08/03/2014 Click


08/03/2014

Similar Content

Browse content similar to 08/03/2014. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

LAUGHS EVILLY

0:00:010:00:04

He's building his part up again.

0:00:040:00:06

This week on Click, we're seeing double.

0:00:210:00:24

But can your phone tell the difference between a good

0:00:240:00:26

and an evil Wi-Fi hotspot?

0:00:260:00:29

We'll ask if using public Wi-Fi is ever safe.

0:00:290:00:33

We'll also sample the gadgets that stimulate your senses.

0:00:330:00:37

But do they smell, or taste, as good as they sound?

0:00:370:00:41

And we'll get a flavour of the Texan interactive festival

0:00:410:00:44

that is South By Southwest.

0:00:440:00:47

All that, plus a round-up of the biggest tech news of the week

0:00:470:00:49

and a way to protect your property online, in Webscape.

0:00:490:00:53

Welcome to Click. I'm Spencer Kelly.

0:00:580:01:00

Over the past few months, we've been investigating an internet crime

0:01:000:01:03

which is almost invisible and which, we've been told, is on the rise.

0:01:030:01:08

Now, you don't have to be a spy to pull it off.

0:01:080:01:11

In fact, all you need is a mobile phone.

0:01:110:01:14

The hack relies on our desire to always be online.

0:01:140:01:18

And specifically, those times

0:01:180:01:20

when we want to hook up to a Wi-Fi hotspot.

0:01:200:01:22

Now, hotspots are really easy to join, of course.

0:01:240:01:26

You just select one on your phone by tapping the screen.

0:01:260:01:29

And conveniently, most phones will remember

0:01:290:01:31

the hotspots that you trust

0:01:310:01:33

and reconnect to them automatically the next time they're in range.

0:01:330:01:36

But, even the hotspots that you trust might not actually be safe.

0:01:370:01:42

And that's because your device can be tricked into connecting

0:01:420:01:45

to another network with an identical name.

0:01:450:01:48

But one that's been set up by a criminal.

0:01:480:01:51

It's called an Evil Twin attack.

0:01:510:01:54

It certainly is, Evil Twin.

0:01:540:01:55

And while he's actually been around for a little while now,

0:01:550:01:58

we've since discovered just how easy it is for him

0:01:580:02:00

to swipe my information using just a mobile.

0:02:000:02:04

Which means your attacker could be standing right next to you.

0:02:040:02:08

Dan Simmons reports.

0:02:080:02:10

The busy lives of the often-spotted city dweller.

0:02:130:02:17

These mammals are always on the go.

0:02:170:02:20

Their social habits include fiddling with these peculiar devices.

0:02:200:02:24

Thankfully, because they often use Wi-Fi,

0:02:260:02:29

we can now see almost everything they do.

0:02:290:02:34

In the park...

0:02:340:02:35

Yeah, it's quite shocking, quite terrifying to think, you know,

0:02:350:02:38

whatever I could have been looking at,

0:02:380:02:39

someone could have found that stuff.

0:02:390:02:41

Relaxing in the coffee shop...

0:02:410:02:43

I thought it would happen in some sort of hi tech van outside.

0:02:430:02:47

But just to see it on a normal laptop here is just a bit unnerving!

0:02:470:02:52

And in the office...

0:02:520:02:55

We could add cards, remove cards, buy items...

0:02:550:02:59

Any functionality within Amazon, we could do pretending to be Caroline.

0:02:590:03:04

City slicker Martin's hopping on to a Wi-Fi hotspot.

0:03:060:03:09

But it's one set up by Nosey Pete, our security expert,

0:03:090:03:13

who's curious to find out what these city folk do in their lunch hour.

0:03:130:03:18

Here he is searching and he finds the website for Billy Elliot.

0:03:180:03:22

There it is.

