Paper Microscope Magnifies Objects 2100 Times and Costs Less Than $1

ananyo writes: “If ever a technology were ripe for disruption, it is the microscope. Microscopes are expensive and need to be serviced and maintained. Unfortunately, one important use of them is in poor-world laboratories and clinics, for identifying pathogens, and such places often have small budgets and lack suitably trained technicians. Now Manu Prakash, a bioengineer at Stanford University, has designed a microscope made almost entirely of paper, which is so cheap that the question of servicing it goes out of the window. Individual Foldscopes are printed on A4 sheets of paper (ideally polymer-coated for durability). A pattern of perforations on the sheet marks out the ‘scope’s components, which are colour-coded in a way intended to assist the user in the task of assembly. The Foldscope’s non-paper components, a poppy-seed-sized spherical lens made of borosilicate or corundum, a light-emitting diode (LED), a watch battery, a switch and some copper tape to complete the electrical circuit, are pressed into or bonded onto the paper. (The lenses are actually bits of abrasive grit intended to roll around in tumblers that smooth-off metal parts.) A high-resolution version of this costs less than a dollar, and offers a magnification of up to 2, 100 times and a resolving power of less than a micron. A lower-spec version (up to 400x magnification) costs less than 60 cents.” Read more of this story at Slashdot.

See original article:
Paper Microscope Magnifies Objects 2100 Times and Costs Less Than $1

Stung By File-Encrypting Malware, Researchers Fight Back

itwbennett (1594911) writes “When Jose Vildoza’s father became the victim of ransomware, he launched his own investigation. Diving into CryptoDefense’s code, he found its developers had made a crucial mistake: CryptoDefense used Microsoft’s Data Protection API (application programming interface), a tool in the Windows operating system to encrypt a user’s data, which stored a copy of the encryption keys on the affected computer. Vildoza and researcher, Fabian Wosar of the Austrian security company Emsisoft, collaborated on a utility called the Emsisoft Decrypter that could recover the encrypted keys. In mid-March Vildoza had launched a blog chronicling his investigation, purposely not revealing the mistake CryptoDefense’s authors had made. But Symantec then published a blog post on March 31 detailing the error.” Read more of this story at Slashdot.

More:
Stung By File-Encrypting Malware, Researchers Fight Back

Intel and SGI Test Full-Immersion Cooling For Servers

itwbennett (1594911) writes “Intel and SGI have built a proof-of-concept supercomputer that’s kept cool using a fluid developed by 3M called Novec that is already used in fire suppression systems. The technology, which could replace fans and eliminate the need to use tons of municipal water to cool data centers, has the potential to slash data-center energy bills by more than 90 percent, said Michael Patterson, senior power and thermal architect at Intel. But there are several challenges, including the need to design new motherboards and servers.” Read more of this story at Slashdot.

See more here:
Intel and SGI Test Full-Immersion Cooling For Servers

Yahoo DMARC Implementation Breaks Most Mailing Lists

pdclarry writes: “On April 8, Yahoo implemented a new DMARC policy that essentially bars any Yahoo user from accessing mailing lists hosted anywhere except on Yahoo and Google. While Yahoo is the initiator, it also affects Comcast, AT&T, Rogers, SBCGlobal, and several other ISPs. Internet Engineering Council expert John R. Levine, a specialist in email infrastructure and spam filtering, said, ‘Yahoo breaks every mailing list in the world including the IETF’s’ on the Internet Engineering Task Force (IETF) list. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a two-year-old proposed standard previously discussed on Slashdot that is intended to curb email abuse, including spoofing and phishing. Unfortunately, as implemented by Yahoo, it claims most mailing list users as collateral damage. Messages posted to mailing lists (including listserv, mailman, majordomo, etc) by Yahoo subscribers are blocked when the list forwards them to other Yahoo (and other participating ISPs) subscribers. List members not using Yahoo or its partners are not affected and will receive posts from Yahoo users. Posts from non-Yahoo users are delivered to Yahoo members. So essentially those suffering the most are Yahoo’s (and Comcast’s, and AT&T’s, etc) own customers. The Hacker News has details about why DMARC has this effect on mailing lists. Their best proposed solution is to ban Yahoo email users from mailing lists and encourage them to switch to other ISPs. Unfortunately, it isn’t just Yahoo, although they are getting the most attention.” Read more of this story at Slashdot.

Read More:
Yahoo DMARC Implementation Breaks Most Mailing Lists

Navy Debuts New Railgun That Launches Shells at Mach 7

Jeremiah Cornelius writes: “The U.S. Navy’s new railgun technology, developed by General Atomics, uses the Lorentz force in a type of linear, electric motor to hurl a 23-pound projectile at speeds exceeding Mach 7 — in excess of 5, 000 mph. The weapon has a range of 100 miles and doesn’t require explosive warheads. ‘The electromagnetic railgun represents an incredible new offensive capability for the U.S. Navy, ‘ says Rear Adm. Bryant Fuller, the Navy’s chief engineer. ‘This capability will allow us to effectively counter a wide range of threats at a relatively low cost, while keeping our ships and sailors safer by removing the need to carry as many high-explosive weapons.’ Sea trials begin aboard an experimental Navy catamaran, the USNS Millinocket, in 2016.” Read more of this story at Slashdot.

