Leader of BitTorrent piracy ring sentenced to five years in prison

The leader of the notorious IMAGiNE BitTorrent piracy ring, Jeramiah Perkins, was sentenced on Thursday to five years in prison, the largest sentence for the group’s five top administrators. In August 2012, Perkins pleaded guilty to one count of conspiracy to commit criminal copyright infringement. After being given the maximum sentence today, Perkins was also ordered to serve three years under “supervised release” and must pay $15,000 in restitution. As we reported in April, the group used infrared and FM receivers and camcorders to capture new releases in movie theaters. In a statement , the Department of Justice cited testimony from the Motion Picture Association of America, calling the group “the most prolific motion picture piracy release group operating on the Internet from September 2009 through September 2011.” Read 2 remaining paragraphs | Comments

More here:
Leader of BitTorrent piracy ring sentenced to five years in prison

Earthworm guts become factory for nanoparticles

Enlarge / Meet the latest quantum dot assembly factory. Colorado State Quantum dots are nanoscale-sized pieces of semiconductor. Their small size ensures that quantum effects, like the Pauli exclusion principle, influence the behavior of electrons within them. This gives the dots properties that a bulk material with the same composition lacks, and it makes them appealing candidates for things like tiny lasers, photovoltaic materials, and LEDs. Another area where they’ve shown promise is medical imaging. In terms of absorbing and emitting light, quantum dots behave much like the fluorescent molecules we can use to label cells of interest. But, since their fluorescent properties depend on the shape of the particles rather than the chemical structure of a molecule, they are much less prone to undergoing reactions that destroy their fluorescence. The problem is that most semiconductors aren’t especially biocompatible, meaning additional chemical reactions need to be performed before the dots can attach to or enter cells. Some researchers have started to look towards making the dots in biological systems, figuring that the output would necessarily be biocompatible. After some successes with bacteria and yeast, they’ve moved on to a larger target: the earthworm. And it appears to work very well. Read 6 remaining paragraphs | Comments

Read the original:
Earthworm guts become factory for nanoparticles

“Neuristor”: Memristors used to create a neuron-like behavior

A cartoon showing spikes of activity traveling among neurons. UC Berkeley Computing hardware is composed of a series of binary switches; they’re either on or off. The other piece of computational hardware we’re familiar with, the brain, doesn’t work anything like that. Rather than being on or off, individual neurons exhibit brief spikes of activity, and encode information in the pattern and timing of these spikes. The differences between the two have made it difficult to model neurons using computer hardware. In fact, the recent, successful generation of a flexible neural system required that each neuron be modeled separately in software in order to get the sort of spiking behavior real neurons display. But researchers may have figured out a way to create a chip that spikes. The people at HP labs who have been working on memristors have figured out a combination of memristors and capacitors that can create a spiking output pattern. Although these spikes appear to be more regular than the ones produced by actual neurons, it might be possible to create versions that are a bit more variable than this one. And, more significantly, it should be possible to fabricate them in large numbers, possibly right on a silicon chip. The key to making the devices is something called a Mott insulator. These are materials that would normally be able to conduct electricity, but are unable to because of interactions among their electrons. Critically, these interactions weaken with elevated temperatures. So, by heating a Mott insulator, it’s possible to turn it into a conductor. In the case of the material used here, NbO 2 , the heat is supplied by resistance itself. By applying a voltage to the NbO 2 in the device, it becomes a resistor, heats up, and, when it reaches a critical temperature, turns into a conductor, allowing current to flow through. But, given the chance to cool off, the device will return to its resistive state. Formally, this behavior is described as a memristor. Read 4 remaining paragraphs | Comments

