×
Earth

Submission + - Is There Still a Ray of Hope on Climate Change? 1

Hugh Pickens writes writes: "David Leonhardt writes in the NY Times that even as the US endures its warmest year on record, and the 13 warmest years for the entire planet have all occurred since 1998, the country seems to be moving further away from doing something about climate change, with the issue having all but fallen out of the national debate. But behind the scenes a different story is emerging that offers reason for optimism as the world’s largest economies may be in the process of creating a climate-change response that does not depend on the politically painful process of raising the price of dirty energy and despite some high-profile flops, like ethanol and Solyndra, clean-energy investments seem to be succeeding more than they are failing. "The price of solar and wind power have both fallen sharply in the last few years. This country’s largest wind farm, sprawling across eastern Oregon, is scheduled to open next month. Already, the world uses vastly more alternative energy than experts predicted only a decade ago," writes Leonhardt. Natural gas, whose use has jumped 25 percent since 2008, while prices have fallen more than 80 percent, now generates as much electricity as coal in the United States, which would have been unthinkable not long ago and thanks in part to earlier government investments, energy companies have been able to extract much more natural gas than once seemed possible which, while far from perfectly clean, is less carbon-intensive than coal use. The clean-energy push has been successful enough to leave many climate advocates believing it is the single best hope for preventing even hotter summers, concludes Leonhardt adding that while a cap-and-trade program faces an uphill political battle, an investment program that aims to make alternative energy less expensive is more politically feasible. “Our best hope,” says Benjamin H. Strauss, “is some kind of disruptive technology that takes off on its own, the way the Internet and the fax took off.”"
Android

Submission + - Samsung: Apple wouldn't have sold a single iPhone without stealing our tech (bgr.com) 1

zacharye writes: Another day, another Apple (AAPL) vs. Samsung (005930) trial. The two consumer electronics companies are preparing to do battle in San Jose, California next week, and now-public court documents shed light on the positions each firm is taking. On Tuesday, Apple told Samsung exactly what it thinks its technology patents are worth (spoiler: barely anything at all), and subsequent filings from Samsung reveal that the South Korea-based company has a few choice words for Apple as well...
Hardware

Submission + - Testing the impact of Software Upgrades, Hyper-Threading on 3D Workstations (extremetech.com)

Dputiger writes: Companies like Autodesk release software updates every year at several thousand dollars each, but if you work in this field, are you better off sticking with a relatively recent suite and buying new hardware — or should you spring for the updates? The answer — especially with 3ds Max 2012 — might surprise you.

Submission + - Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontrol (extremetech.com)

Joe_Dragon writes: "Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontroller

        By Sebastian Anthony on July 25, 2012 at 7:00 am
        5 Comments

Cody Brocious opens an Onity hotel lock with an Arduino microcontroller
Share This article

Bad news: With less than $50 of off-the-shelf hardware and a little bit of programming, it’s possible for a hacker to gain instant, untraceable access to millions of key card-protected hotel rooms.

This hack was demonstrated by Cody Brocious, a Mozilla software developer, at the Black Hat security conference in Las Vegas. At risk are four million hotel rooms secured by Onity programmable key card locks. According to Brocious, who should be scolded for not disclosing the hack to Onity before going public, there is no easy fix: There isn’t a firmware upgrade — if hotels want to secure their guests, every single lock will have to be changed.

The hack in its entirety is detailed on Brocious’s website, but in short: At the base of every Onity lock is a small barrel-type DC power socket (just like on your old-school Nokia phone). This socket is used to charge up the lock’s battery, and to program the lock with a the hotel’s “sitecode” — a 32-bit key that identifies the hotel. By plugging an Arduino microcontroller into the DC socket, Brocious found that he could simply read this 32-bit key out of the lock’s memory. No authentication is required — and the key is stored in the same memory location on every Onity lock.

ArduinoThe best bit: By playing this 32-bit code back to the lock it opens. According to Brocious, it takes just 200 milliseconds to read the sitecode and open the lock. “I plug it in, power it up, and the lock opens,” Brocious says. His current implementation doesn’t work with every lock, and he doesn’t intend to take his work any further, but his slides and research paper make it very clear that Onity locks, rather ironically, lack even the most basic security.

