Forgot your password?
typodupeerror
Iphone

+ - Apple Acknowledges Major iPhone 5 Camera Flaw 1

Submitted by Anonymous Coward
An anonymous reader writes "Many iPhone 5 users are complaining that its camera is adding a purple flare to their photos. Speculation is that it's caused by the new sapphire lens cover that Apple touted as "thinner and more durable than standard glass with the ability to provide crystal clear images." Apple's response to those who've complained? "You're using it wrong.""
Unix

+ - Experimental, Python-powered Shell Released->

Submitted by
JonathansCorner.com
JonathansCorner.com writes "An experimental Unix/Linux command line shell, implemented in Python 3, that offers Unix strength while taking advantage of some more recent concepts in terms of usability and searching above pinpointing files in heirarchies. Nothing here is the last word, but it suggests some very interesting things to consider for the standard shells."
Link to Original Source
Mars

+ - Weather on Mars surprisingly pleasant, Curiosity rover finds Read more: http://->

Submitted by
hessian
hessian writes "Curiosity's onboard weather station, which is called the Remote Environment Monitoring Station (REMS), has measured air temperatures as high as 43 degrees Fahrenheit (6 degrees Celsius) in the afternoon. And temperatures have climbed above freezing during more than half of the Martian days, or sols, since REMS was turned on, scientists said.

These measurements are a bit unexpected, since it's still late winter at Gale Crater, the spot 4.5 degrees south of the Martian equator where Curiosity touched down on Aug. 5.

"That we are seeing temperatures this warm already during the day is a surprise and very interesting," Felipe Gómez, of the Centro de Astrobiología in Madrid, said in a statement."

Link to Original Source

+ - SHA-3 winner announced->

Submitted by Anonymous Coward
An anonymous reader writes "National Institute of Standards and Technology (NIST) has just announced the winner of the SHA-3 competition: Keccak, created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors.

“Keccak has the added advantage of not being vulnerable in the same ways SHA-2 might be,” says NIST computer security expert Tim Polk. “An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently.”

For Joan Daemen it must be a "two in a row" feeling, since he also is one of the authors of AES."

Link to Original Source

+ - Weaponized radiation testing from 1950 to 1970 in St Louis discovered->

Submitted by
filekutter
filekutter writes "Quote from paper: "This piece analyzes a covert Manhattan Project spin-off organization referred to here as
the Manhattan-Rochester Coalition, and an obscure aerosol study in St. Louis, Missouri,
conducted under contract by the U.S. military from 1953-1954, and 1963-1965. The military-
sponsored studies targeted a segregated, high-density urban area..."
Link to research paper:http://gradworks.umi.com/35/15/3515886.html"

Link to Original Source
Security

+ - Graphics Cards: The Future of Online Authentication?->

Submitted by Gunkerty Jeb
Gunkerty Jeb (1950964) writes "Researchers working on the "physically unclonable functions found in standard PC components (PUFFIN) project" announced last week that widely used graphics processors could be the next step in online authentication. The project seeks to find uniquely identifiable characteristics of hardware in common computers, mobile devices, laptops and consumer electronics.

The researchers realized that apparently identical graphics processors are actually different in subtle, unforgeable ways. A piece of software developed by the researchers is capable of discerning these fine differences. The order of magnitude of these differences is so minute, in fact, that manufacturing equipment is incapable of manipulating or replicating them. Thus, the fine-grained manufacturing differences can act as a sort of a key to reliably distinguish each of the processors from one another.

The implication of this discovery is that such differences can be used as physically unclonable features to securely link the graphics cards, and by extension, the computers in which they reside and the persons using them, to specific online accounts."

Link to Original Source
Network

+ - LinkedIn Uses FBI to Investigate 6.5 Million Password Leak->

Submitted by
JohnBert
JohnBert writes "As reported last week, LinkedIn had 6.5 million users' passwords leaked. The company is now working with the FBI to track down the party responsible for stealing their data. None of the member information has been published other than a small list of passwords themselves. LinkedIn director, Vicente Silveira, stated that the company has disabled passwords of members who they believe were at risk and that they "take this criminal activity very seriously so we are working closely with the FBI as they aggressively pursue the perpetrators of this crime.""
Link to Original Source
Government

In Argentina, Law Against Plagiarism Plagiarized 165

Posted by kdawson
from the send-yourself-to-jail dept.
An anonymous reader writes "An Argentinian politician who introduced a law to send plagiarists to jail for three to eight years appears to have plagiarized the explanation of his bill directly from Wikipedia. The bulk of his explanation is three paragraphs that are taken, verbatim, from Wikipedia, without acknowledgment."

You are in a maze of little twisting passages, all alike.

Working...