anr blogja

Russian hackers stole NSA tools using Kaspersky antivirus

Russian state hackers stole a collection of National Security Agency hacking tools and other documents from the personal computer of an agency contractor who had taken the classified documents home from work, reports The Wall Street Journal.

The reported breach took place in 2015 but wasn't discovered until spring of last year.

The Journal reports that the hackers identified the documents through Kaspersky Lab antivirus software.

White House cyber czar Rob Joyce has, however, repeatedly said that the Kaspersky Lab software's ability to access files on systems could be a potential way to compromise a system.

M. Gábor győri lakos

trey jól vagy?

Éjjel 23 óra körül érkezett bejelentés arról, hogy egy győri lakásból furcsa, erős kábítószergyanús illat terjeng. A rendőrök kutyával mentek a helyszínre, ahol M. Gábor 35 éves helyi lakos nyitott ajtót.
A férfi elismerte, hogy a lakásában marihuánás cigarettát szívott, amire a rendőrök a kábítószer-kereső kutyával átkutatták a helyiségeket, és egy nejlonzacskóból meg egy kaspóból összesen 546,6 gramm kábítószergyanús anyagot foglaltak le.
A 35 éves férfit elfogták, a Győri Rendőrkapitányságra előállították, és kábítószer birtoklása miatt gyanúsítottként kihallgatták. Elismerte a bűncselekmény elkövetését.…

Google reduces JPEG file size by 35%

New algorithm is based on human psychovisual system. Images look better, too.

Google has developed and open-sourced a new JPEG algorithm that reduces file size by about 35 percent—or alternatively, image quality can be significantly improved while keeping file size constant. Importantly, and unlike some of its other efforts in image compression (WebP, WebM), Google's new JPEGs are completely compatible with existing browsers, devices, photo editing apps, and the JPEG standard.

The new JPEG encoder is called Guetzli, which is Swiss German for cookie (the project was led by Google Research's Zurich office).…

Szuperbiztonsagos datacenter: NY4

The 49 different exchanges that lease space at this data center sent a record 9.6 million messages per second through its fiber-optic cables in February. Every day, electronic trades representing trillions of dollars’ worth of equities, derivatives, currencies, and fixed-income assets pass under this roof. This is NY4. This is where Wall Street actually transacts.…
The security at NY4 bears this out. To get from the parking lot to a spot where you could touch one of the servers you’d have to go through five checkpoints. One of them is a so-called man trap with two automatic steel doors that never open at the same time. Your palm print is required twice in addition to your PIN code.
facilities up and running 99.9999 percent of the time in 2015.
They’re big on backups. In case of a power failure, NY4’s uninterrupted power supply room has 5,600 batteries on standby to provide eight minutes of electricity while the generators rev to life. Should the air conditioning fail and risk the servers overheating, there are three 150,000-gallon tanks filled with water chilled to 45F. Running that cold water through pipes would give NY4 staff 20 minutes to get the AC fixed. Oh, and the generators: 18 of them, each the size of a locomotive engine and able to crank out 2.5 megawatts of power. Equinix keeps 180,000 gallons of diesel fuel on-site to run them.

How Facebook is eating the $140 billion hardware market

Hosszu cikk arrol, hogy hogyan valtozott meg a hardware business 2011 óta.

Facebook’s extraordinary Open Compute Project is doing for hardware what Linux, Android, and many other popular products did for software: making it free and "open source."…
Since it launched in 2011, OCP has:

Saved Facebook $2 billion.
Cut Fidelity Investments' data center electric bill by 20%.
Nabbed Microsoft as a board member, meaning Microsoft is using OCP hardware in its huge data centers and contributing back to the designs.
Ditto for Apple.
Created better careers for hardware designers, who can now collaborate instead of being forbidden to share trade secrets.
Launched an ecosystem of products and startups.
Created a more than $1 billion business for at least one Chinese manufacturer.
Put networking giant Cisco on notice.
Convinced HP to stop fighting the movement and join it.

