Good News For US Fusion Research


zrbyte writes “Fusion research would get a major boost in a Department of Energy (DOE) spending bill approved today by the U.S. House of Representatives Committee on Appropriations. The panel rejected an Obama Administration proposal to cut funding for domestic fusion research in the 2013 fiscal year, which begins 1 October. It would also give more money than requested to an international collaboration building the ITER fusion reactor in France. This will allow the Alcator C-Mod fusion facility at the Massachusetts Institute of Technology in Cambridge to be kept open, which the Administration had proposed closing.”


Share on Google+

Read more of this story at Slashdot.

Read the original:
Good News For US Fusion Research

Indicted BitTorrent group used FM, infrared receivers to record movies in theater



According to an indictment unsealed this week, the four alleged members of the BitTorrent movie release group IMAGiNE have now been charged with one count of “Conspiracy to Commit Criminal Copyright Infringement,” four counts of “Criminal Copyright Infringement,” and one count of “Distribution of a Work Being Prepared for Commercial Distribution.” Each count brings a maximum penalty of up to five years in prison.

The group, which TorrentFreak called “one of the P2P scene’s most prominent release groups,” was busted up by federal authorities in September 2011. It is not very common for BitTorrent-related groups to be busted up with federal criminal charges brought against them.

Court documents filed in the United States District Court for the Eastern District of Virginia report that the lead defendant, Jeramiah B. Perkins (aliases: “Butch Perkins,” “Stash,” and “theestas”) was arrested and then released on bail on Monday. The other defendants are Gregory Cherwonik, 53, of New York, Willie Lambert, 57, of Pennsylvania, and Sean Lovelady, 27, of California.

Read the rest of this article...

Read the comments on this post

Read more here:
Indicted BitTorrent group used FM, infrared receivers to record movies in theater

WW2 Vet Sent 300,000 Pirated DVDs To Troops In Iraq, Afghanistan


nbauman writes “WW2 veteran ‘Big Hy’ Strachman, 92, pirated 300,000 DVD movies and sent them to soldiers in Afghanistan and Iraq, where they were widely distributed and deeply appreciated. Soldiers would gather around personal computers for movie nights, with mortars blasting in the background. ‘It’s reconnecting to everything you miss,’ said one. Strachman received American flags, appreciative letters, and snapshots of soldiers holding up their DVDs. He spent about $30,000 of his own money. Strachman retired from his family’s window and shade business in Manhattan in the 1990s. After his wife Harriet died in 2003, he spent sleepless nights on the Internet, and saw that soldiers were consistently asking for movie DVDs. He bought bootlegged disks for $5 in Penn Station, and then found a dealer at his local barbershop. He bought a $400 duplicater that made 7 copies at once, and mailed them 84 at a time, to Army Chaplains. The MPAA said they weren’t aware of his operation. The studios send reel-to-reel films to the troops.”


Share on Google+

Read more of this story at Slashdot.

View article:
WW2 Vet Sent 300,000 Pirated DVDs To Troops In Iraq, Afghanistan

U.S. House Passes Controversial CISPA Cybersecurity Bill 248 To 168

The United States House of Representatives · House.gov

This afternoon, the U.S. House of Representatives passed the controversial Cyber Intelligence Sharing and Protection Act (CISPA) by a vote of 248 to168. Unlike SOPA, which focused on copyright violations, CISPA wants to give Internet companies and the U.S. government the tools to protect and defend themselves against cyber attacks by sharing information with each other. Critics, however, argued that this information sharing would be happening with very little oversight and would put Americans’ privacy rights at risk.

Rep. Jared Polis (D-Colo.), an outspoken critic of the bill, argued that the bill would “waive every single privacy law ever enacted in the name of cybersecurity. Allowing the military and NSA to spy on Americans on American soil goes against every principle this country was founded on.”

Even though this bill has now passed the House, chances are that it will not get through the Senate. On Tuesday, the White House issued a statement condemning the bill and on Wednesday, President Obama threatened to veto the legislation because it “fails to provide authorities to ensure that the nation’s core critical infrastructure is protected while repealing important provisions” of long-established privacy law.

Critics, including the Electronic Frontier Foundation, argue that the current version of this bill is basically a major violation of established privacy rights and would allow companies to hand anything and everything you do and say online over to the government in the name of “cybersecurity.”