0:03:220:03:24

We looked in on several other people's sessions,

0:03:240:03:26

and it wasn't difficult to see what they were up to,

0:03:260:03:29

including their passwords and other personal data along the way.

0:03:290:03:34

By simply naming his hotspot the same as the one

0:03:340:03:37

that Martin's expecting to find, Pete can dupe him into believing

0:03:370:03:41

he's on the real one.

0:03:410:03:44

But that's with a public, open Wi-Fi network hotspot.

0:03:440:03:48

No username required, or password.

0:03:480:03:51

Throw those in, and you'd think you'd be a bit more safe. Wouldn't you?

0:03:510:03:58

An aptly-named coffee shop in trendy Shoreditch,

0:04:000:04:03

home to London's tech hub, and one where the owners set up a hotspot

0:04:030:04:08

with a password. A password that is written on the counter.

0:04:080:04:13

And of course, nosy Pete is up to his old tricks again

0:04:130:04:15

and can just as easily set up an identical Wi-Fi hotspot

0:04:150:04:19

asking for the same password.

0:04:190:04:21

This time, it's Lucy caught in the trap.

0:04:210:04:25

We can see what flights you are planning to take,

0:04:250:04:28

we'd know when you will be away from home, away from the office.

0:04:280:04:32

And if it were a business arrangement,

0:04:320:04:35

maybe we could predict what sort of meetings will take place,

0:04:350:04:37

that could be important to the business.

0:04:370:04:40

Yeah. Wow.

0:04:400:04:42

This snooping on what others are doing isn't just nosy,

0:04:440:04:47

it's illegal, which is why we did not set up an evil twin Wi-Fi here.

0:04:470:04:53

Instead, we asked users to log on to our bogus network

0:04:530:04:57

and explained to them what we could see.

0:04:570:05:00

That's not nice. That's not nice at all! That is not nice, no.

0:05:000:05:04

And it's not just websites.

0:05:040:05:07

Nowadays, the apps we use seem to love automatically

0:05:070:05:10

updating in the background, so it's now possible for our data to

0:05:100:05:13

be hacked without our phone leaving our pocket.

0:05:130:05:16

This photo-sharing app is typical.

0:05:180:05:20

It is sending out the user's e-mail address list, password

0:05:200:05:24

and phone contacts to make sure it's up-to-date.

0:05:240:05:28

Pete has got the lot.

0:05:280:05:29

But what he is not is very mobile himself.

0:05:340:05:37

The evil twin Wi-Fi scam has been around for a while

0:05:370:05:40

but all that kit has made Pete's job, well, a bit tricky.

0:05:400:05:43

But it turns out you can carry out the same attack

0:05:430:05:46

with an ordinary mobile smartphone.

0:05:460:05:49

This is mobile Mike

0:05:490:05:51

and he is using his to spoof the local pub's Wi-Fi hotspot.

0:05:510:05:55

With some software from the web,

0:05:550:05:57

he is recording everything Caroline is doing.

0:05:570:06:00

So how worried should we be?

0:06:020:06:04

The head of Europol's cyber crime unit told us

0:06:040:06:07

users simply should not use public Wi-Fi networks for anything

0:06:070:06:11

financial or sensitive but instead wait until they get home.

0:06:110:06:15

Charlie Mcmurdie headed up the UK's police effort against online crime

0:06:170:06:21

until last year.

0:06:210:06:22

She told me Wi-Fi providers should now carry out regular checks

0:06:220:06:26

as snooping becomes easier.

0:06:260:06:28

Whereas, previously, we have really focused on the sort of

0:06:300:06:35

stand-alone attacks and compromises of big databases, now, a lot of

0:06:350:06:41

mainstream criminals have identified there are easy opportunities

0:06:410:06:46

and vulnerabilities just walking down the street and exploiting

0:06:460:06:50

Wi-Fi networks that exist in every coffee shop,

0:06:500:06:53

every premises you go to.

0:06:530:06:55

Back at the cafe, Letty is checking her e-mail.

