US Launches National Cryptocurrency Enforcement Team to Prosecute ‘Criminal Misuses of Cryptocurrency’
Oct07

US Launches National Cryptocurrency Enforcement Team to Prosecute ‘Criminal Misuses of Cryptocurrency’

The U.S. has launched the National Cryptocurrency Enforcement Team, an initiative of the Department of Justice (DOJ), to tackle and prosecute “criminal misuses of cryptocurrency, particularly crimes committed by virtual currency exchanges, mixing and tumbling services, and money laundering.” U.S. Deputy Attorney General Lisa Monaco said, “The point is to protect consumers.” DOJ’s New Crypto Enforcement Initiative U.S. Deputy Attorney...

Read More
ACE Anti-Piracy Coalition Takes Control of Dozens of Pirate IPTV Domains
Oct07

ACE Anti-Piracy Coalition Takes Control of Dozens of Pirate IPTV Domains

Pirate IPTV and similar streaming services are considered one of the greatest threats to the global market for legitimate movie and TV show content. As a result, content companies of all kinds are going to extreme lengths to reduce unlicensed supply. The most significant anti-piracy program by scale is operated by the Alliance for Creativity and Entertainment, a global coalition that counts the major Hollywood studios, Netflix,...

Read More
RIAA Secures ‘Victory’ Against YouTube Rippers and Seeks $82 Million in Damages
Oct07

RIAA Secures ‘Victory’ Against YouTube Rippers and Seeks $82 Million in Damages

The major record labels believe that YouTube rippers are the most significant piracy threat on the Internet. These sites, which can serve a variety of purposes, are used by some to convert free YouTube videos into MP3s. FLVTO.biz and 2conv.com Lawsuit The RIAA and several of its members have taken legal action to curb this threat. They previously sued YouTube-MP3, the world’s largest ripping site at the time, which resulted in the...

Read More
Rotate and archive logs with the Linux logrotate command
Oct07

Rotate and archive logs with the Linux logrotate command

Logs are great for finding out what an application is doing or troubleshooting a possible problem. Almost every application we deal with generates logs, and we want the applications we develop ourselves to generate them too. The more verbose the logs, the more information we have. But left to themselves, logs can grow to an unmanageable size, and they can, in turn, become a problem of their own. So it’s a good idea to keep them...

Read More
3 phases to start a DevSecOps transformation
Oct07

3 phases to start a DevSecOps transformation

DevSecOps is another step in the DevOps journey for your organization. Breaking down your transformation into phases facilitates working directly with developers and other team members. A phased approach also allows you to get feedback from those affected by the change and iterate as necessary. Here are the first three phases of a DevSecOps transformation: Phase 1: analysis, education, and training In phase 1, you do the preliminary...

Read More