I wish I could say that Brocious spent months on this hack, painstakingly reverse-engineering the Onity lock protocol, but the truth is far more depressing. “With how stupidly simple this is, it wouldn’t surprise me if a thousand other people have found this same vulnerability and sold it to other governments,” says Brocious, in an interview with Forbes. “An intern at the NSA could find this in five minutes.”

That is how he justifies his public disclosure of the vulnerability: If security agencies and private militias already have access to millions of hotel rooms, then this is Brocious’s way of forcing Onity to clean up its act. By informing the public, it also means that we can seek out other methods of securing our rooms — such as chain- or dead-locks on the inside of the room.

As for how Onity justifies such a stupendously disgusting lack of security, who knows. Generally, as far as managerial types go, securing a system seems like a frivolous expense — until someone hacks you. In non-high-tech circles, hacks like this are par for the course — usually, a company doesn’t hire a security specialist until after its first high-profile hack. For a company that is tasked with securing millions of humans every night, though, it would’ve been nice if Onity had shown slightly more foresight."

Now there should be a harder way to get to the ports even having them under a screwed in panel or use a custom port that only the lock maker and hotel have. can make it harder and take more time to brake in.

Security

Submission + - Father of SSH says security is 'getting worse' (networkworld.com)

alphadogg writes: Tatu Ylonen has garnered fame in technology circles as the inventor of Secure Shell (SSH), the widely used protocol to protect data communications. The CEO of SSH Communications Security — whose crypto-based technology invented in 1995 continues to be used in hundreds of millions of computers, routers and servers — recently spoke with Network World on a variety of security topics, including the disappearance of consumer privacy and the plight of SSL. (At the Black Hat Conference this week, his company is also announcing CryptoAuditor.)
The Almighty Buck

Submission + - Senate bill raises possibility of withdrawl from ITER as science cuts loom (nature.com)

ananyo writes: "Are the knives coming out for ITER, the international fusion reactor project based in France? A Senate Department of Energy (DOE) spending bill, yet to be voted on, would cut domestic research for fusion and directs the DOE to explore the impact of withdrawing from ITER. The proposed cuts for domestic fusion research are in line with those proposed in the Obama administration’s budget request but come after the House of Representatives voted to boost ITER funding and to support the domestic programme at almost 2012 levels on 6 June.
US fusion researchers do not want a withdrawal from ITER yet but if the 2014 budget looks at all like the 2013 one, that could change. “They’re not trying to kill ITER just yet,” says Stephen Dean, president of advocacy group Fusion Power Associates. “If this happens again in 2014, I’m not so sure.”
The problems for fusion could be small beans though. The ‘sequester’, a pre-programmed budget cut scheduled to take effect on 2 January, could cut 7.8% or more off science and other federal budgets unless Congress can enact last-minute legislation to reduce the deficit without starving US science-funding agencies."

Book Reviews

Submission + - Core Python Applications Programming, 3rd Edition

thatpythonguy writes: "Prentice Hall publishers bring you a new book for the intermediate Python programmer, authored by a veteran engineer, author, and trainer. The book promises to answer the question "Now what?" of the budding programmer how has learned the language and is looking for avenues to apply that knowledge!

Review Text:
==========
Core Python Application Programming is the latest addition to a growing corpus of literature serving a growing number of Python programmers and engineers. This Prentice Hall book of 800+ pages covers some traditional areas and touches upon some new ones.

I typically do not spend much time speaking about the author of the books that I review; however, this occasion warrants an exception! And it is not because Wesley Chun used Python over a decade ago to build the address book and spell-checker for Yahoo! Mail nor is it because he holds a minor degree in music from UC Berkeley in classical piano. Rather, it is because he is both an engineer and an instructor. In other words, he was not pulled from his geek duties and asked to become a pseudo-writer; he already does that for his consulting practice, authoring (or co-authoring) several books and articles on Python (including "Python Web Development with Django") as well as starring in his own training video (entitled "Python Fundamentals"). The result of that experience is a writing style that is technically sound, yet accessible.

The book followed the normal evolutionary path of other books in its class. It started out as the second part of "Core Python Programming" and ended up being split into its own volume in its third edition. The first part became "Core Python Language Fundamentals" which covers the core language. This volume covers the natural successor topics of "now what?" that the first raises: the use of Python in various applications. It is for this reason that the book recommends that the reader be an intermediate Python programmer. I think "intermediate" here refers to anyone who has read an introductory book or followed a tutorial on the core language.