Proponents of the bill, including House Intelligence Committee Chairman Mike Rogers (R-Mich.), argue that the bill is “needed to prepare for countries like Iran and North Korea so that they don’t do something catastrophic to our networks here in America.”

An earlier provision in the bill that would have given Homeland Security more authority to monitor the Internet was dropped before the bill (PDF) passed. In return, though, a number of last-minute amendments, including one that expands the list of reasons for which shared information can be used. While the bill still allows for Internet companies to hand over confidential customer information to U.S. security and intelligence agencies, as well as local low enforcement services, it is worth noting that it does not require them to do so.

You can read a full version of the bill here (PDF).

Link:
U.S. House Passes Controversial CISPA Cybersecurity Bill 248 To 168

Security firm claims Mac security is “10 years behind” Microsoft



Not content to dispel the “myth” that Macs are impervious to malware last week, Kaspersky Lab CEO Eugene Kaspersky is sounding the Mac malware alarm again this week. During the Info Security 2012 conference, he claimed that Apple is 10 years behind Microsoft on the security front.

“I think [Apple is] ten years behind Microsoft in terms of security,” Kaspersky told CBR. “For many years I’ve been saying that from a security point of view there is no big difference between Mac and Windows. It’s always been possible to develop Mac malware, but [Flashback] was a bit different. For example, it was asking questions about being installed on the system and, using vulnerabilities, it was able to get to the user mode without any alarms.”

Kaspersky suggested that OS X’s relatively low incidence of malware over the last decade has caused Apple to fall behind, while the abundance of viruses, worms, and trojans targeting Windows forced Microsoft to step up its game.

There’s some truth behind that thinking—Windows 7 is by far the most secure operating system Redmond has built. But Apple hasn’t entirely rested on its laurels for the last ten years. The company has added malware detection to OS X, continued to remove default installs of popular exploit vectors like Flash and Java, and added features like address space layout randomization (ASLR) and sandboxing to prevent one application exploit from affecting the whole system.

Furthermore, Apple intends to improve security in the next version of OS X, dubbed Mountain Lion. Features like ASLR and sandboxing will have a more robust implementation in Mountain Lion. Meanwhile, Apple is also adding a new feature called GateKeeper, which allows users to limit software installs to either the Mac App Store or to only verified developers.

The recent hubbub over the Flashback trojan has certainly raised concerns over the security of OS X, and we agree that Apple could do more to be responsive to malware threats when they are discovered. But to suggest Apple is “10 years behind” belies the efforts it has made to secure the OS from different angles.

Read the comments on this post

See more here:
Security firm claims Mac security is “10 years behind” Microsoft

Google’s new search algorithm to crack down on “black hat webspam”



Nefarious search engine optimizers be warned. Google is coming for you—again.

Following previous changes to Google’s ranking and page layout algorithms, the search giant is pushing yet another update to its algorithm this week with the hopes of curbing “black hat webspam” from creeping into search results.

The change will go live for all languages at the same time within the next few days, said engineer Matt Cutts in a blog post yesterday, and will affect roughly 3.1 percent of queries in English “to a degree that a regular user might notice.”

Cutts said the changes are targeted at sites engaged in tactics such as keyword stuffing, or “unusual linking patterns” where unrelated links are sprinkled throughout a fake or manufactured article. These sites might be harder to recognize than more blatant SEO offenses, but Google engineers believe that targeted sites “are engaging in webspam tactics to manipulate search engine rankings.”

As previously reported, there have been at least nine major updates to Google’s “Panda” algorithms since they were introduced last February, with numerous other tweaks along the way. In some cases, otherwise innocent sites were harmed, though this change is promised to affect a much smaller subset of visible search results.

Google’s quality guidelines outline just some of the discouraged tactics, which include hidden text or links, pages with irrelevant keywords, cloaking, and, of course, the presence of malicious software. That’s not to say all SEO is bad, however. Cutts points out that so-called white hat techniques are still fair game, and can often improve the usability of a site, “which is good for both users and search engines.”

As for packing every known pharmaceutical synonym into your site’s footer? That’s probably not as wise.

