Archive

Posts Tagged ‘computers’

The sound made by your computer could give away your encryption keys…

December 19, 2013 Comments off

nakedsecurity

One of the first computers I was ever allowed to use all on my own was a superannuated ICL-1901A, controlled from a Teletype Model 33.

One of the processor’s address lines was wired up to a speaker inside the teletype, producing an audible click every time that address bit changed.

The idea was that you could, quite literally, listen to your code running.

Loops, in particular, tended to produce recognisable patterns of sound, as the program counter iterated over the same set of memory adresses repeatedly.

This was a great help in debugging – you could count your way through a matrix multiplication, for instance, and keep track of how far your code ran before it crashed.

You could even craft your loops (or the data you fed into them) to produce predictable frequencies for predictable lengths of time, thus producing vaguely tuneful – and sometimes even recognisable – musical output.

Plus ça change, plus c’est la même chose

So it was with considerable amusement that I read a Full Article Here

Categories: Computers Tags: ,

Google wants to move into your HOME: Giant plans to fit microphones in ceilings…

December 12, 2013 Comments off

dailymail

Californian firm's chief engineer Scott Huffman, pictured,Californian firm’s chief engineer Scott Huffman, pictured, said the microphones would act like personal assistants

Google is already heavily criticised for trying to know almost everything about us, and now the firm wants to get inside our homes, literally.

Engineering director Scott Huffman told The Independent that in his vision of the future Google users would have microphones fitted inside their homes.

Huffman envisages houses with microphones fitted to the ceiling that act like personal assistants; responding to voice queries and connecting to phones, tablets and other smart devices.

He said: ‘Imagine I say ‘Can you bring up a video of the highlights of yesterday’s Pittsburgh Steelers game and play it on a TV in the living room?’ and it works because the Cloud means everything is connected.’

Elsewhere he said he could ask his Google assistant where to go for lunch that serves a particular type of food and on a certain budget and Google will find somewhere.

Huffman could then get in his car and his sat nav would be already programmed to take him to the restaurant of choice.

The plans aren’t too much of a stretch from what the Google Now app already offers thanks to what’s called Read more…

1974 PSA Warned Of High Tech Surveillance State For Behavior Control

August 9, 2013 Comments off

whiteowlconspiracy.com

tvhead-620x400By Aaron Dykes and Melissa Melton
Truthstream Media

 

“A tormenting thought: as of a certain point, history was no longer real. Without noticing it, all mankind suddenly left reality.” -Elias Canetti, Nobel Laureate in literature

As more and more information is released via National Security Administration whistleblower Edward Snowden, many Americans drifting through each day blissfully unaware of what country they really live in have had the curtain pulled back just enough to be fed their first spoonful of reality…it’s a bitter taste.

The clip below is of a public service message warning the public on the growing use of technology and surveillance by government and corporations (though who can really tell the difference these days) to control our lives.

Sure, you say. We know all about that. Snowden has conclusively shown us with leaked documentation what our government is doing to us.

Ah. But the film was not made last week or even last decade; it was filmed in 1974.

Watch and listen. No, really listen. This message isn’t just to warn us about the coming technological surveillance state itself, but how its construct is to Read more…

Chinese military writings reveal cyber, space war plans

April 30, 2012 Comments off

freebeacon.com

USAF Satellite/ AP Images

USAF Satellite/ AP Images

BY: – April 27, 2012 5:00 am

China’s People’s Liberation Army is preparing to destroy U.S. computer and network infrastructure in future attacks and knock out satellites with microwave pulses, according to recently translated Chinese military writings.

A senior colonel in the General Staff Fourth Department—the cyber warfare and electronic spying section known as 4PLA—wrote in one article that Chinese electronic network attack plans call for a “system of systems” destruction plan.

U.S. cyber warfare combat capability “forms a great threat for our military in terms of carrying out joint campaigns and operations, and especially information operations,” wrote Col. Lin Shishan.

“In this regard, we must establish the information combat concept of ‘attack and destruction of Read more…

‘Internet Doomsday’: FBI Gives New Deadline to Disinfect Computer of Malicious Malware by July 9 or Else

April 24, 2012 Comments off

theblaze.com

Earlier this year, we reported that any computer infected with a nasty piece of malware could be shunned from using the Internet by the feds. The deadline for that was March 8 but an extension was ordered to provide users with more time to clean up computers. Now, Federal Bureau of Investigation has said all must be virus free by July 9 or be subject to was PC World calls “Internet doomsday.”

The malware is a piece called DNS Changer Trojan that was the work of six men from Estonia who were arrested and charged in 2011. The malware infected more than 4 million computers in 100 countries and is relatively easy to spread, hence why the government is ready to stop those with the virus from accessing the Internet.

(Related: Seven charged for infecting 4 million computers with ‘false advertising’ malware)

Individuals and companies have been working to scrub the malware from their systems but as of March at least one computer in half of all Fortune 500 companies was infected and more than two dozen government agencies had a carrier as well. PC world reports that estimates are more than 350,000 computers are still infected. Read more…

Categories: Computers Tags: , ,

Computer Can Pick You Out From Your Eyes In A Crowd: ‘Needle in Haystack’ Search Capability

April 18, 2012 Comments off

nanopatentsandinnovations.blogspot

Identifying people by acquiring pictures of their eyes is becoming easier, according to a new report* from the National Institute of Standards and Technology (NIST). NIST researchers evaluated the performance of iris recognition software from 11 different organizations and found that some techniques produced very rapid results—though this speed was often at the cost of accuracy.

According to a NIST report, software that identifies people based on scans of the iris, the ‘colored’ part of the eye that surrounds the pupil, can produce very rapid results, but this speed is often at the cost of accuracy.

Credit: Talbott/NIST

Iris recognition, a form of biometric identification based on noncontact imaging of the complex texture in an individual’s iris, has been purported to be both fast and accurate—claims that had not been validated until now. The Iris Exchange (IREX) III report is the first public and independent comparison of commercially available algorithms that use iris recognition for the challenging task of finding an individual match within a large database of potential identities. Previous published studies only used single algorithms or considered “one-to-one” verification, in which an Read more…

Exposed… Google Spying On Laptops Using Microphone!

March 23, 2012 Comments off

knowthelies.com

internet-spy

I like to bring in this article a confirmed surveillance attempt by Google of my laptop microphone around April of 2011. Note… Also before I am writing this my laptop was attacked by hackers again. Now I have to restore my laptop again right around when I am suppose to interview Dr. Michael Coffman via Webcam and Microphone. ~ Brian D Hill

It was even admitted on The Register in Sep 2006 that Google was developing eavesdropping software, that uses Audio ‘fingerprint’ for content-relevant ads, and that as I quote from their news website “to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down.

The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or Read more…