Troubles Listening to the Show?

The audience can tune in just by going to our website at www.holonetradio.com. We have an embedded player on the top right, click “Listen” to hear the current show on air.

For mobile devices, Holonet Radio can also be played on various media players including the most popular free ones listed below. Follow the instructions using the URL http://stream.holonetradio.com:8000/ to play the radio station on the player of your choice;

  • Open Winamp Media Player, press CTRL+L and type the URL for the live stream of a radio station in the open box.  
  • In Windows Media Player, press CTRL+U and type the URL for the live stream of a radio station in the open box.
  • In VLC Media Player, press CTRL+N, and then type the URL for the live stream of a radio station in the open box.
  • Open the iTunes program, press CTRL+U and type the URL for the live stream of a radio station in the open box.

Celebirty photo leak and internet security

The stars look to have successfully struck back against the leaker who “allegedly” (we have to say that) shared nude photos of Jennifer Lawrence, other celebrities. As of Monday Kate Upton was the latest to confirm that she was included in the nude photo leak of dozens of celebrities the apparently also includes Kirsten Dunst, Selena Gomez, and Kim Kardashian. But with those involved vowing through a spokesman to prosecute those who released or shared the racy pics is no wonder why they seemingly came and went. Kate Upton’s attorney Lawrence Shire told Us Weekly. “This is obviously an outrageous violation of our clients privacy. We intend to pursue anyone disseminating or duplicating these illegally obtained images to the fullest extent possible.” And a representative for Jennifer Lawrence called the violation of the star’s privacy “flagrant” in a statement. Lawrence’s camp has also said “The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence,” A spokeswoman from the FBI declined to say whether the agency was investigating, though it has looked into previous celebrity leaks.

The breach looks like it could be linked to an alleged flaw in Apple’s “Find my iPhone” app, according to The Next Web. The app allows users multiple login attempts without getting locked out after a certain amount of wrong tries, potentially allowing hacker programs that repeatedly try different passwords to access another person’s iCloud account.

Earlier Monday, Ricky Gervais took heat for a comment that appeared to place some of the blame on the victims of the breach. He said via twitter “Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on your computer.”
Many took to the Internet to defend the stars, arguing that the “victim-blaming” is similar to the way victims of sexual assaults and rape have historically been blamed. Many took aim at those who shared the pics, such as celebrity blogger Perez Hilton, who had published some of the uncensored photos on his blog, before removing them and apologizing. Gervais’ Tweet was later deleted but he never quite apologized.

Now I’m sorry by those affected by those who where hacked and I’m not placing the blame on any of the affected party’s. But let’s face it the internet can be a scary place and not many people have good internet security practices and for me the terrifying thing is even if you do it might not stop a highly motivated hacker. For some now would be a good time to consider or at least look into two-step verification for all your accounts. If you don’t know what that is Two-step authentication adds an extra layer of security between your account credentials and your data by asking for a code when you try logging in to your account. This code, which is random and expires after a set period (usually in seconds to a minute), is either generated by or sent to a personal device which you always carry with you, such as your smartphone. You can even set it up for your Google, Apple and Microsoft accounts. Or cloud bases services could even set up site keys which is like a there way handshake you send the site your username they send you an image and phrase you set when setting up the account and then you send them your password.

How to set up 2-step verification for:

Google: https://support.google.com/accounts/answer/185839?hl=en

Microsoft: http://windows.microsoft.com/en-us/windows/two-step-verification-faq

Apple: http://support.apple.com/kb/ht5570