Polls

Is there an unsecured wireless network near you?
 
Google sinks cash into more submarine cables, plans more data centres
Wednesday, 17 January 2018 15:04

Google has made more investments in submarine cables, sinking money into three due to come online in 2019.

First up is the Curie Cable System, which will link the United States and Chile. This one's all Google's: the company says it will “control the design and construction process”, so when the cable is in service it can “make routing decisions that optimise for latency and availability”.

Google hasn't stipulated the number of fibres or lit capacity for Curie, but said it will be the first new cable to land in Chile in the last 20 years.

The cable will have

...
Read more...
 
Long-Range RFID Leaflets
Saturday, 20 January 2018 09:55

Pick a card, any card. [Andrew Quitmeyer] and [Madeline Schwartzman] make sure that any card you pick will match their NYC art installation. “Replantment” is an interactive art installation which invites guests to view full-size leaf molds from around the world.

A receipt file with leaf images is kept out of range in this art installation. When a viewer selects one, and carries it to the viewing area, an RFID reader tells an Arduino which tag has been detected. Solid-state relays control two recycled clothing conveyors draped with clear curtains. The simple units used to be back-and-forth control but through …read more

Read more...
 
ESP32 Makes Not-So-Smart Lights Smart
Saturday, 13 January 2018 03:00

Long taken for granted – lights are a basic necessity of modern life. From the time of the first light bulb, we’ve been able to navigate the dark without the use of fire. With the advent of the Internet of Things, it has become somewhat of a requirement to bring a little intelligence to lights before labeling yourself as a hardware hacker. There are many ways to do this; one of the most common being making use of an ESP32. [Luca Dentella] is somewhat of an ESP32 expert, and has written a fantastic tutorial on how to use the chip. …read more

Read more...
 
LEDE and OpenWRT kiss and make up
Monday, 08 January 2018 11:00

The OpenWRT and LEDE open router projects have merged and promised a major release in the coming months.

OpenWRT was, for years, the only serious open source codebase for router firmware, allowing users to overwrite vendor firmware, either for security reasons or to conduct their own low-level development.

LEDE was created in March 2016 when a group of developers, unhappy with where OpenWRT was going, created the alternative Linux Embedded Development Environment. At the time, the LEDE group worried that OpenWRT lacked a process to bring new core developers into the project at a time developer numbers were dwindling.

When

...
Read more...
 
Parliamentary 'puters made 30k tries to procure pr0nz last year
Tuesday, 09 January 2018 00:32

The Houses of Parliament's network was used to access pornographic material 30,876 times from March to October, it was revealed today.

That works out at approximately five attempts to access smut per hour, with Blighty's parliamentary filtering system blocking users from viewing the content.

September was the month MPs were most eager to access X-rated material (having just returned from summer recess), with 9,467 requests from both the Houses of Lords and Commons that month – according to a freedom of information response by the Press Association .

Last month UK Prime Minister Theresa May sacked her right-hand man Damian

...
Read more...
 
Net boffins brew poison for BGP hijacks
Monday, 08 January 2018 15:02

The Border Gateway Protocol (BGP) is one of the Internet's basic pieces of plumbing technologies, but it's also so old it was designed before the security needs of a multi-billion-user network were understood.

In particular, BGP is notorious for allowing sysadmins to “black-hole” huge swathes of traffic either by fat-fingering route advertisements, or in some suspected cases, maliciously advertising routes that send commercial rivals' traffic into dead zones that kill the user experience.

Which is why a group of researchers from Europe and America reckon they've created a framework that would let service providers neutralize a BGP hijack in minutes.

...
Read more...
 
<< Start < Prev 11 12 13 14 15 16 17 18 19 20 Next > End >>

Page 11 of 86