Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

For a while, it seemed that Wi-Fi was becoming a victim of its own success. In many cities, there are numerous active Wi-Fi networks on those preciously few non-overlapping channels—that’s in addition to microwaves, bluetooth, cordless phones, and baby monitors, which all share the 2.4GHz band. But since about 2007, Apple has also built support for 802.11n Wi-Fi on the 5GHz band into its computers and Airport line of Wi-Fi base stations. Now, the iPhone 5 and the latest iPod touch also have that support. (The iPad has had it since day one.) So, how do you set up a Wi-Fi network that makes the most of this confluence of Wi-Fi bands? Not created equal First of all, it’s important to realize that the two bands are created very differently. The 2.4GHz band suffers from lack of non-overlapping channels and interference from other devices. But the lower frequencies pass through walls and floors reasonably well. The 5GHz band on the other hand, has a much larger number of channels—and they don’t overlap—but the higher frequencies have reduced range, even in open air. In addition to this, Apple only supports using two channels as a single, double-speed wide channel in the 5GHz band. If all else is equal, 5GHz is twice as fast as 2.4GHz. Read 12 remaining paragraphs | Comments

More:
Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

Researcher advises against use of Sophos antivirus on critical systems

Antivirus provider Sophos has fixed a variety of dangerous defects in its products that were discovered by a security researcher who is recommending many customers reconsider their decision to rely on the company. “Sophos claim that their products are deployed throughout healthcare, government, finance, and even the military,” Tavis Ormandy wrote in an e-mail posted to a public security forum . “The chaos a motivated attacker could cause to these systems is a realistic global threat. For this reason, Sophos products should only ever be considered for low-value non-critical systems and never deployed on networks or environments where a complete compromise by adversaries would be inconvenient.” A more detailed report that accompanied Ormandy’s e-mail outlined a series of vulnerabilities that attackers can exploit remotely to gain complete control over computers running unpatched versions of the Sophos software. At least one of them requires no interaction on the part of a victim, opening the possibility of self-replicating attacks, as compromised machines in turn exploit other machines, he said. The researcher provided what he said was a working exploit against Sophos version 8.0.6 running Apple’s OS X. Attackers could “easily” rewrite the code to work against unpatched Sophos products that run on the Windows or Linux operating systems, he said. Read 7 remaining paragraphs | Comments

Original post:
Researcher advises against use of Sophos antivirus on critical systems

Google infringes old Lycos patents, must pay $30 million

Vringo is a little company that’s made a huge bet on suing Google over patents. Today that bet paid off, although to a much lesser degree than its investors hoped earlier. After a two-week trial in Virginia, a jury found that Google’s advertising system infringes two old Lycos patents purchased by Vringo in 2011, and that those patents are valid. Google and several of its advertising partners were ordered to pay a total of about $30 million. That’s a lot of money, but far less than the $493 million Vringo was seeking. According to a report  just published in the Virginian-Pilot , the jury found that Google will have to pay $15.9 million. Its advertising partners must pay smaller amounts: $7.9 million in damages for AOL, $6.6 million for IAC Search & Media, $98,800 for Target, and $4,000 for Gannett. The jury also said Google should pay an ongoing royalty; but whether that ultimately sticks is up to the judge. The Vringo case is remarkable for two reasons: first, it’s rare to see a high-profile patent attack played out directly in the stock market, with investors speculating on each move in court. Second, demonstratives submitted in Vringo’s case show a fascinating story in pictures of how a company that’s more or less a “patent troll” tries to convince a jury to shower it with money. Some of those visuals are posted below. Read 11 remaining paragraphs | Comments

View the original here:
Google infringes old Lycos patents, must pay $30 million

Report: Microsoft going to production with 7-inch “Xbox Surface”

When Microsoft first revealed its Surface tablet back in June , many in the rumor mill were expecting the company to reveal a gaming-focused “Xbox Surface,” based on leaked documents pointing to such a tablet. Those rumors have resurfaced again, with The Verge reporting  today that Microsoft is working on a final implementation of a 7-inch tablet tuned for gaming. The Verge’s unnamed source says the previously leaked specs for the tablet were indeed accurate, meaning the system would include a 7-inch, 1280×720 screen, 288MB of RAM, and a “custom IBM engine for scale-out workloads.” Those specs could be altered to allow for different models independent of one specific hardware architecture, however. The tablet will supposedly run a small Windows kernel rather than the full version of Windows that the 10-inch Surface tablet uses, and will work in conjunction with a “stationary computing device” that could be a next-generation Xbox, as outlined in another leaked Microsoft document from the summer . The Verge claims that the full console will be built by contract manufacturers like Pegatron and Foxconn, but that the tablet will be built by the same secret manufacturing process used for the Surface. The Xbox tablet would be released in 2013, ahead of a next-generation console. Read 1 remaining paragraphs | Comments

View original post here:
Report: Microsoft going to production with 7-inch “Xbox Surface”

Sharp says there is “material doubt” over its corporate survival

Sharp , the century-old stalwart of Japanese electronics, is in deep trouble . On Thursday, the company said it sustained a ¥249.1 billion ($3.12 billion) loss for its latest quarter, the second year it had suffered record deficits. The company still has about $10 billion of debt. “As operating and net loss for the six months ended September 30, 2012 were huge, continuing from the previous year, cash flows from operating activities were negative,” the company wrote in its quarterly earnings report (PDF). Read 5 remaining paragraphs | Comments

