Linux 4.5 Adds Raspberry Pi 2 Support, AMD GPU Re-Clocking, Intel Kaby Lake

The Linux 4.5 merge window has been open for the last two weeks; that means that the 4.5-rc1 kernel is expected to emerge, with the official kernel following in about eight weeks. An anonymous reader writes with this top-level list of changes to look for, from Phoronix: Linux 4.5 is set to bring many new features across the kernel’s 20 million line code-base. Among the new/improved features are Raspberry Pi 2 support, open-source Raspberry Pi 3D support, NVIDIA Tegra X1 / Jetson TX1 support, an open-source Vivante graphics driver, AMDGPU PowerPlay/re-clocking support, Intel Kaby Lake enablement, a Logitech racing wheel driver, improvements for handling suspended USB devices, new F2FS file-system features, and better Xbox One controller handling. Read more of this story at Slashdot.

Read the original post:
Linux 4.5 Adds Raspberry Pi 2 Support, AMD GPU Re-Clocking, Intel Kaby Lake

Finally Calculated: All the Legal Positions In a 19×19 Game of Go

Reader John Tromp points to an explanation posted at GitHub of a computational challenge Tromp coordinated that makes a nice companion to the recent discovery of a 22 million-digit Mersenne prime. A distributed effort using pooled computers from two centers at Princeton, and more contributed from the HP Helion cloud, after “many hiccups and a few catastrophes” calculated the number of legal positions in a 19×19 game of Go. Simple as Go board layout is, the permutations allowed by the rules are anything but simple to calculate: “For running an L19 job, a beefy server with 15TB of fast scratch diskspace, 8 to 16 cores, and 192GB of RAM, is recommended. Expect a few months of running time.” More: Large numbers have a way of popping up in the game of Go. Few people believe that a tiny 2×2 Go board allows for more than a few hundred games. Yet 2×2 games number not in the hundreds, nor in the thousands, nor even in the millions. They number in the hundreds of billions! 386356909593 to be precise. Things only get crazier as you go up in boardsize. A lower bound of 10^10^48 on the number of 19×19 games, as proved in our paper, was recently improved to a googolplex. (For anyone who wants to double check his work, Tromp has posted as open source the software used.) Read more of this story at Slashdot.

Read this article:
Finally Calculated: All the Legal Positions In a 19×19 Game of Go

Samsung Begins Mass Production of World’s Fastest DRAM

MojoKid writes: Late last year marked the introduction of High Bandwidth Memory (HBM) DRAM courtesy of AMD’s Fury family of graphics cards, each of which sports 4GB of HBM. HBM allows these new AMD GPUs to tout an impressive 512GB/sec of memory bandwidth, but it’s also just the first iteration of the new memory technology. Samsung has just announced that it has begun mass production of HBM2. Samsung’s 4GB HBM2 package is built on a 20 nanometer process. Each package contains four 8-gigabit core dies built on top of a buffer die. Each 4GB HMB2 package is capable of delivering 256GB/sec of bandwidth, which is twice that of first generation HBM DRAM. In the example of NVIDIA’s next gen GPU technology, code named Pascal, the new GPU will utilize HBM2 for its frame buffer memory. High-end consumer-grade Pascal boards will ship with 16GB of HBM2 memory (in four, 4GB packages), offering effective memory bandwidth of 1TB/sec (256GB/sec from each HMB2 package). Samsung is also reportedly readying 8GB HBM2 memory packages this year. Read more of this story at Slashdot.

View original post here:
Samsung Begins Mass Production of World’s Fastest DRAM

New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

An anonymous reader writes: Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users: the Linux.Ekoms.1 trojan. It includes functionality that allows it to take screenshots and record audio. While the screenshot activity is working just fine, Dr.Web says the trojan’s audio recording feature has not been turned on, despite being included in the malware’s source code. “All information transmitted between the server and Linux.Ekoms.1 is encrypted. The encryption is initially performed using the public key; and the decryption is executed by implementing the RSA_public_decrypt function to the received data. The Trojan exchanges data with the server using AbNetworkMessage.” Read more of this story at Slashdot.

Taken from:
New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

Cryptsy Bitcoin Trader Robbed, Blames Backdoor In the Code of a Wallet

An anonymous reader writes: Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a security incident, accusing the developer of Lucky7Coin of stealing 13, 000 Bitcoin and 300, 000 Litecoin, which at today’s rate stands more than $5.7 million / €5.2 million. Cryptsy says “the developer of Lucky7Coin had placed an IRC backdoor into the code of [a] wallet, which allowed it to act as a sort of a Trojan, or command and control unit.” Coincidentally this also explains why two days after the attack was carried out, exactly 300, 000 Litecoin were dumped on the BTC-e exchange, driving Litecoin price down from $9.5 to $2. Read more of this story at Slashdot.

