Sunday 31 July 2016

Turn your Android phone into a laptop



Superbook with processing power & storage attached
Credit: Andromium Inc./Kickstarter

Your phone has a lot of processing power (4 or 8 cores now common) & storage, (32 GB & above common + option of 128 GB microSD). Actually, the biggest limit to phone productivity is the small screen & keyboard.

Superbook leverages the strengths of an Android OTG phone, & overcomes its productivity shortcomings, by adding an 11.6 inch 768p screen (1080p $30 option), keyboard, 10 hour battery, plus USB-C & Micro-B sockets. Full size USB-A allows connection of additional storage, mouse &/or USB hub.

Funding on Kickstarter has passed $1 million, at this time.



Most of the expensive parts of a laptop are provided by the phone, so you can still get a Superbook for as little as $US99.

Kickstarter project
https://www.kickstarter.com/projects/andromium/the-superbook-turn-your-smartphone-into-a-laptop-f

Gizmag
http://www.gizmag.com/andromium-superbook-android-laptop/44511/

Trusted Reviews
http://www.trustedreviews.com/news/the-superbook-turns-your-phone-into-a-laptop
/ smartphones incredibly powerful run productivity apps games size input displays power Andromium new Superbook Android smartphone 11.6-inch screen full-size keyboard trackpad Andromium leverage power smartphone processing grunt laptop 4G smartphone engine laptop PC crowdfunding campaign Andromium fully-functioning phone-based workstation phone funding goals peripherals cables laptop shell connects Android smartphone single USB cable Superbook laptop 11.6 inch LCD display 1,366 x 768 resolution full-size keyboard built in trackpad Superbook phone supports USB-OTG running Android 5.0 USB-C MicroUSB cable built in battery charging connected phone over ten hours of work Andromium OS app enables desktop OS-like features mouse cursor keyboard shortcuts full-screen operation Play Store apps full compatibility Microsoft Office suite upgrade your smartphone updating your computer project Kickstarter goal most basic Superbook pack gold laptop USB-OTG cable wall adapter $99 pledge level Superbook blue or gold universal smartphone mount screen-edge wall charger shipping should start in February 2017 /

Saturday 30 July 2016

Purple blob animal (video)



Credit: Ocean Exploration Trust/Gawker

Ocean Exploration Trust research ship E/V Nautilus has discovered an animal, which has the appearance of a purple blob, in the Arguello Canyon (1,000 metres, 3,281 feet), off the coast of California.

Despite the suggestion in the video, a scientific name of Blobus purplus, is unlikely to be adopted.

/ mysterious purple blob found ocean floor strange creature found deep California ocean mystery purple blob what the heck is this thing scientists research ship E/V Nautilus discovered something strange bottom ocean small purple blob retrieved recovered remotely operated vehicle trying to figure out what it is purple blob found deep in Arguello Canyon Channel Islands National Marine Sanctuary off California creature stumped our scientists onboard team video crew discovered purple blob Nautilus scientists surprise episode Mystery Science Theater dark purple blob Blobus purplus scientist researcher /

Friday 29 July 2016

Google vs spam phone calls



Credit: Alamy/The Guardian

Google has just upgraded spam phone call handling on Nexus & Android One phones running Android 6.0 or above.

The Guardian
https://www.theguardian.com/technology/2016/jul/26/google-android-app-caller-id-block-spam-nuisance-calls

Google support
https://support.google.com/nexus/answer/3459196

If you don’t have one of the phones listed above, Android has something for you too. After a spam (or other unwanted) phone call:

● go into the Logs screen of the phone app
● select the unwanted phone call
● select the menu icon ( ≡ or ⋮ )
● select Add to Auto reject list
● press back
● menu icon ( ≡ or ⋮ )
● Settings
● Call
● Call rejection
● Auto reject mode

Auto reject numbers 🔘

/ new spam-blocking spam blocking feature Google integrated default app Android devices Google taking action against spam callers new version phone app Android devices identifies block spammers phone app update Google’s Google separate core phone features OS operating system updates Nexus smartphones Android One devices Nexus 6P Nexus 5X new spam-blocking feature extension Google’s caller ID system helps identify businesses stored your address book phone app checks incoming call numbers database flags spammers big red banner spam caller identified user option permanently block number whitelist false positives first time apps scan incoming calls help users avoid answering spam calls first time Google integrated default app Android devices third-party apps Truecaller available Android iOS iPhone users limited iOS’s locked-down call screeners next version iPhone operating system iOS 10 release iPhone 5 or newer include new caller ID extension system spam alerts Android iPhone iOS OS operating system /

Thursday 28 July 2016

Mine Kafon Drone – demining done safer, faster, cheaper (video)



Massoud Hassani’s wind-powered landmine sweeper, funded on Kickstarter in 2013, on display at the Museum of Modern Art, New York
Credit: Rene van der Hulst/Massoud Hassani/Museum of Modern Art, New York

“There are 100 million land mines worldwide. Every day, 10 innocent civilians are killed or maimed by these explosives.” – Massoud Hassani

Conventional demining operations pose a major risk to the people carrying out the process. Partly for this reason, demining is slow & expensive. In many places, landmines prevent farming & other land use, for long periods after conflict has ended, further impoverishing populations whose lives have already been blighted by war.

Born in Afghanistan, Massoud Hassani, learned at an early age, about the dangers of landmines. In 2013, he placed his first mine detonator on Kickstarter. Now he is back with the Mine Kafon Drone, which he claims is 20 times faster, 200 times cheaper, & eliminates the risks of traditional demining methods.

New mine detonator – a drone design



Kickstarter project
https://www.kickstarter.com/projects/massoudhassani/mine-kafon-drone?ref=HappeningNewsletterJul2616s2

Original 2013 Mine Kafon



2013 Mine Kafon on Kickstarter
https://www.kickstarter.com/projects/massoudhassani/mine-kafon/description
/ Mine Kafon Drone airborne demining system developed clear all land mines around the world less than 10 years Kickstarter Mine Kafon Drone unmanned airborne demining system uses three step process map detect detonate land mines landmines land mine landmine Mine Kafon Drone 20 times faster currently available technologies Mine Kafon Drone MKD innovative solution land mine landmine removal providing reliable demining system delivers accurate updates information mine clearing operations Mine Kafon drone Queen Maxima Singularity U expo Eindhoven the Netherlands Mine Kafon Drone flies fly dangerous areas map detect detonate landmines from a safe distance drone works autonomously equipped three separate interchangeable robotic extensions three methodologies combined MKD up to 20 times faster traditional demining technologies safer 200 times cheaper mapping drone flies over the whole field aerial 3D mapping system identify dangerous areas GPS way points detection robotic metal detecting arm MKD hovers above ground 4 cm detect mines detected mine geotagged operator's system construct map known mine locations destroying MKD Mine Kafon Drone attached robotic gripping arm places small detonator every detected mine land mine landmine detonated safe distance timer detonation land mines landmines more than 60 countries significant risk communities across globe victims mostly civilians children women elderly tens of thousands of innocent people killed every year many more injured horrific reminder current technologies clearing detecting land mines 1100 years established processes slow dangerous expensive solve the problem in our lifetime MKD crucial advantages demining organisations completely casualty free reduced cost traditional methods modular system enhanced addition sensors tools MKD perform wide variety of tasks map area demining operation information decision-making processes on-going operations planning demining procedures easier scanning process information gathered at-risk areas demining begins data operation collected analysed structured systematic way land mines landmines explosives growing up Kabul Qasaba Afghanistan Massoud Mahmud Hassani Mine Kafon Drone project horrors land mines develop a solution safe smart solution detect clear land mines first successful Kickstarter campaign 2013 backed 4200 backers Mine Kafon Foundation founded Mine Kafon Foundation research and development R&D organisation based the Netherlands raising awareness giving lectures developing new approaches fight land mines landmines crowdsourced engineers designers collaborate volunteer humanitarian project developed several working prototypes Mine Kafon Drone performed tests Dutch Ministry of Defense defence experts demining Mine Kafon Drone pilot study showcasing MKD’s capabilities development production Mine Kafon Drone governments UN NGO MKD works reliable unmanned demining system test different weather conditions environments tests finalize details batch production Mine Kafon Drones save thousands of lives civilians access agriculture water resources education freedom play outdoor sports cannot move freely for fear of mines liberate affected countries Mine Kafon Drone /

