| |
Current Topic: High Tech Developments |
|
A Method for Critical Data Theft |
|
|
Topic: High Tech Developments |
6:50 am EST, Feb 22, 2008 |
Markoff covers Felten. The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Officials at the Department of Homeland Security, which paid for a portion of the research, did not return repeated calls for comment. A federal magistrate ruled recently that forcing the suspect to disclose a password would be unconstitutional.
A Method for Critical Data Theft |
|
Dean Kamen's "Luke Arm" Prosthesis Readies for Clinical Trials |
|
|
Topic: High Tech Developments |
6:51 pm EST, Feb 17, 2008 |
Dean Kamen's “Luke arm”—a prosthesis named for the remarkably lifelike prosthetic worn by Luke Skywalker in Star Wars—came to the end of its two-year funding last month. Its fate now rests in the hands of the Defense Advanced Research Projects Agency (DARPA), which funded the project. If DARPA gives the project the green light—and some greenbacks—the state-of-the-art bionic arm will go into clinical trials. If all goes well, and the U.S. Food and Drug Administration gives its approval, returning veterans could be wearing the new artificial limb by next year.
Dean Kamen's "Luke Arm" Prosthesis Readies for Clinical Trials |
|
Topic: High Tech Developments |
6:51 pm EST, Feb 17, 2008 |
Dynamite is a Ruby interface to the Processing graphics API. This is done via JRuby, a Ruby interpreter written in Java.
Dynamite |
|
Topic: High Tech Developments |
6:51 pm EST, Feb 17, 2008 |
Extrema is a powerful visualization and data analysis tool that enables researchers to quickly distill their large, complex data sets into meaningful information. Its flexibility, sophistication, and power allow you to easily develop your own commands and create highly customized graphs.
Extrema |
|
Topic: High Tech Developments |
7:35 am EST, Feb 12, 2008 |
The book-writing machine works simply, at least in principle. First, one feeds it a recipe for writing a particular genre of book - a tome about crossword puzzles, say, or a market outlook for products. Then hook the computer up to a big database full of info about crossword puzzles or market information. The computer uses the recipe to select data from the database and write and format it into book form. Parker estimates that it costs him about 12p to write a book, with, perhaps, not much difference in quality from what a competent wordsmith or an MBA might produce. Nothing but the title need actually exist until somebody orders a copy. At that point, a computer assembles the book's content and prints up a single copy.
Automatic writing |
|
Topic: High Tech Developments |
7:34 am EST, Feb 12, 2008 |
Where do computer files go when you die? A couple of months ago, I was in the middle of one of those grand reveries we all indulge in every so often: I was imagining my funeral. After pondering the finer details (finger food or steam tables, Metallica or Elgar), I started debating what I should leave to various people. I was mentally moving through my house and dispensing items when I arrived at my basement office. Egad! What about my computer? My whole life is in the thing, and I’d never considered what to do with it.
The Big Log Off |
|
Things - task management on the Mac |
|
|
Topic: High Tech Developments |
7:34 am EST, Feb 12, 2008 |
Task management has never been this easy. Simplicity, however, is not achieved at the expense of powerful features. Download our preview today and start getting more things done with less effort.
Things - task management on the Mac |
|
Topic: High Tech Developments |
7:34 am EST, Feb 12, 2008 |
Galago is a new search engine software package developed primarily for research into efficient query processing techniques with lots of query features. The system will be available in Fall 2007 under a BSD-like license.
Galago |
|
Physical Cryptanalysis of KeeLoq Code Hopping Applications |
|
|
Topic: High Tech Developments |
10:09 am EST, Feb 10, 2008 |
Recently, some mathematical weaknesses of the KeeLoq algorithm have been reported. All of the proposed attacks need at least 2^16 known or chosen plaintexts. In real-world applications of KeeLoq, especially in remote keyless entry systems using a so-called code hopping mechanism, obtaining this amount of plaintext-ciphertext pairs is rather impractical. We present the first successful DPA attacks on numerous commercially available products employing KeeLoq code hopping. Using our proposed techniques we are able to reveal not only the secret key of remote transmitters in less than one hour, but also the manufacturer key of receivers in less than one day. Knowing the manufacturer key allows for creating an arbitrary number of valid transmitter keys.
Physical Cryptanalysis of KeeLoq Code Hopping Applications |
|