Skip to main content

Home/ Open Web/ Group items tagged computer

Rss Feed Group items tagged

Paul Merrell

The Internet May Be Underwater in 15 Years - 0 views

  • When the internet goes down, life as the modern American knows it grinds to a halt. Gone are the cute kitten photos and the Facebook status updates—but also gone are the signals telling stoplights to change from green to red, and doctors’ access to online patient records. A vast web of physical infrastructure undergirds the internet connections that touch nearly every aspect of modern life. Delicate fiber optic cables, massive data transfer stations, and power stations create a patchwork of literal nuts and bolts that facilitates the flow of zeros and ones. Now, research shows that a whole lot of that infrastructure sits squarely in the path of rising seas. (See what the planet would look like if all the ice melted.) Scientists mapped out the threads and knots of internet infrastructure in the U.S. and layered that on top of maps showing future sea level rise. What they found was ominous: Within 15 years, thousands of miles of fiber optic cable—and hundreds of pieces of other key infrastructure—are likely to be swamped by the encroaching ocean. And while some of that infrastructure may be water resistant, little of it was designed to live fully underwater. “So much of the infrastructure that's been deployed is right next to the coast, so it doesn't take much more than a few inches or a foot of sea level rise for it to be underwater,” says study coauthor Paul Barford, a computer scientist at the University of Wisconsin, Madison. “It was all was deployed 20ish years ago, when no one was thinking about the fact that sea levels might come up.”
  • “This will be a big problem,” says Rae Zimmerman, an expert on urban adaptation to climate change at NYU. Large parts of internet infrastructure soon “will be underwater, unless they're moved back pretty quickly.”
Paul Merrell

Free Software Pioneer Quits MIT Over His Comments On Epstein Sex Trafficking Case : NPR - 0 views

  • Free software pioneer and renowned computer scientist Richard Stallman resigned from his post at MIT following recent comments about one of Jeffrey Epstein's sex trafficking accusers. He also resigned as president of the Free Software Foundation.
Paul Merrell

WikiLeaks Reveals Details Of CIA "Archimedes" Tool Used To Hack Local Area Networks - 0 views

  • In its seventh CIA leak since March 23rd, WikiLeaks has just revealed the user manual of a CIA hacking tool known as ‘Archimedes’ which is purportedly used to attack computers inside a Local Area Network (LAN).  The CIA tool works by redirecting a target’s The CIA tool works by redirecting a target’s web page search to a CIA server which serves up a web page that looks exactly like the original page they were expecting to be served, but which contains malware. It’s only possible to detect the attack by examining the page source.
Paul Merrell

'Shadow Brokers' give away more NSA hacking tools - 0 views

  • The elusive Shadow Brokers didn't have much luck selling the NSA's hacking tools, so they're giving more of the software away -- to everyone. In a Medium post, the mysterious team supplied the password for an encrypted file containing many of the Equation Group surveillance tools swiped back in 2016. Supposedly, the group posted the content in "protest" at President Trump turning his back on the people who voted for him. The leaked data appears to check out, according to researchers, but some of it is a couple of decades old and focused on platforms like Linux. If anything, the leak might backfire. Edward Snowden notes that while the leak is "nowhere near" representing the NSA's complete tool set, there's enough that the NSA should "instantly identify" where and how the kit leaked. This doesn't mean the Shadow Brokers themselves are about to face capture. However, this may give the agency info it needs to both connect the dots (how much of a role did NSA contractor Harold Thomas Martin III play in the online leak, for instance?) and prevent a repeat incident.Does this open a can of worms? It's hard to say -- researchers are still combing over the data. If there are any hacks that can be made useful, though, this could be problematic for server operators worried about cybercrime. If nothing else, it shows that the Shadow Brokers didn't reveal their full hand.
Paul Merrell

Trump administration pulls back curtain on secretive cybersecurity process - The Washin... - 0 views