Wednesday 27 July 2016

How to make money out of Pokémon Go



Credit: Osah Otak

Method 1

Some want a to have a lot of Pokémon without all of that tiresome game play. So:


a. install Pokémon Go on your device

b. create an account

c. play the game obsessively – just like everyone else – except your future customers

d. capture a lot of Pokémon

e. sell the account – i.e. login details – on eBay

f. repeat until you are rich – or the craze dies


http://www.mobilefun.co.uk/blog/2016/07/how-some-players-are-making-a-career-out-of-pokemon-go/?referer=N_2016_07_26_Nonda_iHere_MAIN&utm_source=Mobile%20Fun&utm_medium=email&utm_campaign=1415592_2016_07_26_Nonda_iHere_MAIN_58729&utm_content=pokemon&dm_i=2A2X,UCA0,2ARWZ3,2885Z,1


Method 2

a. establish a Pokémon Lure Module at your retail outlet

b. sell stuff to players who come in chasing Pokémon


http://www.forbes.com/sites/quora/2016/07/22/how-to-ride-the-pokemon-wave-to-business-success/#716b8f6b2063


http://nextshark.com/pokemon-go-making-small-businesses-ridiculous-amount-money/


Method 3

One of the aims of Pokémon is to get players outside & moving. Some are keen on the game, but not so keen on, “outside & moving”. Offer to walk or drive players' phones – for a fee. PokéWalk is one such service.


PokéWalk on Twitter

https://twitter.com/trypokewalk


More

https://www.inverse.com/article/18152-pokewalk-says-that-it-s-lyft-for-pokmon-go


Method 4

There is a store inside the game, which charges real money for enhancements to game play. This method only works for the rights holders of Pokémon Go.

/ Pokémon GO business success Pokémon GO small business knowledge sharing network phenomenon Pokémon GO completely transformed retail businesses small business owners opportunity traffic game Pokémon Lure Modules actively engage Pokémon GO marketing Pokémon Lure Module purchase physical retail location capture game characters geolocation Lure Module marketing technique while the business is open Pokécoins packs of lures augmented reality feature people walking outdoors Pokémon Go driving a ton of profit local businesses game recent launch small-scale ventures booming market research firm SensorTower 15 million downloads App Store Play Store numbers augmented reality feature gets people walking outdoors Pokémon Go driving a ton of profit local businesses game recent launch small-scale ventures booming market research firm SensorTower has recorded at least 15 million downloads App Store and Play Store numbers combined restaurant ate dinner tonight Pokestop lure constantly active local shops diners movie houses other businesses luring customers in-app purchases creative marketing businesses Lure Modules attract Pokémon specific locations Pokémon hunters purchased within the game applied to local landmarks businesses pizzerias coffee shops areas across neighborhoods PokéStops Gyms resupply items train characters increases store’s chances customer traffic L’inizio’s Pizza Bar Queens spent approximately $10 Lure Modules food drink sales up by at least 30% bisiness owners order Pokémon Gym badges announce leading teams promote screenshots on social media Gyms biggest structures in-game map spot the nearest one business owners establishment PokéStop Gym creative marketing capitalize on a hype virtually found everywhere Pokémon Go collaboration between Pokémon Company Niantic augmented reality Ingress game available to download iOS 8Android 4.4 game helpful in good business knocked-off used for robbery your business reaping Pokémon Go benefits /

Tuesday 26 July 2016

How Finland overhauled their education system (video)


And it’s not what you think!

/ education Finland USA United States of America junior no homework most important thing for students is to be happy /

Monday 25 July 2016

CT Band turns your existing watch into a smartwatch



CT Band SimpliCT Silicone
Credit: byrifft.com

Not the first, but the CT Band adds smartwatch functionality to your existing watch. Display is a small OLED panel built into the band itself. Functions include the usual – notifications of incoming calls, emails, SMSs, exercise tracking etc. Bands include leather & silicone versions in a range of colours.

Possibly the least popular aspect of the CT Band is an Apple-Watch-like requirement to be charged daily, or at best, every other day.

http://the-gadgeteer.com/2016/07/21/ct-band-turns-your-rolex-or-timex-into-a-smartwatch/#comments

Pre-order it here:
https://www.ct-band.com/

Or here:
https://www.byrifft.com/en/
/ CT Band turns your Rolex or Timex into a smartwatch adding smartwatch features non-smart watch CT Band French startup Rifft CT Band replacement watchband watch band watch-band watches made of leather silicone variety of different colors band features high precision 3D accelerometer physiological sensors environmental sensors microphone small OLED display strap connects Android iOS phone Bluetooth strap’s OLED LCD display incoming call text messages email other notifications track daily activity steps heart rate band charged once per day every other day silicone version CT Band pre-ordered €149,00 Euros leather band €169,00 $165 $186 US bands available this fall 2016 leather silicone versions range of colours colors /

Sunday 24 July 2016

3D print of a murdered man's fingers to unlock his phone



Credit: Planet Biometrics

Using a fingerprint in place of a PIN or password to secure your phone is not a way to improve security.

This has been emphasised by news that Professor Anil Jain of Michigan State University is producing 3D prints of a murdered man’s fingers, as an aid to police unlocking the victim’s phone. Police hope that information in the phone may help them in identifying the murderer.

http://gizmodo.com/police-want-to-3d-print-a-dead-mans-fingers-to-unlock-h-1784102211
/ Apple help break in to hack iPhone police 3D print fingers dead man fingerprints unlock phone Michigan State University professor Anil Jain six U.S. patents fingerprint recognition police laboratory ask for help catching murderer ongoing investigation scans victim’s fingerprints previous arrest unlocking his phone make model provide clues killed PhD student Sunpreet Arora printed all 10 digits scans coated them layer metallic particles mimic conducive skin easier read final 3D-printed fingers aren’t finished ready for police try many phones biometric data require PIN entered used two days fingerprint unlock legality case further proof fingerprints not really safest way securing private data dead man judge ruled suspects required unlock phone fingerprint Fifth Amendment protects right avoid self-incrimination illegal force give out passcode biometric indicators fingerprints not covered Fifth Amendment ruling PIN
/

Saturday 23 July 2016

How secure is your fitness tracker?



