|
A destination on the Interweb to brighten your day (now get back to work!)
Thursday, November 29, 2012
Top Stories from the last 24 hours
The Lifehacker Tech Dictionary
November 29th, 2012Top StoryThe Lifehacker Tech DictionaryHere at Lifehacker we talk about all sorts of tech-related things, and often times we'll use acronyms or terms that even the geekiest out there don't understand. So, we've created a tech dictionary to help you better read the internet as a whole, whether you're a tech noob or an advanced user. This list by no means encompasses every technology term you'll run into, but it does cover the bulk of what we, and many other tech sites talk about frequently. It's meant as a quick resource to look up terms you run into, or to share with less tech savvy friends and family. It's broken down into six categories: If you're looking for a particular term, use Ctrl+F to find what you're looking for on the page. Hardware TermsArduino: An Arduino is a open-source piece of hardware typically used to prototype DIY projects. It also comes with free software to write your own code. Our guide to getting started with Arduino is a good place to start if you're interested in learning the basics. CPU (Central Processing Unit): The CPU is the small piece of hardware inside your PC that carries out the instructions your software sends to it. It's essentially the "brain" of your PC. The better it is, the faster it can perform tasks (and the more it can perform at once). If you're building your own PC, check out our guide for more information on finding the perfect CPU. Display Resolution: Display resolution refers to the number of pixels on your screen. It is usually shown as [width] x [height]. The higher the resolution, the more pixels your display can show. This means sharper, clearer images. On most computers, it also means more "space" for your desktop and applications. In some cases, higher resolution can increase your productivity (to a point). Hackintosh: A Hackintosh is a computer you build yourself that doesn't use Apple hardware, but that runs Mac OS X. It's usually cheaper than buying a Mac, and our guide makes it very simple. Microcontroller: A microcontroller is a small computer that includes everything you need (CPU, memory, etc) on a single circuit. They're typically used to complete one single process (like calculators, toys, remotes, appliances), and are popular with DIYers for creating everything ranging from a self watering garden system to your own clapper. NFC (Near Field Communication): NFC is used for close range wireless communication. NFC can be used for a bunch of different things, but it has become most popular for quick sharing between smartphones—like Android Beam, which lets you share playlists and more just by touching your phone to someone else's. Overclocking: Overclocking is when you run your CPU at a faster speed than it was intended. This means faster video editing, better gaming, and other benefits. Under the right conditions, most CPUs can run a little faster than their advertised rate, and if you want to do it yourself our beginner's guide to overclocking will help you get started. That said, overclocking can void a warranty on your CPU and there's always a risk you'll damage your processor. PPI (Pixels Per Inch) : PPI is a measurement of how many pixels are in an image. It's often used to describe computer displays, tablet displays, and digital camera images. Essentially, the higher the PPI, the clearer the image is—like the iPhone's retina display. RAM (Random Access Memory): RAM (also referred to simply as memory) is a temporary place for your computer to store information while the CPU does its work. Nothing is ever stored in RAM permanently. The more RAM you have, the better your computer is at multitasking, meaning you can run more programs at once and switch between them faster. RAM upgrades are cheap and very easy to do yourself, but make sure it's really worth it before you drop the cash. Refurbished: When a piece of hardware—whether it be a laptop, smartphone or other part—has been refurbished, it means that part has been returned to the manufacturer, fixed up, and resold at a lower price. Sometimes the original unit was defective, but an item that's returned is often automatically considered refurbished even if it was never used. Buying refurbished electronics can save you a lot of money, but make sure you choose one from a reputable source with a good warranty. RFID (Radio-frequency Identification): RFID is a wireless system used to track objects using tags. These tags include a small antenna that responds to radio waves. You'll often find these in clothing to prevent theft at retail stores, in toll booths to register a payment when you drive through, and even on credit cards so you can wave your card over a reader instead of swiping it. SSD (Solid State Drive): SSD is a hard drive that doesn't have moving