Skip to main content

Home/ Aasemoon'z Cluster/ Group items tagged security

Rss Feed Group items tagged

Aasemoon =)

IEEE Spectrum: Avoid Microsoft Internet Explorer, German Security Agency Says - 2 views

  • The German government's Bundesamt für Sicherheit in der Informationstechnik (BSI) (or in English, the Federal Office for Information Security) is reported to have told German citizens to avoid all versions of Microsoft Internet Explorer (IE) until security flaws that are suspected to allowing Google and other companies in China to be successfully hacked are fixed.
  •  
    Hahaha... as if we didn't know already.... =))
  •  
    so in other words, avoid the use of a personal computer altogether, because your safety and security cannot be guaranteed under any circumstances, unless you are running a Mac, right?
  •  
    Well not exactly... just avoid IE as much as possible. ;)
Aasemoon =)

IEEE Spectrum: Cracking Security Codes: Does It Matter? - 0 views

  • The past week or so there have been two stories about very secure system protocols being able to be successfully hacked by researchers. The first concerned the report by the AP that Christopher Tarnovsky, a former U.S. Army computer-security specialist and who now runs the Flylogic security company, was able to crack open (literally) a Trusted Platform Module or TPM and obtain its cryptographic keys. This hadn't been done before, or at least admitted to publicly.
Aasemoon =)

IEEE Spectrum: Torturing the Secret out of a Secure Chip - 0 views

  • A new chink has been found in the cryptographic armor that protects bank transactions, credit-card payments, and other secure Internet traffic. And although programmers have devised a patch for it, clever hackers might still be able to break through. The hack, presented in March at a computer security conference in Dresden, Germany, involves lowering the input voltage on a computer’s cryptography chip set and collecting the errors that leak out when the power-starved chips try and (sometimes) fail to encode messages. Crooks would then use those errors to reconstruct the secret key on which the encryption is based. More important, say the hack’s creators, the same attack could also be performed from afar on stressed systems, such as computer motherboards that run too hot or Web servers that run too fast.
Aasemoon =)

Channel 9: Videos about the people building Microsoft Products & Services - 0 views

  • Dr. Cormac Herley spends most of his time thinking about why and how computer users reject security advice (originating from both fellow humans and software security warning prompts). Recently, his paper So Long, and No Thanks for the Externalities: the Rational Rejection of Security Advice by Users, received a fair amount of attention from the general media (Boston Globe, Tech Republic, NPR, etc). The paper also prompted our favorite software renegade, Dr. Erik Meijer, to send me an email simply asking "please set up and E2E with Cormac Herley". I did just that and the following conversation is what happened...
Aasemoon =)

How to Cheat at Securing a Wireless Network--Wireless Network Design--Part V - 0 views

  • In traditional short-haul microwave transmission (that is, line-of-sight microwave transmissions operating in the 18 GHz and 23 GHz radio bands),RF design engineers typically are concerned with signal aspects such as fade margins, signal reflections, multipath signals, and so forth. Like an accountant seeking to balance a financial spreadsheet, an RF design engineer normally creates an RF budget table, expressed in decibels (dB), in order to establish a wireless design. Aspects like transmit power and antenna gain are registered in the assets (or plus) column, and free space attenuation, antenna alignment, and atmospheric losses are noted in the liabilities (or minus) column. The goal is to achieve a positive net signal strength adequate to support the wireless path(s) called for in the design.
Aasemoon =)

ALSOK Security Robot Patrols Gallery - 0 views

  • ALSOK, a security firm that specializes in robot guards, has sent their drones into shopping malls, office buildings, and museums.  This video shows one of them patrolling an art gallery.  Not surprisingly, even in Japan, the sight of a robot patrolling its beat is more than enough to distract some of the visitors from the actual works of art!
Aasemoon =)

Vigilant camera eye - Research News 09-2010-Topic 6 - Fraunhofer-Gesellschaft - 0 views

  • An innovatice camera system could in future enhance security in public areas and buildings. Smart Eyes works just like the human eye. The system analyzes the recorded data in real time and then immediately flags up salient features and unusual scenes.  »Goal, goal, goal!« fans in the stadium are absolutely ecstatic, the uproar is enormous. So it‘s hardly surprising that the security personnel fail to spot a brawl going on between a few spectators. Separating jubilant fans from scuffling hooligans is virtually impossible in such a situation. Special surveillance cameras that immediately spot anything untoward and identify anything out of the ordinary could provide a solution. Researchers from the Fraunhofer Institute for Applied Information Technology FIT in Sankt Augustin have now developed such a device as part of the EU project »SEARISE – Smart Eyes: Attending and Recognizing Instances of Salient Events«. The automatic camera system is designed to replicate human-like capabilities in identifying and processing moving images.
Aasemoon =)

Embedded.com - Protecting FPGAs from power analysis security vulnerabilities - 0 views

  • Recent advances in the size and performance of FPGAs, coupled with advantages in time-to-market, field-reconfigurability and lower up-front costs, make FPGAs ideally suited to a wide range of commercial and defense applications [6]. In addition, FPGAs generality and reconfigurability provide important protections against the introduction of Trojan horses during semiconductor manufacturing process[8]. As a result, FPGA applications increasingly involve highly-sensitive intellectual property and trade-secrets, as well as cryptographic keys and algorithms [7].
Aasemoon =)

