMAP (unencrypted)
  • Attacker can see the top of the Victim’s screen

This attack assumes that for whatever reason, you’re being singled out. It could be random, it could be bored script-kiddies, or it could be a targeted attack. Maybe you’re a school principal and the students want to dig up some dirt, someone’s boss that just got fired, or you have a roommate that thinks you should be paying more for your share of the rent.

It’s not unrealistic to assume that someone might be logged into their account over WiFi. The victim may be in a coffee shop, public library, fast-food place, etc. Let’s call it The BreadPlace. The connectivity in TheBreadPlace could be WPA, WEP, or unencrypted. WEP is essentially worthless, although it is still used.

It’s also not unreasonable that the victim might be checking email with Thunderbird, Mail, Outlook, or other clients at the same time they are browsing. The average user might assume that because they are using a password for their account their mail is protected. What the victim might not realize is that unless they are encrypting or tunneling their email traffic, their username and password are sent over the network in clear-text. Some ISPs do not provide the option to encrypt mail traffic and will instead recommend you use a web interface to check mail.

When the victim is logged into Mint.com, their username is displayed at the top of the screen. As an attacker there are any number of ways I could get that information. Sitting by you, looking over your shoulder as I walk by, pretending to take a picture of my friend when I’m actually taking a picture of you, or stopping and saying , “hey I’ve heard about this…”

Mint.com has a forgot password feature that allows you to submit your email address. It then emails you a link to reset your account to a new password. There are no challenge questions or security checks. You simply use the link Mint.com emails you.

I can read your email. I can do this because I’ve either easily cracked the WEP traffic or I’ve impersonated the WiFi hotspot. You thought you were using the free WiFi from TheBreadPlace but you’re actually going to my laptop first, where I sniff your wireless traffic and then send it on to wherever you were going. And because you were using plain old email and sending your email authentication in clear-text, I know what your password is and can log into you email account.

At this point, as the attacker I have everything I need. I don’t have to get the victim to request a password reset because I can submit it myself, because I know the email address for the account. So I log into your email account, submit the forgot password link, get the reset link when it is emailed to you, and delete the email. Because there are no challenge questions, I get immediate access to reset your account. I set a new password to one I know. Then I change the email address on the account to a random email account I have already setup.

As the attacker, I now own your Mint.com account, and I believe you would have no idea where your account or data went. You could not recover your account or password as your email is no longer associated to the account. At best you could send a help email to Mint.com support asking them to look into their data to see what happened to your account and what the current email address is. But I’ve already run screen shots and captured as much as I can to export, PDF, or an Evernote account.

Principal Skinner, I see you what’s in your wallet. You purchased from rubberlederhosen.com recently…

How to Better Protect Your Mint.com Account

Your Mint.com account doesn’t currently have access to write to any of your financial accounts. Why does it matter if your account gets hacked? If you don’t care, or don’t have any privacy concerns, then it might not matter. But understand what people could learn about you if they did get access – see the account compromise section in the linked article for details.

How to Protect Your Mint.com Account from Brute Force Attacks

  • Don’t use your regular email address, set up one specifically for Mint.com (you could have it forward to your real address so you still get notifications)
  • Make your new email address random so it’s difficult to guess.
  • Use a strong password
  • Change your password
  • Store your login information in a password database like KeePass so you don’t need to remember it

How to Protect Your Mint.com Account from Social Engineering and a Reset Attack

  • Know how to Protect Your Email
  • Make your new email address random so it’s difficult to guess
  • Don’t be bullied or manipulated
  • Remember if you’re in public, be protective of what’s on your computer screen
  • Don’t click on suspicious links in email
  • Don’t log into your Mint.com account from shared unprotected public computers, such as the library

Other Recommendations to Request

Your could ask Mint.com to add the following functionality

  • The ability to hide or disable the display of your account name when you’re logged in
  • The ability to add challenge questions to the password reset function
  • A two-step process that would require follow-up confirmation of the reset process
  • The ability to optionally approve the reset from more than one account
  • The ability to do a password recovery from any email you previously associated with your account

You can follow Jason on Twitter @jason_owens and subscribe to his RSS feed.

Using GPG/PGP/FireGPG to Encrypt and Sign Email from Gmail

By (author unknown), Irongeek's Security SiteJanuary 14, 2008 at 12:56AM

New Video:Using GPG/PGP/FireGPG to Encrypt and Sign Email from Gmail
This tutorial will show how to use GPG and the FireGPG plug-in to encrypt and
decrypt messages in Gmail. GPG is an open source implementation of OpenPGP
(Pretty Good Privacy) , a public-key-encryption system. With public key
encryption you don’t have to give away the secret key that decrypts data for
people to be able to send you messages. All senders need is the public key which can only be used to encrypt, this way the secret key never has to be sent across unsecured channels.

