Topic: COMPUTER - on August 15, 2016 at 6:00:00 PM CEST
Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open
Updated, August 12: Microsoft has now responded to the Secure Boot blooper. The company said: "The jailbreak technique described in the researchers’ report on August 10 does not apply to desktop or enterprise PC systems. It requires physical access and administrator rights to ARM and RT devices and does not compromise encryption protections."
... Link (0 comments) ... Comment
Topic: NASA - on August 15, 2016 at 5:55:00 PM CEST
NASA Systems Engineering Handbook
Since its founding, the National Aeronautics and Space Administration (NASA) has been dedicated to the ad- vancement of aeronautics and space science. The NASA Scientific and Technical Information (STI) program plays a key part in helping NASA maintain this impor- tant role. The NASA STI program operates under the auspices of the Agency Chief Information Officer. It collects, orga- nizes, provides for archiving, and disseminates NASA’s STI. The NASA STI program provides access to the NASA Aeronautics and Space Database and its public interface, the NASA technical report server, thus pro- viding one of the largest collections of aeronautical and space science STI in the world.
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 15, 2016 at 5:54:00 PM CEST
2 Gbps: New Speed Record Set For Data Transmission Using LED Light
A team of researchers has devised a new method to produce white light that supports data transmission rates up to 2 billion bits per second (2 Gbps). This light could be used to made efficient lighting systems and transmit information at the same time. The researchers expect that the white light LED bulbs will be replaced by the bulbs that generate white light using semiconductor lasers.
... Link (0 comments) ... Comment
Topic: SECURITY - on August 15, 2016 at 5:53:00 PM CEST
New method for detecting hardware Trojans
Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner of powerful computations, but it also provides lots of places for tiny malicious circuits, known as hardware Trojans, to hide. Magnifying this security risk is the increasingly distributed and globalized nature of the hardware supply chain, which makes it possible for a Trojan to be introduced at any point along the way.
... Link (0 comments) ... Comment
Topic: WEB - on August 15, 2016 at 5:48:00 PM CEST
“Digital Hell” — Why Is This house Linked To 600 Million IP Addresses?
A couple residing in the remote areas of Kansas has been visited by various police and federal officials on a regular basis. No, they are not some retired high-rank officials but the visits were made to enquire about missing persons, digital fraud cases, and even child pornography cases. More than 600 million IP addresses are linked to the house of this couple, James and Theresa Arnold. The couple shifted to the farm house in 2011. So, what was being baked inside the house? It was the result of a technical issue with an IP mapping company MaxMind. The couple’s house is located somewhere near the geographical center of the United States of America. The company was using this location as default to map IP addresses for which the location could not be identified.
... Link (0 comments) ... Comment
Topic: food - on August 15, 2016 at 5:47:00 PM CEST
Unmasking France’s Violent Wine Extremists
You raise a glass of French wine and you think of the winemaker. You probably imagine someone with sun-soaked wrinkles, his hands as knotty as the vines he tends, sort of a knowing Mother Earth look about him. Maybe you picture him walking the vineyard, gently grazing his thick, worn knuckles against tender green leaves, cupping a cluster of violet-purple grapes, thinking of the vintage to come. Everything’s gorgeous. The sun is shining. He’s fine. You’re fine. You take a sip of his wine and he leaves his vineyard to go set an importer’s office on fire. He is not fine. He’s a member of the Comité Régional d’Action Viticole. Also known as CRAV. A Languedoc-based French wine terrorism organization. Yes, there is absolutely such a thing.
... Link (0 comments) ... Comment