Signal processing library speeds up video analytics deployment - 0 views

  • Pico Computing has developed a signal processing library which is made up of a set of FPGA firmware components and related tools that speed the development and deployment of advanced video and network analytics for security, defense and aerospace applications.The library, which includes flexible components for signal analysis, feature detection, scale-space generation, correlation and filtering, has been validated and optimized for Pico Computing platforms based on the latest-generation Xilinx Virtex-5 and Virtex-6 FPGA devices.
Aasemoon =)

Holograms from the Nano Cosmos - 1 views

  • Everyone knows holograms from their everyday life, for instance the ones applied to credit cards as security indicators. Unlike a photography of an object which only records the amplitude of the light wave coming from the object, the hologram also includes local information about the light wave's phase. In appropriate lighting, the initial wave front is reconstructed in proper phase and the spectator has a three dimensional sensation of the object. But it is not this characteristic of holography that is central when it comes to the imaging of small structures, but the fact that for the recording of a hologram no lenses are required at all. In order to conduct research on nanometer scaled objects, light of an equally small wave length is needed (soft X-rays). The only lenses working in this wave spectrum (so-called Fresnel zone plates) are very sophisticated in design and still yield a quality of imaging one scale inferior then lenses for visible light. The modus operandi of recording holograms without the use of lenses is to superimpose the light wave having radiated the object at the time of recording with a reference wave having a known and stable (coherent) phase.
Aasemoon =)

Image stabilizers | Video/Imaging DesignLine - 0 views

  • Image stabilization remains a major challenge for video cameras, from high-end cinema and broadcast units down through consumer camcorders. Although a variety of technologies now exist to stabilize images, they are typically complex and come at a steep price, making them impractical for most applications. Yet some end users often swallow that cost simply because the alternative can be more expensive. For example, an intricate shot on a movie set could cost hundreds of thousands of dollars to recreate if the first take can't be used because it turned out to be too shaky. Of course, not every end user can justify that expense. So what's needed is a solution that can scale from the low end to the high end, with no trade-offs along the way in terms of price and performance. That's a tall order, but meeting it creates a huge market opportunity. For example, besides applications such as broadcast, cinema and consumer cameras, the technology also could be used in verticals such as government and security.
Aasemoon =)

Microchip/Google PowerMeter - 0 views

  • Google PowerMeter allows consumers to access their power consumption data through a secure, Web-based iGoogle™ gadget. As a Strategic Partner, Microchip incorporated the recently announced Google PowerMeter API to create a Reference Implementation, which makes it much easier to develop products that are compatible with Google PowerMeter. Microchip's Reference Implementation demonstrates the device's activation, data transmission and status messages using readily available Microchip development tools. It can be used as a template for developers' own designs.
Aasemoon =)

IEEE Spectrum: The Wave Function and Quantum Dots: Nanotechnology Videos - 0 views

  • The other day I was critical of the UK’s nanotechnology strategy document. However, I am a great admirer of the UK scientists and engineers working in the field of nanotechnology, which makes the recent strategy document such a double disappointment. To sort of atone for my criticism, I wanted to highlight a UK-based researcher, Professor Philip Moriarty at the University of Nottingham, who first came to my attention a few years back on the pages of Richard Jones’ blog Soft Machines , when Moriarty had organized a debate on the subject of radical nanotechnology, otherwise known as molecular nanotechnology. I also recently noted his ability to secure funding for his research to test the theories of molecular manufacturing, and wondered if he can do it why aren’t more molecular manufacturing theorists doing it.
Aasemoon =)

Dr Dobbs - Memory Management as a Separate Thread - 0 views

  • Researchers at North Carolina State University have developed a new approach to software development that will allow common computer programs to run up to 20 percent faster and possibly incorporate new security measures. The researchers have found a way to run different parts of some hard-to-parallelize programs — such as word processors and web browsers — at the same time, which makes the programs operate more efficiently.
Aasemoon =)

IEEE Spectrum: Interesting FBI Definition of "Minor" Technical Issues in Sentinel Project - 0 views

  • As I noted last week, US Federal Bureau of Investigation (FBI) Director Robert Mueller told the US House Appropriations Committee’s Subcommittee on Commerce, Justice, Science, and Related Agencies that the follow-on to the notoriously failed $170 million Virtual Case File program called Sentinel would once again slip its schedule and cost targets. The latest cost estimate is in excess of $481 million with a total program slip now of some two years and counting.    Director Mueller told the House Committee that the FBI decided to suspend work on Sentinel in early March to correct some "minor" technical issues and make some design changes. These issues included, according to the New York Times, "slow response times, awkward display pages and screen print that was too small."
Aliyah Rush

Instant Fix Slow Computer Solutions - 1 views

I bought a brand new PC with good specifications just last month. But only three weeks of use, I noticed that my PC froze and slowed down a bit. For the next three days, it continued to slow down. ...

fix slow computer

started by Aliyah Rush on 07 Jun 11 no follow-up yet
1 - 16 of 16
Showing 20 items per page