Chankey Pathak writes: "The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 6.00 from http://nmap.org/. It is the product of almost three years of work, 3,924 code commits, and more than a dozen point releases since the big Nmap 5 release in July 2009. Nmap 6 includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more!"
An anonymous reader writes: NASA has succeeded in putting a vacuum tube on-a-chip that measures just 100 nanometers long. Today NASA has to heat the compartments with transistors in them, just to keep them working. Plus elaborate shock proofing is needed to keep circuit boards from cracking. But vacuum tubes supply their own heat for operation, are exceptionally rugged, don't require circuit boards and greatly simplify circuitry since they are ultra-accurate and don't need a bunch of compensation like transistor circuits. Vacuum tubes became obsolete because they were big and could not be scaled, but by putting them on-a-chip they can now be scaled down to smaller sizes just like other semiconductors. NASA says they are still a few years away from commercializaiton, but it looks like the vacuum tube is back!
Fluffeh writes: "A researcher has found and published a way to tune into a RSA SecurID Token. Once a few easy steps are followed anyone can generate the exact numbers shown on the token. The method relies on finding the seed that is used to generate the numbers seemingly randomly, but once known can be used to generate the exact numbers displayed on the targetted Token. The technique, described on Thursday by a senior security analyst at a firm called SensePost, has important implications for the safekeeping of the tokens. An estimated 40 million people use these to access confidential data belonging to government agencies, military contractors, and corporations. Scrutiny of the widely used two-factor authentication system has grown since last year, when RSA revealed that intruders on its networks stole sensitive SecurID information that could be used to reduce its security. Defense contractor Lockheed Martin later confirmed that a separate attack on its systems was aided by the theft of the RSA data."
An anonymous reader writes: A few months ago, students protested against a raise in school fees which led to a major strike. Governement wanted to bring peace by voting a brutal law which controls the right of people to gather in the streets. Now, Anonymous took part in the conflict and claims attacks on Quebec governement websites,
rtobyr writes: "I've got about 50 servers to manage. I do very much appreciate the technology that has come from FOSS operating systems projects, yet it seems to me that most *free* operating systems do not fully support an upgrade path. Ubuntu is the only exception that I'm aware of. I cannot seamlessly upgrade from Free/PC-BSD 8.x to 9.x. Instead I must re-install from scrach. The same goes for CentOS/RHEL 5.x to 6.x, and for every version of Mint Linux.
The two major commercial operating systems (considered to be evil by the FOSS community) easily upgrade from one version to the next. That's important in a real-life production environment. In 2001, I upgraded 200 workstations and 7 servers from Windows NT 4.0 to Windows 2000 without incident. I've had similar experience with all subsequent MicroEvil systems. I do hate MicroEvil, but I can make only limited conclusions regarding the upgrade paths of other operating systems:
1) The distributions exist only for the sake of doing the project, and for the technologies that it produces (such as OpenBSD's OpenSSH).
2) Folks are expected to install a version of FOSS operating systems, but not upgrade because there's no reason to fix something that isn't broken.
3) FOSS operating systems are only for organizations who have so few servers or so many IT folks that re-installing everything from scratch is not inviably cumbersome.
4) I am oblivious to some upgrade path technique for FOSS operating systems.
5) I am a lame poser too unskilled to understand how to properly manage FOSS servers.
angry tapir writes: "Just over two months after its last major release, Linus Torvalds has posted the newest version of the Linux kernel, which supports new graphics processors from Nvidia and Intel, improves file system functionality and comes with a new security module. "I think the 3.4 release cycle as a whole has been fairly calm. Sure, I always wish for the [release candidates] to calm down more quickly than they ever seem to do, but I think on the whole we didn't have any big disruptive events, which is just how I like it," he wrote, in an email announcing the release. "Let's hope the 3.5 merge window is a calm one too.""
An anonymous reader writes: You're a Vice President of a large company, probably taking home a quarter million dollars a year. But for some reason, you need to switch bar codes on LEGO boxes at Target. The kicker? It's "tomsbrickyard" from ebay. To be fair, the authorities aren't sure how much of what they found was actually paid for in full versus only partially paid for by using bar codes he made up himself.
TheGift73 writes: "The court case between Activision and developers Jason West and Vincent Zampella has brought all kinds of ugliness to light. But filings for the case have also made the details of the April, 2010 contract between Bungie, developers of Halo, and Activision a matter of public record, revealing Bungie's upcoming game development plans.
