Two researchers from the University of California at Davis Hao Chen and Lian Cai found a way to determine, which keys have been pressed on the screen’s keypad of OC Android by measuring the shift of vibration and wobbliness of the device that were measured by the built-in accelerometer. This is important, because the data from the accelerometers were not considered as a potential vector of attack, and thus freely available to any application on any Smartphone or pad.
Eavesdropping of keylogging on a desktop or laptop computer with Windows or Mac is incredibly simple: install the appropriate program (or Trojan virus it will do for you), set up where it should be saved or sent the stolen key’s codes, and that is all! When it comes to Smartphones, however, the complex systems of access restrictions make this approach almost impossible unless the side-channels will be used. Strictly speaking, a side-channel is open source of information, which helps the attacker to crack the cryptographic system. In a broader sense, a side-channel may be a light indicator on the router that blinks during the data being transferred, or the keylogging’ sounds of a keypad. [Note: here were mention the real variety of attacks] In other words, the side-channels are characteristics of the system, which potential danger is overlooked.
This is not a joke, the developers of the service Google Analytics added a new tool to track the traffic of any resource in real-time mode. A new tool has its own name that is Google Analytics Real-Time. The service is available only in the new version of the interface, so if you still use the old one, then change the habits. Of course, if you want to track in the real- time mode.
The developers believe that Google Analytics Real-Time will help the webmasters to track the popularity of various materials on the resources. Previously, the traffic tracking was also possible in the real-time mode, but for that purpose were used the third-party tools and services, for example: whos.amung.us.
Everyone has a history. A person changes over time, changes appearance, character, remained unchanged only the name. This year, Adobe celebrates its 25th anniversary. A quarter of century is a considerable age even for a man, and for a company that deals with the computer technologies is simply a great age, few companies can boast about such history.
Let us look back and see how Adobe has been developed over the time and its most famous product - Photoshop. Let us trace the transformation of the logo and loading screen.
The company logo was changed three times.
Vanrok Marwa drew this version; she is the wife of Vanrok John, who is the founder of Adobe.
The last four years I have lived and worked as a programmer in the United States in the Silicon Valley. During this time I have collected some observations that I'd like to share. I will focus on the infrastructure issues, such as the transport, internet, roads, crime, water, entertainment, and etc. I will tell only about my own experience. I hope this article will be interesting for the specialists that are thinking about working in the Silicon Valley.
Roads and automobile transportation
First thing I noticed when I came to the valley, it is excellent quality of the roads. The highway usually has four lanes in the each direction. The outer left lane can be used when more than one person is the car. The speed limit is usually 105 km / h., and it is controlled by the police forces that pull over the people, who drive over the limit. I have to say that they do not pull over for 120 km / h., but for 130 km / h., they may write a ticket. These two statements are verified by my own experience.
Each of us complained about the forecasters, when finds to be in the rain without an umbrella. In this article, we will tell you how to make a forecast based on the model WRF (Weather Research & Forecasting Model) for the several days in advance.
A few words about WRF
WRF is a numerical weather prediction model, which is suitable to predict the condition of the atmosphere, as well for research. It has been developed by the community of scientific organizations the United States, including the National Center for Atmospheric and Ocean, the National Center for Atmospheric Research.
It is a system of modules: the preparation module of initial and interfacial data (WRF Preprocessing System), it is the actual determinant core (Advanced Research WRF), the post-processing module (WRF Postprocessing System).
Most part of the model is implemented in the language fortran, which is using the library MPI. Modules are written on C for working with data. The model is available in the source codes.
Naturally, the model consumes an enormous amount of CPU time, and it is designed to run on supercomputers, since the weather forecast is one of the toughest tasks.
Every day new standards of CSS3 and HTML5 enter more deeply into the life of web designers and web developers, and the browsers are becoming more compatible with these standards.
In connection with this event we would like to present you a selection of 10 buttons of CSS3 that will make your life easier during the layout and creation of the web applications.
PREDICTION: Apple to release iPhone 5 on October 4 and start shipping by the end of October.
Apple reportedly plans to release the golden master of iOS 5, its forthcoming operating system update for the iPhone, iPad and iPod touch, to its overseas assemblers at some point between September 23 and September 30, on time for a mid-October launch of a fifth-generation iPhone.
Analyst Ming-Chi Kuo revealed to AppleInsider on Monday that the new iPhone and iPod touch went into mass production in late August, and assemblers are currently scheduled to receive the golden master of iOS 5 the week of September 30. Typically, a golden master version of software is identical to the code that eventually becomes the final release to the public.
If you remember, Marty McFly worn Nike Mags in Back to the Future II. What could be better than auto lacing shoes? Nike thought so as well and patented these precious ideas. Now comes year 2011 and Nike finally releases Nike Mag.
But sadly commercial says that we'll see a real tech only in 2015, but for now you can buy a pair of Nike Mags with blinking lights which last for 4 hours on one charge. Availability of 1500 pairs auctioned on eBay and donated to the Michael J. Fox. One pair can go as high as $3000-$35000.
Clickjacking is the mechanism that misleads users when they follow a link to any site; it redirects the user to a malicious webpage. Clickjacking has become very effective. It is often used to spread through the Facebook links to the malicious websites. Recently, these techniques proved their effectiveness to breach the anonymity of website’s visitors. Also, following a sly link may lead to an attacker that will gain an access to the OAuth data. Let us see how it happens.
Classic application of clickjacking - spreading links through the Facebook
The attacker hides the “Like” or “Share” buttons in a transparent iframe in the classic scenario of clickjacking. This iframe is located above the element of page, which should be clicked by the user; also iframe can follow the mouse cursor. When we click on the element it is redirected to the invisible “Like” or “Share” buttons. Such operations are not limited to the Facebook, the attacker only needs to hide the elements of another website in the iframe.
Below is shown a typical message that can be seen in the net of Facebook, if one of our connections were intercepted by clickjacking:
2147483647 (231-1), Mersenne prime is the maximum possible value for 32-bit integer that is the largest integer that can be written in 32 bits.
What does this have to do with the phone numbers? Ironically, it has the most direct relation. It turns out that a significant number of American programmers are developing the systems in order to optimize it, where numbers are stored on the server in the form of 32-bit integers. Thus, the maximum possible number is equal to (214) 748-3647 in the United States, where 214 is a code of Dallas. When we enter into the database greater value then it is stored the maximum possible number of 2147483647.
If we conduct a search on the Internet, we can find hundreds of the phone books from all over America, which refer to the same number in Dallas. We can only sympathize to the owner of this phone number.
How could not the project’s clients to notice the mistake on the part of developers? Probably many of them did the business in the region, where the code is less than 214, so that the other phone numbers just did not get into the database. Maybe the developers convinced someone that this is the best way to optimize: in such form the numbers take up less space than when are stored in the form of individual characters. In fact many are obsessed with the optimization. The lessons of Y2K did not go well for all; moreover, a new generation of programmers grew up who do not remember Y2K at all.