Yoga Pro 3 review: Broadwell is a mixed blessing

Specs at a glance: Lenovo Yoga 3 Pro SCREEN 3200×1800 at 13.3″ (276 ppi) OS Windows 8.1 64-bit CPU 1.1GHz Intel Core M-5Y70 RAM 8GB 1600MHz DDR3 GPU Intel HD Graphics 5300 HDD 256-512GB SSD NETWORKING Dual-band 802.11a/b/g/n/ac, Bluetooth 4.0 PORTS 2x USB 3.0, 1x USB 2.0, micro-HDMI, SD card reader, headphone/microphone dual jack SIZE 13 × 9 × 0.5″ WEIGHT 2.62 lbs BATTERY 4-cell 44.8Wh Li-polymer WARRANTY 1 year STARTING PRICE $1299.99 OTHER PERKS 720p Webcam, volume rocker, screen orientation lock button, system back-up button When Lenovo launched its first Yoga laptop, it seemed rather weird. It arrived on a wave of new Windows 8-oriented devices that tried all manner of new things to offer the best of the traditional laptop and the tablet experience. The Yoga’s premise was simple: make a hinge that bends all the way around, so you can fold the laptop back on itself to make it into a sort of chunky laptop. It skewed more heavily towards laptop usage than tablet usage—there are no compromises when using it as a laptop, unlike, for example, Microsoft’s Surface Pro range—but still offered that flexibility for those who wanted it. Although designed to let the device transform into a tablet, it is perhaps the other positions that have been the real winners with the Yoga’s hinge: what Lenovo calls “tent mode,” where the keyboard is folded most of the way back to prop the screen up, is excellent when watching movies in planes and similar cramped situations, as it drastically shrinks the footprint of the device. This flexibility made the Yoga design one of the big winners. Read 22 remaining paragraphs | Comments

Read this article:
Yoga Pro 3 review: Broadwell is a mixed blessing

Here’s how to run homebrew on your 3DS

A video showing off Smealum’s Ninjhax homebrew exploit in action. Earlier this week, hacker Jordan “Smealum” Rabet announced that obscure 2011 3DS platformer Cubic Ninja held the key to unlocking the 3DS hardware to run homebrew code, causing an immediate run on the hard-to-find game . Now, Smealum has published the details of his hack , along with the instructions and tools needed to unlock the system. What Smealum is calling “Ninjhax” exploits an error in Cubic Ninja ‘s level creation and sharing function, which passes created level data via generated QR codes. Scanning a specifically manufactured QR code, generated by a tool on Smealum’s site to match any current 3DS hardware/firmware combination, causes the game to run a boot file loaded on the SD card. At that point, the bootloader downloads additional code over Wi-Fi and installs and runs a front-end channel that can run other homebrew software stored on the SD card. After that initial QR code scan, the homebrew menu can be loaded simply by accessing the save game file through Cubic Ninja . Read 3 remaining paragraphs | Comments

More here:
Here’s how to run homebrew on your 3DS

Netflix takes up 9.5% of upstream traffic on the North American Internet

Netflix We’ve written a lot about how Netflix takes up a gigantic share of Internet traffic. During peak viewing hours, Netflix accounts for about a third of all bits sent to Internet users in North America on “fixed” connections—that is, cable, DSL, fiber, or satellite, but not cellular. But Netflix users also send a ton of data upstream, so much so that Sandvine’s latest Internet Phenomena Report puts Netflix at 9.48 percent of all peak upstream traffic on North American fixed Internet services, second only to BitTorrent’s 25.49 percent. Sandvine, a maker of equipment that helps consumer broadband providers manage network congestion, defines “peak” hours as those when network usage is within 95 percent of its daily maximum, typically from 7 to 11 p.m. It isn’t new that Netflix is both an upload and download monster. But for some reason, its share of uploads went up substantially in the latest measurement while downloads remained level. The twice-annual report had Netflix accounting for 6.44 of peak upstream traffic and 34.21 percent of downstream traffic in the first half of this year , while the newest report has Netflix at 9.48 percent of upstream and 34.89 percent of downstream: Read 17 remaining paragraphs | Comments

