Macoto Murayama’s incredible digital flower diagrams

Macotooooo

Macoto Murayama’s exquisite “Inorganic Herbarium” diagrams will be on display at Frantic Gallery’s booth in the Art Stage Singapore Art Fair next weekend, January 12-15. I first posted about his work back in 2009 and its evolution is nothing short of breathtaking.

 Wp-Content Uploads 2012 01 Murayamamamamama

This time we present exclusively large scale Botanical Diagrams by Murayama with a vast explanatory material on both botanical and technical context of his digital flowers. We will also show how the artist creates his works, beginning from vivisection of a real flower, photography, sketches and then software for 3-Dimensional drawings. For the first time, the original flowers used for the Botanical Diagrams will also be shown inside transparent vessels filled with formaldehyde.

Macoto Murayama: Botanical Diagrams


Original post:
Macoto Murayama’s incredible digital flower diagrams

FreeDOS 1.1 Released


MrSeb writes with this excerpt from an Extreme Tech article about the latest FreeDOS release and a bit of project history: “Some 17 years after its first release in 1994, and more than five years since 1.0, FreeDOS 1.1 is now available to download. The history of FreeDOS stems back to the summer of 1994 when Microsoft announced that MS-DOS as a separate product would no longer be supported. It would live on as part of Windows 95, 98, and (ugh!) Me, but for Jim Hall that wasn’t enough, and so public domain (PD) DOS was born. … Despite what you might think, FreeDOS isn’t an ‘old’ OS; it’s actually quite usable. FreeDOS supports FAT32, UDMA for hard drives and DVD drives, and it even has antivirus and BitTorrent clients.”

The official release announcement has more details on the improvements, and the FreeDOS website has the release for download.

Read more of this story at Slashdot.

Link:
FreeDOS 1.1 Released

Hands-on: hacking WiFi Protected Setup with Reaver



WiFi hacking has long been a favorite pastime of hackers, penetration testers, and people too cheap to pay for their own Internet connection. And there are plenty of targets out there for would-be hackers and war drivers to go after—just launch a WiFi scanner app in any residential neighborhood or office complex, and you’re bound to find an access point that’s either wide open or protected by weak encryption. Fortunately (or unfortunately, if you’re the one looking for free WiFi), those more blatant security holes are going away through attrition as people upgrade to newer routers or network administrators hunt down vulnerabilities and stomp them out. But as one door closes, another opens.

Last week, security researchers revealed a vulnerability in WiFi Protected Setup, an optional device configuration protocol for wireless access points. WPS lets users enter a personal identification number that is hard-coded into the access point in order to quickly connect a computer or other wireless device to the network. The structure of the WPS PIN number and a flaw in the protocol’s response to invalid requests make attacking WPS relatively simple compared to cracking a WiFi Protected Access (WPA or WPA2) password. On December 28, Craig Heffner of Tactical Network Solutions released an open-source version of an attack tool, named Reaver, that exploits the vulnerability.

To find out just how big the hole was, I downloaded and compiled Reaver for a bit of New Years geek fun. As it turns out, it’s a pretty big one—even with WPS allegedly turned off on a target router, I was able to get it to cough up the SSID and password. The only way to block the attack was to turn on Media Access Control (MAC) address filtering to block unwanted hardware.

Read the rest of this article...

Read the comments on this post

Continued here:
Hands-on: hacking WiFi Protected Setup with Reaver