  • The White House on Wednesday made public for the first time the rules by which the government decides to disclose or keep secret software flaws that can be turned into cyberweapons — whether by U.S. agencies hacking for foreign intelligence, money-hungry criminals or foreign spies seeking to penetrate American computers. The move to publish an un­classified charter responds to years of criticism that the process was unnecessarily opaque, fueling suspicion that it cloaked a stockpile of software flaws that the National Security Agency was hoarding to go after foreign targets but that put Americans’ cyber­security at risk.
  • The rules are part of the “Vulnerabilities Equities Process,” which the Obama administration revamped in 2014 as a multi­agency forum to debate whether and when to inform companies such as Microsoft and Juniper that the government has discovered or bought a software flaw that, if weaponized, could affect the security of their product. The Trump administration has mostly not altered the rules under which the government reaches a decision but is disclosing its process. Under the VEP, an “equities review board” of at least a dozen national security and civilian agencies will meet monthly — or more often, if a need arises — to discuss newly discovered vulnerabilities. Besides the NSA, the CIA and the FBI, the list includes the Treasury, Commerce and State departments, and the Office of Management and Budget. The priority is on disclosure, the policy states, to protect core Internet systems, the U.S. economy and critical infrastructure, unless there is “a demonstrable, overriding interest” in using the flaw for intelligence or law enforcement purposes. The government has long said that it discloses the vast majority — more than 90 percent — of the vulnerabilities it discovers or buys in products from defense contractors or other sellers. In recent years, that has amounted to more than 100 a year, according to people familiar with the process. But because the process was classified, the National Security Council, which runs the discussion, was never able to reveal any numbers. Now, Joyce said, the number of flaws disclosed and the number retained will be made public in an annual report. A classified version will be sent to Congress, he said.
Paul Merrell

Asia Times | Say hello to the Russia-China operating system | Article - 0 views

  • Google cuts Huawei off Android; so Huawei may migrate to Aurora. Call it mobile Eurasia integration; the evolving Russia-China strategic partnership may be on the verge of spawning its own operating system – and that is not a metaphor. Aurora is a mobile operating system currently developed by Russian Open Mobile Platform, based in Moscow. It is based on the Sailfish operating system, designed by Finnish technology company Jolla, which featured a batch of Russians in the development team. Quite a few top coders at Google and Apple also come from the former USSR – exponents of a brilliant scientific academy tradition.
  • No Google? Who cares? Tencent, Xiaomi, Vivo and Oppo are already testing the HongMeng operating system, as part of a batch of one million devices already distributed. HongMeng’s launch is still a closely guarded secret by Huawei, but according to CEO Richard Yu, it could happen even before the end of 2019 for the Chinese market, running on smartphones, computers, TVs and cars. HongMeng is rumored to be 60% faster than Android.
  • Aurora could be regarded as part of Huawei’s fast-evolving Plan B. Huawei is now turbo-charging the development and implementation of its own operating system, HongMeng, a process that started no less than seven years ago. Most of the work on an operating system is writing drivers and APIs (application programming interfaces). Huawei would be able to integrate their code to the Russian system in no time.
  • ...2 more annotations...
  • The HongMeng system may also harbor functions dedicated to security and protection of users’ data. That’s what’s scaring Google the most; Huawei developing a software impenetrable to hacking attempts. Google is actively lobbying the Trump administration to add another reprieve – or even abandon the Huawei ban altogether. By now it’s clear Team Trump has decided to wield a trade war as a geopolitical and geoeconomic weapon. They may have not calculated that other Chinese producers have the power to swing markets. Xiaomi, Oppo and Vivo, for instance, are not (yet) banned in the US market, and combined they sell more than Samsung. They could decide to move to Huawei’s operating system in no time.
  • The existence of Lineage operating system is proof that Huawei is not facing a lot of hurdles developing HongMeng – which will be compatible with all Android apps. There would be no problem to adopt Aurora as well. Huawei will certainly open is own app store to compete with Google Play.
Paul Merrell

Chinese military to replace Windows OS amid fears of US hacking | ZDNet - 0 views

  • Amidst an escalating trade war and political tensions with the US, Beijing officials have decided to develop a custom operating system that will replace the Windows OS on computers used by the Chinese military.
  • Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux servers, and from routers to common desktop operating systems, such as Windows and Mac.Since these leaks have revealed that the US can hack into almost anything, the Chinese government's plan is to adopt a "security by obscurity" approach and run a custom operating system that will make it harder for foreign threat actors -- mainly the US -- to spy on Chinese military operations.
saiedootech

كود معرفة رصيد اتصالات مجانا - سـعـيـدو تــــك - 0 views

  •  
    معرفة رصيد اتصالات او معرفة الرصيد عموما لكل الشبكات هي خدمة أساسية تقدمها شركات الاتصالات جميعا إلى جميع عملائها ومن ضمنهم شبكة اتصالات، ويعتبر معرفة رصيد اتصالات خدمة من خدمات عديدة ومتنوعة تقدمها شركة اتصالات......
  •  
    معرفة رصيد اتصالات او معرفة الرصيد عموما لكل الشبكات هي خدمة أساسية تقدمها شركات الاتصالات جميعا إلى جميع عملائها ومن ضمنهم شبكة اتصالات، ويعتبر معرفة رصيد اتصالات خدمة من خدمات عديدة ومتنوعة تقدمها شركة اتصالات......
saiedootech

