Category: Just Interesting

How to Unlock More Movies on Netflix

One of the problems with Netflix is it’s just too big! Much is made of of it’s super clever algorithm which is designed to guide you to your favorite shows, however the reality is that most of us will never come across thousands of the shows and movies stored on there. Most of the versions of Netflix are the same but the US version has even more content with some estimates suggesting tens of thousands more films and TV shows. Here’s how to unlock more movies on Netflix using a simple hack.

So how can we browse all these films more easily, well some clever chap has discovered a way to break out of Netflix’s suggested movies mode and dive straight into specific categories.

It turns out that you can go straight to thousands of pre-defined categories on Netflix just by using the correct URL. For instance, here’s a few.

Classic Comedies – http://www.netflix.com/browse/genre/31694
Music Documentaries – http://www.netflix.com/browse/genre/90361
Sports Dramas – http://www.netflix.com/browse/genre/7243

You can access them by modifying the end number of the URL and you’ll be directed straight to that category if you’re logged into Netflix. There are in fact 76,000 different categories some of them extremely specific – for instance there’s a category of ‘Witty Movies by Woody Allen’.

Fortunately someone has produced an incredible list of all 76000 categories which you can find on this link. Just have a browse and you’re bound to find a few categories of interest that you’ve never found.

What’s more if you switch to another version of Netflix then these categories still work but you’ll see different movies and shows depending on which country. SO for example you could use one the Netflix VPNs such as this and switch countries before clicking the URL and see loads more. That means you can go directly to very specific genres under each country variant armed with this list and a Netflix working VPN.

It’s definitely worth trying and of course the Netflix algorithm will pick up on your choices after you watch and rate them to update your standard auto-generated menu’s too.

Innovative Cyber Criminals Hack Austrian Hotel

One of the main reasons that in the past cyber crime was never too much of an issue, was the fact that many of the people who were capable of performing the attacks were not that good at the criminal side of it.   Hopeless geeks would steal stuff nobody wanted and then get picked up when they tried extorting money.   This is changing now in a big way as cyber gangs across the world start working with organised crime and becoming much more effective.

Luxury Hotels Targeted by Hackers

One of the current hot cyber crimes is ransomware, getting access to a system and denying access to the data or applications themselves.  A popular method is for viruses to encrypt important data and destroying it unless a payment is made.   It does work occasionally but only on badly configured and poorly defended systems – any half decent disaster recovery system will make such attacks ineffective.

However the latest targets of slightly modified attacks are big hotel chains.  Hotels have long been a target for technological crime, often because there’s a mix of wealthy people using mobile devices and poor levels of IT support and administration.   Previous targets have been hijacking Hotel Wifi systems or infecting lobby computers to steal usernames and passwords.   The latest twist however is to target a much more practical application, the hackers are taking over the hotels keycard systems.  The application which controls, registers and deregisters the room control cards – effectively controlling access to guests rooms – locking them in or out at will.   These are often also linked directly to reservation systems which can also cause havoc for any hotel.

There have been many rumours of these attacks taking place, however one hotel has decided to admit that they were attacked and decided to pay the ransom.  The hotel is a luxurious four star place in Austria called the Romantic Seehotel Jaegerwirt set alongside a beautiful Alpine lake.   Like many modern hotels they have a sophisticated IT system which controls all the key cards.   When the system was compromised none of the keys worked and nobody could open any of the room doors – customers were either locked in or out of their room.

Imagine the chaos that would cause the hotel management, especially on the opening weekend of their busy Winter season.  Then the demand came, a relatively modest request for 1500 EUR paid in Bitcoins in order to restore their key card system and access to the reservation application.  As the manager pointed out, the police and insurance are of little help when you have 180 guests locked out of their rooms.  The manager decided that paying the demand was quicker and cheaper than any other alternative.  There are two crucial aspects to this case, the modest request and the fact that when it was paid the hackers kept their word and restored the system.   These factors are crucial to convincing  victims that ‘paying up’ is the sensible option it in fact the best business decision in the circumstances.

Cyber crime is moving into a new and more dangerous phase than the amateuristic attacks we have seen in the past.   More and more of our world and systems are accessible online, the IoT (Internet of Things) is bringing vulnerabilities into our world that previously didn’t exist and criminals are using these avenues to run their businesses.  The hotel has interestedly identified an upgrade that will prevent these attacks in the future, their next refurbishments will replace the keycards with ordinary keys which were originally used by the hotel when it opened over a hundred years ago.

IP Address Mapping Hell in Kansas

Is there such a thing as a ‘digital hell’ well although it sounds like some sort of melodramatic media headline, one couple in Kansas could arguably have been living there for several years.

Everything that is connected to the internet has an IP address, every computer, laptop, tablet or smart phone needs some sort of address in order to communicate on the world wide web. Tracking, mapping and filtering these addresses is big business and many companies have sprung up providing accurate information on the IP address attached to your device.

Obviously knowing the location is one major part of the puzzle and there are several services for looking up the physical location of an IP address. You can have a look here at where your IP address appears to be located – https://www.whatismyip.com/ – did it return your correct location?  Sometimes these can be very accurate, the information sourced from companies like MaxMind has been built up over many years through a variety of methods. The information is used for a variety of reasons, from targeting advertising to region locking and filtering used by companies like Netflix

Sometimes, however this information is not very accurate at all  but sufficient if you just want a specific country or region. However when a company like MaxMind have no relevant data on an IP address they will tend to resort to assigning a default location. For example if they have no further information other than country is USA, Maxmind will return a default location – the geographic center of the United States.

ipad-632394_640-1

Sounds logical? It is until you realise that located in the geographical center of the US is a small farm in Kansas owned by James and Theresa Arnold. Furthermore there are quite a few IP addresses which are registered to this ‘default location’ – specifically just over 600 million addresses.

Now it might seem that this isn’t really a problem, but unfortunately this is not the case. These 600 million addresses are real and being used online all the time – and of course with such a huge volume some of these addresses are being used for all sorts of activities. Spammers, hackers, cyber crime, terrorists, pedophiles are all using these IP addresses online and when anyone tries to investigate their location – they are directed to this small rural farm in Kansas.

For years the couple have been subject to all sorts of accusations – they’ve had visits from law enforcement agencies, public officials, ordinary people who’ve been crime victims and have tracked the IP address back to the Arnold’s home address. You can imagine the volume when even a small percentage of 600 million addresses are used for criminal purposes.

It’s not the only situation like this, there is a house located at the end of a cul-de-sac in Ashburn, Virginia which has similar problems. The town itself is the home to several huge data centers and server farms, all with registered commercial IP addresses – the house was unfortunately given as the default location for millions more IP addresses with similar results – strange accusations and police raids being a common occurrence.

Fortunately there should be a happy ending for both these parties as the ‘default locations’ for unknown IP addresses is being changed to non-residential addresses such as the middle of a lake! The Arnold’s though are unsurprisingly also seeking some financial compensation for the distress and inconvenience over the year, and you can hardly blame them!

Activism or Sensationalism – Erdogan Emails

It’s a pretty turbulent in Turkey at the moment, with many people genuinely worrying about it’s future as a democratic republic.  The failed military coup has ignited all sectors of the country and President Erdogan has seized the opportunity to round up his enemies and imprison them.

So it’s obviously a pretty dramatic time for WikiLeaks to release what’s it’s calling the Erdogan Emails which it says is leaked from the AKP, the ruling party in Turkey.  There are approximately 300,000 which are being released in stages, you can find them on the WikiLeaks website in a searchable database.

turkey-953415_640

The response has been predictable, the WikiLeaks site has been blocked in Turkey and the activists around the world have shouted and tweeted about the censorship of the Turkish Government. Although people in Turkey are well versed in the use of Open DNS, VPNs and proxies so this has very little effect.