Microsoft Band 2
Credit: AV-Test

Your fitness band or smartwatch collects a lot of important data about you, & communicates it to your smartphone. At each step, personal data is potentially open to interception by third parties.


Striiv Fusion
Credit: AV-Test

Some health insures provide various incentives for policy holders to buy & use fitness trackers. Rationale is that fit policy holders are healthier & so cost the health insurer less. Some insurers require evidence, from the fitness tracker, that the user is reaching targets. This can create an incentive for the user to tamper with data.


Pebble Time – fewest risk points among the devices tested
Credit: AV-Test

AV-Test evaluated 8 fitness bands & watches:

Apple Watch
Pebble Time
Basis Peak
Microsoft Band 2
Mobile Action Q-Band
Runtastic Moment Elite
Striiv Fusion
Xiaomi MiBand

https://www.av-test.org/en/news/news-single-view/seven-fitness-wristbands-and-the-apple-watch-in-a-security-check-2016/
/ how secure fitness band fitness tracker smartwatch smart watch smart-watch seven fitness wristbands Apple Watch security check 2016 fitness wristbands smart watches extremely popular sports fans health insurance companies subsidizing purchase tracker rewarding their use fit people cost insurance companies less experts from AV-TEST examined 7 fitness wristbands Android Apple Watch security result manufacturers disappointing errors smart watches fitness wristbands trackers popular recommended health insurers Europe legal playing field health insurance companies subsidize wearables United States offers premium rebates policyholder is able to demonstrate efforts per fitness tracker New York startup Oscar Health pays policyholders one dollar per day reach daily fitness goal 2014 over 26 million wearables sold 2015 75 million 2016 exceed 100 million high security risks fitness trackers test evaluated latest best-selling fitness wristbands Pebble watch Apple Watch wristbands operate corresponding app Android smartphone findings summarized test trackers apps laboratory very detailed test report available as a PDF Apple Watch special case test methods cannot be directly applied Android iOS evaluation Apple Watch products tested Basis Peak Microsoft Band 2 Mobile Action Q-Band Pebble Time Runtastic Moment Elite Striiv Fusion Xiaomi MiBand Apple Watch experts focused two special issues perspective private user data recorded tracker app secure against spying hacking third parties health insurers other companies data tracker app secure against tampering attackers may use data exploit user's disadvantage private data rightly needs to be protected health insurance companies reward policyholders policy holders reaching fitness goal fitness tracker app manipulated exploited eventually tamper tampering three test steps risk assessment testers fitness wristband 10 testing criteria tracker application online communication graph risk assessment test candidates testers criterion as a risk fault security gap not chosen heightened or high risk penetration areas evaluated explicitly open door testers hack risk area analyzed attacker consequences tracker connection authentication tampering visibility fitness trackers use Bluetooth connect smartphone traditional problems examined first security aspect invisibility for Bluetooth devices can't connect rack during pairing devices visible security offered wristbands Microsoft Pebble Mobile Action claims capability still visible BLE privacy Bluetooth safety aspect function BLE privacy feature Android 5.0 feature device repeatedly generates new MAC address Bluetooth connection actual address never disclosed therefore not trackable technology only used Microsoft Band 2 ability to be found device connected very secure solution exclusive Bluetooth pairing tracker only allows connection one known smartphone test only used by Basis Peak Microsoft Band 2 Pebble Time allows connections several devices user required manually confirm each one that is also secure Xiaomi MiBand simple yet safe method successful pairing no longer visible allows no more connections wristbands from Striiv Runtastic Mobile Action fail to use reliable technology prevent connections unknown devices authentication third-party smartphone successfully paired tracker additional safety feature authentication secondary security threshold consistently Basis Peak Microsoft Band 2, Pebble Time Xiaomi use the technology quite simple to circumvent additional security implement it inadequately tamper protection health insurance companies courts rely authenticity data tested integrity safeguard access protection data stored in the tracker protection configured prevents access third parties eliminates tampering data smartphone owner Basis Microsoft Pebble Xiaomi basic protection device Xiaomi fooled weak authentication third-party make wristband vibrate change alarm times completely reset the tracker to factory settings fitness trackers Striiv Mobile Action adequate functioning authentication safety mechanisms vulnerable to tampering Striiv Fusion values body measurements user changed superhuman parameters used as inputs calculation distance traveled calorie burn tracker Mobile Action modify stored user information weight height step length test values used directly calculation calorie burn distance traveled app safeguarding code check local storage technology tracker secure corresponding app smartphone weakest link testing apps save data accessible other apps smartphone security functions non-rooted rooted root Android devices prevent access data saved accessible to everyone Xiaomi MiBand committing this error stores extensive log file app activity completely open area log transmitted data user information body measurements authentication process code obfuscation second test object Identify sloppy programming apps apps use code obfuscation technology prevents reverse engineering hides useful information from attackers apps Mobile Action Pebble Xiaomi technology apps Basis Runtastic raised flags obfuscation enable attackers products Microsoft Striiv obfuscation perform an app analysis log debug info programming error output log debug information important information outputs security mechanisms defeated process app Mobile Action works cleanly information attackers secure online communication connections app communication monitored un encrypted transmitted good news connections encrypted encrypt intercept intercepted open HTTP connections unencrypted contents secure connection readable installation of a root certificate evaluation possible pathway users manipulate transmitted data Basis Pebble security sufficiently protected against unwanted access monitor secure connections successfully tamper with them authentication synchronization data readable lack of security fitness wristbands similar errors current test security risk assessment trackers Pebble Time Basis Peak Microsoft Band 2 most secure minor errors offer few opportunities attackers tampering test smaller defects firmware update fitness wristband Mobile Action multiple risk factors function invisible has deficiencies authentication tamper protection test user data modified back door Runtastic Striiv Xiaomi most risk points products tracked easily authentication tamper protection code apps obfuscated data traffic manipulated monitored root certificates Xiaomi stores data unencrypted smartphone comprehensive security study testing fitness trackers Apple Watch security check Apple Watch fitness tracker iPhone safely handle data retrieved test Apple Watch configured Android devices iOS Android risk criteria performed not relevant Apple device trackers controlled visibility BLE privacy controlled connectivity online communication connections encrypted manipulated using root certificates visibility Bluetooth controlled by the user watch constantly tracked BLE privacy different MAC address Bluetooth newly activated almost impossible to track airplane mode switched on and off genuine MAC address Bluetooth components controlled connectivity Apple special theft prevention technique Watch paired with an account released with great effort factory reset thief sells smart watch new user Apple Watch uses encrypted connections additionally secured updates unencrypted via HTTP connections encrypted further secured testers read information geo data of user location street address Android devices root certificate installed connections monitored user more access data tamper Apple Watch high security rating testers vulnerabilities attackers gain access watch /

Friday 22 July 2016

Adobe Flash – two more nails in the coffin



Credit: PC World

There are a number of reasons to disable Flash on your browser – most obvious is security. Adobe asked users to stop using it months ago.

