Blog Archive
-
▼
2013
(295)
-
▼
January
(26)
- Aaron Swartz case prompts letter to US attorney ge...
- Fractal Design Announces Arc Midi R2 Computer Case
- How to build a bionic man | Corrinne Burns
- Prenda's Latest Trick: Pretend There Are NO Defend...
- Inhabitat's Week in Green: asteroid mining, a Lego...
- Misogyny stinks, but we need to say more than 'Thi...
- Review: MediaTools Wipe 1.1 erases data on up to 1...
- Review: The Iomega StorCenter px2-300d NAS Drive I...
- UK trials updated 1950s naval tech, avoids GPS jam...
- How to convert text documents into audio files
- Boot up: Mega's encryption, Jobs's thief jailed, o...
- VW AllTrack: car review
- 7 Years in Prison for the Guy Who Raided Steve Job...
- FCC Challenge: 1Gb Internet Service in Every State...
- Kim Dotcom: the internet cult hero spoiling for a ...
- Hewlett-Packard blames Autonomy 'improprieties' fo...
- How to Roast a Turkey
- Windows President Steven Sinofsky Leaves Microsoft
- Will The Next Secretary Of State Support Internet ...
- Review: Asus Xonar Essence One USB DAC and Headpho...
- Hilary Boyd and the rise of 'gran-lit'
- HMV's woes do not signal the end for record shops
- Super Talent Announces High Speed mSATA 3 SSD for ...
- Prosecutor's husband criticises Swartz's family
- The Filabot will revolutionise the home 3D-printin...
- Sony Patent Application Takes On Used Game Sales, ...
-
▼
January
(26)
About Me
Tuesday, January 22, 2013
Boot up: Mega's encryption, Jobs's thief jailed, open data catalogued, HTC's M7?, and more
In addition, the man behind the voice of Stephen Hawking, the failure of the United States of Atari, the guy goes to the event LookRobot girl playing Nintendo, and more
a quick burst of 9 links for you to chew, as selected by the team of technology LawMoore
not kill passwords Touchpaper >> Light Blue
Joseph Bonneau, University of Cambridge Computer Security Research Lab
In my thesis 20 years traced steal passwords and improvements have seen an increase of nearly 1,000 the number of attempts per second per unit cost that could be achieved, almost exactly a Moore law style doubles every two years. The good news though is that passwords can (and should) co-evolve to obtain proportionately more expensive to evaluate in time. This is a classic race and arms at the same rate simply requires steadily increasing the number of iterations in a hash. We can improve even against password cracking over time using memory functions consolidated memory speeds are not growing as quickly and are more difficult parallellise. The Scrypt () key derivation function is a good implementation of a hash of the password-related memory and all high security applications should be using or something similar.
Intel application engineer Travis BonifieldStephen Hawking New
PC >> Intel Free Press
worked closely with Hawking to communicate with the world in a decade. He traveled from the U.S. to England a few years to personally deliver Hawking a customized PC. Here, he talks about the unique project Bonifield technology that powers the customized system and how Intel co-founder Gordon Moore is Hawking to switch from AMD Intel. Speech
Hawking was absolutely Intel-powered for centuries, but it is always fascinating to read how. (Thanks @ mrbeardy for the link.)
Jobsthief home to seven years in prison >> Macworld UK
The man who broke into the home of Palo Alto, California, in late Apple CEO Steve Jobs and stole laptops, iPads and other goods was sentenced to seven years California State Prison.
Kariem McFarlin, 35, was arrested in August last year by agents Allied Computer Team Rapid Run, a Silicon Valley crimes unit composed of high-tech local, state and federal .McFarlin
REACT officers found safety with Apple, which followed in the stolen computers were used by matching serial numbers with connections to the servers of Apple iTunes. The IP address is in use is a line in the apartment in the vicinity of Alameda McFarlin was also used by an Apple device registered to a family member, according to a police report.
is the new site of Kim Dotcom, MEGA, actually safer than MegaUpload? Daily Dot >>
New MEGAcan provide better Internet hackers port -. As long as you're careful
MEGA
, the new service local file created in the wake of formwork and the continued pursuit of Megaupload, differs from its predecessor in a significant way (besides the fact that it is currently a huge multinational trial). Users can encrypt your files
Although nothing will change for those who use the site to promote a broader piracy, people who just want to share with your friends pirated material is unlikely to be captured. It is not clear. Those who register for the service, which was released on Saturday, are welcomed with service conditions that make it seem that you are likely to get into trouble if you download pirated content.
gatecrashing wife Nintendo gamer cases for a Gizmodo UK Type >>
- Grant Howitt:
There are a couple kissing on the balcony. In a game activity
do not understand what to do with someone in a play activity is so massively strange. This may be seen as a violation very involved and male homosocial space carefully cultivated. Perhaps this is because, as the race, most games journos tend to give the impression that they are at least two cups of coffee behind everyone in the room. Perhaps both.
thing Howitt wrote Panasonic Toughbooks. Beautiful nails.
Find best price for : --Guardian----Atari----East----Toughbook----McFarlin----Apple----Hawking----Bonifield----Travis----Intel----Croydon--
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment