Saturday, December 31, 2011

3 Technology Link

3 Technology Link

The Year 2012: 2012 Facts and Events

Posted: 31 Dec 2011 06:23 AM PST

Events In 2012, ALL ABOUT 2012, Top Events In 2012, Major Events In 2012, Calendar of Events 2012, The Year 2012, 2012 Facts and Events

The Year 2012: 2012 Facts and Events


Business Events for 2012

2012 London Events

The Year 2012: 2012 Facts and Events

2012 New York Events

London Events Calendar 2011-2012 – Telegraph

Astronomy Calendar of Celestial Events 2012 – Sea and Sky

Year 2012 – Predicted and scheduled events

BBC Sport – London 2012 Olympic test event schedule unveiled

The Year 2012: 2012 Facts and Events

Upcoming events | London 2012

Events – Madrid 2012, XXII World Congress of Political Science …

Atlantis Events – 2012 Allure 2012 Caribbean Cruise

2012 Event Table | Science Olympiad

2012 – Wikipedia, the free encyclopedia

Other events in 2012 – Britain in 2012 – 2012 Games …

Vienna 2012 ESMO Congress – European Society for Medical …

AWP- 2012 Conference- Accepted Events

GLOBAL Ultramarathon Races & Events Calendar 2011/2012 …

Events – The London Business Network

Magic Online Magic 2012 Release Events : Daily MTG : Magic: The …

All Events 2012 « Fiesta San Antonio

SoCal 2012 | Tough Mudder

2012 Events — Medical Sciences Division

New Zealand Events in February 2012 – February 2012 Events in NZ

Book Venice Carnival Balls and Events |Official Venice Carnival 2012

Year 2012 Calendar of Holidays, Events and Observances

2012 Events


The Year 2012: 2012 Facts and Events

2011/2012 WSOP Circuit Events and Results

Graceland Mansion: Annual Events: The Elvis Presley 2012 Birthday …

2011–2012 Events – Radcliffe Institute for Advanced Study …

EVENTS 2011-2012

London: Free Events 2012 | Venere Travel Blog

Major Events in 2012 – Visit Lancashire

Medical Conferences 2012 – Health Conferences 2012 – www …

The Topline – Clean Energy Events, Ending Opec, 2012 and the …

KONFEX & EVENTS Göteborg 2012 – Welcome – easyFairs®

Preakness Week Events | 2012 Preakness

Events In 2012

Share and Enjoy

FacebookTwitterLinkedInDiggDeliciousStumbleUponRedditGoogle BuzzFriendFeedMySpaceAdd to favoritesEmailPrintPDF

Google top US Web destination in 2011: Nielsen

Posted: 30 Dec 2011 01:51 PM PST

Google top US Web destination in 2011: Nielsen

Google top US Web destination in 2011: NielsenPeople in front of a logo of Google, at the Frankfurt Book Fair in 2005. Google was the most-visited Web destination in the United States in 2011, followed by Facebook and Yahoo!, industry tracker Nielsen said Thursday.

>>>Google was the most-visited Web destination in the United States in 2011, followed by Facebook and Yahoo!, industry tracker Nielsen said Thursday.

Google received an average of 153.4 million unique US visitors a month from home and work computers, according to Nielsen.

Facebook notched up 137.6 million unique US visitors a month and Yahoo! 130.1 million.

Microsoft’s MSN, WindowsLive and Bing were next with 115.9 million unique US visitors a month, followed by YouTube with 106.7 million.

Facebook, which boasts more than 800 million members worldwide, was the runaway leader in the category of social networks and blogs, Nielsen said.

The social networking website’s 137.6 million unique monthly visitors were more than triple the 45.7 million a month for Blogger and nearly six times the 23.6 million a month for Twitter, Nielsen said.

Struggling social network Myspace attracted an average of 17.9 million unique US visitors a month while Google’s new social network, Google+, got 8.2 million a month, according to Nielsen.

