跳到主要內容

發表文章

目前顯示的是 7月, 2013的文章

Famed hacker Barnaby Jack died, aged 35

 Barnaby Jack, a celebrated computer hacker who forced bank ATMs to spit out cash and sparked safety improvements in medical devices, died in San Francisco, a week before he was due to make a high-profile presentation at a hacking conference. The New Zealand-born Jack, 35, was found dead on Thursday evening by "a loved one" at an apartment in San Francisco's Nob Hill neighborhood, according to a police spokesman. He would not say what caused Jack's death but said police had ruled out foul play. Jack was one of the world's most prominent "white hat" hackers - those who use their technical skills to find security holes before criminals can exploit them. His genius was finding bugs in the tiny computers embedded in equipment, such as medical devices and cash machines. He often received standing ovations at conferences for his creativity and showmanship while his research forced equipment makers to fix bugs in their software. Jack h...

VRC - Virtual Robotics Challenge from DARPA

The Faculty has formed a self-funded (DARPA track D) “Team HKU” (name to be later determined) comprised of a group of researchers, from both inside and outside the Faculty Team HKU will use a Boston Dynamics “Atlas” robot, and a laboratory to support our work is undergoing preparation. Team HKU will have advantages of an assured spot in the final competition, use of the best robot for the competition, and early access to key components. hku link DARPA is announcing the results of the Virtual Robotics Challenge (VRC) portion of the DARPA Robotics Challenge (DRC). The six top teams will each be receiving a bunch of money, plus a Boston Dynamics ATLAS robot of their very own, which they'll use to compete in the DRC trials later this year. Let's see who won! VRC Winning Teams: Team IHMC , Institute for Human and Machine Cognition, Pensacola, Fla. (Track B, 52 points) WPI Robotics Engineering C Squad (WRECS) , Worcester Polytechnic Institute, Worcester, Ma...

Keep your Data out of Hackers' Reach!

Below are some simple practices that you may adopt to keep your valuable information and data out of hackers’ reach. Safeguard your computers Secure your computers with anti-virus software. Keep virus signatures, spyware signatures, Windows and other software patches updated. Enable personal firewall. Securely protect your smartphones and tablets Lock your smartphones and tablets by enabling passcode and automatic screen lock after a short period of inactivity. Avoid storing confidential / sensitive data on your smartphones and tablets. Securely erase / wipe all the data in your device before discarding or selling your device. Set Strong passwords Enable password protection for all your computing devices, smartphones and files (e.g. Excel and PDF files) containing confidential information. Avoid sensitive data transmission Do not post or transmit any files containing sensitive data over the Internet. If you have to...

Spaun - cogntive neural model aka artificial brain

Developed by neuroscientists and software engineers at the University of Waterloo in Canada, Spaun includes a 784-pixel digital eye, and a robotic arm for writing, but the real meat of it is its 2.5 million simulated neurons which are used to emulate parts of a human brain like the prefrontal cortex, basal ganglia, and thalamus. Using all those neurons, it can think through questions and solve limited problems the same way a human brain can, albeit in a much more finite sense. Even though its makers claim it is the "most complex" artificial brain in existence, it's tricks are pretty scant; it mostly does things like recognize patterns and (mis)remember long strings of numbers. Which is pretty much what it takes to be able to struggle through most of an IQ test, even if it's a low score. The impressive thing here isn't so much what Spaun can do, but what it can do considering it's built to act like a real, pulsing, fleshy brain. In the futu...

uncovering Android Master Key affects almost all android device

Security research team BlueBox has discovered a bug in Google’s Android operating system which could make 99 percent of all devices vulnerable to a frightening attack. A vulnerability in the OS could theoretically allow attackers to take control of an otherwise legitimate app. From here the attacker could steal information or control the device itself. According to BlueBox CTO Jeff Forristal, this vulnerability has been present in Android for the last four years and could affect as many as 900 million devices around the world. BlueBox alerted Google about this vulnerability in February and will explain how the bug affects Android later this month at the Black Hat USA Security Conference in Las Vegas, Nevada. “The vulnerability involves discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature,” writes Forristal on the BlueBox corporate blog . “All Android appl...