The L.A. Times reports that the 27-page contract outlines Bungie's agreement to develop four "sci-fantasy," action shooter games to be released every other year starting in 2013, under code name "Destiny." The agreement also includes DLC plans, with four expansion packs code-named "Comet" due in the alternating years, beginning in 2014.
The contract also specifies that the first game is a timed Xbox exclusive, created for the Xbox 360 as well as potentially for its still-unnamed successor, called the "Xbox 720" in the documentation. It could then later be released for PlayStation in 2014. In addition to the Xbox, later games could also be released for the PS3 or its successor console, as well as for PC.
In 2011, word leaked that Bungie was working on Destiny. The developer then confirmed at GDC 2011 that they were developing a MMO title.
The contract also specifies that Bungie is working on a Marathon title, based on its 1994 Mac sci-fi first-person shooter.
We have reached out to Activision to find out how much of the 2010 agreement is still planned, and will update if we hear back."
WindyWonka writes: According to Justia, Cal Tech's lawyers told the ITC that RIM’s mobile devices violate the school's CMOS image patents, and shouldn't be imported or sold in the U.S. because they "are not essential to the public’s health and welfare and are hardly comparable to nuclear devices or burn beds.”
Fluffeh writes: "The EU has accused Google of abusing its dominant position in advertising to benefit its own advertising services at the expense of competitors. In a twist however, rather than initiating formal proceedings, the EU has given Google a chance to settle the whole matter without much fuss. They outlined four changes that Google can make that will put it firmly back in the good graces of the EU. Google has been given "a matter of weeks" to propose remedies to the four issues — which all tie in with how search results are displayed, their format and their portability to other platforms. This matter has come before the EU based on complaints by a few small companies and Microsoft."
ourlovecanlastforeve writes: "AP reports that NATO's big players have settled on a leisurely date of 2014 to stop killing our children, "affirming they will close the largely stalemated conflict at the end of 2014 but keep their troops fighting and dying there for two more years in the meantime." So my question is, at what point does it become important to stop throwing human lives and trillions of dollars at Afghanistan's problems when we can't afford to pay our own bills? Where is the altruism in this proceeding; why are we really wasting all these resources, when there are plenty of other nations that would be grateful for our aide that we could easily throw just as much money we don't have at?"
An anonymous reader writes: Recently, a certain pastebin.com publication revealed that several Android smartphones manufactured by Chinese company ZTE have some kind of a backdoor as an interesting addition to their functions. There is a sync_agent application in the system directory/system/bin/ that provides root access to the system shell to those who know a specific password (in this case, ztex1609523):
The application’s presence is confirmed on smartphone Score M that is distributed through North American carrier MetroPCS. However, some sources reveal that there are also other models, including those sold worldwide, that contain this application. The application itself cannot be treated as malicious since it does not perform any destructive operations, but its presence could pose a threat to users if cybercriminals were ever to turn this vulnerability into a real weapon.
Opinions on the matter vary between both users and security experts. While some consider that the manufacturer has left the backdoor intentionally in order to control devices for unknown purpose or blame the U.S. and Chinese governments and mobile carriers who sell these smartphones, others think that it is no big deal and probably results from an engineering fault at ZTE.
Though no response has been provided by ZTE yet, some unofficial sources claim that the company will fix this problem shortly. For now, the conspiracy theory enthusiasts have one more topic to discuss.
moebin writes: "Confirming the importance of ecological protection in Islam, a new book will be launched in Malaysia on conserving the environment with an Islamic perspective. Realizing the threats towards the environment and wildlife species, the new book, prepared by World Wide Fund for Nature (WWF) Malaysia and Ikim, will be launched next July."
Gerald writes: After 3 years of work Fyodor and company have released version 6.00 of the Nmap Security Scanner! The new release includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more! We recommend that all current users upgrade. More info in the release notes.
An anonymous reader writes: Researchers have unveiled a microprocessor that’s designed to get the answer wrong — at least, some of the time. The idea of building microprocessors that deliberately allow for incorrect results has been kicking around for years; the prototype silicon demonstrated last week is the first time anyone has demonstrated the idea in native hardware. Why do it? Because perfection takes a lot of power so if less-than-perfect calculations can be used part of the time it could lead to dramatic power savings. Intel is even behind the idea and it currently researching the variable precision floating point unit.