components. Because of this, SSD drives are much, much faster than typical hard drives and they're less susceptible to failure because they have no moving parts. SSD's are useful for anyone looking for a speed upgrade for application launching or boot time, provided you're not worried about storage space. UPnP (Universal Plug and Play) : UPnP is a feature that allows devices on your home network to discover each other and access data or services. These days, it's often used for streaming media across devices on a network without a bunch of complicated set up procedures. USB (Universal Serial Bus): USB is a cable or connector that allows your computer to communicate with other devices like a mouse or keyboard. They're also found in smartphones, game consoles, portable hard drives, and elsewhere. There are several different types and sizes currently on the market. Photo by DijutalTim. Internet TermsBitTorrent: BitTorrent is a protocol for sharing files between different users online. Unlike regular downloads, it allows you to download a single file or group of files from multiple people at once, making the transfer very fast and efficient. It's often cited as a means for piracy, but it's also used to distribute files without weighing down a server (Linux is often traded this way, for example). However, because of its relation with copyright, many internet service providers slow your internet connection if you're using BitTorrent, but you can anonymize your traffic to keep it from happening. HTTP/S (Hypertext Transfer Protocol): HTTP is the set of rules that determines how files are transferred on the World Wide Web. Essentially, it's the foundation for the way the web works. HTTPS (HTTP Secure) is the same basic thing as HTTP, but with added security for sites like banks or online shops. HTTPS is incredibly important for keeping your data secure online. Magnet Links: A magnet link is used on BitTorrent sites to start downloads without you needing to download a .torrent file first. Basically, it's a faster, easier way to start torrent downloads. Here's how to make use of them. Net Neutrality: As the name implies, net neutrality is about making the internet a free and open platform that everyone gets equal access to. It's a pretty complicated, but important idea that affects how we all use the internet. The main goal of net neutrality is that every web site (whether it's Google, Bing, Amazon, or anyone else) should be treated the same when it comes to access speed. OAuth: OAuth is an open protocol that allows you to secure your data by only allowing applications to access a limited amount of information. OAuth is what you use to log into other services using your Google, Twitter, or Facebook Account. If a smaller service get hacked, OAuth makes it easier to protect your information. PHP (Hypertext Preprocessor): PHP is an open source scripting language used on most servers. It allows for web sites to create content that changes frequently (like Wiki's, blogs, etc). PHP is code that happens on the server side, and you see it when you fill out password forms, forums, and plenty more. POP (Post Office Protocol)/IMAP (Internet Message Access Protocol): POP and IMAP are both methods for accessing your email on a desktop client like Outlook, or the mail client on your smartphone. POP pulls your email to your phone and manages it separately than on the server (say, Gmail). IMAP keeps everything in sync, so if you delete a message on your phone, for example, it'll be deleted in Gmail as well. In general, we recommend using IMAP for all your email needs, since it's less confusing. RSS (Rich Site Summary): RSS is a service provided by blogs and web sites that creates a feed of always updating information from the site. RSS readers (like Google Reader) collect that information from various sites to create a news stream. Those feeds can be read online, or with a desktop or mobile app. Basically, RSS helps you keep up with all your favorite blogs and sites from one unified place. SEO (Search Engine Optimization): SEO is the process of pushing a web site up on search engine results so that it's seen by a wider amount of people. Usenet/Newsgroup: Usenet was originally a bulletin board service, but has since expanded into a place where people share files with one another. The files exist on a newsgroup, and can be downloaded with a Usenet service and client. Getting started with Usenet is incredibly easy, and it's arguably a safer means to transfer files than BitTorrent. Image remixed from Kati Neudert (Shutterstock). Network Terms802.11a/b/g/n: 802.11 is a set of standards for wireless local area networks that regulates how your computer communicates with your wireless router. Each of the letters (a/b/g/n) denotes different speeds and ranges, with Wireless N being the fastest. If you're not sure what you have check out our guide to knowing your network. Ad Hoc Network: An