Soon there will be two more reasons to remove Flash content from web sites

● almost all Flash content will be blocked by Google’s Chrome browser by the end of the year

● Mozilla’s Firefox will block, “certain Flash content that is not essential to the user experience”, starting in August


http://www.lifehacker.com.au/2016/07/mozilla-will-start-blocking-superfluous-flash-content/
/ Mozilla blocking superfluous Flash content Google committed to blocking Adobe Flash Chrome browser Mozilla stop non-essential Flash content displayed Firefox browser starting August HTML5 supplanted Flash preferred technology support rich media websites good riddance Flash numerous security vulnerabilities concerted effort move websites off Flash plugin Mozilla blog post August Firefox block Flash content user experience support legacy Flash content future changes Firefox users enhanced security improved battery life faster page load better browser responsiveness Firefox blocking specific Flash content invisible to users reduce Flash crashes hang hangs minimise website compatibility problems changes limited to a short curated list Flash content replaced with HTML HTML5 Mozilla moving away from plugins implementing web APIs replace their functionality drop all APAPI plugins Flash /

Thursday 21 July 2016

2014 was the hottest year on record – until 2015



Another record high temperature year apparently in progress
Credit: NASA/National Oceanic & Atmospheric Administration (NOAA)/Climate Central

But look at 2016.

Last post about the continuing series of record hot years, on these pages, was in January of this year.

Unfortunately, as shown in the graph at the top of this item, the trend which was apparent in January has continued.

http://www.climatecentral.org/news/first-half-of-2016-record-hot-by-far-20540

And June 2016 was the 14th consecutive month of record heat for the globe.1 Fourteen consecutive record hot months is, in itself, a record.

NOAA has a summary of global climate information for every month since January 2012 at https://www.ncdc.noaa.gov/sotc/summary-info/global/201201
__________

1 NOAA: “Global Summary Information - June 2016”, https://www.ncdc.noaa.gov/sotc/summary-info/global/201606
/ First half 2016 blows away temp records record hot June 2016 will be the hottest year on record globally data released running average global temperatures during 2016 monthly numbers from NASA National Oceanic and Atmospheric Administration NOAA planet on track surpass 2015 hottest on record 2016 blown that out of the water Gavin Schmidt director NASA’s Goddard Institute for Space Studies 2016 boost exceptionally strong El Niño record temps excess heat built up in Earth’s atmosphere accumulating greenhouse gases heat raising global sea levels disrupting ecosystems more extreme weather events every month this year has been record warm globally among the first ever recorded exceed 1°C 1.8°F above average NASA NOAA all six months of the year so far exceeded that remarkable benchmark compared to preindustrial temperatures El Niño temperature departures record-high levels June above 20th century average NOAA above 1951-1980 average NASA June record warm for the contiguous U.S intense record-breaking heat wave NOAA record unprecedented 14 consecutive record-hot months streak Deke Arndt head climate monitoring division NOAA National Centers for Environmental Information long-term warming trend setting records beyond anything we had seen before early 2015 June’s record heat year-to-date above the 20th century average NOAA above average NASA temperatures excess global temperature data baselines comparing temperatures long-term warming trend nations have agreed goal keeping warming under 2°C 3.6°F above temperatures from preindustrial times manmade greenhouse gases increasing in the atmosphere end of the century current global temperatures into perspective NASA NOAA data two datasets averaged compared average from 1881-1910 preindustrial era above the average Arctic sky-high temperatures this year record-low sea ice levels roasting Arctic temperatures extended into Alaska hottest temperature Arctic coast oceans persistent warmth NOAA global average ocean temperature above the 20th century average largest such departure in 137 years of records elevated temperatures record third year of a global coral bleaching event water changes temperature air landglobal ocean heat temperatures record pace forecasts predictions La Niña global temperatures year warmest long-term trend of warming is clear record heat of the 15 warmest years on record, 14 have occurred in the 21st century warmest on record climate variability factors strength of the La Niña warmest years on record /

Wednesday 20 July 2016

SpaceX rocket lifts off on cargo run, then lands at launch site (video)



Falcon 9 SpaceX rocket launches a Dragon capsule from Cape Canaveral – next stop for the Dragon capsule is the International Space Station – next stop for the Falcon 9 launch vehicle is a controlled landing just a few miles from the spot this photograph was taken
Credit: AP/The Sydney Morning Herald

A Falcon 9 SpaceX rocket launched from Cape Canaveral at 00:45 USA EDT (04:45 GMT) on Monday 08 July.

At the top of the 23 story space vehicle was a Dragon capsule packed with almost 5,000 pounds (2268kg) of payload, including a 7.8 feet (2.4 m) docking ring. When attached to the International Space Station, it will allow docking with the manned vehicles currently under development by SpaceX & Boeing. First test flights are scheduled to begin in 2017.

After separation of the Dragon capsule, the Falcon 9 flew itself back to a point just a few miles south of its launch pad.

Video below is just over 30 minutes in length
Ten second countdown begins just after 16:45
Landing begins around 24:50



https://uk.news.yahoo.com/spacex-rocket-lifts-off-cargo-060218878.html

http://www.smh.com.au/technology/sci-tech/spacex-rocket-lifts-off-on-cargo-run-then-lands-itself-at-launch-site-20160718-gq8jmi.html

http://www.reuters.com/article/us-space-station-spacex-idUSKCN0ZY0BA
/ SpaceX rocket lift off cargo runlands launch site unmanned SpaceX rocket blasted off Cape Canaveral Florida early Monday cargo ship International Space Station landed itself launch site 23-story-tall Falcon 9 rocket Elon Musk’s Space Exploration Technologies SpaceX lifted off Cape Canaveral Air Force Station Dragon capsule 5,000 pounds 2,268 kg food supplies equipment miniature DNA sequencer first to fly in space aboard capsule metal docking ring diameter 7.8 feet 2.4 metres meters attached station commercial spaceships under development SpaceX Boeing ferry astronauts station $100-billion laboratory orbits orbit flies 250 miles 400 km above Earth manned craft scheduled begin test flights next year NASA retired fleet space shuttles United States Russia ferry astronauts ISS International Space Station cost more than $70 million per person Dragon cargo ship two-day journey station Falcon 9 booster rocket separated flew itself back to the ground touch touching down south launch pad pair sonic boom good launch good landing Dragon NASA technology SpaceX developing rockets refurbished re-used slashing launch costs touchdown SpaceX successfully landed Falcon rockets ground ocean platform SpaceX launch recovered rockets Hans Koenigsmann vice president mission assurance /

Tuesday 19 July 2016

US Government operational security guidance for intelligence officers & friends playing Pokémon GO


You are probably aware of the malware risks associated with playing Pokémon GO, but there are other risks, including those to privacy & physical safety.


Who is Thomas Rid? He's Professor of Security Studies at King's College London & author of “Rise of the Machines”.
/ official app application download developer Niantic Google Play Store Apple App Store malware GPS data connection WiFi 3G 4G data play playing geotag geo-tag geo tag geotagged geo tagged geo-tagged personal email Gmail account log in login Google credentials expose your credentials app owner security holes patched playing Pokémon GO Pokémon Trainers Club throw away Gmail account trainer name screen name mindful of surroundings taking pictures foreground background revealing identity location street signs government buildings disable AR embedded in photograph picture metadata physically visiting Pokéstop gym driving capture /

Monday 18 July 2016

Edna the electric drive train test mule meets Tesla & Ferrari at the drag strip (video)


California-based electric-car startup Atieva recently drag raced its powertrain test mule, Edna, against a Tesla Model S & a Ferrari California.