0:06:570:07:00

But, this time, our snoopers are not so lucky.

0:07:000:07:02

Thankfully, most e-mail and retail sites are encrypted.

0:07:030:07:07

It's slower but much safer.

0:07:070:07:09

Encrypted sites show up with the letters HTTPS in the address bar.

0:07:090:07:14

Your browser might also add a padlock to reassure you.

0:07:140:07:17

If your session is encrypted this way,

0:07:180:07:20

no-one else should be able to snoop.

0:07:200:07:23

But our security experts have found a way to bypass even that,

0:07:240:07:28

using an app that can be simply downloaded to a mobile phone.

0:07:280:07:32

Caroline is shopping.

0:07:330:07:35

In this attack, Mike doesn't need to spoof a hotspot,

0:07:350:07:38

he just needs to be on the same genuine Wi-Fi network.

0:07:380:07:42

But the app he has got manages to tell his victim's handset to

0:07:420:07:46

send all of its web requests to his own mobile.

0:07:460:07:49

He will act as a man in the middle, again seeing everything

0:07:490:07:53

because he is now able to strip out the encryption that Caroline

0:07:530:07:57

is relying on.

0:07:570:07:59

Many other encrypted websites would be just as vulnerable.

0:07:590:08:02

It means if you are using Wi-Fi with just a mobile,

0:08:020:08:06

your attacker could be sitting right next to you.

0:08:060:08:09

You can see them all sitting on benches, and they wouldn't be

0:08:090:08:12

given a second thought to the potential that those communications

0:08:120:08:17

are being picked up and read by the person sat on the bench next to them.

0:08:170:08:20

Dan Simmons reporting.

0:08:240:08:25

And just to reiterate, there was nothing intrinsically unsafe,

0:08:250:08:29

insecure or unusual about the websites featured in that report.

0:08:290:08:34

The hack happens because of the way that our phones recognise

0:08:340:08:37

and connect over Wi-Fi networks.

0:08:370:08:39

Joining me is Mick Paddington,

0:08:400:08:42

from one of the security firms who worked with us on that report.

0:08:420:08:45

-Hi.

-Hi.

-What can we do? We can't give up using public Wi-Fi, can we?

0:08:450:08:50

No, and there's some simple steps you can take.

0:08:500:08:52

You would not read out your credit card on the train

0:08:520:08:55

aloud over the phone with an audience.

0:08:550:08:58

so you've got to be aware that

0:08:580:08:59

when you are doing these kind of transactions or working on the web

0:08:590:09:03

you should be limiting the sort of behaviour you're doing online.

0:09:030:09:06

Just to clarify - the mere fact that you have to enter a password

0:09:060:09:11

to join a Wi-Fi network does not make it secure.

0:09:110:09:14

No. Definitely not.

0:09:140:09:15

In fact, a lot of these passwords are in the public domain because these

0:09:150:09:18

companies that own these hotspots

0:09:180:09:20

don't actually change these passwords.

0:09:200:09:22

The sort of passwords you should be looking for

0:09:220:09:25

which are more secure are dynamic, one-use passwords.

0:09:250:09:27

If you are in a hotel room, it will ask you for your name

0:09:270:09:30

and room number and then issue you with a password.

0:09:300:09:32

Rather than you going into a well-known coffee shop, for instance,

0:09:320:09:35

and the Wi-Fi address and the password is up on the wall.

0:09:350:09:38

So those one-time passwords can't be obtained by some hacker

0:09:380:09:42

who is setting up a spoof Wi-Fi network?

0:09:420:09:45

They would have no idea what that password is and if they were

0:09:450:09:47

issued with it, you would be issued with a different one.

0:09:470:09:50

Right. That is the theory, OK. Obviously, nothing is 100% secure.

0:09:500:09:54

What we are putting in practice is behaviour

0:09:540:09:57

that reduces your risk online.