ad hoc network is a wireless network that allows two devices to communicate directly with each other without the need for external equipment. It's useful for privately sharing files between computers as well as for multiplayer gaming. Bandwidth: Bandwidth is the amount of data that can be transferred at once over a network, often between your computer and your internet provider, in a certain amount of time (e.g. 20 Megabits per second). In recent years, internet providers have put bandwidth caps on how much data you can transfer between your computer and the web, but it's easy to track how much you're using. DHCP (Dynamic Host Configuration Protocol): DHCP is what assigns an IP addresses to each device on your network, and makes sure that no two computers have the same address (which would cause problems). It's how most computers receive their IP addresses on a network, although you can create a static one with your own computer or reserve addresses for a specific machine. That way, your devices always have the same addresses, which is useful for streaming video and other purposes). DNS (Domain Name Service): DNS is a database system that translates a server or computer name from a numerical IP address into an easier to remember name (i.e. www.lifehacker.com instead of 407.562.326.28). Every internet service provider has their own DNS system, but you can use different ones for better speed and security. FTP (File transfer protocol): FTP is a system used to transfer data between computers on a network. FTP can transfer files between computers on a local network, or to transfer files online. IP Address (Internet Protocol Address): An IP address is what makes it possible for computers to connect to each other. Every device that connects to the internet is assigned a unique IP address. You internet service provider assigns you either a static IP address that remains the same, or a dynamic IP address, which changes every time you log on. That said, you can fake your IP address with a proxy server, which is handy for remaining anonymous online. ISP (Internet Service Provider): Your ISP is the company (Comcast, Time Warner, CenturyLink, etc.) from whom you receive internet access. LAN (Local Area Network) : A LAN is the network that connects computers in a limited area, like your home. This is a closed system that outside networks do not have access to unless you let them in (say, by giving them a password). MAC Address (Media Access Control Address): Your MAC Address is a unique number attached your hardware that identifies it to a network—like an ID card for your hardware. Your MAC address never changes, but you can spoof it to get around restrictions like coffee shop time limits. NAS (Network Attached Storage): A NAS is a device (like a small computer or hard drive) that stores files that anyone on the network can access. Any computer on your network can access those files from anywhere in the house. It's easy to turn an old computer into a NAS you can use as a networked backup, media streaming, or torrenting machine. NAT (Network Address Translation): NAT is what translates a web site on the internet to your local network so you can interact with the internet and vice versa. It also makes it so hundreds (or several) computers on a single network can all access the internet through one router without causing confusion. Proxy Server: A proxy server stands between you and the internet to relay information. Think of it like a game of telephone where you're yelling to someone across the street who's then yelling the same thing across the block. A proxy server has two main purposes: to improve internet speeds by providing recently visited web sites on a local hard drive, and to filter the content you can access. When you use a proxy server, you can fake the internet into thinking you're somewhere you're not, which can enable you to watch region specific content incredibly easily. SSH (Secure Shell): SSH is used to connect a computer (or other internet connected device) to another computer over a network the internet. It's commonly used to control your computer from afar, but also comes in handy when connecting an Android or iOS device to your computer. Tethering: Tethering is when you use the internet connection on one device (typically your phone) for another device (typically your computer). This allows you to get internet access on your computer from virtually anywhere, even if you don't have Wi-Fi. Check out our picks for the best tethering apps on Android and the iPhone to try it out. TLS (Transport Layer Security): TLS and it's predecessor, SSL (Secure Socket Layer) connect your computer to a secure server on the internet. TLS encrypts and protects the data you're sending, which is why it's commonly used for email, IM, banking, and online shopping. VoIP (Voice Over Internet Protocol): Like the name suggests, VoIP is the system that allows live voice