It’s not the best looker, but Edna gets to the finish line first. Which variant of the Tesla Model S is used in the race isn’t specified, but it is unlikely to be the highest performing P90D – at least not in Ludicrous mode. Tesla claims that a P90D in Ludicrous mode can reach 60 mph (96.6 kph) in 2.8 seconds.1 Edna, as the video shows, is credited by its creator with a 0-60 mph time of 3.08 seconds.

On the other hand, the test mule is hampered by a heavier body with inferior aerodynamics. Atieva claims that their production vehicle will reach 60 mph 0.4 seconds faster than Edna – that's faster than a P90D in Ludicrous mode. However, production is planned for 2018, & it is likely that Tesla will have something faster by then. Many other manufactures have electrics on the drawing board – other startups & some established names – so the Atieva production vehicle is likely to enter a crowded market.

http://electriccarsreport.com/2016/07/watch-edna-electric-van-beats-tesla-ferrari-drag-race/

http://electrek.co/2016/07/13/atieva-edna-races-all-electric-van-against-tesla-model-s-ferrari-video/


http://www.roadandtrack.com/new-cars/future-cars/news/a29996/where-did-this-900-horsepower-electric-van-come-from/
__________

1 Tesla Motors: https://www.tesla.com/models/design
/ California based electric-car startup Atieva recently race powertrain test vehicle mule Edna Tesla Ferrari drag race Edna converted Mercedes-Benz Vito commercial van Ferrari California Tesla Model S lining up specs Tesla startup Model S P90D Ludicrous mode drag race Atieva test vehicle Edna two electric motors two sets of power electronics two gearboxes one battery storing 87 kWh energy over 900 horsepower software components Edna test powertrain system motor control algorithms regenerative braking behaviors accelerator pedal feel cooling strategies Edna electric van accelerate 0 to 60 mph 3.08 seconds Atieva chassis body final product 60 mph 0.4 seconds faster Atieva engineering former Tesla VP Model S Chief Engineer Peter Rawlinson working luxury electric sedan 2018 electric-car startup raised significant funding build half-billion-dollar electric car factory California /

Road for electric trucks with overhead power supply opens in Sweden



Govermnent funding + Seimens electrics + Scania trucks = electric highway trial
Credit: Siemens/truckinginfo.com

Electric personal transport, including long distance travel, is a solved problem.

Short-range electric trucking too.

All-electric long-haul trucking, on the other hand, remains unsolved.

A trial being run near the city of Gävle in Sweden may point the way. Funding by the Swedish government + equipment supplied by Siemens has fitted a 2.0-kilometer section of public road with overhead power similar to that which provides power to electric trains. Modified Scania trucks are able to draw power from overhead.

More at:

http://www.greencarreports.com/news/1104908_road-for-electric-trucks-with-trolley-like-catenary-opens-in-sweden

https://www.truckinginfo.com/channel/fuel-smarts/news/story/2016/06/siemens-opens-first-public-electric-highway-in-sweden.aspx
/ road electric trucks trolley-like catenary Sweden relatively short ranges long charging times current lithium-ion battery packs development electric long-haul trucks truck carry supply electricity onboard section highway city Gävle Sweden features overhead wires provide power electrified trucks long-haul trucking all-electric tractor wires e-way" catenary powers electric trains providing current picked up by pantographs mounted specially-equipped trucks first of its kind public road in the world Scania supplied trucks Swedish government backed project backing wires 2.0-kilometer 1.24-mile right lane E16 motorway electrified lane lanes two-year trial program system two Scania G360 trucks modified pull power overhead wires equipment from Siemens hybrids 9.0-liter diesel engines biofuel electric motors hybrid powertrains trucks drive electric-only lanes driver pass another truck electrified stretch of road internal-combustion engine produces 360 horsepower electric motor rated 150 kilowatts 201 hp highway pantographs connect disconnect overhead wires speeds up to 90 kph 56 mph Siemens onboard 5-kilowatt-hour lithium-ion battery pack storage capacity electric-only driving e-way Scania Siemens planning second trial electric-truck technology U.S.A. USA next year California's South Coast Air Quality Management District Volvo Trucks test catenary ports of Los Angeles Long Beach /

Sunday 17 July 2016

Fake Pokémon GO app on Google Play infects phones with malware



Credit: TNW

In the wake of the craze, malware variants of Pokémon GO & other related apps have appeared on the Google Play store.

Malware apps documented to-date:

● Pokémon GO Ultimate

● Guide & Cheats for Pokémon GO

● Install Pokémongo


Promptly removed from the Google Play store, they may still appear on third-party app stores.

Impacts of the malware in question include:

● locking device screen

● rename itself to evade counter measures

● remove itself from the device app menu to evade counter measures

● run in the background & click on ads to generate income for its creator

● display messages that claim that the device is infected with malware (actually true) which advise the user to buy further apps & services to remove malware

● install a backdoor app called DroidJack (aka SandroRAT) which grants an attacker full access to the device


What you can do to protect yourself:

● keep all software up-to-date, including Android itself – as they become available for your device

● avoid using third-party app stores – apart from Amazon

● avoid apps from unknown developers


Ars Technica
https://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/

Gizmodo
https://gizmodo.com/more-fake-pokemon-go-were-released-to-ruin-your-phone-1783761949

Naked Security
https://nakedsecurity.sophos.com/2016/07/12/fake-pokemon-go-app-watches-you-tracks-you-listens-to-your-calls/
/ fake Pokémon Go app Google Play infects phones screenlocker Pokemon Go Ultimate battery removal Device Manager uninstalled badware malware Pokémon Go frenzy sneak fake wares official Google Play marketplace security researchers researchers antivirus provider Eset Google-hosted marketplace Pokemon Go Ultimate biggest threat locks the screen devices installed restarting infected phone unlock the screen Infected phones unlocked removing the battery using the Android Device Manager screen has been unlocked device has restarted app renamed title PI Network removed from the device's app menu continues to run in the background surreptitiously clicks on ads generate revenue for its creators first observation lockscreen functionality fake app Google Play Eset malware researcher Lukas Stefanko ransom message lockscreen ransomware Google Play Eset discovered fake Pokémon Go apps Google Play Guide & Cheats for Pokemon Go Install Pokemongo deliver ads fraudulent scary-sounding messages designed trick users buying expensive unnecessary services message device is infected with malware prompts user spend money get malicious apps removed user presses Back button new scareware pop-ups advertisements appear Stefanko double-clicking Back button apps first case scammers exploit the ongoing Pokémon Go craze researchers from security firm Proofpoint backdoored version of the Pokémon Go app Android contained all the functions of the legitimate app also included remote access tool DroidJack SandroRAT gives an attacker full control over an infected phone malicious app available in third-party third party 3rd-party 3rd party app stores avoid marketplaces increased chances include harmful wares die-hard Pokémon fans sideloading side-loading side loading official Pokémon Go unavailable available in many countries apps discovered by Eset available in Google Play Google Eset reported them continued presence of malicious apps inside the official Android marketplace significant limits Google's attempts detect malicious abusive behavior before admitting titles run Pokémon Go Android phone download app only from Google Play closely inspect the publisher number of downloads other data for signs of fraud before installing /

Saturday 16 July 2016

Brain-linked prosthetic arm provides more accurate, more natural control


“Luke” is a prosthetic arm, activated by the nerves which previously activated the muscles of the severed limb. Advantages of this approach include reduced learning time for the prosthesis user & more natural control. Feedback sensors allow users to know how much force they are applying, so that both heavy & light weight, delicate objects can be handled.