Read More:
“Neuristor”: Memristors used to create a neuron-like behavior

Anonymous sets sights on an old enemy—the Westboro Baptist Church

That link? It leads to a survey entitled, “Interactive Butthurt Report v. 2.0.” Nothing is beneath the Westboro Baptist Church, as evidenced by the group’s announcement to picket outside Sandy Hook Elementary School in wake of the recent tragedy. The group’s most recent, perhaps most deplorable decision has apparently irked one of its oldest enemies : infamous hacker collective Anonymous. In response to the WBC’s plans early today, Anonymous tweeted , “It’s so nice of #WBC to provide the internet with a list of their twitter handles…” Roughly one hour later, they revealed their plans for the WBC : “#WBC GodHatesFags Site Admin gets #DOX’d via: Anonymous.” DOX, of course, refers to the work Anonymous did to find and publish a list of WBC members complete with e-mails, phone numbers, and even home addresses—all for the adoring public to access. In addition to the DOXing, Anonymous has repeatedly promoted a whitehouse.org petition to have the WBC recognized legally as a hate-group . The petition was created on Friday and it has already doubled the required 25,000 signatures. Read 1 remaining paragraphs | Comments

Read More:
Anonymous sets sights on an old enemy—the Westboro Baptist Church

Using Windows 8’s “hidden” backup to clone and recover your whole PC

The blue screen of bringing your PC back to life. When it comes to backing up and restoring your PC, Windows 8 took a few steps forward and a few steps back. Your settings and apps in the new tablet-y interface (yeah, we’re still calling it Metro ) are automatically backed up if you use a Microsoft account. That means when you restore your PC, all of the Metro stuff comes back exactly the way you remember it. This has limitations—your desktop applications, anything that wasn’t downloaded from the Windows Store, are wiped when performing the most easily accessible type of restore in Windows 8. Beyond Metro, all you get is a file on your desktop listing the applications you’ve lost. There’s also a new backup tool on the desktop side of things, but this has its limits too. Called File History, it lets you automatically back up files to a network drive or cable-connected external hard drive every 10 minutes. As Peter Bright explained in an article last summer, File History’s arrival was paired with the exit of Shadow Copies. This was a useful tool that let users revert to previous versions of files without needing to connect an external drive, and now it’s gone. Read 20 remaining paragraphs | Comments

See original article:
Using Windows 8’s “hidden” backup to clone and recover your whole PC

Google phasing out ActiveSync push mail for free customers

Calling it “Winter cleaning,” Google has announced that from January 30, 2013, users of Google Mail, Calendar, and Contacts will no longer receive Exchange ActiveSync (EAS) support on their accounts. EAS provides push mail and synchronization of contacts and calendars to a number of mobile platforms, including iOS, Symbian, and Windows Phone. It’s also one of the protocols that Windows 8’s Metro Mail app uses, as does Outlook 2013. Currently, users of Google’s services can enable EAS support to use their Google accounts with suitable devices. After the cut off, existing users will continue to be able to use EAS with their devices, but those users won’t be able to add new devices. All future devices will have to use IMAP for their mail, CalDAV for calendar sync, and CardDAV for contact sync. Android and iOS users can use these protocols, but many others will be left high and dry. Push mail, in particular, could be left behind, as many platforms (including iOS) don’t support the IMAP IDLE push mail feature. Read 4 remaining paragraphs | Comments

Originally posted here:
Google phasing out ActiveSync push mail for free customers

FBI snares $850 million Butterfly botnet ring with help of Facebook

On Tuesday, the FBI announced that it had arrested ten people connected to a botnet that had spread through Facebook. Spread by a virus targeting Facebook users, the botnet caused over $850 million in losses to financial institutions, infected over 11 million computers, and stole credit card and bank account data. The botnet itself was shut down in October, according to an FBI statement. This is the second major outbreak of botnets based on the Butterfly (aka Mariposa) bot tool. The first incarnation, discovered in December 2008 and shut down a year later, infected over 12 million PCs worldwide and was spread primarily through file-sharing and instant messaging attacks. It also harvested financial information from over 800,000 victims. In the latest incarnation of Butterfly, the botnet spread itself using variants of Yahos, a virus that spreads itself by sending links via social networks and instant messaging. Victims clicked on the link, launching Yahos’ attack. The malware, which in some variants disguised itself as an NVIDIA video driver , then downloaded and installed the botnet controls and browser exploits that captured users’ credit card and bank account information. The spread of viruses like Yahos prompted Facebook to   partner with McAfee in 2010 to provide tools to users to clean infected systems. Read 1 remaining paragraphs | Comments