Repurpose a Hanger to Tidy Long Cables [Cable Management]

By Dan Arrigo, LifehackerMay 11, 2010 at 09:30AM

Repurpose a Hanger to Tidy Long CablesCables are everywhere. Cables for your camera, your speakers, this peripheral and that, and you need every one of them for some part of your workstation and workflow. This clever tip turns a pants hanger into a cable manager for lengthy cables.

Reader Dan Arrigo shared a clever hack that repurposes pants hangers—the kind, as seen in the picture above, with little tension clips on each end—to wrangle cables. He writes:

Between credit cards, paper towel rolls, and daisy chains, you’ve got plenty of ways to tackle cable clutter, but for a 30 foot RCA cord, those techniques can get tricky. I concocted this after reading your article on using IKEA hangers to keep a desk tidy, and it works like a charm.

Find yourself a plastic pants hanger and cut the hook off. Wrap one end around one of the clips a few times (in case you’ll need just a few inches of slack) then wrap it up along the hanger. When you get to the end, wrap it once around the hook to anchor your progress and go back the way you came. Repeat until clutter free. Success!

Have a clever tip of your own to share? Sound off in the comments or submit it to our #tips page and you might see it highlighted here on Lifehacker.

Lighting Modifiers Cheat Sheet Card

By udijw, DIYPhotography.net -DIY Photography and Studio LightingMay 10, 2010 at 01:21PM

Lighting Modifiers Cheat SheetSo we had a Portrait Lighting Cheat Sheet that was designed to help placing the light in space around the model. While I called it portrait lighting cheat sheet card, I was only telling half of the truth.

The half that I did not include in that card was how different modifiers will change the light falling on your subject.

It is time to correct this wrong, so this lighting modifiers cheat sheet completes this gap.

There are some new things on this sheet, like a perfectly still model, dark walls to control reflections and a few beers that you can not spot in the actual card. But they were there. Trust me.

Lighting Modifiers Cheat Sheet (by udijw)
You can download a “super size” here.

Again, we tried to keep it simple. We usually ask a wife or a boss to model for those kinda things, but since the differences between the modifiers can be subtle we wanted to keep everything constant but the light. So… We asked Lady Plastic to come to our aid on this one. She kindly agreed or at least did not mind.

read more

Finding Your Friends Via GPS With These 9 Free Mobile Apps

By Steven Campbell, MakeUseOfMay 10, 2010 at 12:31PM

finding your friends via gpsGeo-location technology is a hot topic as of late. We now have the ability to utilize the power of GPS right from the palm of our hand using our mobile device. We can view maps, points of interest, play games, and even spend time finding your friends via GPS with smart applications.

Being able to locate your friends without having to call them is a major bonus. And since we’ve become so adept at using social networks anyway, this is just one more tool added to the toolbox. Want to be able to find your friends even if you can’t hear them? If you want to locate their position (or give them yours) these 9 applications should help.


Before we get into the apps I would like to mention that we have written a few great articles in the past on this subject. For some more great location apps that won’t be covered here, I suggest you check out Beth’s article, The 9 Best iPhone GPS Apps, and Ryan’s 5 Mobile Social Networks That Know When Your Friend Is Near and How To Trace a Mobile Phone Location with Google Latitude.

LOCiMOBILE [iPhone & Android]

LOCiMOBILE has a few great GPS tracking apps out at the moment. The two that I would like to feature are the free/lite versions of the software.

GPS Tracking Lite

finding your friends via gps

This app supports up to 6 users (paid version is unlimited) and integrates with Twitter and Facebook. GPS Tracking populates your phone’s built-in Google Maps with the locations of people in your private opt-in buddy list. You can let users know where you are or request their location, and you can post your information to your social profiles.

iLOCi2 Lite

finding your friends via gps

iLOCi2 is the “Interactive GPS People Finder.” Add people to your contact list and you can receive their location through notification alerts.

The app seems like a simpler version of GPS Tracking that is focused more on keeping your contact information organized. This app works in the background as well.

Loopt [iPhone, Blackberry, Android & More]

We’ve covered Loopt briefly in the past through a directory listing. Loopt is perfect for finding your friends via GPS and to learn what they’re doing. You can discover events or places around you or your friends with Loopt Pulse, as well as check in to places and share directions.

