Utility companies go to war against solar

Utility companies across America are fighting solar , imposing high fees on homeowners who install their own solar panels to feed back into the grid. This one was predictable from a long, long way out — energy companies being that special horror-burrito made from a core of hot, chewy greed wrapped in a fluffy blanket of regulatory protection, fixed in their belief that they have the right to profit from all power used, whether or not their supply it. Bruce Sterling once proposed that Americans should be encouraged to drive much larger trucks, big enough to house monster fuel-cells that are kept supplied with hydrogen by decentralized windmill and solar installations — when they are receiving more power than is immediately needed, they use the surplus to electrolyze water and store the hydrogen in any handy nearby monster-trucks’ cells. When the wind isn’t blowing or the sun isn’t shining, you just plug your house into your enormous American-Dream-mobile — no need for a two-way grid. This solution wasn’t just great because it aligned the core American value of driving really large cars with environmental protection, but also because it was less vulnerable to sabotage from hydrocarbon-addicted energy companies. HECO, despite criticism from Hawaii’s solar industry, denies the moratorium is anything more than an honest effort to address the technical challenges of integrating the solar flooding onto its grid. The slowdown comes in a state where 9 percent of the utility’s residential customers on Oahu are already generating most of their power from the sun and where connections have doubled yearly since 2008. In California, where solar already powers the equivalent of 626,000 homes, utilities continue to aggressively push for grid fees that would add about $120 a year to rooftop users’ bills and, solar advocates say, slow down solar adoptions. Similar skirmishes have broken out in as many as a dozen of the 43 states that have adopted net-metering policies as part of their push to promote renewable energy. In Colorado, Xcel Energy Inc. has proposed cutting the payments it makes for excess power generated by customers by about half, because it says higher payouts result in an unfair subsidy to solar users. Utilities Feeling Rooftop Solar Heat Start Fighting Back [Mark Chediak, Christopher Martin and Ken Wells/Bloomberg] ( via /. ) ( Image: Solar Panels All Done! , a Creative Commons Attribution (2.0) image from clownfish’s photostream )        

Read More:
Utility companies go to war against solar

How to: Read books buried 2000 years ago

When the first excavations of the ancient Roman town of Herculaneum began in 1738, the diggers found what appeared to be charcoal and half-burnt logs . In reality, those blackened lumps were papyrus scrolls. Buried beneath the detritus of Mt. Vesuvius, a Herculanean villa contained a whole library of the things. And now, thanks to micro-CT imaging and other digitization techniques , researchers are finding ways to read those scrolls.        

Read the original:
How to: Read books buried 2000 years ago

2 men suspected of installing card skimmers at LA area banks

Two men were arrested in the greater Los Angeles area Sunday on charges they installed ATM card-skimmers at banks in Sherman Oaks and Encino. The operation was managed by the Southern California High-Tech Task Force (SCHTTF), a law enforcement team that includes LA Sheriff’s Department personnel and agents from Secret Service and FBI. An LA Sheriff’s rep says North Hollywood resident Geori Nikolov, 32, and Santa Monica resident Dimitar Dimitrov, 36, installed the devices at Chase and Bank of the West locations in order to steal credit and debit card information and PIN numbers. “They would attach the skimmers for a few hours and then go and retrieve them and the banking information they stole,” said the spokesman. More: CBS Los Angeles , Patch , and a press release .        

Read More:
2 men suspected of installing card skimmers at LA area banks

Archie comics CEO being sued for calling employees "penis"

Male employees are suing Archie Comics’ CEO Nancy Silberkleit for gender discrimination. Her alleged workplace behavior, reported in the New York Daily News , is bizarre: – refuses to call male employees by their names and instead refers to all of them as “Penis.” – frequently yells “Penis! Penis! Penis!” in staff meetings. – invites Hell’s Angels into the office to intimidate employees. – frequently inquires about the location of a handgun and 750 rounds of ammunition she believes her late husband kept in the office. – stalking employees and their families “Silberkleit contends that the case should be tossed out because white males are not ‘a protected class.'” (Thanks, chellberty!)        