More:
Navy Debuts New Railgun That Launches Shells at Mach 7

Navy Creates Fuel From Seawater

New submitter lashicd sends news that the U.S. Naval Research Laboratory has announced a successful proof-of-concept demonstration of converting seawater to liquid hydrocarbon fuel. They used seawater to provide fuel for a small replica plan running a two-stroke internal combustion engine. “Using an innovative and proprietary NRL electrolytic cation exchange module (E-CEM), both dissolved and bound CO2 are removed from seawater at 92 percent efficiency by re-equilibrating carbonate and bicarbonate to CO2 and simultaneously producing H2. The gases are then converted to liquid hydrocarbons by a metal catalyst in a reactor system. … NRL has made significant advances in the development of a gas-to-liquids (GTL) synthesis process to convert CO2 and H2 from seawater to a fuel-like fraction of C9-C16 molecules. In the first patented step, an iron-based catalyst has been developed that can achieve CO2 conversion levels up to 60 percent and decrease unwanted methane production in favor of longer-chain unsaturated hydrocarbons (olefins). These value-added hydrocarbons from this process serve as building blocks for the production of industrial chemicals and designer fuels.” Read more of this story at Slashdot.

Read more here:
Navy Creates Fuel From Seawater

Nanodot-Based Smartphone Battery Recharges In 30 Seconds

Zothecula (1870348) writes “At Microsoft’s Think Next symposium in Tel Aviv, Israeli startup StoreDot has demonstrated the prototype of a nanodot-based smartphone battery it claims can fully charge in just under 30 seconds. With the company having plans for mass production, this technology could change the way we interact with portable electronics, and perhaps even help realize the dream of a fast-charging electric car.” Read more of this story at Slashdot.

Link:
Nanodot-Based Smartphone Battery Recharges In 30 Seconds

Tesla Model S Has Hidden Ethernet Port, User Runs Firefox On the 17" Screen

New submitter FikseGTS (3604833) writes “A Tesla Model S owner located a 4 pin connector on the left side of the Tesla Model S dashboard that turns out to be a disguised ethernet networking port. After crafting his owns patch cable to connect with the Tesla’s port, a networking connection was established between the Tesla Model S and a laptop computer. The Model S is running a 100 Mbps, full duplex ethernet network and 3 devices were found with assigned IP addresses in the 192.168.90.0 subnet. Some ports and services that were open on the devices were 22 (SSH), 23 (telnet), 53 (open domain), 80 (HTTP), 111 (rpcbind), 2049 (NFS), 6000 (X11). Port 80 was serving up a web page with the image or media of the current song being played. The operating system is modified version of Ubuntu using an ext3 filesystem. Using X11 it also appears that someone was able to somewhat run Firefox on both of the Model S screens. Is a jailbroken Tesla Model S on the way?” Some more details on this front would be appreciated, for anyone who has a Tesla they’d like to explore. Read more of this story at Slashdot.

See the original post:
Tesla Model S Has Hidden Ethernet Port, User Runs Firefox On the 17" Screen

NYU Group Says Its Scheme Makes Cracking Individual Passwords Impossible

An anonymous reader writes “Researchers at New York University have devised a new scheme called PolyPassHash for storing password hash data so that passwords cannot be individually cracked by an attacker. Instead of a password hash being stored directly in the database, the information is used to encode a share in a Shamir Secret Store (technical details PDF). This means that a password cannot be validated without recovering a threshold of shares, thus an attacker must crack groups of passwords together. The solution is fast, easy to implement (with C and Python implementations available), requires no changes to clients, and makes a huge difference in practice. To put the security difference into perspective, three random 6 character passwords that are stored using standard salted secure hashes can be cracked by a laptop in an hour. With a PolyPassHash store, it would take every computer on the planet longer to crack these passwords than the universe is estimated to exist. With this new technique, HoneyWords, and hardware solutions all available, does an organization have any excuse if their password database is disclosed and user passwords are cracked?.” Read more of this story at Slashdot.

View original post here:
NYU Group Says Its Scheme Makes Cracking Individual Passwords Impossible

New York Public Library Releases Over 20,000 Hi-Res Maps

Daniel_Stuckey (2647775) writes “Finally, you don’t have to raise your voice over a group of whisperers in the New York Public Library to get a better view of its map collection. Actually, you don’t even need to visit the place at all. Over 20, 000 maps and cartographic works from the NYPL’s Lionel Pincus & Princess Firyal Map Division have been uploaded and made downloadable for the public. ‘We believe these maps have no known U.S. copyright restrictions, ‘ explains a blog post announcing the wholesale release of the library’s map collection. ‘It means you can have the maps, all of them if you want, for free, in high resolution. We’ve scanned them to enable their use in the broadest possible ways by the largest number of people.’ The NYPL is distributing the maps under Creative Commons CC0 1.0 Universal Public Domain Dedication, which means you can do whatever you want with the maps.” Read more of this story at Slashdot.

View post:
New York Public Library Releases Over 20,000 Hi-Res Maps