communications like you find on Skype or Google Voice to happen over the internet. VPN (Virtual Private Network): A VPN is a group of computers networked together over a public network—usually the internet. A VPN encrypts what you're doing online so your data is always secure. It's a good idea to start using one if you're privacy minded or a security advocate. WAN (Wide Area Network): A WAN is a large network that connects several smaller local networks (LANs). A WAN might refer to something as small as a corporation's network, or as large as the internet itself. WEP (Wired Equivalent Privacy)/WPA (Wi-Fi Protected Access): Both WEP and WPA are security systems for your home network. They're both meant to protect your home network from outside hackers, but it turns out both WEP and WPA are easy to hack into. WPA, however, is much more secure than WEP, so you should use it whenever possible. Media TermsBitrate: Generally, bitrate refers to the number of bits—the amount of data—that are processed over time. We often see bitrate in reference to music files. For instance, the music you download from iTunes is 256 kilobits per second, meaning 256 kilobits of data is stored in every second of the song. See our explanation on bitrate for more information on how it can affect your music's sound quality. Codec: A codec is a computer program that encodes or decodes video so it can be played. Essentially, a codec shrinks large movie files to make them playable on your device. Nowadays, so many different types of video formats exist that many people use a codec pack or specific program that contains multiple codecs and can play nearly anything. DRM (Digital Rights Management): DRM is a technology that limits the use of media after its sold. Most often, it locks the media to your personal account so you can't share it with anyone, or use it on any other programs. It's often attached to books, videos, and games as a means to cut down on privacy. Because it's so restrictive, it's often an annoyance, but you can strip DRM away from books and videos pretty easily. Lossless: Lossless refers to video or music that hasn't been altered from the original version. If you rip a CD or DVD losslessly, the file on your computer is the exact same in both bitrate, size, and quality as the original. Lossy: Lossy is when you compress a media file so it doesn't take up as much space. This is what an MP3 or AAC file is. When you do this, you're deleting chunks of data, and thus losing some clarity or quality in exchange for space savings. Media Center (also known as an HTPC or Home Theater PC): As the name suggests, a media center is a computer used exclusively for media. In most cases, this computer is attached to a television locally or over a network so you always have access to your shows, movies, music, and games on its hard drive. Common programs for media centers include the streaming-focused Plex and the extremely customizable XBMC. You can set up a media center that does everything for $500 or a more minimalist one for $35. It might sound complicated, but you can set it up for non-geeks very easily, and any annoyances you come across are easily fixed. Streaming: Streaming is when media content is sent to you at the same time you're watching it. You do not download anything, and instead the content is stored temporarily while you listen or watch it. This is very common in music and video. In fact, it's how you watch videos on YouTube or Netflix—you don't download the file, you just start watching. Security and Privacy TermsCookies: A cookie is a small bit of text stored in your browser that saves data from websites you visit. In some cases, these cookies are used to track the web sites you visit. "Do Not Track": Do Not Track is a web browser setting and policy proposal that ensures your browsing isn't tracked by advertisers, social networks, or other web sites. However, it's currently just a suggestion your browser makes and not a rule because web sites do not have to obey the request. Firewall: A firewall is either software or hardware to secure a computer or a network. It controls the traffic going in and out so that unapproved files don't slip in. A firewall is very simple to turn on (or off) on your home computer. Phishing: Phishing is usually an email or web site you're directed to that attempts to trick you into giving information such as usernames or passwords by pretending to be a trustworthy site. In most cases, a phishing scam is easy to detect as long as you know what you're looking for. Privacy Policy: A privacy policy is a legal document that tells you the ways a company can use, gather, disclose, or manage your data. Sandboxing: Sandboxing is a security measure used by operating systems and programs that restricts software from accessing files they're not supposed to. You or your computer may sandbox a program if you aren't sure it's safe. Terms of Service/Use: A Terms of