More:
Archie comics CEO being sued for calling employees "penis"

Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps

Aluminum castings of ant-nests

Anthill Art fills ant colonies with molten aluminum, creating massive, intricate castings of the architecture of the ants’ nests. They’re for sale on Ebay (surprisingly cheap, too), and they’re spectacular. I make casts of ant colonies using molten aluminum to fill the tunnels and chambers of the nest. The result is an amazing sculpture showing the intricate detail of the nest architecture. The cast is then mounted for display on a wood base. Each display has a stainless steel plaque mounted on it with information on the cast and a unique cast number. These make perfect displays for a home or as an educational piece for teachers and professors to display in a science classroom or laboratory. Anthill Art – Artistic and Educational Ant Colony Castings ( Thanks, Fipi Lele! )        

See the original post:
Aluminum castings of ant-nests

Medieval kids’ birch-bark doodles

Michael sez, “Apparently medieval Russian schoolroooms used birch bark for things like writing practice. Erik Kwakkel, medieval book historian at Leiden University, Netherlands, has some charming photos of stick-figure illustrations on bark by kids who, like kids everywhere, got a bit bored with the lesson and started doodling in the margins. There are links to more images (and an interesting scholarly article) at the bottom of the post .” The most special items, however, are the ones shown above, which are from a medieval classroom. In the 13th century, young schoolboys learning to write filled these scraps with alphabets and short texts. Bark was ideal material for writing down things with such a short half-life. Then the pupils got bored and started to doodle, as kids do: crude drawings of individuals with big hands, as well as a figure with a raised sword standing next to a defeated beast (lower image). The last one was drawn by Onfim, who put his name next to the victorious warrior. The snippets provide a delightful and most unusual peek into a 13th-century classroom, with kids learning to read – and getting bored in the process. Medieval kids’ doodles on birch bark [Erik Kwakkel] ( Thanks, Michael ! )        

See the article here:
Medieval kids’ birch-bark doodles

Botnet of 20,000 point-of-sale machines

Details are emerging about Stardust, a piece of malicious software that targets point-of-sale credit-card processing machines. Stardust has reportedly compromised over 20,000 PoS machines and turned them into a easy-to-control botnet. The malware’s masters can monitor the botnet in realtime and issue fine-grained commands to its components, harvesting a titanic volume of payment card details. The discovery comes as researchers from a separate security firm called Arbor Networks published a blog post on Tuesday reporting an active PoS compromise campaign. The advisory is based on two servers found to be hosting Dexter and other PoS malware. Arbor researchers said the campaign looks to be most active in the Eastern Hemisphere. There was no mention of a botnet or of US restaurants or retailers being infected, so the report may be observing a campaign independent from the one found by IntelCrawler. It remains unclear how the attackers manage to initially infect PoS terminals and servers that make up the botnet. In the past, criminals have targeted known vulnerabilities in applications that many sellers of PoS software use to remotely administer customer systems. Weak administrator passwords, a failure to install security updates in a timely fashion, or unknown vulnerabilities in the PoS applications themselves are also possibilities. Credit card fraud comes of age with advances in point-of-sale botnets [Dan Goodin/Ars Technica]        

Read this article:
Botnet of 20,000 point-of-sale machines

Apps come bundled with secret Bitcoin mining programs, paper over the practice with EULAs

Researchers at Malwarebytes have discovered that some programs covertly install Bitcoin-mining software on users’ computers , papering over the practice by including sneaky language in their license agreements allowing for “computer calculations, security.” The malicious programs include YourFreeProxy from Mutual Public, AKA We Build Toolbars, LLC, AKA WBT. YourFreeProxy comes with a program called Monitor.exe, which repeatedly phones home to WBT, eventually silently downloading and installing a Bitcoin mining program called “jhProtominer.” So now that we have proof that a PUP is installing miners on users systems, do they do it without ever letting the user know? Well not exactly, their EULA specifically covers a section on Computer Calculations: COMPUTER CALCULATIONS, SECURITY: as part of downloading a Mutual Public, your computer may do mathematical calculations for our affiliated networks to confirm transactions and increase security. Any rewards or fees collected by WBT or our affiliates are the sole property of WBT and our affiliates. Their explanation is basically the purpose of Bitcoin Miners and that they will install this software on the system, run it, use up your system resources and finally keep all rewards from the effort YOUR system puts in. Talk about sneaky. In my opinion, PUPs have gone to a new low with the inclusion of this type of scheme, they already collected information on your browsing and purchasing habits with search toolbars and redirectors. They assault users with pop-up ads and unnecessary software to make a buck from their affiliates. Now they are just putting the nails in the coffin by stealing resources and driving user systems to the grave. Potentially Unwanted Miners – Toolbar Peddlers Use Your System To Make BTC [Adam Kujawa/Malwarebytes] ( via /. )        

Originally posted here:
Apps come bundled with secret Bitcoin mining programs, paper over the practice with EULAs