0:09:570:09:59

Nothing is 100% secure and, if it was,

0:09:590:10:01

it would probably be totally unusable.

0:10:010:10:03

What about the idea of not using Wi-Fi

0:10:030:10:05

but using the cellular network, the mobile network, to connect to your bank, for example?

0:10:050:10:09

Is that safer?

0:10:090:10:10

Yes, but the trouble is that most people connect to Wi-Fi

0:10:100:10:13

or automatically connect.

0:10:130:10:15

You have got to be aware of what your device is connecting to

0:10:150:10:18

and if you have it set up to connect automatically.

0:10:180:10:21

In terms of using the cellular network, yes, it is inherently more secure.

0:10:210:10:25

The connection from your device to the mast is encrypted.

0:10:250:10:28

The trouble is Wi-Fi is more convenient, it tends to be a lot more faster.

0:10:280:10:32

4G isn't everywhere yet

0:10:320:10:33

so people will default to a Wi-Fi network.

0:10:330:10:36

Thank you very much. Wise words. Good advice there.

0:10:360:10:39

If you have advice or experiences of your own that you

0:10:390:10:42

would like to share, e-mail us.

0:10:420:10:43

Next up, a look at this week's tech news.

0:10:460:10:48

A Japanese-American man has been named by Newsweek magazine

0:10:500:10:54

as the creator of Bitcoin.

0:10:540:10:56

Dorian Satoshi Nakamoto, who shares part of his name

0:10:560:11:00

with the mysterious figure behind the digital currency,

0:11:000:11:03

was chased by reporters through Los Angeles after the news broke

0:11:030:11:07

only to tell the Associated Press he had nothing to do with Bitcoin.

0:11:070:11:11

He said he hadn't even heard of the currency

0:11:110:11:14

until three weeks ago when his son was contacted by a reporter.

0:11:140:11:17

Ever wanted the physical strength of a superhero?

0:11:180:11:21

Well, engineers in Italy have created a powered exoskeleton

0:11:210:11:25

that can do just that.

0:11:250:11:26

The body extender tracks the movement of the person

0:11:260:11:29

wearing it and can lift 50 kilos in each of its metal hands.

0:11:290:11:34

Its modular design means it could be rapidly reconfigured to perform

0:11:340:11:37

a large number of different tasks

0:11:370:11:40

such as work in factories or emergency rescue scenarios.

0:11:400:11:43

Finally, thinking of getting new business cards?

0:11:440:11:47

American programmer Kevin Bates

0:11:470:11:49

has certainly made an impression with his.

0:11:490:11:52

It sports an in-built Tetris game.

0:11:520:11:55

Made up of a tiny Arduino computer, an OLED screen

0:11:550:11:58

and capacitive sensor controls, a user or business associate

0:11:580:12:03

can play for up to nine hours before changing batteries.

0:12:030:12:07

Programmable to play other games,

0:12:070:12:09

Bates is already working on a Pokemon variant.

0:12:090:12:12

In recent years, it has made us sit up

0:12:160:12:18

and take notice of everything from Twitter to lifelogging.

0:12:180:12:22

So the big question is

0:12:220:12:23

what does Austin's South By Southwest Interactive Festival

0:12:230:12:27

hold for us this year?

0:12:270:12:28

LJ Rich is our reporter on the ground,

0:12:280:12:30

she's just landed and this is what she has found so far.

0:12:300:12:34

One trend that shows no sign of abating

0:12:350:12:38

if this festival's obsession with eating.

0:12:380:12:41

Look at all these restaurants along sixth street.

0:12:410:12:44

Down the road, something new is being cooked up.

0:12:440:12:47

It can't hurt to be more creative in the kitchen

0:12:500:12:53

and that's exactly what researchers at IBM's Watson Group decided.

0:12:530:12:57

They're using cognitive computing,

0:12:570:12:59

which is like a machine learning as opposed to programmed,

0:12:590:13:03

to help put unexpected ingredients together.