See more here:
Sharp says there is “material doubt” over its corporate survival

Curiosity’s first chem test: Sands of Mars taste a lot like volcano

NASA/JPL After a few dry runs, the Curiosity rover has now put its chemistry set to use at a site called the Rock Garden. For the first time, we’ve operated an X-ray diffraction system on another planet, telling us something about the structure of the minerals in the Martian soil. The first results tell us the sand the rover has driven through contains some material that wouldn’t be out of place near a volcano on Earth. Curiosity comes equipped with a scoop that lets it pick up loose soil from the Martian surface and drop it into a hatch on the main body. From there, the samples can be directed into a variety of chemistry labs. Yesterday, NASA and the Jet Propulsion Laboratory revealed the first results obtained by the Chemistry and Mineralogy (or CheMin) instrument, the first time anything of this kind has been operated on another planet. We have a lot of ways to look at the composition of the material on Mars’ surface. We can look at the absorption of light by materials (including from orbit), which can tell us a lot about its likely composition. The rover itself has a number of spectrometers, which can also tell us about the chemical composition of rocks, as well as wet and dry chemistry labs. Read 5 remaining paragraphs | Comments

More:
Curiosity’s first chem test: Sands of Mars taste a lot like volcano

First look: Pandora 4.0, the new mobile frontier

Enlarge / Pandora 4.0: the new look Pandora Here comes Pandora 4.0, a big remake of the music service’s mobile listening environment. If you are a Pandora fan, get ready for expanded playlist, station-making, lyric-reading, personal profile, and social networking power on your smartphone. The new service creates a “unifying” experience across web and mobile devices, the company proclaims. It also represents about six or seven years of planning, thinking, and development for the outfit. Back in 2005, iPhone and Android mobile gadgets were gleams in the eye of Apple and Google. Pandora, however, was transforming radio and music distribution with its sophisticated “genome” powered song recommendation algorithm. Millions of users were clicking thumbs up or down to millions of tunes on, well, millions of Pandora channels. By 2007, Pandora was a huge hit. It was, however, mostly a desktop computer hit. “We started thinking about creating a mobile service in 2004,” Pandora CTO Tom Conrad told us in an interview. “We wanted to unify the Pandora experience.” That meant an experience that was easy from the start, that allowed users to individualize their environment and get more of what they wanted, and that was “ubiquitously available.” Read 16 remaining paragraphs | Comments

More here:
First look: Pandora 4.0, the new mobile frontier

Facebook tries cloaking probe into data leak involving 1 million accounts

Facebook officials told a blogger to keep their discussions with him private as they investigate claims he acquired names and e-mail addresses belonging almost one million account holders for $5 through a publicly available service online. “Oh and by the way, you are not allowed to disclose any part of this conversation,” member’s of Facebook’s platform policy team said during a tape-recorded telephone conversation, according to a blog post published by Bogomil Shopov, who describes himself as a “community and technology geek” who lives in Prague, Czech Republic. “It is a secret that we are even having this conversation.” Shopov said Facebook officials set up the conversation after an earlier blog post claiming he purchased data for one million Facebook users online for just $5. The blogger said it was impossible for him to determine exactly how recent the data was, although several of the entries he checked contained accurate e-mail addresses for people he knew. In addition to containing names and e-mail addresses, the cache he purchased also contained profile IDs. In an e-mail to Ars, Shopov said he suspects the data came from a third-party developer. The website selling the information has since removed the post that advertised the data, but for the time being it’s still available in Google cache . Read 6 remaining paragraphs | Comments

Read the original post:
Facebook tries cloaking probe into data leak involving 1 million accounts

Better on the inside: under the hood of Windows 8

Windows 8’s most obvious—and most divisive—new feature is its user interface . However, it would be a mistake to think that the user interface is the only thing that’s new in Windows 8: there’s a lot that’s changed behind the scenes, too. Just as is the case with the user interface, many of the improvements made to the Windows 8 core are motivated by Microsoft’s desire to transform Windows into an effective tablet operating system. Even those of us with no interest at all in tablets can stand to take advantage of these changes, however. For example, Windows 8 is more power efficient and uses less memory than Windows 7; while such work is critical to getting the software to run well on low-memory tablets with all-day battery life, it’s equally advantageous for laptop users. The biggest single piece of technology that is new to Windows 8 is, however, squarely Metro focused: it’s a large set of libraries and components called WinRT. I’ve already written extensively about what WinRT is, so I won’t be getting into that here, but there are system capabilities that WinRT apps can use (or are forced to use) that are interesting in their own right. Read 77 remaining paragraphs | Comments

See more here:
Better on the inside: under the hood of Windows 8

Cisco machine gets listed by blackhat org that rents out hacked PCs

Enlarge KrebsonSecurity.com A computer running inside the corporate network of Cisco Systems is one of about 17,000 machines that is being rented out to online miscreants looking to get a foothold inside Fortune 500 companies, according to a published report. The Windows Server 2003 system uses Microsoft’s Remote Desktop Protocol so it can be remotely accessed by anyone with the login credentials. It’s listed on Dedicatexpress.com, a service that allows anyone in the world to access hacked computers at specific organizations, KrebsonSecurity reported . Remarkably, the username for the box is “Cisco” and the corresponding password is—you guessed it—”Cisco.” “Businesses often turn on RDP for server and desktop systems that they wish to use remotely, but if they do so using a username and password that is easily guessed, those systems will soon wind up for sale on services like this one,” reporter Brian Krebs wrote. Read 3 remaining paragraphs | Comments

Read More:
Cisco machine gets listed by blackhat org that rents out hacked PCs