More:
Netflix takes up 9.5% of upstream traffic on the North American Internet

Prosecutors drop key evidence at trial to avoid explaining “stingray” use

p | m In a Baltimore trial courtroom on Monday, a local judge threatened to hold a police detective in contempt of court for refusing to disclose how police located a 16-year-old robbery suspect’s phone. Once the Baltimore Police were able to locate Shemar Taylor’s phone, they then searched his house and found a gun as well. But rather than disclose the possible use of a stingray, also known as a cell site simulator, Detective John L. Haley cited a non-disclosure agreement, likely with the Harris Corporation, since the company is one of the dominant manufacturers of such devices. Stingrays can be used to determine a phone’s location, and they can also intercept calls and text messages. Baltimore Circuit Judge Barry G. Williams retorted, “You don’t have a nondisclosure agreement with the court,” according to the Baltimore Sun . Read 8 remaining paragraphs | Comments

See original article:
Prosecutors drop key evidence at trial to avoid explaining “stingray” use

A power user’s guide to OS X Server, Yosemite edition

Welcome to Yosemite Server. Andrew Cunningham OS X Server is in maintenance mode. That much was clear when Mavericks Server came out a year ago with just a handful of welcome-but-minor tweaks and improvements. The software hasn’t grown stagnant, really—certainly not to the extent of something like Apple Remote Desktop, which only gets updated when it’s time to support a new OS X version. But now OS X Server is changing very little from version to version, and since the untimely death of the Mac Mini Server , Apple isn’t even selling any kind of server-oriented hardware. Still, the Yosemite version of OS X Server changes enough to be worth revisiting. As with our pieces on Mavericks and Mountain Lion , this article should be thought of as less of a review and more of a guided tour through everything you can do with OS X Server. We’ll pay the most attention to the new stuff, but we’ll also detail each and every one of OS X Server’s services, explaining what it does, how to use it, and where to find more information about it. In cases where nothing has changed, we have re-used portions of last year’s review with updated screenshots and links. Table of Contents Installation, setup, and getting started Server.app basics OS X Server and AirPort Open Directory Users and Groups Comparison with Active Directory Profile Manager RIP Workgroup Manager, last of the Server Admin Tools File Sharing SMB 3.0: Optional encryption and performance improvements WebDAV FTP and SFTP Time Machine Xcode Caching Software Update Areas of overlap, and advice for moving forward Mail, Calendar, Contacts, and Messages Mail Calendar Contacts Messages Connecting to your server NetInstall Creating a basic image with the System Image Utility Configuring images for booting Websites Wiki VPN DHCP DNS Xsan Conclusions: OS X Server is still kicking Installation, setup, and getting started Read 168 remaining paragraphs | Comments

More:
A power user’s guide to OS X Server, Yosemite edition

High-res Rosetta pics catch little Philae lander bouncing across comet

The European Space Agency’s decade-old Rosetta mission managed to do what no mission has done before—successfully rendezvous a probe with a comet and then land on it . Even if things didn’t go entirely as planned with the landing, the lion’s share of the mission’s science was always slated to be carried out by the Rosetta probe itself rather than by the Philae lander, so plenty of experiments will still be carried out over the next year. A mosaic assembled by ESA scientists showing Philae’s first bounce across Comet 67P. ESA In fact, one of the Rosetta probe’s instruments managed to capture some remarkable imagery last week during Philae’s landing. In a blog post that went live this morning, the  ESA posted pictures from the spacecraft’s OSIRIS imager (that’s Optical, Spectroscopic, and Infrared Remote Imaging System) showing Philae’s initial approach and first “bounce” off of Comet 67P/Churyumov–Gerasimenko on November 12. Philae was supposed to have anchored itself to Comet 67P with a pair of harpoons, but those harpoons didn’t fire on touchdown. Philae actually rebounded away from the comet (67P has a small but appreciable amount of gravity, although its escape velocity is only 0.5 meters per second). It was during the first of two “bounces” that Rosetta’s OSIRIS imager captured a series of frames showing the lander’s parabolic journey across the comet’s face. The exact location of Philae’s final resting place remains as yet undetermined. Read 1 remaining paragraphs | Comments