The book covers the two main lines of python development: 2.x and 3.x. Despite the slow adoption of the 3.x line due to its backward incompatibility, there are already popular third-party libraries that have been ported to that line and that occurrence will only increase moving forward. Chun does a very good job balancing the two by providing concurrent examples (i.e., code snippets) in both flavours. He also has numerous references and side notes indicating that certain features/libraries are only available for certain versions of the language.

There are three parts to the book: General Application Topics, Web Development, Supplemental/Experimental. The first includes the usual dosage of general chapters including regular expressions (regex), network programming (including an intro to the Twisted framework), Internet client programming, threading and multi-processing, GUI, and databases (including a taste of NoSQL). It is peculiar that it also includes chapters on Microsoft Office programming and writing Python extensions which are not general in my opinion. It is probably because these two chapters do not fit anywhere else! The second part is probably the core of Chun's own experience as he is a self-described "web guy". He certainly goes into details in that domain covering web clients/servers (yes, he writes a small web server!), general web programming (i.e., CGI and WSGI), the Django framework, cloud computing (mostly Google App Engine; GAE), and web services. Finally, the last part has two chapters on text processing and miscellaneous topics (basically, Jython and Google+). I find the naming of the text processing chapter rather poor given that it is about processing comma-separated values (CSV), JavaScript Object Notation (JSON), and Extensible Markup Language (XML). Arguably, "text processing" is more descriptive of regex, transcoding, and Unicode! Two appendices at the end of the book provide some background and a guide to Python 3.x migration.

Chun spends some time delving into a problem domain in addition to providing the Python solution. For example, he describes the regular expression syntax in detail and spends time explaining the client-server architecture using real-life analogies to drive his points home. His code examples are well-structured, object-oriented solutions that range from the demonstrative to the practical. For example, in the Django chapter, he builds a practical Twitter application that uses third-party libraries and some advanced features. However, do not expect a cookbook-style coverage nor production-ready code from a book of this nature. Do expect many exercises with partial solutions at the end of the book.

I find Chun's approach to be pedagogically sound. His ideas flow logically from one to the next, incrementally building a story-like chain of problems and Python solutions. He highlights architectural patterns that are shared by disparate problem domains (e.g., the event-driven nature of SocketServer and Tkinter), leading to a better understanding of both. However, he does leave out many topics from his coverage for applications in compression, cryptography, and date handling (among others). Maybe he considers these to be ancillary or simple enough to be looked up in Python's own standard library documentation. Also, as a Developer Advocate for Google, it is not surprising to see him cover the GAE in depth. Specifically, I think for anyone who is interested in running Django on the GAE, he can be an excellent (and accessible, by his own admission) resource. Google him (no pun intended!) to see his presentation on "porting" Django applications to the GAE.

Finally, the book is aesthetically type-set and is well-structured. I think that it has a wealth of well-written information that cover key areas of Python application development that will be useful to a broad spectrum of readers.

Ahmed Al-Saadi is a software consultant based in Montreal, Canada. He mainly speaks Python, Erlang, and Objective-C these days."
Government

Submission + - City Council Ordered To Stop CCTV In Taxi Cabs (techweekeurope.co.uk)

judgecorp writes: "Southampton Council in the UK has been ordered to stop snooping on every taxi cab in the city. Privacy watchdog, the Information Commissioner's Office has said it is "disproportionate" to demand that every Southampton taxi has CCTV that constantly monitors driver and passengers, including recording all conversations."
Idle

Submission + - British Kid Flies To Rome Without Passport And Ticket (menmedia.co.uk)

jones_supa writes: A boy of 11 flew alone to Rome after he ran away from his mother and boarded a flight at Manchester Airport without a passport, boarding pass or cash. Security staff scanned him but failed to realize he was on his own and had no boarding card. It was only during the journey to Italy that passengers became suspicious and told the cabin crew. The crew members alerted the captain who radioed back to Manchester. Now a full-scale investigation has been mounted by Manchester Airport and Jet2.com to find out how this was possible. It is understood five members of staff working for Jet2.com have been suspended from duty while the investigation takes place.
Patents

Submission + - Samsung Galaxy S3 Stripped of Local Google Search (ibtimes.co.uk)

DavidGilbert99 writes: "Ahead of a legal battle with Apple, Samsung has begun disabling the local Google search functionality on the international version of the Galaxy S3.