Share and Enjoy

FacebookTwitterLinkedInDiggDeliciousStumbleUponRedditGoogle BuzzFriendFeedMySpaceAdd to favoritesEmailPrintPDF

Review: ‘W.E.L.D.E.R.’ leads parade of iPad gems

Posted: 30 Dec 2011 01:49 PM PST

Review: ‘W.E.L.D.E.R.’ leads parade of iPad gems

Review: W.E.L.D.E.R. leads parade of iPad gemsThis product image provided by Highline Games, shows "W.E.L.D.E.R." which combines elements of "Bejeweled," "Boggle" and "Scrabble" in one of the iPad’s most addictive word games. (AP Photot/Highline Games)

>>>So you just got an iPad for Christmas. You already have all the essentials loaded – Facebook, Twitter, iBooks, whatever news app you prefer.

Now it’s time to get serious and start learning what the iPad was really built for: games.

There are more than 26,000 iPad games available from Apple’s App Store, with something for every imaginable taste. And the prices are so low you can build an impressive library for less than the cost of a single Xbox game. Here are some of my favorites from the last few months.

-”W.E.L.D.E.R.” (Highline Games, $3.99): For the record, it stands for “Word Examination Laboratory for Dynamic Extraction and Reassessment,” but never mind the strained acronym. What “W.E.L.D.E.R.” really stands for is the iPad’s most addictive word game, a clever combination of “Bejeweled,” “Boggle” and “Scrabble.” The object is to slide letter tiles around an 8-by-8 grid, forming words of four or more letters. However, you won’t get far unless you figure out how to combine score-multiplying gold tiles with the limited number of moves you’re given. If you’re burned out on “Words With Friends,” let this provide your new crossword puzzle fix.

-”Infinity Blade II” (Chair Entertainment, $6.99): If you want to show off your new toy, there are few better demonstrations than this sword-fighting epic. It’s a series of one-on-one battles in which dodging, parrying and blocking attacks are just as important as slashing your foes. This sequel adds some role-playing elements and more alternate paths to the goal, but the core attraction remains the same: bone-crunching combat in breathtaking environments.

-”Chocolate Fix” (ThinkFun, $2.99): Take nine candies – three shapes, each in three colors – and arrange them in a 3-by-3 box. If you’re a Sudoku maven, that probably sounds simple. But at the expert level, the clues to which candy goes where are more abstract, making this innocent-looking brainteaser devilishly challenging. It’s another elegant treat from the creators of “Rush Hour.”

-”Bag It!” (Hidden Variable Studios, $1.99): It’s another adventure in food packaging! This time, you’re a clerk cramming groceries into a paper bag. The goal is to fill each bag as tightly as possible without breaking anything; if you put a watermelon on top of a carton of eggs, you’re asking for trouble. The groceries themselves are endearingly anthropomorphized, making “Bag It!” one of the cutest puzzle games around.

-”Blueprint 3D” (FDG Entertainment, 99 cents): Each screen in this game is a seemingly random assortment of lines floating in three dimensions. When you rotate the space, you can see how some lines might fit together. Eventually, they snap in place to create a 2-D image of a familiar object – a house, perhaps, or the Eiffel Tower. The 200-plus puzzles here aren’t terribly demanding, but they’re undeniably satisfying.

Finally, some essential games from earlier in 2011:

-”Jetpack Joyride” (Halfbrick Studios, 99 cents): Keep your hero airborne while avoiding lasers, missiles and other obstacles in this breathless race from the creators of “Fruit Ninja.”

-”Superbrothers: Sword & Sworcery EP” (Capybara Games, $4.99): The old-school point-and-click adventure gets a postmodern makeover.

-”Where’s My Water?” (Disney, 99 cents): Help an alligator take a bath in this adorably goofy physics puzzler.

-”Ticket to Ride” (Days of Wonder, $6.99): The best board-game translation on the iPad is this suspenseful race to build cross-country railroads.

Share and Enjoy

FacebookTwitterLinkedInDiggDeliciousStumbleUponRedditGoogle BuzzFriendFeedMySpaceAdd to favoritesEmailPrintPDF

Kaspersky team reveals Stuxnet family of weapons

Posted: 30 Dec 2011 01:46 PM PST

Kaspersky team reveals Stuxnet family of weapons

The Stuxnet cyber weapon that was designed to cripple control systems in Iran's nuclear plant was just one of five weapons engineered in the same lab, and three have not been released yet. That is the word from Moscow based Kaspersky Lab. What's more, according to Kaspersky's director of global research, Costin Raiu, these Lego-like weapons work as modules, in that they are designed to fit together with each having different functions. They were developed on a single platform whose roots trace back at least to 2007; the creators have used the same software development environment ever since.