Designed by Segway creator, Dean Kamen, with funding from US Defense Advanced Research Projects Agency (DARPA).

Perhaps most important of all to amputees, it's scheduled to go on sale later this year.



The Verge
https://www.theverge.com/2016/7/11/12147726/prosthetic-luke-arm-commercial-launch-2016

Daily Mail
http://www.dailymail.co.uk/sciencetech/article-3692019/The-Force-strong-one-Luke-Skywalker-style-robot-arm-amputees-developed-military.html
/ DARPA-funded prosthetic arm go on sale later this year world most advanced prosthetics market later this year Luke arm designed Segway creator Dean Kamen funding from DARPA development received approval FDA prosthetic previously named the DEKA arm Luke Luke Skywalker's advanced prosthetic Star Wars headline feature control system prosthetic electrodes amputated limb electrical signals user's muscles user tenses flexes arm Luke changes position grip much more intuitive more basic prosthetics generally controlled switches or buttons adjusted manually by the wearer separate control system uses wireless sensors Luke more degrees of flexibility movement regular prosthetic shoulder elbow wrist individually powered four independent motors hand dexterity securely grip single egg force sensors fingers give the wearer feedback how hard they're gripping technology comes at a price creators of the Luke arm prosthetic cost tens of thousands of dollars experts industry price tag of $100,000 /

Friday 15 July 2016

Electric world record at the drag strip




VW Beetle electric conversion, Black Current, set a world record with an ET of 8.711 seconds & terminal velocity of 151.58 mph at the 2016 SPRC Summer Nationals at Santa Pod Raceway.

Black Current has been a development project, with a string of records, including the first electric car to cover a quarter mile in under 10 seconds, as long ago as 2011. That run included 0-60 mph in just 1.6 seconds. At that time, the car was powered by sixty 12-volt lead-acid motorcycle batteries.

Daily Mail 2011
http://www.dailymail.co.uk/sciencetech/article-1394754/Record-breaking-Beetle-fastest-electric-powered-drag-racer-doing-0-60mph-1-6-seconds.html?ito=feeds-newsxml
/ EV electric vehicle battery electric motor LiIon lithium ion charge recharge drag strip drag race Volts-wagen Volkswagen Beetle fastest electric-powered electric powered drag racer 0-60mph in 1.6 seconds Black Current Black Currant Black Current, constructed from a 1965 VW Beetle created brothers Olly Sam Young set world record first electric-powered electric powered car quarter mile in under ten seconds 0-60mph in 1.6 seconds electric cars good for the environment minimal carbon footprint fastest thing on four wheels Sam 30 driver Olly 34 designer won Zero Emissions category annual Alternative Energy Racing tournament Santa Pod home-made home made electric dragster hitting nearly 133mph in the process broken a world record a few weeks earlier quarter-mile sprint 9.51 seconds top speed 135mph first ever break 10-second barrier electric car Olly nought to sixty in 1.6 seconds hand-building electric cars small workshop Hungerford UK world-beater mean machine powerful zero-emissions vehicles milk float car powered by sixty 12-volt motorcycle batteries faster still lithium gel battery pack started VW Beetle record-breaking creation milk float just made improvements year on year the secret is time effort trial and error research keep making car lighter more powerful make it even faster pride and excitement everything works as it should months of work brothers next step race overseas conquer petrol-powered petrol powered dragsters next black currant /

Thursday 14 July 2016

Samsung Galaxy Note 7 launch on 02 August – update




Credit: BGR

Yes, you read that right.

Yes, the current Galaxy Note is the 5.

Rumour has it that Samsung plans to skip the name Note 6 & go straight to 7, based on this teaser:


Credit: The Next Web

Update 15 July: Samsung refers directly to the “Galaxy Note7” on its own web site:
https://news.samsung.com/global/invitation-samsungs-latest-galaxy-note-unpacked-2016

Why? Most likely to bring the Samsung S & Note model lines into numeric synchronisation.

Other widely reported specs:
● 6GB RAM

● base model with 64GB flash storage – estimates range as high as 512GB for the top model – this may be including microSD card(s) – cards up to 256GB will be supported & the dual SIM model will support a second microSD card in the 2nd SIM slot

● curved edges on both sides of the screen, as in the S6 Edge
● USB-C connector for power & data

GSMArena
http://www.gsmarena.com/samsung_galaxy_note7-8082.php

TechnoBuffalo
http://www.technobuffalo.com/2016/07/12/galaxy-note-7-august-2-event/

Gizmag
http://www.gizmag.com/galaxy-note-7-event-launch-details/44313/
/ Android OS phone smartphone smart phone mobile cell phone cellphone Samsung Galaxy S5 Samsung Galaxy S6 Samsung Galaxy S7 device announced earlier than normal official confirmation Samsung Tuesday media invites event scheduled Aug. 2 a few weeks from now announce follow-up Galaxy Note 5 pictures Samsung’s next device Unpacked announcement handset looks a lot like Galaxy S6 Edge Plus S Pen upgraded specs pictures four possible color colour options black silver blue pink official confirmation Samsung’s event next month pretty good idea of what to expect rumor rumour rumoured rumored specs specifications 5.7-inch QHD display quad high density display 12-megapixel dual-pixel camera OIS PDAF 3,700mAh battery 64GB 128GB storage options microSD slot support IP68 waterproof water proof water resistant rating standout features iris scanner allowing users unlock device just by looking at it launch launches USB-C charge sync /

Wednesday 13 July 2016

All-electric Ferrari – obscene?



Credit: ElectricGT

Ferrari’s Marchionne is reported to have said of an all-electric Ferrari, “With Ferrari, it's almost an obscene concept.”1,2

Good to keep an open mind.

On the other hand, when Eric Hutchinson discovered a Ferrari 308 with an engine that had been destroyed in a fire, electric drive seemed like a good idea.

Conversion process
http://www.electricgt.com/about/

Completed vehicle
http://www.electricgt.com/



Boy Genius Report
http://bgr.com/2016/05/10/electric-ferrari-electric-gt/
__________

1 Road & Track: “Marchionne: all-electric Ferrari ‘an obscene concept’”, http://www.roadandtrack.com/new-cars/future-cars/news/a28377/electric-ferrari-youll-have-to-shoot-me-first-says-marchionne/

2 AutoBlog: “Marchionne: all-electric Ferrari ‘an obscene concept’”
http://www.autoblog.com/2016/03/04/marchionne-all-electric-ferrari-an-obscene-concept/
/ ev EV electric vehicle battery LiIon lithium ion charge recharge electric vehicles challenge pick a car to convert to electric convert conversion red 1978 Ferrari 308 GTS fuel leak and subsequent fire had toasted the car send it to the graveyard carbureted engine beyond repair perfect rolling chassis electric conversion project toasted Classic Magnum PI Style Ferrari perfect blend retro electric super cool high-performance low-maintenance electric vehicle suitable for daily driving 308 GTS tube frame racing inspired core design construction handle seriously increased power and torque electric drive conversion electric vehicle delivers huge torque quick speed dynamic driving all the smiles and fun you want without maintenance first scheduled oil change NEVER driven an electric 1978 Ferrari 308 GTS first and only 100% electric zero-emissions converted Ferrari on the road conversion project recycled engine 308 Ferrari owner’s GT-series cars OEM parts converted Ferrari 308 passionate dedicated skilled professionals in California EV electric vehicle racing record holders winners brilliant engineers radical custom fabricators sourced teamed top-notch EV engineers designers fabrication masters automotive professionals enhance car total driving experience performance Electric GT projects horse power horsepower torque are doubled custom design unrivaled driving experience performance Classic EV /

Tuesday 12 July 2016

Hackers find new ways to attack computing systems



Security risk?
Credit: PC Advisor

You probably have a good idea of how to avoid having your various computing systems attacked. It may be time to think again. Proof-of-concept has just been demonstrated for two new ways to overcome security precautions.

