35700285
submission
Sparrowvsrevolution writes:
At the Defcon security conference later this week, two security researchers will release a tool that aims to expose a little-seen list of hidden private aircraft flight plans–the so-called Block Aircraft Registration Request or BARR list, a collection of aircraft whose owners have tried to keep their whereabouts secret.
Any private jet owner can request to be taken out of the FAA's public database of flight plans. But Dustin Hoffman and Semon Rezchikov found that private flyers' whereabouts are still broadcast in air-traffic control communications. So they developed a speech-to-text system that pulls out planes' tail numbers from those communications almost in real time, often fast enough to post a plane's destination before it lands. In its proof-of-concept version, the site is focusing on Las Vegas airports, but plans to expand to other cities soon.
35687877
submission
An anonymous reader writes:
The processing power available inside modern supercomputers isn’t just able to help us better understand the universe we live in, develop better medicines, and model complex systems. Apparently it is also helping to make better ice cream.
Research has been carried out at the University of Edinburgh to simulate the soft matter that makes up ice cream. More specifically, scientists are trying to understand the complex interactions occurring between the many different ingredients that make up your favorite flavor of the delicious cold stuff.
35687539
submission
gManZboy writes:
A key component of the FAA's emerging "Next Gen" air traffic control system is fundamentally insecure and ripe for manipulation and attack, security researcher Andrei Costin said in a presentation Wednesday at Black Hat 2012. Costin outlined a series of issues related to the Automatic Dependent Surveillance-Broadcast (ADS-B) system, a replacement to the decades-old ground radar system used to guide airplanes through the sky and on the ground at airports. Among the threats to ADS-B: The system lacks a capability for message authentication. "Any attacker can pretend to be an aircraft" by injecting a message into the system, Costin said. There's also no mechanism in ADS-B for encrypting messages. One example problem related to the lack of encryption: Costin showed a screen capture showing the location of Air Force One--or that someone had spoofed the system.
35687247
submission
hypnosec writes:
Apple announced during WWDC 2012 that it is going to ditch Google maps and bring out its own under iOS 6. Did Google sulk? Well no! It started working and in fact raced ahead of Apple in providing 3D maps for iOS. Through a blog post, Google announced that it has now made 3D imagery available on its Google Earth for iOS app. Users of iPhone 4S, iPad 2 or new iPad, while using Google Earth for iOS app, will feel that they are virtually flying over cities.The feature, as of now, works only for 12 regions. Cities for which the 3D imagery is provided are from US with an expectation of a city in Rome. The U.S. cities include: Boulder, Colo., Boston, Charlotte, N.C., Lawrence, Kan., Long Beach, Calif., Los Angeles, Portland, Ore., San Diego, Santa Cruz, Calif., Tampa, Fla., Tucson, Ariz., and San Francisco, plus its East Bay and Peninsula neighbors notes the blog post.
35687203
submission
ananyo writes:
A species of termite found in the rainforests of French Guiana takes altruism seriously: aged workers grow sacks of toxic blue liquid that they explode onto their enemies in an act of suicidal self-sacrifice to help their colonies.
The “explosive backpacks” of Neocapritermes taracua grow throughout the lifetimes of the worker termites, filling with blue crystals secreted by a pair of glands on the insects' abdomens. Older workers carry the largest and most toxic backpacks. Those individuals also, not coincidentally, are the least able to forage and tend for the colony: their mandibles become dull and worn as the termites age, because they cannot be sharpened by moulting (abstract).
35685257
submission
the_newsbeagle writes:
The annual computer poker competition has just wrapped up, in which artificial intelligences battled each other over the (virtual) Texas Hold 'Em table. A researcher who worked on one of the top programs, the University of Alberta's "Hyperborean" program, has blogged about this year's competition and entrants for IEEE Spectrum. His first post explains the rules of the game and why it's tougher for a computer to win at poker than at chess; his second post describes Hyperborean's strategies, and the third gives the results and takes stock of Hyperborean's performance.