Service (also known as Terms of Use) is a legal document that describes how you can use a service, piece of software, or web site. They often include stipulations about community behavior, marketing policies, and copyright. While they're often very long, it's possible to at least skim them quickly for certain keywords that may indicate you're signing up for something you're not comfortable with. Software TermsApp Launcher: An app launcher is a program that quickly launches applications with a keystoke, but they can also do so much more. The point of an app launcher is to give you quick access to your most commonly used apps and actions. Boot Disc/Live CD: A boot disc or live CD boots into an operating system without ever actually installing the operating system. Boot discs are commonly used to launch utility programs that troubleshoot software issues or install a new operating system. Live CDs are common with Linux because you can launch into an operating system without installing it, but they can also be used for getting rid of viruses and running a totally private and secure operating system on any computer. Cloud Storage: Cloud storage is a type of service that allows you to store and back up your files to so they're not located solely on your hard drive. This makes them accessible from any computer, and keeps them backed up in case your hard drive dies. Dropbox or Google Drive are two popular versions of this, but you can make your own pretty easily. Dual Booting: Dual booting is the ability to install and boot into two different operating systems on one computer. It's incredibly handy when you want to test out an operating system before committing to it, like with Windows 7 and Windows 8, or if you need to run programs from a different operating system from time to time, like with Windows and Linux, Mac OS and Linux, or even Mac, Windows, and Linux. GUI (Graphic User Interface): The GUI is essentially what you see and interact with in your operating systems and programs. The GUI includes everything from the scroll bars to the button prompts. It's also one of our favorite things to hack and customize. ISO Image: An ISO image is an exact duplicate of a physical disc on your hard drive that uses the *.ISO file extension. For example, an ISO of a DVD is identical to a DVD itself and your computer treats it the same way. It's an easy way to burn an exact copy of something, and you'll often encounter ISO images with boot discs or live CDs. Jailbreak: Jailbreaking is the process that removes software limitations on Apple hardware like the iPhone, iPad, iPod Touch, and Apple TV. Once jailbroken, you have access to deeper parts of the operating system and you can run unapproved software. The jailbreaking process changes with each new version of iOS, but we have an always up-to-date guide to jailbreaking your phone to keep you on top of it. Kernel: A kernel is the software that communicates between your hardware and your software. Essentially, a kernel makes it so your applications can communicate with your CPU, memory, and any other hardware devices. Location-based: Location-based typically refers to the use of GPS to track your location and serve you specific information or perform certain functions. Location-based reminders apps like Checkmark for iOS or Geonote on Android are great for reminding yourself to do something when you're in a certain location. Location-based apps are also good for making your iPhone read your mind or turning your Android into a fully-automated superphone. Push Notifications: Push notifications are the pop-up messages you get on your mobile device or computer from apps. These come in the form of email messages, Facebook notifications, or even to-do list reminders. We'd argue push notifications aren't as great as they seem, but you can make them much more useful with a little tweaking. Rooting: Rooting gives you access to deeper parts of your Android's operating system. Much like jailbreaking on the iPhone, it allows you to do much more with the operating system itself, like add new features, overclock it to boost its speed, and more. Our always-up-to-date guide to rooting the most popular Android phones guides you through the process. Text Expansion: Text expansion refers to a software utility that monitors what you type, and triggers a phrase when you type in a key combination. For example, you can use text expansion so when you type "omw" the program will replace that with "On my way." We love text expansion because when used properly it can save you hours of typing every day. Title image remixed from Mariusz Gwizdon (Shutterstock). |
|
Looking for the Revolution Outside a Wendy's in Brooklyn
