Search

Rss Posts

Rss Comments

Login

 

Posts from July, 2016

Vintage ‘Western Flyer’ RV is a Cure for the Summertime Blues

Jul 31

Filed under:
,,,,


This is one of three RVs claimed to have been shaped by famed American industrial designer Brooks Stevens in 1941.

Continue reading Vintage ‘Western Flyer’ RV is a Cure for the Summertime Blues

Vintage ‘Western Flyer’ RV is a Cure for the Summertime Blues originally appeared on Autoblog on Sat, 30 Jul 2016 16:09:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

View source

Tesla AutoPilot crash hasn’t hurt perception of self-driving cars

Jul 31

Filed under:
,,,


Joshua Brown’s fatality at the wheel of a Tesla Model S didn’t have a big impact on the public’s perception of autonomous driving technology.

Continue reading Tesla AutoPilot crash hasn’t hurt perception of self-driving cars

Tesla AutoPilot crash hasn’t hurt perception of self-driving cars originally appeared on Autoblog on Sat, 30 Jul 2016 14:05:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

View source

Here’s where you’ll need a motorcycle license to drive an Elio

Jul 31

Filed under:
,,,,,


We expect Elio sales to be pretty low in West Virginia.

Continue reading Here’s where you’ll need a motorcycle license to drive an Elio

Here’s where you’ll need a motorcycle license to drive an Elio originally appeared on Autoblog on Sat, 30 Jul 2016 12:05:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

View source

Acura NSX GT3 public testing, 2017 Hyundai Elantra top safety rating | Autoblog Minute

Jul 31

Filed under:
,,


Acura is set to publicly track test the NSX GT3, and the Insurance Institute for Highway Saftey has awarded its Top Saftey Pick+ honors to a Hyundai sedan. Senior Producer Chris McGraw reports on this edition of Autoblog Minute.

Continue reading Acura NSX GT3 public testing, 2017 Hyundai Elantra top safety rating | Autoblog Minute

Acura NSX GT3 public testing, 2017 Hyundai Elantra top safety rating | Autoblog Minute originally appeared on Autoblog on Sat, 30 Jul 2016 10:00:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

View source

Recharge Wrap-up: Cezeta electric scooter, BMW’s new Efficient Dynamics engines

Jul 31

Filed under:
,,,,,,,,,


Cezeta is reborn with an EV scooter. BMW unveils new updated Efficient Dynamics engines. Tesla is opening its biggest charging stations yet. Automotive aluminum recycling rates are high.

Continue reading Recharge Wrap-up: Cezeta electric scooter, BMW’s new Efficient Dynamics engines

Recharge Wrap-up: Cezeta electric scooter, BMW’s new Efficient Dynamics engines originally appeared on Autoblog on Sat, 30 Jul 2016 09:06:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

View source

America Uses Stealthy Submarines To Hack Other Countries’ Systems

Jul 31

When the Republican presidential nominee Donald Trump asked Russia — wittingly or otherwise — to launch hack attacks to find Hillary Clinton’s missing emails, it caused a stir of commotion. Russia is allegedly behind DNC’s leaked emails. But The Washington Post is reminding us that U.S.’s efforts in the cyber-security world aren’t much different. (could be paywalled; same article syndicated elsewhere From the report: The U.S. approach to this digital battleground is pretty advanced. For example: Did you know that the military uses its submarines as underwater hacking platforms? In fact, subs represent an important component of America’s cyber strategy. They act defensively to protect themselves and the country from digital attack, but — more interestingly — they also have a role to play in carrying out cyberattacks, according to two U.S. Navy officials at a recent Washington conference. “There is a — an offensive capability that we are, that we prize very highly,” said Rear Adm. Michael Jabaley, the U.S. Navy’s program executive officer for submarines. “And this is where I really can’t talk about much, but suffice to say we have submarines out there on the front lines that are very involved, at the highest technical level, doing exactly the kind of things that you would want them to do.” The so-called “silent service” has a long history of using information technology to gain an edge on America’s rivals. In the 1970s, the U.S. government instructed its submarines to tap undersea communications cables off the Russian coast, recording the messages being relayed back and forth between Soviet forces. (The National Security Agency has continued that tradition, monitoring underwater fiber cables as part of its globe-spanning intelligence-gathering apparatus. In some cases, the government has struck closed-door deals with the cable operators ensuring that U.S. spies can gain secure access to the information traveling over those pipes.) These days, some U.S. subs come equipped with sophisticated antennas that can be used to intercept and manipulate other people’s communications traffic, particularly on weak or unencrypted networks. “We’ve gone where our targets have gone” — that is to say, online, said Stewart Baker, the National Security Agency’s former general counsel, in an interview. “Only the most security-conscious now are completely cut off from the Internet.” Cyberattacks are also much easier to carry out than to defend against, he said.


Share on Google+

Read more of this story at Slashdot.