35685101
submission
derekmead writes:
Skype has gone under a number of updates and upgrades since it was bought by Microsoft last year, mostly in a bid to improve reliability. But according to a killer report by the Washington Post, Skype has also changed its system to make chat transcripts, as well as users’ addresses and credit card numbers, more easily shared with authorities.
As we’ve already seen with Facebook and Twitter, big Internet firms aren’t digging their heels in against government requests, which shouldn’t come as a shock; pissing off the authorities is bad business. The lesson then is that, while the Internet will always retain a vestige of its Wild West days, as companies get bigger and bigger, they’re either going to play ball with governments or go the way of Kim Dotcom.
35684621
submission
sfcrazy writes:
During LinuxCon this year one of the lead Linux kernel developers, Alan Cox, pointed at the challenge the community is facing in terms of gender gap. Unlike other areas where women are in leadership positions open source is an exception. So, we are starting an interview series on Muktware 'Woman Force In Open Source' where we will feature one female developer/executive every week. We are starting this series with Elizabeth Krumbach the winner of the O'Reilly Open Source Award.
35683597
submission
silentbrad writes:
From the Financial Post: "Fast-evolving biometric technologies are promising to deliver the most convenient, secure connection possible between you and your bank account — using your body itself in place of all of those wallets and purses stuffed with cash, change and plastic cards. Biometrics is the science of humans’ physiological or behaviourial characteristics and it’s being used to develop technology that recognizes and matches unique patterns in human fingerprints, faces and eyes and even sweat glands and buttock pressure. Its applications in the financial realm are a potentially huge time and effort saver, but that’s just a beginning for the technology’s usefulness. ... [BIOPTid Inc.]’s One Touch cube, set to be on the market within a year, is an external device that users can hook up to their computers and mobile electronics to replace passwords for Internet logins and banking. The cube reads a personal sweat gland barcode to verify identity from the moisture on a user’s fingertip. ... “Biometrics is something that’s used by governments, it’s used by ‘Big Brother’ to keep an eye on us and we want to change that,” says Mr. McNulty. “We think biometrics is something that can be actually used by the people and it becomes their technology that they use to protect themselves.”
35683479
submission
mikejuk writes:
The SKD for the new Windows Phone 8 has been leaked via a Chinese website. What it reveals for the developer is that WP8 is a restart. You can convert your existing WP7 Silverlight apps to the new WinPRT API but you can't create or maintain existing Silverlight or XNA applications that target WP8. You can't even convert existing XNA apps except by hand.
There are also enough differences between Windows 8 WinRT apps and WP8 apps to make life difficult.
The final big shock is that JavaScript apps are not supported. So basically if you developed your Windows 8 app using JavaScript thinking that you could port it to WP8 you are out of luck.
So in one move Microsoft has upset a good range of developers. WP7 Silverlight and XNA apps are now legacy and JavaScript apps just have to wait their turn.
It probably would have been better to stick to WP7 and just make it a bit better.
35683297
submission
Quantus347 writes:
I am trying to convince a number of people to give Linux a chance, arguing that it has come a long way on the road of consumer usability. Can you, oh Wise Ones of Slashdot, recommend a Lunix setup that will be as similar as possible to a Windows environment (Windows 7 or XP). These people hate and fear change, and so will latch onto nearly any noticeable differences, so I'm thinking in terms of both front end functionality and the look of the interface. It would also be very important for them to have to go to the command line as little as possible during daily use (meaning as close to never as can be managed).
35681873
submission
Zothecula writes:
The current U.S. space suit used by NASA is a dinosaur. Designed in 1992, it was only ever intended to be used by crews aboard the Space Shuttle and the International Space Station (ISS). That may have been good enough in the days of 14 kps modems, but with eyes turning increasingly toward missions to the Moon, Mars and the asteroids, space explorers need something better. That’s why NASA is designing its first new suit in twenty years. Developed by NASA’s Advanced Exploration Systems (AES), the Z-1 prototype space suit currently undergoing vacuum testing at the Johnson Space Center is a wearable laboratory of new technology. And it’s a hatchback.