0:13:030:13:06

How does it work?

0:13:060:13:07

You choose an ingredient you like, like asparagus,

0:13:070:13:10

and then Watson does millions of calculations, comparing asparagus

0:13:100:13:14

for thousands of other ingredients, then decides which ingredient would

0:13:140:13:19

fit perfectly with asparagus that humans would not normally think of by themselves.

0:13:190:13:23

Now, this may just be a nice way of trying different foods but actually

0:13:230:13:27

the science behind this can be widened out

0:13:270:13:30

to things like travel itineraries or even making perfume.

0:13:300:13:34

The whole idea behind cognitive computing is, of course, to do things a little bit differently.

0:13:340:13:39

So, what does a real chef make of ingredients being put together by a machine?

0:13:390:13:45

Creativity is based on previous experience.

0:13:450:13:48

For chefs, it is something we tasted, it's a smell from our childhood,

0:13:480:13:51

something we remember that spurs us to create a new dish.

0:13:510:13:54

Now, working with this system, that's erased.

0:13:540:13:57

It's all based on new information.

0:13:570:13:59

We are starting with a blank slate looking at a set of ingredients

0:13:590:14:02

that seemingly have no relationship, no memory, nothing to spur us on,

0:14:020:14:07

just the ingredients themselves are the inspiration.

0:14:070:14:11

-There it is. Russian beet salad.

-Thank you very much.

0:14:110:14:15

Mmmm. Mmmm!

0:14:150:14:17

Beets, prunes, pickles, cucumbers - who would have thought?

0:14:170:14:22

I liked it more when you didn't tell me what was in it.

0:14:250:14:28

LJ Rich - and LJ will have more from South By Southwest next week.

0:14:280:14:34

Now, a feast for your senses.

0:14:340:14:36

Computers have traditionally played to only two of our five senses,

0:14:390:14:43

sight and sound.

0:14:430:14:44

And while these have become increasingly immersive over the years,

0:14:440:14:48

the other senses are much harder to cater for.

0:14:480:14:50

But, after recently finding something that simulates touch,

0:14:510:14:55

it is time to turn my attention and my tongue to something rather tasty.

0:14:550:15:00

This is what is being billed as the world's first electric lollipop.

0:15:020:15:08

It doesn't look like it but bear with me.

0:15:080:15:10

You stick your tongue between these two electrodes

0:15:100:15:13

and they pass an electric current through it.

0:15:130:15:16

What the researchers here at City University London have found

0:15:160:15:19

is that by varying the amplitude and frequency of that current

0:15:190:15:23

they can stimulate the different taste receptors.

0:15:230:15:26

That means they can simulate the four basic tastes - sweet,

0:15:260:15:31

sour, salt and bitter.

0:15:310:15:33

The question is does it work? Time to find out.

0:15:340:15:39

By far the easiest taste to create is a sour, lemony taste.

0:15:410:15:45

It's the same sensation you get when you taste some metals. Ughhh!

0:15:450:15:49

HE GIGGLES

0:15:490:15:51

That's so weird. That's lemon. Lemon?

0:15:510:15:55

The theory is that animals have developed a strong response

0:15:550:15:58

to sour taste in order to detect food that's gone bad.

0:15:580:16:01

The other tastes are certainly harder to judge.

0:16:010:16:05

I can't really taste anything.

0:16:070:16:08

One thing is for sure - it is a weird experience.

0:16:080:16:12

While this thing can only ever simulate basic tastes,

0:16:140:16:18

it could be used in combination with a mouth-worn device

0:16:180:16:22

that stimulates your nose,

0:16:220:16:24

at which point you should be able to detect many, many more flavours.

0:16:240:16:28

In fact, that is where we are off to next.

0:16:280:16:30

We have ticked off sight, sound, touch and taste.

