Tag Archives: facebook

Weird facebook.com whois!

 

$ whois facebook.com

Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
 with many different competing registrars. Go to http://www.internic.net
 for detailed information.

FACEBOOK.COM.DISABLE.YOUR.TIMELINE.NOW.WITH.THE.ORIGINAL.TIMELINE-REMOVE.NET
FACEBOOK.COM.GET.ONE.MILLION.DOLLARS.AT.WWW.UNIMUNDI.COM
FACEBOOK.COM.LOVED.BY.WWW.SHQIPHOST.COM
FACEBOOK.COM.MORE.INFO.AT.WWW.BEYONDWHOIS.COM
FACEBOOK.COM.ZZZZZ.GET.LAID.AT.WWW.SWINGINGCOMMUNITY.COM
FACEBOOK.COM

How to do a correct whois:  whois =facebook.com

 

WTF?

More readings about it
http://superuser.com/questions/30388/strange-whois-results
http://serverfault.com/questions/265750/twitter-coms-weird-whois-what-is-going-on

 

 

Facebook Messenger’s Android Mobile App Permissions

The Insidiousness of Facebook Messenger’s Android Mobile App Permissions (Updated)

Read full article on http://www.huffingtonpost.com/sam-fiorella/the-insidiousness-of-face_b_4365645.html

In-app purchases An app can ask you to make purchases inside the app.

Device & app history
An app can use one or more of the following:

  • Read sensitive log data
  • Retrieve system internal state
  • Read your web bookmarks and history
  • Retrieve running apps

Cellular data settings
An app can use settings that control your mobile data connection and potentially the data you receive.

Identity
An app can use your account and/or profile information on your device.

Identity access may include the ability to:

  • Find accounts on the device
  • Read your own contact card (example: name and contact information)
  • Modify your own contact card
  • Add or remove accounts

Contacts/Calendar
An app can use your device’s contacts and/or calendar information.

Contacts and calendar access may include the ability to:

  • Read your contacts
  • Modify your contacts
  • Read calendar events plus confidential information
  • Add or modify calendar events and send email to guests without owners’ knowledge

Location
An app can use your device’s location.

Location access may include:

  • Approximate location (network-based)
  • Precise location (GPS and network-based)
  • Access extra location provider commands
  • GPS access

SMS
An app can use your device’s text messaging (SMS) and/or multimedia media messaging service (MMS). This group may include the ability to use text, picture, or video messages.

Note: Depending on your plan, you may be charged by your carrier for text or multimedia messages. SMS access may include the ability to:

  • Receive text messages (SMS)
  • Read your text messages (SMS or MMS)
  • Receive text messages (MMS, like a picture or video message)
  • Edit your text messages (SMS or MMS)
  • Send SMS messages; this may cost you money
  • Receive text messages (WAP)

Phone
An app can use your phone and/or its call history.

Note: Depending on your plan, you may be charged by your carrier for phone calls.

Phone access may include the ability to:

  • Directly call phone numbers; this may cost you money
  • Write call log (example: call history)
  • Read call log
  • Reroute outgoing calls
  • Modify phone state
  • Make calls without your intervention

Photos/Media/Files
An app can use files or data stored on your device.

Photos/Media/Files access may include the ability to:

  • Read the contents of your USB storage (example: SD card)
  • Modify or delete the contents of your USB storage
  • Format external storage
  • Mount or unmount external storage

Camera/Microphone
An app can use your device’s camera and/or microphone.

Camera and microphone access may include the ability to:

  • Take pictures and videos
  • Record audio
  • Record video

Wi-Fi connection information
An app can access your device’s Wi-Fi connection information, like if Wi-Fi is turned on and the name(s) of connected devices.

Wi-Fi connection information access may include the ability to:

  • View Wi-Fi connections

Device ID & call information
An app can access your device ID(s), phone number, whether you’re on the phone, and the number connected by a call.

Device ID & call information may include the ability to:

  • Read phone status and identity

Other
An app can use custom settings provided by your device manufacturer or application-specific permissions.

Note: If an app adds a permission that is in the “Other” group, you’ll always be asked to review the change before downloading an update.

Other access may include the ability to:

  • Read your social stream (on some social networks
  • Write to your social stream (on some social networks)
  • Access subscribed feeds

When you review individual permissions, all permissions, including those not displayed in the permissions screen, will be shown in the “Other” group.



Continuing Public/Private Surveillance Partnership

The Continuing Public/Private Surveillance Partnership

If you’ve been reading the news recently, you might think that corporate America is doing its best to thwart NSA surveillance.

Google just announced that it is encrypting Gmail when you access it from your computer or phone, and between data centers. Last week, Mark Zuckerberg personally called President Obama to complain about the NSA using Facebook as a means to hack computers, and Facebook’s Chief Security Officer explained to reporters that the attack technique has not worked since last summer. Yahoo, Google, Microsoft, and others are now regularly publishing “transparency reports,” listing approximately how many government data requests the companies have received and complied with.

Read more at
 
https://www.schneier.com/blog/archives/2014/03/the_continuing_.html

 

HipHop-Vagrant-VM

HipHop for PHP (shortened as HipHop) describes a series of PHP execution engines and improvements created by Facebook. The original motivation of HipHop was to save resources on Facebook servers, given the large PHP codebase of facebook.com. As development of HipHop progressed, it was realized that HipHop could substantially increase the speed of PHP applications in general. Increases in web page generation throughput by factors of up to 6 have been observed over Zend PHP.

Source: http://en.wikipedia.org/wiki/HipHop_for_PHP

 

Setup a test environment for HipHop VM.
The final VM will contain HHVM, Nginx, PHP, MySQL, ab.

Some graphs comparing PHP 5.3, PHP 5.5 and HHVM.
https://blog.liip.ch/archive/2013/10/29/hhvm-and-symfony2.html

Facebook – 2 petabytes in a rack

Each disk in the cold storage gear can hold 4 terabytes of data, and each 2U system contains two levels of 15 disks. In other words, each unit can handle 120 terabytes. A rack could hold 16 of these storage systems, allowing for 2 petabytes of cold storage in a rack.

Source: http://www.datacenterknowledge.com/archives/2013/10/16/first-look-facebooks-oregon-cold-storage-facility/

You can read more at how to create this servers on

Hacking Conventional Computing Infrastructure » Open Compute 

www.opencompute.org/

By releasing Open Compute Project technologies as open hardware, our goal is to develop servers and data centers following the model traditionally associated