1. An attack on Siri or Google Now with voice commands (which are barely audible to humans) embedded in videos http://www.theregister.co.uk/2016/07/11/siri_hacking_phones/

2. Manipulating the speed of a computer’s internal fans to steal data from air-gapped machines https://www.wired.com/2016/06/clever-attack-uses-sound-computers-fan-steal-data/
/ group researchers Israel highly adept stealing data from air-gapped computers machines prized by hackers security reasons never connected to the Internet connected to other machines connected to the Internet making it difficult to extract data from them Mordechai Guri manager research and development Cyber Security Research Center Ben-Gurion University colleagues lab designed attacks various methods extracting data from air-gapped machines methods radio waves electromagnetic waves GSM network heat emitted by computers lab’s team found yet another way undermine air-gapped systems sound emitted by cooling fans inside computers technique steal limited amount of data siphon encryption keys lists usernames passwords keylogging histories documents more than two dozen feet away researchers technical details attack paper siphon encryption keys passwords rate of 15 to 20 bits per minute 1,200 bits per hou working on methods accelerate data extraction use two fans concurrently same machine CPU chassis fans double transmission rates research colleagues Yosef Solewicz Andrey Daidakulov Yuval Elovici director Telekom Innovation Laboratories Ben-Gurion University working on more techniques accelerate make it much faster air-gap myth air-gapped systems classified military networks financial institutions industrial control system environments factories critical infrastructure protect sensitive data networks machines aren’t impenetrable steal data attacker needs physical access to the system removable media USB flash drive firewire cable connecting air-gapped system another computer attackers use near-physical access covert methods Ben-Gurion researchers devised challenge assumption air-gapped systems are secure using sound waves steal data high-security environments not require sensitive systems air-gapped external internal speakers systems removed disabled create audio gap using computer’s cooling fans also produce sound researchers bypass protection steal data computers fans CPU fan chassis fan power supply fan graphics card fan operating fans generate acoustic tone blade pass frequency louder with speed attack increasing speed frequency fans transmit digits encryption key password nearby smartphone computer different speeds representing binary ones zeroes data attackers extract test researchers 1,000 RPM represent 1 1,600 RPM represent 0 one zero air-gap hacks stealing data computers using heat researchers hack air-gapped computer cell phone attackers radio signals mobile phones steal protected data attack researchers air-gapped machines targeted machine infected with malware researchers proof-of-concept malware Fansmitter manipulates speed computer’s fans malware air-gapped machines insurmountable problem real-world attacks Stuxnet Agent.btz sensitive air-gapped machines infected via USB drives receive sound signals emitted target machine attacker infect smartphone someone working near machine malware detect decode sound signals transmitted send attacker via SMS Wi-Fi mobile data transfers receiver within eight meters 26 feet targeted machine secure environments smartphones attacker infect internet-connected machine in the vicinity targeted machine fans operate few hundred RPMs few thousand RPMs noticing fluctuations fan noise attacker lower frequencies transmit data close frequencies differ only by 100 Hz signify binary 1’s and 0’s fluctuating speed natural background noise of a room human ear much more sensitive attack systems no acoustic hardware speakers design servers printers internet of things devices industrial control systems attack multiple infected machines transmitting receiver distinguish signals fans multiple infected computers transmit signals different frequencies methods mitigate fan attacks software detect changes in fan speed hardware devices monitor sound waves drowning dalek commands Siri voice-rec hack attack boffins embed barely-audible-to-humans commands inside vids videos vid video fool virtual assistants university boffins brewed one of the most complex mechanisms loading malware onto phones surreptitious Google Now Siri voice commands hidden in YouTube videos attack phones state receive voice commands feature often left unlocked close enough audio source instructions to be understood masking phone's beep acknowledgment voice commands have been received could alert users to an attack researcher researchers research boffins Tavish Vaidya Yuankai Zhang Micah Sherr Clay Shields Wenchao Zhou Georgetown University Nicholas Carlini Pratyush Mishra David Wagner University of California Berkeley paper Hidden Voice Commands give away beeps can precise conditions countered noise cancelling from the same attacking audio source users ignore beep LED flashes vibrations Apple Google operating systems alert systems sounds paper builds on existing work hidden voice commands constructed very little knowledge speech recognition system significantly improved attacks adversaries significant knowledge speech recognition system construct hidden voice commands humans cannot understand detection mitigation strategies limit effects attacks speech recognition audio CAPTCHAs proof-of-concept video boffins phone empty conference room three metres 10 feet from a speaker commands issued sound like a drowning dalek garbling garbled commands difficult for humans to understand passable for Siri attackers activate airplane mode denial of service attack open website paper substituted phishing malware download site successful effort malware writers malware fake Pokemon Go apps viral app tricked into dodgy substitutes commands easy to understand proof-of-concept video priming effects words spoken researchers /

Monday 11 July 2016

Growing population = protein supply problem



Credit: Ética Animal

Humanity has a population problem – expected to reach 10 billion by the middle of the century. Feeding that many people is a problem. Biggest part of that problem is protein. In western societies, the preferred source of protein is red meat. Unfortunately, producing one calorie in the form of meat takes many more plant calories.

One way around this problem is cutting out the plant-to-animal stage by growing a plant based source of protein, such as soya beans.

An alternative is an animal which is more efficient at turning plants into protein. One such animal is the cricket – ten times more efficient in fact. Water use, 100 times more efficient than cattle.



http://www.wired.com/2016/07/ive-future-tastes-like-crickets/
/ the future tastes like crickets humanity population problem solution six-legged six legged insect insects crickets soundtrack everyday foods snack bars pastas chips cricket protein industry venture capitalists cricket startup Exo $4 million in funding earlier this year Silicon Valley cash-slingers alternative foods crickets sales of edible insects worldwide top $500 million by 2023 venture capitalists humanitarian organizations our species won’t be able to feed itself population growth 10 billion people on Earth middle of this century humans better way produce protein using fewer resources insects seem to be the answer crickets 10 times more efficient than cattle feeding them 100 times more efficient water use efficiency improve cricket farmers perfect their methods cricket production in action visited Entomo Farms Ontario Canada farmers care for 100 million crickets churn out 1,500 pounds flour week from egg to grinder make the food that’ll soon power humanity /

Sunday 10 July 2016

Climate change is really very simple – Elon Musk explains


In around 12 minutes



And why it’s important, in just over a minute.