November 29th, 2012Top StoryLooking for the Revolution Outside a Wendy's in BrooklynBy 11:30 this morning, several dozen people wrapped in winter coats and wielding hand-drawn posters had assembled on the corner in front of the Wendy's on the Fulton Mall in downtown Brooklyn, across from the Modell's and the Bank of America, with the purpose of addressing that most fascinating question in labor relations: Can fast food workers ever be unionized? Here, in New York, today, a lot of fast food workers decided to skip the theory and proceed directly to the "Fuck you, pay me" phase of the process. "I'm tired of being courteous to guests for $7.25!" thundered one of the workers to her peers. As a former McDonald's worker who was never asked to work the register due to a lack of enthusiasm for customer service, I find that sentiment very difficult to argue with. The protest at Wendy's was just one of several throughout New York City today, all part of the launch of a new unionization campaign aimed at NYC's fast food workers, one which is backed by several activist groups and big unions and dozens of organizers and is not, I daresay, fucking around. Our city is, if you open your eyes, a bit, littered with fast food restaurants—it is only the most affluent neighborhoods that can afford not to have them. All of these restaurants are staffed by our fellow New Yorkers. Many of them are paid $7.25 an hour, the state minimum wage, and they're scheduled for fewer than 30 hours a week, on average. They're asking for $15 an hour. Still not all that much to live on. But much more than they get now. Latoya Hall, who works at a McDonald's on Eastern Parkway, had taken the day off to wave a sign in front of a Wendy's on Fulton St. A fairly remarkable act of solidarity, if you think about it. "Our boss said we need to protest to get another job," she said, laughing. She started at her McDonald's six months ago, at $7.25 an hour; she subsequently received a raise, of ten cents. When an organizers showed up at the restaurant a month ago to speak to workers about their wages being too low, she agreed. And here she was. Some of her coworkers were there too. Others agreed, but were too scared of losing their jobs to come. "I understand. I've got two kids," Hall said. "But I've been in this game for ten years, and I'm still at square one." Truvon Shim works at a Wendy's on Livingston Street, not far from the one where the protest was being held, and with the same owner. He lives in the Rockaways, and commutes one hour and 45 minutes to work. He said that his house was destroyed in Hurricane Sandy. "I'm sleeping on couches, in hotels, with friends," he says. Five of his coworkers were there. When they first started talking to organizers, he says, his boss told them not to, and then posted a sign at work saying that they'd be terminated if they joined a union; that sign came down, he says, after workers told the boss it was illegal. Tomorrow, Truvon will go back to work. "I have no fear," he said. Kirsten John Foy, a dapper activist formerly of the National Action Network and the NYC Public Advocate's office, was out to support the protesters. "This is 2012. Not 1812!" he hollered, to cheers of support. "The struggle for decent livable wages is a moral issue, not a political issue," he said. Unionizing fast food workers is uncharted territory, and Foy acknowledged that it would be a long term project—"If this is a one-shot deal, then it means nothing," he said, gesturing across the protesters, who had started marching up and down the sidewalk, back and forth, perhaps just to stay warm. "Protests are one thing. Boycotts are another. Wendy's ain't the only burger flipping joint on the block." Despite the dozens of loud strikers waving signs on the sidewalk, a slow but steady stream of oblivious customers still trickled into Wendy's for lunch. At one point, as the chants of "No music, hey! Fifteen and a union, hey!" progressed into serious hand-clapping, a hefty man in a leather jacket and braids peeked out of the Wendy's door; then, fast food bag in hand, stepped out onto to the sidewalk and started dancing, while eating his fries. He was followed out, moments later, by a Wendy's employee with a nametag reading "Alex," who emerged to raucous shouts and pounds all around. It was indeed Alex's rock star moment. Someone produced a boombox, and "Ain't No Stoppin Us Now" was played. One of the leaders of the workers, a woman in a pink and black Northface jacket and dyed red hair and the sort of natural charisma that comes with having Enough Of This Shit, stood in front of everyone for an Occupy-style mic check. She had been there, on the corner, since early in the morning, dragging her kids in tow. "Guess what, Wendy's?" she hollered. "My kids said to tell you, next time they gotta wake up early, they want 15 and a union. I can't even get a cab for $7.25! If I can't get my 15 and a union, guess what, Wendy's? You can't get your labor. Because I'm tired." Part-time, minimum-wage, fast food work would make anyone tired. Fast food workers do not generally have the public's respect. They are mocked as easily replaceable, unskilled, shiftless. They do not have political power. They certainly do not have money. But, as evidenced by the Not To Be Fucked With look on that woman's face and the words she spoke, they do have the single piece class consciousness that has launched a thousand revolutions throughout history. "I'm calling the shots," she roared, "because I do the labor!" |
