Encrypted e-mail: How much annoyance will you tolerate to keep the NSA away?

Aurich Lawson In an age of smartphones and social networking, e-mail may strike many as quaint. But it remains the vehicle that millions of people use every day to send racy love letters, confidential business plans, and other communications both sender and receiver want to keep private. Following last week’s revelations of a secret program that gives the National Security Agency (NSA) access to some e-mails sent over Gmail, Hotmail, and other services—and years after it emerged that the NSA had gained access to full fiber-optic taps of raw Internet traffic—you may be wondering what you can do to keep your messages under wraps. The answer is public key encryption, and we’ll show you how to use it. The uses of asymmetry The full extent of the cooperation between the NSA and various technology companies is unclear. It will probably remain that way for the foreseeable future. For the time being, however, it seems likely that the standard cryptographic tools used to secure data “in flight”—that is to say, the SSL that protects data traveling between machines on the Internet—remain secure as long as certain best practices are used. Read 55 remaining paragraphs | Comments

See the original post:
Encrypted e-mail: How much annoyance will you tolerate to keep the NSA away?

How OS X “Mavericks” works its power-saving magic

Apple execs talk up the new features in OS X Mavericks. At yesterday’s Worldwide Developer Conference (WWDC) keynote, Apple made some bold claims about the future of battery life in its laptops. A new 13-inch Macbook Air, for instance, should now run a full 12 hours on a single charge , up from 7 in the previous model. Assuming that testing bears out Apple’s numbers, how did the company do it? The obvious part of the answer is “Haswell”—but that turns out to be only part of the story. The power efficiency gains found in Intel’s new Haswell CPUs should provide modest gains in battery life, and such gains were widely expected. Back in January, Intel claimed that the new Haswell CPUs featured the “largest generation-to-generation battery life increase in the history of Intel” and said that the chips were the first of its architectures designed “from the ground up” for Ultrabooks and tablets. The new chips run at lower clockspeeds and at lower wattages. Less expected was the announcement of OS X 10.9 “Mavericks” and its own focus on mobile power usage. While Apple made a few comments during the keynote about the new technologies meant to enable longer battery life, more information appeared later in the day with the separate release of a Core Technology Overview (PDF) document that offers a high-level look at some of the Mavericks internals. Read 11 remaining paragraphs | Comments

View original post here:
How OS X “Mavericks” works its power-saving magic

Apple announces flatter, sleeker iOS 7

A new version of Apple’s mobile operating system, iOS 7, was announced at the company’s Worldwide Developer Conference (WWDC) at the Moscone Center in San Francisco. The release will feature, among a number of changes, a departure from the bubbly, skeuomorphic design that has prevailed on both iOS and OS X for the last several years in favor of flatter, more angular design elements influenced by Apple SVP of Industrial Design Jony Ive. The most front-facing part of the OS, the home screen, now has app icons that lack the dimension and gloss effect of previous versions. Design elements within the icon, like the musical note on the Music app icon, appear as a flat design flush with the background rather than a cutout like before. iOS 7 isn’t doing away completely with dimensionality, as some text elements shown in the intro video still feature embossing, and Ive emphasized that the OS focuses on “depth and vitality.” The look of several key apps in iOS 7. Many of the skeuomorphic touches are also gone from the OS, such as the textured paper in the iBooks app and the leather-bound elements in the Calendar app. Of the Game Center redesign, Apple SVP of Software Engineering Craig Federighi stated, “we just ran out of green felt.” Read 14 remaining paragraphs | Comments

More:
Apple announces flatter, sleeker iOS 7

Chinese supercomputer destroys speed record and will get much faster

Lights on the Tianhe-2 supercomputer change color depending on the power load. Jack Dongarra A Chinese supercomputer known as Tianhe-2 has been measured at speeds of 30.65 petaflops, or 74 percent faster than the current holder of the world’s-fastest-supercomputer title. The speed is remarkable partly because the Intel-based Tianhe-2 (also known as Milkyway-2) wasn’t even running at full capacity during testing. A five-hour Linpack test using 14,336 out of 16,000 compute nodes, or 90 percent of the machine, clocked in at the aforementioned 30.65 petaflops. (A petaflop is one quadrillion floating point operations per second, or a million billion.) Linpack benchmarks are used to rank the Top 500 supercomputers in the world . The Top 500 list’s current champion is Titan, a US system that hit 17.59 petaflops. Tianhe-2 achieved 1.935 gigaflops per watt, which is slightly less efficient than Titan’s 2.143 gigaflops per watt. Tianhe-2’s numbers were revealed this week in a paper by University of Tennessee professor Jack Dongarra, who created the Linpack benchmarks and helps compile the bi-annual Top 500 list. Dongarra’s paper doesn’t say whether Tianhe-2’s Linpack measurement was officially submitted for inclusion in the Top 500 list. Ars has asked him if the measurement will put Tianhe-2 on top when the next list is released, but we haven’t heard back yet. In any case, the new Top 500 rankings will be unveiled on June 17. Read 4 remaining paragraphs | Comments

See the article here:
Chinese supercomputer destroys speed record and will get much faster