Code Poetry Slam 2.0

Lying With Computers

Submissions are open for Stanford University's 3rd Code Poetry Slam! The slam will be held January 23rd, 2015 in Wallenberg Hall 124, and submissions are due by December 31st, 2014.
Code poetry is literature that intermixes notions of classical poetry and computer code.

nehany pelda regebbiekre:

One way to tell how rich a country is: Look at its profusion of Android phones…
There are now nearly five times the number of phone models running Google’s Android operating systems in use in the world as there were in 2012.
That’s according to OpenSignal, a mobile network analysis company based in London, which found that nearly 19,000 different devices accounted for the last 682,000 downloads of its app. (Google doesn’t disclose these data, but OpenSignal is a reliable proxy, thanks to the worldwide ubiquity of their app.) That is up from nearly 12,000 last year and just under 4,000 in 2012.
OpenSignal, which has been publishing reports on Android’s fragmentation since 2012, has a particularly fascinating way of looking at it this year: The firm crunched the numbers and found that a country’s GDP per capita directly correlates to the level of fragmentation in the market.

Crossbar on the way to delivery terabyte on a chip nonvolatile 3D RRAM technology

Crossbar announced it had demonstrated pre-production 1 megabyte arrays using its patented 1TnR (1 transistor driving n resistive memory cells) non-volatile resistive RAM (RRAM or ReRAM) for read/write operations. The company feels this is a major milestone toward commercializing terabyte-scale memory arrays on a postage-stamp-sized chip.

* 1 Terabyte of storage on a single chip
* 3D stacking on advanced nodes
* 20X faster write than NAND…

Building a Warship for the Video Game Generation

The Navy's latest high-tech destroyer is basically a floating Xbox.
The operations center aboard the new Zumwalt-class stealth destroyer is the ship's nerve center, into which sensor information flows, and from which the crew can control ship functions such as weapons and navigation. The Zumwalts are extremely automated, with a crew of just 130 sailors compared to more than 300 for the Navy's older and smaller Arleigh Burke-class destroyers .
That degree of automation is made possible by the extensive use of big video screens as well as touchscreen workstations.
Naval Postgraduate School survey last year of 200 enlisted Marines found that 73 percent owned a game console such as Xbox, and 40 percent used it daily.
In a world of high-speed weapons and normal-speed human brains, how data is presented is vital. In fact, it's so vital that battle management has become data management. The Pentagon spends vast sums on command and communications equipment to enable commanders and their aircraft, ships, and ground troops to share targeting coordinates and surveillance imagery even when U.S. forces are thousands of miles apart. But the military is always struggling to ensure that this concoction of numbers, video, and photos is presented in a way that doesn't drown the user in a tidal wave of information.
Video games are no different. Whether Call of Duty or Minecraft, or even a paper wargame like Twilight Struggle, playing these games boils down to information management. Players must absorb and assess data in order to make the correct decision.…

Better data centers through machine learning

It’s no secret that we’re obsessed with saving energy. For over a decade we’ve been designing and building data centers that use half the energy of a typical data center, and we’re always looking for ways to reduce our energy use even further. In our pursuit of extreme efficiency, we’ve hit upon a new tool: machine learning. Today we’re releasing a white paper (PDF) on how we’re using neural networks to optimize data center operations and drive our energy use to new lows.

It all started as a 20 percent project, a Google tradition of carving out time for work that falls outside of one’s official job description. Jim Gao, an engineer on our data center team, is well-acquainted with the operational data we gather daily in the course of running our data centers. We calculate PUE, a measure of energy efficiency, every 30 seconds, and we’re constantly tracking things like total IT load (the amount of energy our servers and networking equipment are using at any time), outside air temperature (which affects how our cooling towers work) and the levels at which we set our mechanical and cooling equipment. Being a smart guy—our affectionate nickname for him is “Boy Genius”—Jim realized that we could be doing more with this data. He studied up on machine learning and started building models to predict—and improve—data center performance.…
What Jim designed works a lot like other examples of machine learning, like speech recognition: a computer analyzes large amounts of data to recognize patterns and “learn” from them. In a dynamic environment like a data center, it can be difficult for humans to see how all of the variables—IT load, outside air temperature, etc.—interact with each other. One thing computers are good at is seeing the underlying story in the data, so Jim took the information we gather in the course of our daily operations and ran it through a model to help make sense of complex interactions that his team—being mere mortals—may not otherwise have noticed.

