KentuckyFC writes: "The way radio signals vary in a wireless network can reveal the movement of people behind closed doors, say researchers who have developed a technique called variance-based radio tomographic imaging which processes wireless signals to peer through walls. They've tested the idea with a 34-node wireless network using the IEEE 802.15.4 wireless protocol (the personal area network protocol employed by home automation services such as ZigBee). The researchers say that such a network could be easily distributed by the police or military wanting to determine what's going on inside a building. But such a network, which uses cheap off-the-shelf components, might also be easily deployed by your neighbor or anybody else wanting to monitor movements in your home."
viralMeme writes: ".. Novell this week felt the ire of its user base, as it warned partners that in a few months it would be requiring that customers get a maintenance contract on software before they would get access to patches, updates, and technical documents for that software.." Link to Original Source
Trailrunner7 writes: "Bruce Schenier writes on Threatpost.com: In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you unauthenticate yourself? My home computer requires me to log out or turn my computer off when I want to unauthenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability."
An anonymous reader writes: Costis was able to dump the elusive boot ROM from the Gameboy Color by using various voltage and clock glitching tricks. The boot ROM is what initializes the Gameboy hardware, displays the "GAMEBOY" logo and animation, and makes the trademarked "cling!" sound effect. Even decapping the CPU had failed previously, but now the boot image and specifics on how it was dumped (along with many photos) are available for download at http://www.fpgb.org/
krischik writes: "The German Pirate Party received 2% of the votes on last Sundays federal elections in Germany. While this is not enough the pass the 5% / 3 direct seats minimum requirement to enter parliament it is still more then the 1.5% Green Party received on there first run in 1980. At it's time the Green Party needed three runs to enter parliament. The Pirate Party is now the strongest of the minor parties.
For those who wonder: Seats in the German Parliament are half assigned by direct votes and half assigned by proportional representation. To qualify any seats from the proportional pool you need 3 seats from direct candidates or 5% of proportional votes."
wikinerdiest writes: "Wikipedians are again struggling with back channel invasions of Users' privacy http://en.wikipedia.org/wiki/Wikipedia:Administrators'_noticeboard#.22Private.22_Checkuser_use . This time it is the frequent(admitted) use by many administrators of backchannel (IRC,email) methods to request and obtain Checkuser information without the User checked being made aware of it. This process completely circumvents their official process at http://en.wikipedia.org/wiki/WP:CHECKUSER which seems to be little more than a facade for public consumption. While the official process makes note of the right of Users to complain of privacy breaches, the "private checkuser request" process makes that right mute since the User may not be even made aware Checkuser was used."
Dan Jimbokla writes: CNET.co.uk has a truly funny and read-worthy article up about the top ten off switches. One of my favorite switches from the piece is #4 — The illuminated toggle switch: "This switch isn't designed for high-drain uses, typically it can only provide a maximum of 20 amps at 12 volts. That will make it suitable for a number of exciting uses though, and what it lacks in power handling, it makes up for in practicality. This switch will illuminate when the device it controls is turned on, and go off when the device is deactivated. This is logical and practical, and that has earned this switch a place in our hearts. What's more, it's far from expensive and there are even a choice of colours."
1gkn1ght writes: "Looks like the long running P2P music sharing site Oink.cd has finally been shutdown. Going to their site gives you this message.
"This site has been closed as a result of a criminal investigation by IFPI, BPI, Cleveland Police and the Fiscal Investigation Unit of the Dutch Police (FIOD ECD) into suspected illegal music distribution.
A criminal investigation continues into the identities and activities of the site's users"
from the mother-please-i'd-rather-patch-it-myself dept.
dg2fer writes "For more than two months, the vulnerability of parsing URIs has been known for a number of Windows programs, including Outlook, Adobe Reader, IRC clients, and many more. Microsoft admitted the vulnerability only last week. The latest Microsoft patches published on October's Patch Tuesday did not include a solution, so hackers have taken on the problem themselves. One, KJK::Hyperion, has published (as open source) an unofficial patch that cleans up the critical parameters of URI system calls before calling the vulnerable Windows system function."
Lisandro writes: "The Independent reports that James D. Watson, Nobel Prize winner for his work on the unravelling of DNA, declared on a newspaper interview that the assumption that black people is as intelligent as white people is wrong, which led to widespread racism accusations. "All our social policies are based on the fact that their intelligence is the same as ours — whereas all the testing says not really", he stated. He also added that the idea that of "equal powers of reason" were shared across racial groups was a delusion, claiming that genes responsible for creating differences in human intelligence could be found within a decade."
VincenzoRomano writes: "The latest releases of Ubuntu for desktop and server are available today for download. This release brings together the best of free and open source software delivered on a stable, easy to use and learn platform. Read the press releases or download it now.
Among all other news, this new version should have a better support for the hardware and a deeper compatibility with Windows (provided that you are willing to). Of course also the siblings have been updated, namely KUbuntu (but still not using KDE 4), EdUbuntu and XUbuntu."