View article:
FBI snares $850 million Butterfly botnet ring with help of Facebook

FreedomPop launches free home wireless to compete with low-end DSL

FreedomPop’s new Hub Burst will begin shipping in January 2013. FreedomPop Just over three months after launching its free portable hotspot , FreedomPop now says its ready for the second phase of its expansion plan—a free home wireless connection. Like its portable device, which requires an $89 deposit to get 500MB of free mobile data over WiMAX, this new device (also with an $89 deposit) will offer 1GB of free data in nearly all of the 80 largest urban markets across the United States. “You’ll get speeds of 9 to 12Mbps when it’s fully optimized,” FreedomPop’s CEO Stephen Stokols told Ars, saying that it would be comparable to DSL. Read 13 remaining paragraphs | Comments

Read More:
FreedomPop launches free home wireless to compete with low-end DSL

California law enforcement moves to buy drones, draws controversy

UAV set up for Wylye intersection. QinetiQ group Since Congress passed legislation in February ordering the Federal Aviation Administration to fast-track the approval of unmanned aerial vehicles—more colloquially known as drones—for use by law enforcement agencies, police and sheriff departments across the country have been scrambling to purchase the smaller, unarmed cousins of the Predator and Reaper drones which carry out daily sorties over Afghanistan, Yemen, and other theaters of operation. Alameda County in California has become one of the central battlegrounds over the introduction of drones to domestic police work. Earlier this year , Alameda County Sheriff Gregory Ahern raised the hackles of local civil libertarians (and there are quite a few of those in the county, which encompasses Berkeley and Oakland) by declaring his intention to purchase a drone to assist with “emergency response.” According to Ahern, Alameda Sheriff’s personnel first tested a UAV in fall 2011 and gave a public demonstration of the machine’s usefulness for emergency responses during the Urban Shield SWAT competition in late October. Were Alameda County to purchase a drone, it would set a precedent in California, which has long been an innovator in law enforcement tactics: from SWAT teams (pioneered in Delano and Los Angeles) to anti-gang tactics such as civil injunctions. The first documented incident of a drone being used to make an arrest in the United States occurred in North Dakota in June 2011, when local police received assistance from an unarmed Predator B drone that belonged to US Customs and Border Protection . The Federal Bureau of Investigation and Drug Enforcement Administration have also reportedly used drones for domestic investigations. Read 7 remaining paragraphs | Comments

Read this article:
California law enforcement moves to buy drones, draws controversy

Why Gmail went down: Google misconfigured load balancing servers

Portions of the Internet panicked yesterday when Gmail was hit by an outage that lasted for an agonizing 18 minutes . The outage coincided with reports of Google’s Chrome browser crashing. It turns out the culprit was a faulty load balancing change that affected products including Chrome’s sync service, which allows users to sync bookmarks and other browser settings across multiple computers and mobile devices. Ultimately, it was human error. Google engineer Tim Steele explained the problem’s origins in a developer forum : Chrome Sync Server relies on a backend infrastructure component to enforce quotas on per-datatype sync traffic. That quota service experienced traffic problems today due to a faulty load balancing configuration change. That change was to a core piece of infrastructure that many services at Google depend on. This means other services may have been affected at the same time, leading to the confounding original title of this bug [which referred to Gmail]. Because of the quota service failure, Chrome Sync Servers reacted too conservatively by telling clients to throttle “all” data types, without accounting for the fact that not all client versions support all data types. The crash is due to faulty logic responsible for handling “throttled” data types on the client when the data types are unrecognized. If the Chrome sync service had gone down entirely, the Chrome browser crashes would not have occurred, it turns out. “In fact this crash would *not* happen if the sync server itself was unreachable,” Steele wrote. “It’s due to a backend service that sync servers depend on becoming overwhelmed, and sync servers responding to that by telling all clients to throttle all data types (including data types that the client may not understand yet).” Read 4 remaining paragraphs | Comments

Read More:
Why Gmail went down: Google misconfigured load balancing servers