hírolvasó

3D-Printed Gun Earns Man Two Years In Japanese Prison

Slashdot - k, 2014-10-21 11:21
jfruh writes: Japan has some of the strictest anti-gun laws in the world, and the authorities there aim to make sure new technologies don't open any loopholes. 28-year-old engineer Yoshitomo Imura has been sentenced to two years in jail after making guns with a 3D printer in his home in Kawasaki.

Read more of this story at Slashdot.


Kategóriák: Napi hírek

3D-Printed Gun Earns Man Two Years In Japanese Prison

Slashdot - k, 2014-10-21 11:21
jfruh writes: Japan has some of the strictest anti-gun laws in the world, and the authorities there aim to make sure new technologies don't open any loopholes. 28-year-old engineer Yoshitomo Imura has been sentenced to two years in jail after making guns with a 3D printer in his home in Kawasaki.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Australian Physicists Build Reversible Tractor Beam

Slashdot - k, 2014-10-21 09:33
An anonymous reader writes: Physicists at Australian National University have developed a tiny tractor beam that improves in several ways upon previous attempts. First, it operates on scales which, while still tiny, are higher than in earlier experiments. The beam can move particles up to 200 microns in diameter, and it can do so over a distance of 20 cm. "Unlike previous techniques, which used photon momentum to impart motion, the ANU tractor beam relies on the energy of the laser heating up the particles and the air around them (abstract). The ANU team demonstrated the effect on gold-coated hollow glass particles. The particles are trapped in the dark center of the beam. Energy from the laser hits the particle and travels across its surface, where it is absorbed creating hotspots on the surface. Air particles colliding with the hotspots heat up and shoot away from the surface, which causes the particle to recoil, in the opposite direction. To manipulate the particle, the team move the position of the hotspot by carefully controlling the polarization of the laser beam."

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Az iPhone 6 húzta az Apple negyedévét

HWSW - k, 2014-10-21 09:13
Hétfő este közzétette a harmadik naptári negyedévre eső negyedik pénzügyi negyedévének eredményeit az Apple. A bevétel és a nyereség is szépen nőtt, elsősorban az iPhone 6 sikerének köszönhetően. Az iPad eladásai nagyot estek.

Kategóriák: Napi hírek

Doctor Who To Teach Kids To Code

Slashdot - k, 2014-10-21 08:18
DCFC writes: The BBC is releasing a game to help 8- to 11-year-old kids get into coding. Based on Doctor Who, it alternates between a standard platform game and programming puzzles that introduce the ideas of sequence, loops, if..then, variables and a touch of event-driven programming. Kids will get to program a Dalek to make him more powerful. (Apparently the BBC thinks upgrading psychopathic, racist death machines is a good idea!)

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - k, 2014-10-21 06:20
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Kategóriák: Napi hírek