What will you tell your children, or grandchildren in 20 years time?

Didn’t anyone tell you?

Yes they did …

11 record hot months in a row
http://hhg2tech.blogspot.com/2016/04/11-record-hot-months-in-row.html

At last – a representative debate on climate change (video)
http://hhg2tech.blogspot.com/2015/10/at-last-representative-debate-on.html

Fossil fuel subsidies — $US10 million per minute
http://hhg2tech.blogspot.com/2015/05/fossil-fuel-subsidies.html

Rockefeller Family Fund divesting from fossil fuels
http://hhg2tech.blogspot.com/2016/03/rockefeller-family-fund-divesting-from.html

2014 was the hottest year on record
http://hhg2tech.blogspot.com/2016/01/2015-was-hottest-year-on-record.html

More record weather events in 2015
http://hhg2tech.blogspot.com/2016/01/more-record-weather-events-in-2015.html

What if climate change is just a hoax?
http://hhg2tech.blogspot.com/2014/02/what-if-climate-change-is-just-hoax.html

I don't believe in global warming
http://hhg2tech.blogspot.com/2013/12/i-dont-believe-in-global-warming.html
/ Elon Musk Tesla Solar City SpaceEx SpaceX sustainable transport global warming climate change weather hottest year on record anthropically caused climate change anthropic climate change global warming carbon dioxide CO2 carbon oxide atmosphere green house green-house greenhouse effect scientist scientific consensus political debate climate skeptic climate denier drought el nino el nina heat stress health future generations dehydration drought flood cyclone hurricane burning fossil fuel hydrocarbon energy renewable sustainable green photovoltaic PV solar cell solar energy hydro electricity wind turbine climatologist greenhouse gas /

Saturday 9 July 2016

How to keep hackers from listening to your computer’s microphone



Note tape over Webcam & microphone
Credit: wn.com

You may have read on these pages why disabling your webcam, when it’s not in use, is a good idea. And there’s evidence that FBI Director James Comey thinks so too.

Edward Snowden as well – https://www.wired.com/2014/03/webcams-mics/

As indicated in the image above, Mark Zuckerberg seems to agree, although the evidence doesn’t support the Gizmodo assertion that this makes him, “Paranoid As Fuck”.

Gizmodo
http://gizmodo.com/wow-mark-zuckerberg-is-paranoid-as-fuck-1782370124

Disabling a webcam is simple – if unplugging isn’t an option, the Zuckerberg method is 100% effective.

Preventing audio hacking on a built-in microphone isn’t so easy. Tape over the microphone may muffle the sound, but that’s all. There are other, more effective, options however:

Mac OS
http://www.macworld.com.au/help/how-to-keep-snoops-from-listening-to-your-laptops-microphone-143088/

Windows
http://windows.wonderhowto.com/how-to/everything-you-need-disable-windows-10-0163552/
/ how to keep snoops from listening to your laptop’s microphone security infosec information security shot seen round the world Mark Zuckerberg posted Instagram photo Mac laptop visible in the background Zuckerberg had put tape over his laptop’s camera microphone input mic jack virus viral Edward Snowden exposed NSA US National Security Agency data-gathering behaviour Vice program programme HBO how disable audio video inputs smartphone removing them extreme scrutinised tracked hacked Mark Zuckerberg Edward Snowden sanguine OS X vulnerabilities Mac OS Macintosh OS widespread exploitation attackers government agencies insinuate themselves into Macs target prevent potential general principle camera easy to block effectively black it out microphone harder covering may muffle volume Apple Apple’s laptops some sound would bleed through Zuckerberg’s savvy tape may be a reminder made deeper change software hardware most people fear mics being tapped conversation would be listened particular secret random subject of probing realistic potential NSA-scale audio-to-text extraction inevitable decrease in cost computational power criminal syndicates mass snarfed audio scanned for context reading a credit card number aloud discussing confidential business matter technically plausible today scale will eventually become practical microphone active piece of tape isn’t enough what steps can you take security hardware experts graduated path set microphone input to zero graphical user interface open sound system preference pane each device listed in the Input tab Input Volume zero drag all the way to the left prevents gross misuse software otherwise be able use an audio source without you realising input volume could be controlled through this approach security malicious software malware reset input volume bypassing settings pull audio directly from device stage before setting applied simplest and most direct change no other repercussions turn input volume up device whenever you need to unplug USB input devices while you’re not using them extra protection Macs Mac Macintosh support audio input through 3.5mm headphone jack using ear buds headset combo combination comes with an iPhone insert stubby adapter nothing plugged into it doesn’t apply built-in mics nearly all Macs Macintoshs Mac Macintosh prevent malware capable accessing audio drivers switching on audio input monitor microphone use Micro Snitch maker network-activity detector Little Snitch watches audio video input activity system level detects mic becoming active posts OS X notification floats window non-intrusive animation indicating it’s in use lower level than Sound preference pane separately installed software not found on every Mac more likely malware would trigger it Micro Snitch can’t monitor all input couldn’t alert some USB-attached microphones attaching on demand remove the drivers Windows Linux Apple provide easy access hardware drivers install remove modify settings intentional OS X’s friendly face contrasted Windows’ obscurity manage drivers system-provided interface troubleshoot problems Kenn White cryptography expert National Institute of Standands and Technology’s report securing OS X IT professionals disabling microphone input how to do it background detail disable audio system-wide removing a few driver files Terminal app command unsupported low-level changes unusable system make backup first sudo srm -rf System Library Extensions Apple USB Audio System Library Extensions IO Audio Family System Library Extensions disallow all audio input disable audio output system update restore missing drivers disable audio input hardware /

Friday 8 July 2016

Researchers create glow-in-the-dark cement to light up cities without using electricity



Credit: Studio Roosegaarde/Science Alert

Provides illumination at night without using energy. Able to absorb enough light, even on an overcast day, for up to 12 hours of illumination.

http://bgr.com/2016/06/20/glow-in-the-dark-cement-phosphorescent/
/ Starry Night Starry Night sustainable energy renewable energy green energy environmental progress decreasing dependency fossil fuels shift toward electric cars projected several studies dramatic impact gasoline world consumes next few decades wind farms growing more efficient recent breakthroughs double amount power generated solar panels developments technologies utilize utilise phosphorescent materials decrease dependency fossil fuels utilizes glow-in-the-dark materials mixed cement illuminate walkways night researchers Mexico Michoacan University San Nicolás de Hidalgo created new cement mixture walkways roads buildings illuminate themselves manmade energy sources research standard cement mixture phosphorescent materials phosphorescent element absorbs sunlight during the day glows at night illuminating paths pedestrians cyclists automobiles cars researchers special cement absorb sunlight sunny day cloudy day remain lit for up to 12 hours additives scientists prevent formation crystals occur normally production of cement creating material noncrystalline structure similar to glass allows passage of light inside varying proportion additives added during manufacturing cement regulates luminescent intensity color dazzle drivers used on roads special phosphorescent cement manufactured regular cement researchers addition of phosphorescent materials change structure finished product glowing cement used coating material other surfaces standard cement phosphorescent cement ready for commercial applications researchers research studying best way repair cement when it gets damaged /