View source

Famed Security Researcher ‘Mudge’ Creates New Algorithm For Measuring Code Security

Jul 31

Peiter “Mudge” Zatko and his wife, Sarah, a former NSA mathematician, have started a nonprofit in the basement of their home “for testing and scoring the security of software… He says vendors are going to hate it.” Slashdot reader mspohr shares an article from The Intercept:

“Things like address space layout randomization [ASLR] and having a nonexecutable stack and heap and stuff like that, those are all determined by how you compiled [the source code],” says Sarah. “Those are the technologies that are really the equivalent of airbags or anti-lock brakes [in cars]…” The lab’s initial research has found that Microsoft’s Office suite for OS X, for example, is missing fundamental security settings because the company is using a decade-old development environment to build it, despite using a modern and secure one to build its own operating system, Mudge says. Industrial control system software, used in critical infrastructure environments like power plants and water treatment facilities, is also primarily compiled on “ancient compilers” that either don’t have modern protective measures or don’t have them turned on by default…

The process they use to evaluate software allows them to easily compare and contrast similar programs. Looking at three browsers, for example — Chrome, Safari, and Firefox — Chrome came out on top, with Firefox on the bottom. Google’s Chrome developers not only used a modern build environment and enabled all the default security settings they could, Mudge says, they went “above and beyond in making things even more robust.” Firefox, by contrast, “had turned off [ASLR], one of the fundamental safety features in their compilation.”
The nonprofit was funded with $600,000 in funding from DARPA, the Ford Foundation, and Consumers Union, and also looks at the number of external libraries called, the number of branches in a program and the presence of high-complexity algorithms.


Share on Google+

Read more of this story at Slashdot.

View source

Russian Government Gets ‘Hacked Back’, Attacks Possibly Launched By The NSA

Jul 31

An anonymous reader write: Russian government bodies have been hit by a “professional” cyber attack, according to the country’s intelligence service, which said the attack targeted state organizations and defense companies, as well as Russia’s “critically important infrastructures”. The agency told the BBC that the powerful malware “allowed those responsible to switch on cameras and microphones within the computer, take screenshots and track what was being typed by monitoring keyboard strokes.” ABC News reports that the NSA “is likely ‘hacking back’ Russia’s government-linked cyber-espionage teams “to see once and for all if they’re responsible for the massive breach at the Democratic National Committee, according to three former senior intelligence officials… Robert Joyce, chief of the NSA’s shadowy Tailored Access Operations, declined to comment on the DNC hack specifically, but said in general that the NSA has technical capabilities and legal authorities that allow the agency to ‘hack back’ suspected hacking groups, infiltrating their systems to gather intelligence about their operations in the wake of a cyber attack… In some past unrelated cases…NSA hackers have been able to watch from the inside as malicious actors conduct their operations in real time.”


Share on Google+

Read more of this story at Slashdot.

View source

After New GIMP Release, Core Developer Discusses Future of GIMP and GEGL

Jul 31

GIMP 2.9.4 was released earlier this month, featuring “symmetry painting” and the ability to remove holes when selecting a region, as well as improvements to many of its other graphics-editing tools. But today core developer Jehan Pages discussed the vision for GIMP’s future, writing that the Generic Graphics (GEGL) programming library “is a hell of a cool project and I think it could be the future of Free and Open Source image processing”:
I want to imagine a future where most big graphics programs integrate GEGL, where Blender for instance would have GEGL as the new implementation of nodes, with image processing graphs which can be exchanged between programs, where darktable would share buffers with GIMP so that images can be edited in one program and updated in real time in the other, and so on. Well of course the short/mid-term improvements will be non-destructive editing with live preview on high bit depth images, and that’s already awesomely cool right…?

[C]ontributing to Free Software is not just adding any random feature, that’s also about discussing, discovering others’ workflow, comparing, sometimes even compromising or realizing that our ideas are not always perfect. This is part of the process and actually a pretty good mental builder. In any case we will work hard for a better GIMP


Share on Google+

Read more of this story at Slashdot.

View source

Babylon 5 Actor Jerry Doyle Dies

Jul 31

Slashdot reader tiqui writes: Jerry Doyle, best known for playing Security Chief Michael Garibaldi on Babylon 5 has passed away in Las Vegas at only 60 years of age. His B5 character was often paired-up with G’Kar (played by Andreas Katsulas who died in 2006 at age 59) and with Jeffrey Sinclair (played by Michael O’Hare who died in 2012, also at age 60) He seems to have lead an interesting life. Cause of death not yet known.

Slashdot reader The Grim Reefer quotes the BBC:
Fellow Babylon 5 actor Bruce Boxleitner tweeted that he was “so devastated at the news of the untimely death of my good friend”, while astronaut Scott Kelly said the news was “very sad to hear”.


Share on Google+

Read more of this story at Slashdot.

View source