أهم ارقام خدمة عملاء اتصالات لسنة 2023 - سـعـيـدو تــــك - 0 views

  •  
    ارقام خدمة عملاء اتصالات مهمه جدا للذين يوردن الراحة والاحترافية عند التواصل مع خدمة العملاء، فإذا كنت تبحث عن رقم يوفر لك الدعم الممتاز والحلول السريعة لمشاكلك واستفساراتك؟ إذاً اتبع معي هنا سأقدم لك مجموعة من أرقام خدمة العملاء التابعة لشركة الاتصالات......
  •  
    ارقام خدمة عملاء اتصالات مهمه جدا للذين يوردن الراحة والاحترافية عند التواصل مع خدمة العملاء، فإذا كنت تبحث عن رقم يوفر لك الدعم الممتاز والحلول السريعة لمشاكلك واستفساراتك؟ إذاً اتبع معي هنا سأقدم لك مجموعة من أرقام خدمة العملاء التابعة لشركة الاتصالات.......
saiedootech

أهم أكواد باقات انترنت اتصالات 2023 - سـعـيـدو تــــك - 0 views

  •  
    باقات انترنت اتصالات يجب عليك معرفتها كونك عميل لدى اتصالات حيث يمكنك الاستمتاع بأفضل تجربة اتصالات إنترنت مع باقات انترنت اتصالات السريعة والموثوقة! احصل على الأكواد الخاصة بباقات الإنترنت المذهلة والمناسبة لاحتياجاتك.....
  •  
    باقات انترنت اتصالات يجب عليك معرفتها كونك عميل لدى اتصالات حيث يمكنك الاستمتاع بأفضل تجربة اتصالات إنترنت مع باقات انترنت اتصالات السريعة والموثوقة! احصل على الأكواد الخاصة بباقات الإنترنت المذهلة .......
saiedootech

كيفية تحويل الرصيد من هاتف الي اخر اتصالات - سـعـيـدو تــــك - 0 views

  •  
    مما لا شك فيه بأنه يجب عليك معرفة كيفية تحويل الرصيد من هاتف الي اخر اتصالات، فإذا كنت لا تملك المعلومات الكافية عن خدمة تحويل الرصيد وترغب فى معرفة كافة المعلومات حول كيفية تحويل رصيدك من هاتفك إلى هاتف آخر في شبكة اتصالات........
  •  
    مما لا شك فيه بأنه يجب عليك معرفة كيفية تحويل الرصيد من هاتف الي اخر اتصالات، فإذا كنت لا تملك المعلومات الكافية عن خدمة تحويل الرصيد وترغب فى معرفة كافة المعلومات حول كيفية تحويل رصيدك من هاتفك إلى هاتف آخر في شبكة اتصالات........
saiedootech

كود تحويل مكسات اتصالات 2023 - سـعـيـدو تــــك - 0 views

  •  
    إذا كنت من مستخدمى شركة اتصالات مصر فلابد لك من معرفة كود تحويل مكسات اتصالات لرقم اخر، ففى بعض الاحيان قد تكون مُطٌر بشكل أو باخر لأمر طارئ الى تحويل مكسات اتصالات لرقم اخر. فهي خدمة مميزة من شركة اتصالات حيث من خلال .........
  •  
    إذا كنت من مستخدمى شركة اتصالات مصر فلابد لك من معرفة كود تحويل مكسات اتصالات لرقم اخر، ففى بعض الاحيان قد تكون مُطٌر بشكل أو باخر لأمر طارئ الى تحويل مكسات اتصالات لرقم اخر. فهي خدمة مميزة من شركة اتصالات حيث من خلال .........
saiedootech

التحدث مع خدمة عملاء we - سـعـيـدو تــــك - 0 views

  •  
    هل تحتاج إلى المساعدة في حل مشكلة أو الحصول على معلومات حول اى تفاصيل تخص خطك؟ هل ترغب في التحدث مع خدمة عملاء we، التواصل مع خدمة العملاء لتلبية احتياجاتك؟ اكتشف كيف يمكنك التحدث مع خدمة العملاء بكل سهولة ويسر. سواء كنت تفضل الاتصال .........
  •  
    هل تحتاج إلى المساعدة في حل مشكلة أو الحصول على معلومات حول اى تفاصيل تخص خطك؟ هل ترغب في التحدث مع خدمة عملاء we، التواصل مع خدمة العملاء لتلبية احتياجاتك؟ اكتشف كيف يمكنك التحدث مع خدمة العملاء بكل سهولة ويسر. سواء كنت تفضل الاتصال .........
« First ‹ Previous 401 - 413 of 413
Showing 20 items per page