|
YouTuber: I Was Banned From Making Money Because Of An Over-Zealous Fan [UPDATE]
November 29th, 2012Top StoryYouTuber: I Was Banned From Making Money Because Of An Over-Zealous Fan [UPDATE]Like a lot of people on YouTube, Nick Reineke makes videos about games. And like a lot of people on YouTube, he wants to make money off those videos. But he can't. Last month, YouTube banned him from AdSense, the advertising service that most YouTubers use to make money. It's not clear exactly why he was banned—YouTube hasn't explained—but Reineke thinks he knows what the problem was: an excited fan. A fan who clicked on one of Reineke's ads too many times. A fan who might have inadvertently ruined Reineke's YouTube career. Kotaku was first contacted by Reineke, who runs a channel dedicated to showing off indie games, a few weeks ago. He told us that he had received an e-mail from YouTube saying he was banned from AdSense for "invalid activity." And he said he knew why. "I've come to find out that a fan of mine took it upon himself to "help" my page by clicking The fan has admitted to clicking the ad, posting on Reineke's forums to apologize. "I thought, 'Hey, maybe I could give it a few clicks to see if Nick gets any money from it. Couldn't hurt to try, right?'" he wrote. "This was obviously [an] incredibly dumb decision and ended up getting Nick's AdSense blocked completely." Reineke has reached out to other YouTube networks to try to strike a deal, but they won't partner with someone who can't support AdSense. He can't make a new account without making up a false identity. And when he appealed to YouTube, they denied his request. Here's the letter they sent him:
After an e-mail like that, Reineke says there isn't much else he can do. "It is not possible to directly contact Google," he said. "No one will speak with you, and there are no other avenues unless you are friends with someone who works there. Once your appeal is rejected, they will not reply to your emails or speak with you further on the issue (they actually tell you that in the rejection letter). It is essentially a LIFETIME ban for your account. Seems fair, right?" I reached out to YouTube for clarity, but they wouldn't comment on Reineke's specific situation. A YouTube representative sent me this statement:
While it's certainly possible that Reineke was banned for another reason, he told me he has no idea what that might be, and YouTube isn't helping. "The notification that they had disabled my AdSense account due to 'invalid activity' was sent just a few days after the person had told me they did the spam clicking on my ad," he said. "Since it was the only ad I had up, and it was the only thing tied to my AdSense account... it's really the only thing that could have caused this. I've also considered the possibility of a rogue spammer on my site or something random like that, but I've never seen any evidence of strange behavior on the site before my account had already been disabled. Click to view One of Nick Reineke's most recent videos, from his channel Indie Impressions. "My YouTube and website editing and usage (with respect to my account standing) has been very much a repeated pattern of posting new content the same way day after day for months, so I can say in good conscience, other than the fan clicking the ad, there wasn't a deviation of any kind or anything I've done that would be misconstrued as malicious by Google." So Reineke is frustrated. He's feeling helpless. And he doesn't know what to do next. "My question is: what is there to stop someone who didn't like me from spamming any ad they know to be powered by AdSense to get it all taken down?" Reineke said. "There are no repercussions for the person doing the clicking, only the people who stand to lose everything. Seeing as how I did not condone this action by the individual who thought they were helping me, it's not really much different. "So is there really justice here? Someone who has devoted thousands of hours to their site and channel is now barred from potentially ever making money from their work on this service because an over-zealous fan decided on their own to spam click my ad?" Update: Shortly after the publication of this article, I got an e-mail from Reineke saying that his account had been restored. He wasn't contacted by YouTube or informed in any way; he just suddenly saw that AdSense was back. "I uploaded a video last night and I didn't have the row of $s next to my videos," he said. "This morning, as I noticed [this article] show up in my RSS feed, it was back." |
|