Loopt runs on over 100 phones.

Mobcast [iPhone & Web Browser]

Mobcast is a Facebook application that lets you meet up with your friends without calling back and forth. View your friends’ locations on a map and post “mobcasts” which update your Facebook status with your location and push notifications to your friends.

Since the app is integrated with Facebook, there is no need to add your friends. You can also use this application from any web browser simply by signing in.

Friends Around Me [iPhone & iPad]

Use Friends Around Me to interact with friends across social networks and meet new friends based on a location-based search. Features include a free group chat, open profiles with alerts, integration with social networks like Facebook and Twitter, and a rewards system.

HeyWAY [iPhone]

HeyWAY stands for Hey Where Are You. HeyWAY emphasizes privacy by making you individually authorize others to see your location. You can also choose when you want to receive updates. The app also logs location updates so you can refer back to your friends’ locations whenever you want.

Find My Friend [iPhone]

Find My Friend is a Facebook app, which means it cannot be used if you don’t have a Facebook account. The main purpose of the app is to be able to meet up with your friends without having to tell each other where you are. It is integrated with Facebook and you have the ability to accept/reject requests. Privacy is taken into account with this app.

Friend Mapper Free [iPhone]

Friend Mapper updates your position live every 15 seconds. You can hide your position at any time. One-touch call or text your friends and view their locations. The time of their last update is noted.

The free version of this app only allows you to view one friend’s location, however. The paid version (99 cents) allows up to 23 streams simultaneously.

GeoTwitts [iPhone]

GeoTwitts posts your GPS location to Twitter. It also reads your friends GeoTwitts and gives you their location, along with directions to them if you would like to meet up. The app uses Google Maps to monitor/display directions and navigation.

Conclusion

With these apps installed on your mobile device, finding your friends via GPS should be easy.

Have you used any of these apps before? Are there any geo-location apps you use that I didn’t cover? Leave your thoughts, ideas, and comments below!

Image Credit: Rotorhead

Do you like MakeUseOf articles? Do share our articles with others! It’s really important to us.

Similar MakeUseOf Articles

Fluid, the site-specific browser creator, goes entirely open source

By Jay Hathaway, Download SquadMay 09, 2010 at 03:30PM

Filed under: , ,

I’m a longtime fan of Fluid, a Mac app that lets you easily set up site-specific browsers for your favorite webapp. In fact, I like it so much that I posted 10 web apps that work amazingly well as Fluid SSBs. Fluid may have just become even cooler, though, because developer Todd Ditchendorf has released all of the code for Fluid and announced that it’s going entirely open source.

If you’re a developer, you can grab the code on GitHub and have at it.

I’m excited to see what comes out of this, especially in terms of Finder integration to make Fluid browsers behave even more like desktop apps. Our newest member of the DLS team, Matthew Rogers, pointed out that Fluid is a straightforward enough app that open source might not make a difference.

What do you think, readers? Is there anything you’d like to see added to Fluid?

Fluid, the site-specific browser creator, goes entirely open source originally appeared on Download Squad on Sun, 09 May 2010 14:30:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Add to digg
Add to del.icio.us
Add to Google
Add to StumbleUpon
Add to Facebook
Add to Reddit
Add to Technorati



Open sourceFluidSite-specific browserMatthew RogersMacintosh

Make a DIY Ring Light for Better Macro Shots [DIY]

By Jason Fitzpatrick, LifehackerMay 08, 2010 at 04:00PM

Make a DIY Ring Light for Better Macro ShotsIf you’ve been experimenting with macro and closeup photography and been hesitant to shell out for an expensive ring flash, this cheap and simple ring light setup is worth checking out.

Most of the time DIY LED camera hacks involve circuit boards, soldering, and lots of electronic DIY know how. We love this hack for its simplicity. The two LED rings seen in the picture above are actually meant to be put on car head lamps by car modders. You can pick them up for under $5 each and the only wiring you’ll have to do is to simply wire them to a switch clipped onto a 9v battery. Check out the sample image below, the image on the left is from the ring flash and the image on the right is from the LED ring light.

Make a DIY Ring Light for Better Macro Shots

Check out the link below for more photos and a build guide that details how to select the right LED rings for your camera and attaching them to an inexpensive lens hood. Have a favorite camera hack you want to share? Let’s hear about it in the comments.

DIY Macro Lighting Ring [DIY Photography via Make]