Read the comments on this post

See the article here:
Google’s new search algorithm to crack down on “black hat webspam”

Ubuntu 12.04 LTS Precise Pangolin hits the web, with HUD in tow

Image

It’s here! Precise Pangolin or, as it’s officially known, Ubuntu 12.04 LTS. Canonical’s latest is now available in its final(ish) form and ready for you to download, burn and install. While LTS (Long Term Support) releases are generally more conservative in their application of new features, Pangolin does include some rather notable tweaks. The most immediately noticeable will be the new log in screen which, while largely the same, does have the slick new trick of changing wall papers to match the selected user. A more subtle change is revealed once you’ve logged on and press alt — HUD. The new search-based menu system is quite a departure from traditional interaction models, and one that will come as a relief to those who constantly forget where a particular option is buried. Perhaps the most welcome change, though, is the vastly improved performance and power management. Ubuntu, for all of its finer points, has never been particularly battery friendly. But Canonical is promising that is going to change. We’ll have to wait to find out once we get this bad boy installed on some machines of our own. You know the drill, hit up the source link to download it for yourself, for free.

Update: Well, looks like all you Ubuntu fanatics have taken out the site temporarily. We’re sure it’ll be back soon but, in the meantime, you can still download the latest version of the OS here (magnet link).

Update 2: And they’re back! Also, we’ve now got PR after the break.

Continue reading Ubuntu 12.04 LTS Precise Pangolin hits the web, with HUD in tow

Ubuntu 12.04 LTS Precise Pangolin hits the web, with HUD in tow originally appeared on Engadget on Thu, 26 Apr 2012 08:40:00 EDT. Please see our terms for use of feeds.

Permalink | sourceUbuntu | Email this | Comments

View post:
Ubuntu 12.04 LTS Precise Pangolin hits the web, with HUD in tow

Netgear’s R6300 router is first to use Broadcom 802.11ac chipset, will ship next month for $200

ImageThat 802.11n router not keeping up with the gigabit pipe to your homestead? Netgear’s latest may just give you a much-anticipated boost. The R6300 Dual-Band Gigabit WiFi Router is the first to utilize Broadcom’s 5G WiFi IEEE 802.11ac chips, making it roughly three times faster than aging 802.11n. This means the R6300 could be an excellent fit for folks lucky enough to take part in Google’s Kansas City fiber experiment, assuming of course that they that also adopt yet-to-be-announced 802.11ac-compatible gadgets. For its part, the Netgear base ships with the usual suite of features, including Netgear Genie for configuring the network from a computer or smartphone, MyMedia with DLNA support, AirPrint (there’s two USB ports built-in) and pre-configured wireless security, keeping your hotspot off the neighbors’ radar right out of the box. The Netgear R6300 will ship next month, letting you future-proof your home for a mere $199.99.

Continue reading Netgear’s R6300 router is first to use Broadcom 802.11ac chipset, will ship next month for $200

Netgear’s R6300 router is first to use Broadcom 802.11ac chipset, will ship next month for $200 originally appeared on Engadget on Thu, 26 Apr 2012 09:29:00 EDT. Please see our terms for use of feeds.

Permalink | sourceNetgear | Email this | Comments

Taken from:
Netgear’s R6300 router is first to use Broadcom 802.11ac chipset, will ship next month for $200

In Ticketing increases options for venues and promoters, as long as they’re using iOS

Image

Converting a cellphone into a credit card reader is nothing new, but transforming one into a box office for live events could shake things up a bit — or, at least provide a bit of friendly competition for NFC-based alternatives. In Ticketing has just launched InHand Box Office software for use at live events. The company claims to be one of the greener ticketing outfits out there, and plans to turn your iPhone or iPod touch into a device capable of wirelessly processing payments (and printing out paper receipts, unlike Square or PayPal Here) at independently run concerts or festivals. Potentially reducing time spent in line and preventing congestion at the entrance translates into more people inside the venue, and using your phone instead of a difficult-to-establish credit card merchant account should reduce the friction in throwing such an event. As long as you tend to carry the appropriate iDevice with In Ticketing’s new app installed, you can marry it to that iAPS Sled you see above to create your own personal CC processing machine. The only issues? Convincing Gotye to play your house party instead of Coachella next year, and that awkward lack of support for Android, BlackBerry and Windows Phone.

Continue reading In Ticketing increases options for venues and promoters, as long as they’re using iOS

In Ticketing increases options for venues and promoters, as long as they’re using iOS originally appeared on Engadget on Thu, 26 Apr 2012 07:53:00 EDT. Please see our terms for use of feeds.

Permalink | sourceIn Ticketing | Email this | Comments

Continued here:
In Ticketing increases options for venues and promoters, as long as they’re using iOS