They are of course right, but it doesn’t take much for the Turkish authorities to start banning stuff, in fact it doesn’t mean anything in itself.  Which in this case seems to be the problem, this leak doesn’t seem to actually contain much more than personal information of ordinary Turkish women.   I have had a decent look and found nothing but apparently others have been combing through this stuff for days without finding anything vaguely relevant to power (and/or the abuse of it).

There is however a lot of personal private information of ordinary Turkish voters such as the home addresses, phone numbers or women in most of the Turkish voters list.    Also identifying information such as the Turkish Citizen ID whether they’re in the AKP and similar – in truth it’s the sort of information of much more use to Identity thieves and stalkers than freedom fighters.

There is no doubt that this information could be used to cause significant damage to innocent individuals, so was WikiLeaks right to publish this?

It’s easy to argue the case that WikiLeaks isn’t responsible for deciding what is or isn’t released. Plus the resources needed to individually check and verify the data fully is probably beyond the organisation. However surely there should be some cursory checks before releasing the personal details of so many innocent Turkish women. It really is difficult to get passed the mundane and personal feel to these emails, much of it just simple correspondence from Turkish citizens.

The reality is that the information was probably already available before WikiLeaks released it, including all the people likely to try and exploit this information. The opposite argument suggests that once information is already released then it’s best for as many people possible to be aware, the victims are better forewarned than ignorant.

Overall though I think an organisation like WikiLeaks should be careful that the information released is in the public interest, perhaps we might find something in the coming months in these emails too.

Security Concerns of Pokémon GO

There’s a certain virtual reality type game that’s causing quite a stir at the moment, it’s called Pokémon GO and in common with anyone over 40 years old – I think it’s utterly pointless. However I seem to be in a minority and there does seem to be some upside – my son actually voluntarily walked the dog yesterday, I feel the need to add exclamation marks to this statement but instead here’s a picture which perhaps illustrates better ….

pokemon-dog

Yes of course he didn’t actually want to walk the dog he went searching for these virtual, cartoon type things with his phone.   Look carefully as you go about your business and you’ll notice these Pokemon hunters blindly walking into street signs, busy roads all the time transfixed by their phones.    Reading up in the papers and online there are stories of people walking off cliffs, being mugged and even finding corpses whilst engaged in Pokémon GO.

So here’s some brief security tips on playing safely:

  1. Download from a trusted source: There are bound to be dodgy or malware filled copies of the game floating around all over the internet, don’t be dumb download it from a reputable source. Go to Google Play or Apple App store, search for the application and select the one with millions and millions of downloads. Seriously it might be slow but you should be ultra careful installing anything which has access to your GPS.
  2.  Remember GPS: Your location will be tagged and marked, if you want to remain incognito or simply want to keep your location discrete don’t play.
  3.  Keep your Privacy: Don’t log into the app with your main account. Don’t log in with your main gmail, google or Facebook account you will be releasing your personal information to the app owner who can of course tie it into your physical location using the GPS data, too creepy – use a throwaway account or login directly.
  4. Play Safe: Don’t wander around dangerous places you are unfamiliar with, staring at your phone like an idiot waiting to be mugged. Be sensible and keep to safe and public places, don’t trespass or climb into private property – imagine how sad you’re going to look when the police are called.
  5. Everyone Can See Pokestops: Be especially careful when using Pokestops, try to go with a friend or group. Don’t visit them late at night in remote places, people have been mugged or robbed at these locations.

There will inevitably be some stories of bad stuff happening to Pokémon GO players. However in reality bad stuff happens to people all the time, although stupidity does increase your chances. I suspect it will eventually get taken off the market when a series of law suits arrives from Pokémon GO related incidents. At the moment though it’s at least trebled my teenage son’s activity level, my dog walking duties have been reduced and well all these kids seem to have a smile on their face for a change – so enjoy.