A $6 commute with Wi-Fi, USB ports, and coconut water

SAN FRANCISCO—In a city replete with not only local buses, and the famously-hated tech company buses that shuttle hundreds of workers daily 40 miles south, a new startup is set to debut a private luxury commuter bus line, charging $6 for a roughly three-mile ride. At its Wednesday launch, Leap will only operate four buses (with one more in reserve) during commuting hours, focusing on giving rides from the Marina neighborhood in the city’s north, going southeast to downtown in the morning, and the reverse in the evening. There’s no fixed schedule—the buses are just constantly rolling at 10 to 15 minute intervals, and passengers can check the iOS or Web apps to see when they will arrive. (Ars first profiled Leap in March 2014.) Leap is betting that riders are willing to pay nearly three times what a ride on a local Muni bus costs, and a fair bit less than what a taxi (or its newer cousins, Uber, Lyft, and Sidecar) would charge for a similar journey. What makes it worth that price? Free Wi-Fi, comfortable seats (limited to just 27, no standing passengers), USB ports, plus food and drinks. Read 24 remaining paragraphs | Comments

Read More:
A $6 commute with Wi-Fi, USB ports, and coconut water

Windows 10 shaves off gigabytes with selective system file compression

With the Windows 8.1 Update, Microsoft shrank the Windows 8.1 install footprint to make it suitable for low-cost tablets with just 16GB of permanent storage, a reduction from the 32GB generally required for Windows 8. Windows 10 will shrink the disk footprint further, potentially freeing as much as 6.6GB of space on OEM preinstalls. Microsoft describes two sources of savings. The first is the re-use of a time-honored technique that fell out of fashion as hard drives grew larger and larger: per-file compression. The NTFS filesystem used in Windows has long allowed individual files and folders to be compressed, reducing their on-disk size at the expense of a small processor overhead when reading them. With spinning disks getting so large as to feel almost unlimited, per-file compression felt like a relic from a bygone age by the mid-2000s. But with the rise of solid state storage and ultra-cheap devices with just a handful of gigabytes available, per-file compression has gained a new lease on life. Read 11 remaining paragraphs | Comments

Read the article:
Windows 10 shaves off gigabytes with selective system file compression

Cops are freaked out that Congress may impose license plate reader limits

Despite the fact that no federal license plate legislation has been proposed, the International Association of Chiefs of Police (IACP) has sent a pre-emptive letter to top Congressional lawmakers, warning them against any future restrictions of automated license plate readers. The IACP claims to be the “world’s   oldest and largest association of law enforcement executives.” As the letter, which was published  last week, states: We are deeply concerned about efforts to portray automated license plate recognition (ALPR) technology as a national real-time tracking capability for law enforcement. The fact is that this technology and the data it generates is not used to track people in real time. ALPR is used every day to generate investigative leads that help law enforcement solve murders, rapes, and serial property crimes, recover abducted children, detect drug and human trafficking rings, find stolen vehicles, apprehend violent criminal alien fugitives, and support terrorism investigations. Sarah Guy, a spokeswoman for the IACP, told Ars that current state and local restrictions have made the police lobby group concerned at the federal level. Read 14 remaining paragraphs | Comments

View article:
Cops are freaked out that Congress may impose license plate reader limits

Epic Google snafu leaks hidden whois data for 280,000 domains

Google leaked the complete hidden whois data attached to more than 282,000 domains registered through the company’s Google Apps for Work service, a breach that could bite good and bad guys alike. The 282,867 domains counted by Cisco Systems’ researchers account for 94 percent of the addresses Google Apps has registered through a partnership with registrar eNom. Among the services is one to shield from public view all personal information included in domain name whois records. Starting in mid 2013, a software defect in Google Apps started leaking the data, including names, phone numbers, physical addresses, e-mail addresses. The bug caused the data to become public once a registration was renewed. Cisco’s Talos Security Intelligence and Research Group discovered on February 19 and five days later the leak was plugged, slightly shy of two years after it first sprung. Whois data is notoriously unreliable, as is clear from all the obviously fake names, addresses and other data that’s contained in public whois records. Still, it’s reasonable to assume that some people might be more forthcoming when signing up using a privacy-enhancing service that promises to hide such data. Even in cases where people falsified records, the records might provide important clues about the identities of the people who made them. Often when data isn’t pseudo-randomized, it follows patterns that can link a person to a particular group or other Internet record. As Cisco researchers Nick Biasini, Alex Chiu, Jaeson Schultz, Craig Williams, and William McVey wrote: Read 4 remaining paragraphs | Comments