More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Wikimedia Hundreds of thousands of websites could be endangered by publicly available attack code exploiting a critical vulnerability in the Plesk control panel . This particular vulnerability gives hackers control of the server it runs on according to security researchers. The code-execution vulnerability affects default versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 of Plesk running on the Linux and FreeBSD operating systems, a configuration used by more than 360,000 websites . Plesk running on Windows and other types of Unix haven’t been tested to see if those configurations are vulnerable as well. The exploit code was released Wednesday on the Full-Disclosure mailing list by “kingcope,” a pseudonymous security researcher who has frequented the forum for years. He has a proven track record for developing reliable exploits. “This vulnerability has a high severity rating,” kingcope wrote in an e-mail to Ars. “An attacker can use this exploit to get a command line shell remotely with the privileges of the configured Apache user.” Read 7 remaining paragraphs | Comments

See more here:
More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Espionage malware infects raft of governments, industries around the world

Kaspersky Lab Security researchers have blown the whistle on a computer-espionage campaign that over the past eight years has successfully compromised more than 350 high-profile targets in 40 countries. “NetTraveler,” named after a string included in an early version of the malware, has targeted a number of industries and organizations, according to a blog post published Tuesday by researchers from antivirus provider Kaspersky Lab. Targets include oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies, military contractors and Tibetan/Uyghur activists. Most recently, the group behind NetTraveler has focused most of its efforts on obtaining data concerning space exploration, nanotechnology, energy production, nuclear power, lasers, medicine, and communications. “Based on collected intelligence, we estimate the group size to about 50 individuals, most of which speak Chinese natively and have working knowledge of the English language,” the researchers wrote. “NetTraveler is designed to steal sensitive data as well as log keystrokes, and retrieve file system listings and various Office of PDF documents.” Read 3 remaining paragraphs | Comments

See the article here:
Espionage malware infects raft of governments, industries around the world

Internet Explorer 10 takes chunks out of IE9, Windows 8 closes on Vista

Net Market Share One wonders what the browser market would look like if Microsoft had enabled automatic updates before. Though the overall positions in the market were little changed in May, one thing is clear: Internet Explorer 10’s uptake is fast, in a way that no older version of the browser has ever been. Net Market Share Net Market Share Internet Explorer was up slightly, picking up 0.18 points for a 55.99 percent share of the desktop market. Firefox had stronger growth, up 0.33 points to 20.63 percent. Chrome was the month’s big loser, dropping 0.61 points to 15.74 percent—its lowest share since August 2011. Safari was marginally up, adding 0.08 points to reach an all-time high of 5.46 percent. Opera ended the month up 0.04 percent points, at 1.77 percent. Read 8 remaining paragraphs | Comments

See the original post:
Internet Explorer 10 takes chunks out of IE9, Windows 8 closes on Vista

France removes Internet cut-off threat from its anti-piracy law

This street art in eastern France reads: “Hadopi: The French Internet is under control!” mathias France finally put an end to the most extreme measure of its famous “three strikes” anti-piracy regime: no one will face being cut off from the Internet. The law is better known by its French acronym, Hadopi. In the last few years under the law, the Hadopi agency famously set up a system with graduating levels of warnings and fines . The threat of being cut off entirely from the Internet was the highest degree, but that penalty was never actually put into place. “Getting rid of the cut-offs and those damned winged elephants is a good thing. They’re very costly,” Joe McNamee, of European Digital Rights, quipped to Ars. Read 11 remaining paragraphs | Comments

Read More:
France removes Internet cut-off threat from its anti-piracy law

Windows 8.1 gains boot-to-desktop to attract business users

At TechEd North America today, Microsoft unveiled a host of features coming in Windows 8.1 that should make the operating system more appealing to business users. Windows 8.1 is a free update to Windows 8 that will ship  later this year . On top of bringing back a Taskbar-visible Start button , Windows 8.1 will give enterprises a lot more control over the operating system’s appearance. Chief among these controls is the ability to boot straight to the desktop, a feature found in prerelease versions of Windows 8 but not officially supported in the final version. Additionally, IT departments can now exact more control over the Start screen, fixing its layout and prepopulating it with tiles for corporate apps. At its most extreme, this will allow IT departments to turn Windows 8 machines into kiosks, booting into specific Metro apps. If the built-in capabilities aren’t sufficient, Microsoft will be releasing an embeddable version. The catchily-named Windows Embedded 8.1 Industry will be for use in things like point-of-sale systems and ATMs. Read 6 remaining paragraphs | Comments

View article:
Windows 8.1 gains boot-to-desktop to attract business users

Seat of Power: the computer workstation for the person with everything

MWE Lab’s Emperor 1510 LX—don’t call it a chair. MWE Labs Science fiction is filled with cherished seats of power, workstations that put the universe a finger-touch or a mere thought away. Darth Vader had his meditation pod, the Engineers of Prometheus had their womb-like control stations, and Captain Kirk has the Captain’s Chair. But no real-life workstation has quite measured up to these fictional seats of power in the way that Martin Carpentier’s Emperor workstations have. The latest “modern working environment” from Carpentier’s Quebec City-based MWE Lab is the Emperor 1510 LX. With a retractable monitor stand that can support up to five monitors (three 27-inch and two 19-inch), a reclining seat with thigh rest, a Bose sound system, and Italian leather upholstery, the Emperor 1510 LX looks more like a futuristic vehicle than a workstation.  And it’s priced like a vehicle, too—it  can soon be yours for the low, low price of $21,500. Tale of the Scorpion In 2006, Carpentier was slaving away as a web designer when he reached a breaking point. He was tired of his tangle of cables, the struggle to manage multiple monitors, and the horrible ergonomics that came with a standard computer desk. Inspired by the emperor scorpion, Carpentier modeled his workstation after its tail, with the monitors suspended at the stinger. Read 12 remaining paragraphs | Comments

View post:
Seat of Power: the computer workstation for the person with everything