This mean you'll no longer be able to search contacts, messages, or other content stored locally on your phone using the in-built Google app.

The interesting thing is that Apple has yet to sue Samsung over this feature in the EU or the UK and so it seems as if Samsung is being ultra cautious ahead of the the companies' big court date on Monday next."

Biotech

Submission + - Pet Dogs Help Biotechs Find New Weapons Against Cancer (xconomy.com)

awjourn writes: "Biotech company Genelux is recruiting pet dogs for a trial that could yield an entirely new way to combat cancer--both in man and man's best friend. Genelux's technology uses a genetically engineered cowpox virus to annihilate tumor cells. Because dogs get many of the same cancers that strike humans, this trial will not only give dog owners access to a cutting-edge treatment, but it will also provide vital insights to oncologists who are testing the same technology in people."
Security

Submission + - Black Hat hacker gains access to 4 million hotel rooms with Arduino (extremetech.com)

MrSeb writes: "Bad news: With an Arduino microcontroller and a little bit of programming, it’s possible for a hacker to gain instant, untraceable access to millions of key card-protected hotel rooms. This hack was demonstrated by Cody Brocious, a Mozilla software developer, at the Black Hat security conference in Las Vegas. At risk are four million hotel rooms secured by Onity programmable key card locks. According to Brocious, who didn't disclose the hack to Onity before going public, there is no easy fix: There isn’t a firmware upgrade — if hotels want to secure their guests, every single lock will have to be changed. I wish I could say that Brocious spent months on this hack, painstakingly reverse-engineering the Onity lock protocol, but the truth — as always, it seems — is far more depressing. “With how stupidly simple this is, it wouldn’t surprise me if a thousand other people have found this same vulnerability and sold it to other governments,” says Brocious. “An intern at the NSA could find this in five minutes.”"
Security

Submission + - Crisis Malware Discovered Targeting Macs as Mountain Lion Launches (ibtimes.co.uk)

DavidGilbert99 writes: "A new piece of malware has been discovered which targets Mac OS X, on the same day that Apple launches Mac OS X Mountain Lion to the public.

The malware, known variously as Crisis and Morcut, has been discovered by security company Sophos and preliminary investigation shows if features compontent to help it hide; a backdoor component which opens up your Mac to others on your network, a command-and-control component so it can accept remote instructions and adapt its behaviour, data stealing code, and more."

Space

Submission + - 'Seeds' of Supermassive Black Holes Discovered (discovery.com)

astroengine writes: "The very existence of intermediate black holes (IMBHs) is in dispute, but a group of astronomers of Keio University, Japan, have found the potential locations of three IMBH candidates inside previously unknown star clusters near the center of the Milky Way. Using the 10-meter Atacama Submillimeter Telescope Experiment (ASTE) in the Atacama Desert, Chile, and the 45-meter Nobeyama Radio Observatory (NRO) in Japan, they hunted for the emissions from molecular gases associated with supernovae in star clusters — what they discovered could help evolve our view on how supermassive black holes form."
The Military

Submission + - U.S. Army to test female-specific body armor (gizmag.com)

cylonlover writes: Body armor is a blessing and a curse for soldiers. Modern tactical armor has saved thousands of lives from bullets and bombs, but it can also be a major problem if it doesn’t fit properly. That’s what the women who make up 14 percent of the U.S. Army face on a regular basis. Now, according to the Army News Service, the Army is preparing to test a new armor that is tailored to the female form to replace the standard men's armor that the women now use. Working on data collected in studies overseas and at stateside army bases, the Program Executive Office (PEO) Soldier has identified several problem areas and has developed a new armor that will be tested in 2013.

Submission + - OS X 10.8 Mountain Lion review

AlistairCharlton writes: "Mountain Lion is the latest major update to Apple's OS X operating system, replacing Lion and bringing with it a comprehensive range of iOS-inspired features and applications."
Censorship

Submission + - Tor Project mulls $100 cheque for exit relay hosts (scmagazine.com.au)

mask.of.sanity writes: The Tor Project is considering paying exit relay hosts to make the network faster and more secure.

The project has called for discussion on the idea, notably from relay hosts. Its founder has suggested a $100 a month would attract fast and diverse nodes.

Exit nodes are the last hopping point on the Tor network and are critical to its performance and safety.

Slashdot Top Deals