0:16:300:16:34

It is now time for Lara Lewington to hit the fifth sense,

0:16:340:16:37

as she heads to Madrid to see what's cooking.

0:16:370:16:40

This may be a feast for the eyes

0:16:420:16:44

but the rest is left to the imagination.

0:16:440:16:47

Spanish chef Andoni Luis Aduriz hopes that could change.

0:16:480:16:53

With two Michelin stars,

0:16:530:16:55

his restaurant, Mugaritz, ranks in the world's top five year on year.

0:16:550:16:59

And he wants to bring the scent of this molecular gastronomy to your phone.

0:17:010:17:07

HE SPEAKS SPANISH

0:17:070:17:10

Here, I am learning to make one of his signature dishes,

0:17:100:17:13

a broth that is all about the full sensory experience.

0:17:130:17:18

The smell is a lot stronger since I have been doing this.

0:17:230:17:27

I can smell saffron and peppercorns, mixed with some seeds.

0:17:270:17:31

The saffron is the most overwhelming smell.

0:17:310:17:34

Watching this on TV, you could see what the soup looked like,

0:17:370:17:40

you could hear me making it,

0:17:400:17:42

but of course you have no idea how it taste or smells

0:17:420:17:46

which, let's face it, when it comes to food, is pretty important.

0:17:460:17:50

Here is some technology that could change things.

0:17:500:17:53

This app allows you to virtually create what

0:17:530:17:56

I made in the kitchen, so let's get going.

0:17:560:17:59

You move the phone around, which effectively mixes up

0:18:000:18:03

the ingredients, the peppercorns and the seeds are being crushed.

0:18:030:18:08

It looks pretty similar and the sound is the same.

0:18:080:18:11

But the most exciting bit is, once you are finished,

0:18:120:18:15

you press OK, and the smell comes out.

0:18:150:18:21

And I can tell you, that also smells of saffron

0:18:210:18:24

and is pretty similar to the real thing.

0:18:240:18:26

We get to enrich all our information with taste and smell.

0:18:280:18:34

We will enhance and improve, particularly not our membranes

0:18:340:18:42

but our feelings in the very moment when we are watching

0:18:420:18:47

something together with the smell and taste of it.

0:18:470:18:51

The app's software sends signals to a moving motor in the device,

0:18:510:18:55

which attaches via the earphone jack to puff out the smell.

0:18:550:18:59

This version only omits one scent.

0:18:590:19:02

But, as the device's creator explains, it's merely the start.

0:19:020:19:06

What we are working on for the long-term

0:19:060:19:09

is a device that you put inside your mouth.

0:19:090:19:12

It will have magnetic coils

0:19:120:19:13

which will directly stimulate your olfactory bulb,

0:19:130:19:17

producing electrical currents to produce the artificial smell

0:19:170:19:20

sensation in your brain.

0:19:200:19:22

Once we can do that, the range of smells we can generate will be infinite

0:19:220:19:25

because they are not going to be limited chemicals.

0:19:250:19:28

And then, well, you may be left hungry

0:19:280:19:31

but the full sensory experience could be yours anywhere, any time.

0:19:310:19:35

Lara Lewington with her portable pongs.

0:19:360:19:40

From smells back to pictures now. Publishing photographs online

0:19:400:19:45

that don't belong to you can be a costly business.

0:19:450:19:48

Certainly if you're BuzzFeed, Getty Images or Perez Hilton,

0:19:480:19:52

all of whom have had copyright infringement lawsuits filed against them in the last year.

0:19:520:19:58

Coming up with some tips to help you protect your online images

0:19:580:20:01

and stay on the right side of the law, here comes Kate Russell with Webscape.

0:20:010:20:05

Copyright protection for digital content is a complex issue

0:20:080:20:12

with no straightforward solution.

0:20:120:20:14

Stipple can help you by creating a unique fingerprint that stays

0:20:140:20:18

connected to it wherever it travels within the website's network.

