Tuesday, June 24, 2008

Phoenix Mars Lander’s mission site hacked



With the world’s eyes on the latest multimedia streaming straight from Mars, during the weekend the Phoenix Mars Mission’s site got hit twice, first by an Ukrainian web site defacer who posted a message at the site’s blog, and hours later, the Turkish “sql loverz crew 2008″ redirected the official mission’s site, as well as the Lunar and Planetary Laboratory site to a third-part location serving the defaced page. The Phoenix Mars Lander mission’s security staff are aware of the issue, and seem to have fixed it already, right before making an announcement - Hacker changes Phoenix Mars Lander Web site

A spokeswoman for the Phoenix Mars Lander mission says a hacker took over the mission’s public Web site during the night and changed its lead news story. Spokeswoman Sara Hammond says a mission update posted Friday was replaced with a hacker’s signature and a link redirecting visitors to an overseas Web site. Hammond says the site hosted by the University of Arizona has been taken off line while computer experts work to correct the problem.

Meet the latest group of script kiddies empowered by publicly obtainable remote SQL injection scanners, that each and every site that’s been affected in the past could have downloaded, and self-audited itself. The perspective that if you don’t take care of your site’s web application vulnerabilities, someone else would, fully applies here. No malware, or false information was distributed despite that the defacer linked to what looks like his homepage and therefore could have embedded malicious links or directly pointed the surfer to them.

And while this doesn’t seem to be what them wanted to achieve, in three of the most recent web site defacement incidents, we have defacers fully abusing the access they have. Last month for instance, Russian nuclear power websites were attacked and nuclear accident rumors spread using them, the Pro-Serbian hacktivists attacking Albanian web sites to spread propaganda messages, as well as a fake rumor for upcoming earthquake spread on the site of a Chinese seismological bureau.


Source

Monday, June 23, 2008

Super Antennas, Made From 'Invisible' Stuff

block_neg

Metamaterials might be used to create a real-life invisibility cloak, or even a cloak of silence -- some day. The Pentagon is seeking short-term gains by using metamaterials for revolutionary new antennas with obvious commercial spin-offs.

In fact, this is back where metamaterials started, when Prof. Sir John Pendry found that bundles of carbon fiber did not reflect radar in the usual way. Metamaterials gain their special properties because of the way they are structured, rather than their composition. This entails having a structure on the same scale as the wavelengths involved, so a metamaterial to influence light is going to require nano-technology, whereas radio waves and microwaves work on a scale of centimeters so metamaterials to influence them are far more practical in the short term.

Which is why the Air Force has put out a call for "Applied Metamaterials for Antennas." The goal is to demonstrate materials could improve antennas by:

" Beam shaping and steering / lobe control; enhanced center frequency tuning range; enhanced bandwidth; reduction in antenna size/weight/thickness; and enablers for conformal, flexible antenna designs. The overall technical objective of this research is to develop improved metamaterials with low electrical losses and simultaneous control over permittivity and permeability in the 20MHz to 10GHz frequency range. "

What does that mean, in English? Better antennas which give an improved performance for the same size. In particular, this is about conformal antennas which are integrated into a surface -- rather than sticking out from it. These are useful for aircraft and UAVs; metamaterial antennas could provide 'em with better radar and communications.

There is plenty of commercial potential for this technology, too. A metamaterial antenna does not just mean improved radio reception from a smaller aerial. It also means mobile phones which can work from a fainter signal and which less power. The same goes for Wi-Fi, Bluetooth and other wireless devices.The future urban landscape might benefit when all TV aerials, satellite dishes and mobile phone masts are replaced with conformal antennas.

The Air Force's call for proposals on metamaterial development is for a three-year program which will also investigate optical metamaterials. No invisibility cloaks, alas. But they are considering "optical / IR beam steering, compact optical systems, mirrors, optical circuitry, interconnects, filters and limiter applications."

This kind of technology could lead to a drastic increase in the amount of data you can fit optical media like DVDs ; a flat metamaterial 'lens' can beat the diffraction limit which restricts the ultimate magnifying power of telescopes and other optical devices.

This is a fast-moving field and nobody knows how much further it will advance in the next three years. But the results will certainly be worth watching.

JAPAN_INVISIBLE_COAT_TOK101_wideweb__470x318,0

Source

Sunday, June 22, 2008

Virus writers charged with copyright violation

Japan has arrested its first suspected virus writers, but in a strange twist the three suspected creators and distributors of a strain of P2P malware have been charged with copyright violation, in an arrest that recalls Al Capone's prosecution for tax evasion.

The trio were cuffed by cops in Kyoto on suspicion of involvement in a plot to infect users of the Winny P2P file-sharing network with a Trojan horse that displayed images of popular animé characters while wiping MP3 and movie files. The malware, called Harada is Japanese reports, is reckoned to be related to the Pirlames Trojan horse (http://www.sophos.com/pressoffice/news/articles/2007/02/pirlames.html) intercepting by net security firm Sophos in Japan last year.

According to local reports, the three men have confessed to their roles in unleashing the malware. One is said to have created the malware, while the other duo are reckoned to have offered the malware up to prospective marks on Winny. A lack of relevant computer crime law in Japan means that the group have been charged with copyright offences.

"It isn't illegal to write viruses in Japan, so the author of the Trojan horse has been arrested for breaching copyright because he used cartoon graphics without permission in his malware," explained Graham Cluley, senior technology consultant for Sophos. "Because this is the first arrest in Japan of a virus writer, it's likely to generate a lot of attention and there may be calls for cybercrime laws to be made tighter."

Due to the lack of applicable cybercrime laws, the authors of the malware face much the same fate as the coder who developed Winny. Isamu Kaneko, Winny's author, was fined by a Japanese court in December 2006 for copyright offences. ®


Source

Arduino




Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments.

Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) and the Arduino development environment (based on Processing). Arduino projects can be stand-alone or they can communicate with software on running on a computer (e.g. Flash, Processing, MaxMSP).

The boards can be assembled by hand or purchased preassembled; the software can be downloaded for free. The hardware reference designs (CAD files) are available under an open-source license, you are free to adapt them to your needs.

Arduino received an Honory Mention in the Digital Communities section of the 2006 Ars Electronica Prix. Credits




Source

Friday, March 28, 2008

Double jeopardy ..

In India, protection against double jeopardy is a Fundamental Right guaranteed under Article 20 of the Constitution of India. Accordingly no person can be prosecuted and punished for the same offence more than once. Right to Freedom in the Constitution of India. The provision enshrines the principle that a person cannot be tried twice for the same offense by any equally competent court. Thus a person cannot be tried for an offense for which he has been tried and convicted. Double Jeopardy involves the concept of Autrefois Acquit or Autrfois Convict. Autrfois acquit means again acquit and autrefois convict means again convict. The Constitution of India under article 20(3) only provides for autrefois convict. Thus in India if a person is acquitted once he can be tried twice. But if a person is prosecuted and punished then he can't be prosecuted again.