Skip to main content

Home/ Indie Nation/ Group items tagged ground

Rss Feed Group items tagged

John Lemke

ground hum in studio a/c - Gearslutz.com - 0 views

  • The $30 20 minute fix. Go to home depot and get a run of 12 gauge green wire, a pair of wire strippers and a pipe ground. Attach the pipe ground to the cold water pipe in your basement that comes from the street. Attach the wire to the pipe ground and run it into your studio. Turn off the circuit breaker and open the outlet(s) and remove the ground that is there and replace it with the wire from the basement. Turn on the circuit breaker. Done and done.
  • your best bet it to drive an actual ground rod (theyre pretty cheap) in your basement 10' deep or so ... then use the grounding techniques as above.... consider using braided wire as well, the larger surface area is better at 'grabbing' and grounding RFI
John Lemke

Spy Babe Now Wants to Design Astronaut Outfits | Danger Room | Wired.com - 0 views

  •  
    Is your national space program fashion-forward enough? Astronauts getting a little frumpy after the Cold War? Having trouble getting that space plane off the ground? Why not lift morale and brighten up the place with some fierce new uniforms designed by planet Earth's most infamous ex-spy? Yes, Russia's famously outed sleeper agent Anna Chapman is back in yet another installment of her merciless publicity tour. This time, she's looking to help the ground crew at Khrunichev State Research and Production Space Center work it down the runway in style. Frilly epaulets for all! "Chapman told me that she intends to participate in designing clothing for the Khrunichev [Space] Center, in what capacity, designer or financially, she did not specify," the Gagarin Astronaut Training Center's top astronaut told Russian state media today.
John Lemke

Japan may send chatty humanoid tweet-bot to space - Yahoo! Finance - 0 views

  •  
    Japan's space agency is considering putting a talking humanoid robot on the International Space Station to watch the mission while astronauts are asleep, monitor their health and stress levels and communicate to Earth through the microblogging site Twitter. Japan's space agency JAXA announced this week that it is looking at a plan to send a humanoid robot to the space station in 2013 that could communicate with the ground through Twitter -- primarily feeding photos, rather than original ideas -- and provide astronauts with "comfort and companionship."
John Lemke

Recording Industry Rep Suggests Parents Should Slap Their Children To Stop Piracy | Tec... - 0 views

  • A ruling handed down yesterday by Germany's highest court represents a blow to rightsholders in their quest to clamp down on illicit file-sharing. The court ruled that the parents of a teenager who had made available more than 1,100 songs on file-sharing networks can not be held responsible for their son's infringements, nor be required to monitor or hinder his online activities.
  • The Court ruled that the parents had met their parental obligations when they informed their child of "basic do's and don'ts" including that file-sharing copyrighted content online is illegal. Furthermore, the Court ruled that the parents were not required to monitor their child's online activities nor install special software to restrict his online behavior. This would only be required should the parents have "reasonable grounds" to presume that their child would engage in infringing activities online.
John Lemke

Man allegedly steals $100k coin collection then spends for face value on pizza and a mo... - 2 views

  • Garren denied the accusation back in May, telling police they, "didn't have any evidence against him," according to a report filed in Cowlitz County Superior Court.
  • But then Garren and Massman allegedly began using the coins at local establishments, spending them at face value, including a quarter that is estimated to be worth thousands of dollars. The Daily News reports the collection includes a variety of rare coins included Liberty Head quarters, Morgan dollars and several others dating back to the early 1800's, After police conducted their investigation, they now say the couple spend several 1930's coins at a Battle Ground area movie theater, using quarters worth between $5 and $68 each. Later on the same day, they then spend more of the coin collection at a local pizza restaurant, including a Liberty quarter with an estimated value between $1,100 and $18,500.
    • John Lemke
       
      I like the "but then" ... like he thought.. better ditch the evidence... no on will notice some of these coins are TWO centuries old"
John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
John Lemke

New Zealand Launched Mass Surveillance Project While Publicly Denying It - The Intercept - 0 views

  • Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders.
  • Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key (pictured above), who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”
  • Snowden explained that “at the NSA, I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called ‘X KEYSCORE.”" He further detailed that “the GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB facility in Waihopai, and the Prime Minister is personally aware of this fact.”
  • ...4 more annotations...
  • Top secret documents provided by the whistleblower demonstrate that the GCSB, with ongoing NSA cooperation, implemented Phase I of the mass surveillance program code-named “Speargun” at some point in 2012
  • Over the weekend, in anticipation of this report, Key admitted for the first time that the GCSB did plan a program of mass surveillance aimed at his own citizens, but claimed that he ultimately rejected the program before implementation. Yesterday, after The Intercept sought comment from the NSA, the Prime Minister told reporters in Auckland that this reporting was referring merely to “a proposed widespread cyber protection programme that never got off the ground.” He vowed to declassify documents confirming his decision.
  • That legislation arose after it was revealed in 2012 that the GCSB illegally surveilled the communications of Megaupload founder Kim Dotcom, a legal resident of New Zealand. New Zealand law at the time forbade the GCSB from using its surveillance apparatus against citizens or legal residents. That illegal GCSB surveillance of Dotcom was followed by a massive military-style police raid by New Zealand authorities on his home in connection with Dotcom’s criminal prosecution in the United States for copyright violations. A subsequent government investigation found that the GCSB not only illegally spied on Dotcom but also dozens of other citizens and legal residents. The deputy director of GCSB resigned. The government’s response to these revelations was to refuse to prosecute those who ordered the illegal spying and, instead, to propose a new law that would allow domestic electronic surveillance.
    • John Lemke
       
      The Dotcom raid was ruled illegal.  Yet the Dotcom spying was exactly the type of activity of this plan.
  • n high-level discussions between the Key government and the NSA, the new law was clearly viewed as the crucial means to empower the GCSB to engage in metadata surveillance. On more than one occasion, the NSA noted internally that Project Speargun, in the process of being implemented, could not and would not be completed until the new law was enacted.
John Lemke

Stealing Encryption Keys Just by Touching a Laptop - 0 views

  • A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.
  • In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.
  • in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.
  • ...1 more annotation...
  • The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."
1 - 8 of 8
Showing 20 items per page