Raiu told Reuters about the findings on Wednesday based on the evidence that his team has gathered. He cited Stuxnet–the Iran-targeted weapon– and a related Duqu–the data-scoffing Trojan targeting design documents that showed up this year in Europe– as two of what might be a lethal assembly—three of the weapons have yet to be released.

Besides Kaspersky, other anti-virus leaders such as Symantec and Trend Micro incorporated technology into their products to protect systems against Stuxnet and Duqu; Raiu says that these viruses may be more sophisticated than previously known.

Kaspersky named the platform “Tilded” because many of the files in Duqu and Stuxnet have names beginning with the tilde symbol “~” and the letter “d.” What Kaspersky recently discovered is that shared components search for at least three other unique registry keys, It is possible that at least three other pieces of malware have been built that use the same platform. It would be relatively easy for the developers of those highly sophisticated viruses to create other weapons.

Developers can build new cyber weapons by simply adding and removing modules, he told Reuters, “It’s like a Lego set. You can assemble the components into anything: a robot or a house or a tank."

The Kaspersky team cited 2007 because installed code by Duqu was compiled from a device running Windows on August 31, 2007. Kaspersky sources did not name a country responsible for the cyber weapons. When contacted by the press about Kaspersky's findings, the Pentagon declined comment.

Kaspersky Lab is a vendor of security software. In 1999, Kaspersky Labs, says the company, was the first to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems.

Share and Enjoy

FacebookTwitterLinkedInDiggDeliciousStumbleUponRedditGoogle BuzzFriendFeedMySpaceAdd to favoritesEmailPrintPDF

US-CERT says Wi-Fi hole open to brute force attack

Posted: 30 Dec 2011 01:43 PM PST

US-CERT says Wi-Fi hole open to brute force attack

US CERT says Wi Fi hole open to brute force attack

The US Computer Emergency Readiness Team (US-CERT) has issued a warning about a security hole in the Wi-Fi Protected Set-up protocol for Wi-Fi routers. Security researcher Stefan Viehbock discovered the vulnerability, reported it to the US-CERT, which then issued its public warning earlier this week. Viehbock was able to recognize design decisions about the protocol, which enables an efficient brute force attack.

The US-CERT warning said:

"The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on some wireless routers makes this brute force attack that much more feasible."

The protocol, introduced in 2007 by the Wi-Fi Alliance, was intended to make life simple for setting up and configuring security on wireless local area networks, especially for home and small office-home (SOHO) environments. "Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to easily configure new wireless networks, to add new devices and to enable security," according to the WiFi Alliance white paper.

The simplification resides in the setup process where users only have to type in a shortened PIN instead of longer phrase if adding a new device to a network. By entering the wrong PIN, the hacker gets returned information that could be useful for an attack. The 8-digit PIN’s security falls dramatically as more attempts are made. A message sent by the router when the PIN fails informs the hacker if the first four digits are correct; the last digit of the key is used as a checksum and is given out by the router in negotiation.

According to reports, this hole cuts the hacker's time and effort significantly. There is less effort in trying out combinations, reducing attempts from 100 million to 11,000.

In its warning, the US-CERT site said "We are currently unaware of a practical solution to this problem."

Its recommended workaround was to disable WPS. Though not a solution, it said a recommendation was to only use WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network.

Affected vendors include Belkin, Buffalo, D Link, Linksys, Netgear, Technicolor, TP-Link, and ZyXEL.

Viehbock, meanwhile, said he was working on a brute force tool, which he may release once he works the code into better shape.

Share and Enjoy

FacebookTwitterLinkedInDiggDeliciousStumbleUponRedditGoogle BuzzFriendFeedMySpaceAdd to favoritesEmailPrintPDF

No comments:

Post a Comment