See more here:
Epic Google snafu leaks hidden whois data for 280,000 domains

Indian ISP’s routing hiccup briefly takes Google down worldwide

For a short time today, people all over the world trying to access Google services were cut off because of what Dyn Research Director of Internet Analysis Doug Madory identified as a “routing leak ” from an Indian broadband Internet provider. The leak is similar to a 2012 incident caused by an Indonesian ISP , which took Google offline for 30 minutes worldwide. Routing leaks occur when a network provider broadcasts all or part of its internal routing table to one or more peered networks via the Border Gateway Protocol, causing network traffic to be routed incorrectly. In this case, the Indian ISP Hathway’s boundary router incorrectly announced routing data for over 300 network prefixes belonging to Google to the Internet backbone via its provider Bharti Airtel. “Bharti in turn announced these routes to the rest of the world,” Madory wrote in a Dyn Research blog entry posted this morning, “and a number of ISPs accepted these routes.” In the US, Cogent and Level 3 accepted the routes; a number of overseas carriers, including Orange, were also affected. Read 1 remaining paragraphs | Comments

See the article here:
Indian ISP’s routing hiccup briefly takes Google down worldwide

Microsoft to step up the pace of delivering Windows 10 builds

Though the plan was to give Windows 10 preview a series of regular updates, there hasn’t been a new build since January. Windows 10 has two public release channels. The fast channel is meant to get more regular updates, and so get new features sooner, while the slow channel is meant to be more thoroughly tested and a little more stable. Both channels have been quiet lately. While there’s no immediate change on that front—a new public candidate build is in testing but it’s not done yet—testers of the new operating system should take note: the fast channel is due to get faster. Gabe Aul, a General Manager in Microsoft’s Operating Systems Group tweeted today the fast channel is going to go faster , and if you want a more stable situation, you should switch to the slow channel . Further, Aul says that the company may introduce additional channels, perhaps to offer even more cutting edge builds. Read 1 remaining paragraphs | Comments

View post:
Microsoft to step up the pace of delivering Windows 10 builds

Internet providers ordered to stop hiding the true size of monthly bills

New rules for home Internet providers and wireless carriers require them to be truthful about how much their service actually costs. As part of the transparency requirements in the Federal Communications Commission’s net neutrality order , Internet providers have to clearly detail all charges, such as modem rental and installation fees, and disclose the full monthly price that will go into effect after any promotional pricing expires. The new disclosure rule is more specific than a previous one, the FCC said. Read 7 remaining paragraphs | Comments

Read More:
Internet providers ordered to stop hiding the true size of monthly bills

Apple releases iOS 8.2 today with Apple Watch support and plenty of bug fixes

SAN FRANCISCO—iOS 8.2 has been in development for several months now, and today Apple is formally releasing the update to the public. It’s available as an over-the-air update or through iTunes for any device running iOS 8, including the iPhone 4S, 5, 5C, 5S, 6, and 6 Plus; all iPads except the first-generation model; and the fifth-generation iPod Touch. The biggest feature update is support for the Apple Watch. The device will work with the iPhone 5 and newer models, but it will not work with iPads or iPods. Once you’ve tethered a watch to your phone, a new companion app will allow you to change the watch’s settings, organize its Home screen, and make other changes. We’ll take a longer look at this companion app when the time comes to review the Apple Watch itself. For those of you with other iDevices and/or no particular interest in the Apple Watch, there are still plenty of reasons to install the update. HomeKit will allow users to control devices at home Read 2 remaining paragraphs | Comments

Link:
Apple releases iOS 8.2 today with Apple Watch support and plenty of bug fixes

Water droplets bounce off these new self-cleaning surfaces

Every day, we interact with a myriad of surfaces ranging from soft fabrics to hard metals. Inevitably, this means we have to spend our time cleaning them. A class of self-cleaning materials would certainly make our lives easier. Previous attempts to create these materials have focused on developing surfaces that are rough and waxy; these cause water droplets to roll along the surface, picking up dirt and dust due as it goes. These materials have been relatively successful, but they have many limitations. For example, they’re easily worn away and easily contaminated by oils like those found on our skin. Luckily, scientists have now developed a waterproof, self cleaning coating that can be applied to materials that are as soft as cotton and as hard as glass. This coating is composed of titanium dioxide (TiO2) nanoparticles with two size distributions, delivered as a suspension in ethanol containing the chemical perfluorooctyltriethoxysilane. After application, the ethanol is allowed to evaporate for 180 seconds before the coating is ready for use. This coating can be sprayed, dipped, or painted onto a surface, and it maintains its performance after several types of damage. Read 6 remaining paragraphs | Comments

Read the original:
Water droplets bounce off these new self-cleaning surfaces

DNS enhancement catches malware sites by understanding sneaky domain names

A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O’Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank , it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness. The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via “phishing” links in e-mails and social media have gone past the well-worn “typo-squatting” approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered “Carbanak” attacks on banks that allowed criminals to gain access to financial institutions’ networks starting in January 2013 and steal over $1 billion over the next two years. Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks. Read 4 remaining paragraphs | Comments

More here:
DNS enhancement catches malware sites by understanding sneaky domain names