See the original post:
Cryptsy Bitcoin Trader Robbed, Blames Backdoor In the Code of a Wallet

Grisly Find Suggests Humans Inhabited Arctic 45,000 Years Ago

sciencehabit points out this story which may rewrite the early history of humans in North America. From the Sciencemag story: “In August of 2012, an 11-year-old boy made a gruesome discovery in a frozen bluff overlooking the Arctic Ocean. While exploring the foggy coast of Yenisei Bay, about 2000 kilometers south of the North Pole, he came upon the leg bones of a woolly mammoth eroding out of frozen sediments. Scientists excavating the well-preserved creature determined that it had been killed by humans: Its eye sockets, ribs, and jaw had been battered, apparently by spears, and one spear-point had left a dent in its cheekbone—perhaps a missed blow aimed at the base of its trunk. When they dated the remains, the researchers got another surprise: The mammoth died 45, 000 years ago. That means that humans lived in the Arctic more than 10, 000 years earlier than scientists believed, according to a new study. The find suggests that even at this early stage, humans were traversing the most frigid parts of the globe and had the adaptive ability to migrate almost everywhere.” Read more of this story at Slashdot.

Read the original post:
Grisly Find Suggests Humans Inhabited Arctic 45,000 Years Ago

"DDoS-For-Bitcoin" Blackmailers Arrested

An anonymous reader writes: The DDoSing outfit that spawned the trend of “DDoS-for-Bitcoin” has been arrested by Europol in Bosnia Herzegovina last month. DD4BC first appeared in September 2015, when Akamai blew the lid on their activities. Since then almost any script kiddie that can launch DDoS attacks has followed their business model by blackmailing companies for Bitcoin. Read more of this story at Slashdot.

Read More:
"DDoS-For-Bitcoin" Blackmailers Arrested

Verizon Accused of Helping Spammers By Routing Millions of Stolen IP Addresses

An anonymous reader writes: Spamhaus, an international non-profit organization that hunts down spammers, is accusing Verizon of indifference and facilitation of cybercrime because it failed for the past six months to take down stolen IP routes hosted on its network from where spam emails originated. Spamhaus detected over 4 million IP addresses, mainly stolen from China and Korea, and routed on Verizon’s servers with forged paperwork. Spamhaus says, “For a start, it seems very strange that a large US-based ISP can be so easily convinced by abusers to route huge IP address blocks assigned to entities in the Asian-Pacific area. Such blocks are not something that can go unnoticed in the noise of everyday activity. They are very anomalous, and should call for an immediate accurate verification of the customer. Internal vetting processes at large ISPs should easily catch situations so far from normality.” Read more of this story at Slashdot.

Original post:
Verizon Accused of Helping Spammers By Routing Millions of Stolen IP Addresses

BBC Confirms 50% Bitrate Savings For H.265/HEVC Vs H.264/AVC

An anonymous reader writes: A research team from the BBC has done a series of tests to confirm earlier computations showing a ~50% savings in bit rate for H.265/HEVC compared to video using H.264/AVC at comparable quality. “The subjective tests used a carefully selected set of coded video sequences at four different picture sizes: UHD (3840×2160 and 4096×2048), 1080p (1920×1080), 720p (1280×720) and 480p (832×480), at frame rates of 30Hz, 50Hz, or 60Hz. The video content was chosen to represent diverse spatial and temporal characteristics, and then coded using HEVC and AVC standards at a wide span of bit rates producing a variety of quality levels.” Here is the full published analysis. “The tests confirmed the significant compression efficiency improvements achieved in HEVC, verifying the results previously reported using objective quality metrics (PSNR based methods).” The team did not test against VP9, which is shaping up to be an impressive standard as well. Read more of this story at Slashdot.

Visit site:
BBC Confirms 50% Bitrate Savings For H.265/HEVC Vs H.264/AVC

Questions Linger As Juniper Removes Suspicious Dual_EC Algorithm

msm1267 writes: Juniper Networks has removed the backdoored Dual_EC DRBG algorithm from its ScreenOS operating system, but new developments show Juniper deployed Dual_EC long after it was known to be backdoored. Stephen Checkoway, assistant professor of computer science at the University of Illinois at Chicago, said that he and a number of crypto experts looked at dozens of versions of Juniper’s NetScreen firewalls and learned that ANSI X9.31 was used exclusively until ScreenOS 6.2 when Juniper added Dual_EC. It also changed the size of the nonce used with ANSI X9.31 from 20 bytes to 32 bytes for Dual_EC, giving an attacker the necessary output to predict the PRNG output. ‘And at the same time, Juniper introduced what was just a bizarre bug that caused the ANSI generator to never be used and instead just use the output of Dual_EC. They made all of these changes in the same version update.’ Read more of this story at Slashdot.

More here:
Questions Linger As Juniper Removes Suspicious Dual_EC Algorithm