0:20:180:20:22

There is the extra bonus that you can add interactive content to tell

0:20:220:20:27

the story behind the image

0:20:270:20:29

and get detailed analytics about views and shares.

0:20:290:20:33

If anyone wants to repost your images,

0:20:330:20:35

this site makes the process super-easy, with a ready-made embed code

0:20:350:20:39

equipped with full attribution details as set by you.

0:20:390:20:43

There is even a free iPhone app to protect your mobile uploads,

0:20:430:20:47

which is a notoriously thorny part of intellectual property rights online.

0:20:470:20:51

If you want to stay on the right side of copyright law

0:20:540:20:57

when reposting a non-attributed image you find,

0:20:570:21:00

you can use the site's reverse image search.

0:21:000:21:03

Even though this website makes it super-easy to use and attribute images legally,

0:21:030:21:08

it is not a fail-safe method for protecting your photos online.

0:21:080:21:12

In truth, the only way to keep them safe is not to post them at all.

0:21:120:21:17

But that's not a satisfactory option for most

0:21:170:21:20

so I have some other suggestions.

0:21:200:21:22

You could try adding a subtle watermark detailing your ownership.

0:21:250:21:30

Most editing packages will let you do this by adding a translucent layer

0:21:300:21:35

and you will find lots of tutorials online.

0:21:350:21:37

If you want a quick and simple tool, try uMark Online

0:21:370:21:41

but bear in mind that positioning the attribution

0:21:410:21:44

on the edge of your picture so it doesn't spoil the view

0:21:440:21:47

will make it pretty easy to crop out before reposting

0:21:470:21:50

if someone is determined to rip you off.

0:21:500:21:53

Make sure you are clear about your terms for anything that you post

0:21:540:21:59

by linking it to a licence.

0:21:590:22:01

From all rights reserved,

0:22:010:22:03

meaning no-one has permission to repost,

0:22:030:22:05

to public domain, where you are happy for it to be shared without attribution.

0:22:050:22:10

And everything in between.

0:22:100:22:12

A Creative Commons licence is an easy and standardised way

0:22:120:22:16

of detailing permissions so that no-one can claim ignorance.

0:22:160:22:20

If you think your images are at risk of copyright theft,

0:22:230:22:27

it is not a bad idea to run them through a reverse image search,

0:22:270:22:31

like TinEye, every now and then.

0:22:310:22:33

It will trawl the web detailing where the image has been found online.

0:22:330:22:38

A quick way to check a whole website is to run the address through

0:22:390:22:43

Copyscape, which will tell you

0:22:430:22:45

if any other web pages are using the content posted on it.

0:22:450:22:49

If you do find a violation, there are steps you should take to tackle it,

0:22:510:22:55

rising in escalation depending on how the violator responds.

0:22:550:22:59

Firstly, contact them directly and keep it simple

0:22:590:23:02

and non-confrontational.

0:23:020:23:05

It could be that they are not aware they have done anything wrong

0:23:050:23:08

and the matter can be resolved swiftly.

0:23:080:23:11

How about we finish with a real-world hack

0:23:180:23:21

for this week's video of the week?

0:23:210:23:23

Illusion specialists Brusspup have a brilliant 3D T-rex video

0:23:230:23:27

on their YouTube channel,

0:23:270:23:29

complete with a link to download and print your own.

0:23:290:23:33

Thank you, Kate. Loving those dinosaurs.

0:23:440:23:46

They are so simple yet so very, very effective.

0:23:460:23:49

If you missed any of Kate's links,

0:23:490:23:50

you will find them all on our website as usual.

0:23:500:23:52

If you would like to get in touch about anything you have seen today,

0:23:530:23:57

please do e-mail or tweet us.

0:23:570:23:59

That's it for now though.

0:24:010:24:02

Thank you very much for watching and we'll see you next time.

0:24:020:24:05

Download Subtitles

SRT

ASS