Read More:
High-res Rosetta pics catch little Philae lander bouncing across comet

One of world’s largest landslide deposits discovered in Utah

The Markagrunt gravity slide in Utah includes most of the area between Beaver, Cedar City, and Panguitch. Google Earth Some things can be too big to notice, as our flat-Earth-believing ancestors can attest, having failed to work out that the surface of the Earth curves around a sphere. Or, as the saying goes, you can focus on the details of some fascinating trees and miss interesting facts about the forest as a whole. In southwest Utah, geologists had noticed some pretty cool “trees.” The area had been volcanically active between 21 and 31 million years ago, building up a host of steep, volcanic peaks. A number of huge blocks of rock from these peaks, up to 2.5 square kilometers in area and 200 meters thick, are obviously out of place—they’ve been interpreted by geologists as the result of many landslides around the volcanoes. In a recent paper in Geology , David Hacker , Robert Biek , and Peter Rowley show that rather than being the result of many individual landslides, these are actually all part of one jaw-droppingly large event. The deposit, called the Markagunt gravity slide, covers an area about 90 kilometers long and 40 kilometers wide and is hundreds of meters thick. During the event, all of this slid 30 kilometers or more. The scale puts run-of-the-mill landslides—as terrifying and deadly as they can be—to shame. Read 7 remaining paragraphs | Comments

Read More:
One of world’s largest landslide deposits discovered in Utah

Feds gather phone data from the sky with aircraft-mimicking cell towers

Aleksander Markin On Thursday afternoon, the Wall Street Journal published a report saying that the US Marshals Service (USMS) was using small, fixed-wing Cessnas equipped with so-called “dirtboxes”—receivers that act like cellphone towers—to gather data from citizens’ phones below. The purpose of such collection is to target and spy on criminal suspects, but the data from any citizen’s phone is collected by such devices. Sources told the WSJ that USMS operated these planes from five major airports in the US and that the program had a flying range “covering most of the US population.” The devices on the planes can capture unique identifying information from “tens of thousands” of cellphones on the ground. Using that information, federal authorities can pinpoint a cellphone user’s location from “within three meters or within a specific room in a building,” the WSJ said. Individuals with knowledge of the matter told the news outlet that the plane flyovers were targeted at “fugitives and criminals” and that non-target phone data is “let go” as it is gathered. The dirtboxes are described as higher-grade Stingrays, which police use  on the ground to collect International Mobile Subscriber Numbers (IMSI). Read 8 remaining paragraphs | Comments

Continued here:
Feds gather phone data from the sky with aircraft-mimicking cell towers

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

400 Tor-anonymized domains tracked down and seized in global crackdown

Thursday’s takedown of the Silk Road 2.0 drug website was part of a much bigger crackdown by police in a dozen countries that seized more than 400 darknet domains, it was widely reported Friday. Operation Onymous, as the coordinated international effort was dubbed, confiscated $1 million in bitcoins, $250,000 in cash, and a variety of drugs, gold, and silver, the Associated Press reported . In all, according to Wired , police seized 414 .onion domains, the Web addresses that use the Tor anonymity service to hide the physical location where they’re hosted. At least 17 people were arrested. Sites besides Silk Road 2.0 that were taken down included Hydra, Cloud Nine, Pandora, and Blue Sky. In all, some 55 different markets will be shut down once Operation Onymous is completed. Sites Agora and Evolution aren’t among them. The rise of underground bazaars selling illicit drugs and services has continued despite last year’s arrest of Ross William Ulbricht, the alleged mastermind of the original Silk Road who has pleaded not guilty and continues to fight the criminal charges in court. Read 1 remaining paragraphs | Comments

Link:
400 Tor-anonymized domains tracked down and seized in global crackdown