Five Arrested In Massive Hacking Bust

A federal indictment made public today in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers and resulted in hundreds of millions of dollars in losses.  It is the largest such scheme ever prosecuted in the United States. U.S. Secret Service (USSS), Criminal Investigations, Newark, N.J., Division (The USSS) led the investigation of the indicted conspiracy. The defendants allegedly sought corporate victims engaged in financial transactions, retailers that received and transmitted financial data and other institutions with information they could exploit for profit.  The defendants are charged with attacks on NASDAQ, 7-Eleven, Carrefour, JCP, Hannaford, Heartland, Wet Seal, Commidea, Dexia, JetBlue, Dow Jones, Euronet, Visa Jordan, Global Payment, Diners Singapore and Ingenicard.  It is not alleged that the NASDAQ hack affected its trad...

some notes on ASUS RT-N10+

RT-N10 H/W Rev.D1. It have a Broadcom 5356 chip. an etrontech chip(i think its ram) and a winbond flash chip)   last Fw for both RT-N10 and RT-N10+ is exactly the same version 2.1.1.1.70.  ASUS firmware site modded to DD-WRT firmware and here and here RT-N10 硬體規格 CPU: Broadcom BCM5356 300MHz Flash: 4MB RAM: 16MB Wireless: 802.11n up to 150Mbps Ethernet: 1 x WAN / 4 x LAN 10/100Mbps RT-N10+ 硬體規格 CPU: Ralink RT3050F 320MHz Flash: 4MB RAM: 32MB Wireless: 802.11n up to 150Mbps Ethernet: 1 x WAN / 4 x LAN 10/100Mbps so be careful which one you actually have

something on ed

/usr/ede/SetIP >> Use Mirror Mode Gateway: 192.168.0.1 eth0 - C eth1 MANAGE - 192.168.0.88 255.255.255.0 192.168.0.255 settings in /etc/netconfig. gateway, mgt dve, cap dev. resolv.conf : just general,, eg, gateway ip webpages in /opt/local/apache/htdocs based on debian 4.0 Etch

Hacking America - The thrill of the Hack, prosecuting Cybercrime

interview with Stephen Watt, aka UT (Unix Terrorist)  - convicted felon CNBC video For start-ups eager to displace more established military contractors, selling vulnerabilities—and expertise about how to use them—has become a lucrative opportunity. Firms like Vupen in Montpellier, France; Netragard in Acton, Mass.; Exodus Intelligence in Austin, Tex.; and ReVuln, Mr. Auriemma's and Mr. Ferrante's Maltese firm, freely advertise that they sell knowledge of the flaws for cyberespionage and in some cases for cyberweapons. Outside Washington, a Virginia start-up named Endgame—in which a former director of the N.S.A. is playing a major role—is more elusive about its abilities. But it has developed a number of tools that it sells primarily to the United States government to discover vulnerabilities, which can be used for fighting cyberespionage and for offensive purposes. Like ReVuln, none of the companies will disclose the names of their customers. But Adriel Des...

W8075 Suspicious pointer conversion (C++)

The compiler encountered some conversion of a pointer that caused the pointer to point to a different type. You should use a cast to suppress this warning if the conversion is proper. A common cause of this warning is when the C compiler converts a function pointer of one type to another (the C++ compiler generates an error when asked to do that). It can be suppressed by doing a typecast . Here is a common occurrence of it for Windows programmers: #define STRICT #include <windows.h> LPARAM _export WndProc( HWND , UINT , WPARAM , LPARAM ); test() { WNDCLASS wc; wc.lpfnWndProc = WndProc; //warning }   It is suppressed by making the assignment to lpfnWndProc as follows:   wc.lpfnWndProc = ( WNDPROC ) WndProc;       

head transplant

Italian scientists claim they have invented a method for carrying out a head transplant - a discovery that could prove life-changing for patients suffering from hitherto incurable diseases. Boffins at the Turin Advanced Neuromodulation Group claim to have devised a new way to connect the brain to the spinal column. The technique is useful for anyone who wants a new head - which might prove a bit difficult to enjoy - or fancies a new body. It draws upon the research of Robert White, who in 1970 transplanted of the head of one rhesus monkey onto the body of another. Sadly, the monkeys didn't live for very long with their new heads in place, but the Italian researchers are optimistic nonetheless. Dr Sergio Canavero of the University of Turin, said that a "clean cut" was needed with a super-sharp blade. If this is done correctly, he believes it is already possible to join a brain to a body. He said: "It is my contention that the technology only now e...