How the NSA tampers with US-made internet routers…
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald
A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.

Desert bus

Desert Bus is a trick minigame in the package, and was a featured part of Electronic Gaming Monthly's preview. The objective of the game is to drive a bus from Tucson, Arizona to Las Vegas, Nevada in real time at a maximum speed of 45 mph. The feat requires 8 hours of continuous play to complete, since the game cannot be paused.
The bus contains no passengers, there is little scenery aside from an occasional rock or stop sign, and there is no traffic. The road between Tucson and Las Vegas is completely straight. The bus veers to the right slightly, and thus requires the player's constant attention. If the bus veers off the road it will stall and be towed back to Tucson, also in real time. If the player makes it to Las Vegas, he scores one point. The player then has the option to make the return trip to Tucson for another point, a decision he must make in a few seconds or the game ends. Players may continue to make trips and score points as long as their endurance lasts. Although the landscape never changes, an insect splats on the windscreen about five hours through the first trip, and on the return trip the light fades, with differences at dusk, and later a pitch black road where the player is guided only with headlights. Through the continuous play of the game during Desert Bus for Hope, a bug in the game was found. The game goes from day to dusk, night, dawn, and then night again. It loops from dusk or dawn, to night and back again, never returning to day.'s_Smoke_and_Mirrors#Desert…

Cunningham's Law

Cunningham's Law states, "the best way to get the right answer on the Internet is not to ask a question, it's to post the wrong answer."
People online generally don't want to be helpful, but they do want to be smartest person in the "room".
Best way to get answer about open source software:
Go to forum
"X software can't do Y task, and Z product can, how can it compete?"
5 ms later over a dozen answers calling you out with a detailed guide.
The Z part is important, otherwise you get one asshole that asks why you would want to do Y task and not something unrelated.…

Satoshi Nakamoto, may have been identified…

1. Ez a valodi neve.Japan-amerikai LA mellett el.
2. ~1mill BTC-je lehet, de nem koltott eddig belole semmit.

He is someone with a penchant for collecting model trains and a career shrouded in secrecy, having done classified work for major corporations and the U.S. military.

Everything You Need to Know About the Mt. Gox Bitcoin Debacle

The exchange’s rapid death spiral is a result of the apparent theft of 744,000 Bitcoins (six percent of all available Bitcoins) due to a security breach, a crime that went unnoticed for several years according to a leaked document that has been connected to Mt. Gox. “The reality is that MtGox can go bankrupt at any moment, and certainly deserves to as a company,”…
Bitcoin has been critiqued as a dressed-up Ponzi scheme—as more users buy in, digital currency exchanges are able to pay off the smaller group that cashes out without holding enough money in reserve. The theft and resulting shutdown shows that putting faith in unregulated financial companies is just as dangerous.

CodingBat code practice

CodingBat is a free site of live coding problems to build coding skill in Java, and now in Python (example problem), created by Nick Parlante who is computer science lecturer at Stanford. The coding problems give immediate feedback, so it's an opportunity to practice and solidify understanding of the concepts. The problems could be used as homework, or for self-study practice, or in a lab, or as live lecture examples. The problems, all listed off the CodingBat home, have low overhead: short problem statements (like an exam) and immediate feedback in the browser. The idea for CodingBat came from my experience teaching CS at Stanford combined with seeing how student's used unit-tests in more advanced courses

Documents Reveal Top NSA Hacking Unit

The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.
TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.