Follow by Email

Tuesday, September 1, 2015

Linux Kernal 4.2 Released

The Linux 4.2 kernel is now available. This kernel is one of the biggest kernel releases in recent times and introduces rewrites of some of the kernel's Intel Assembly x86 code, new ARM board support, Jitter RNG improvements, queue spinlocks, the new AMDGPU kernel driver, NCQ TRIM handling, F2FS per-file encryption, and many other changes to benefit most Linux users.


Sunday, August 30, 2015

Redefining the connectivty without data plan

I say a good amount of people will turn towards this old-fashioned way to connect to the internet using this method. Only this time it will be over cellular 2G networks rather than the use of dial-up, hard copper, twisted wires and all the troubles we had to go through.

This one-of-a-kind company, Pangea Communications from New York, says that this is the solution to the lack of data packages for people in areas such as Africa. The process is to transform the fundamental data into an inflected sound wave and then send the audio down existing 2G platforms and similar mobile devices. Any sort of mobile unit would get the job done. That is because the audio is transformed straight back into automated data once it is received by the cellular hardware, and then that information is loaded. Furthermore, the concept is that individuals in less developed nations and places without 3G can quickly post to Facebook, check out a Twitter trend, utilize Wikipedia and so on and so forth. In fact, any straight forward data necessitating text function can utilize this method of tonal data exchange via sound without 3G.
The company’s setup works by converting an inquiry for data, something like a website, into a sound wave. It is then sent at sixty-four kbps over the voice channel. Pangea rebuilds that request inside its cloud and yields the content to the channel-able device. There it is converted again into electronic pulses of ones and zeros and displayed as content in a browser. Also, it can be used for email and possibly eventually for a full OS experience, albeit a slow experience.
“Around four billion people globally do not have accessibility to an internet connection. That is more than half of the global populace, says Vlad Iuhas, founder of Pangea, while delivering a speech at an event in New York. “And while some developing areas are beginning to see better 3G net penetration, Africa is not! Africa has eight percent 3G exposure rate.”

Iuhas believes that developing out additional 3G data coverage is not the sole solution to the connectivity downside. Increasing 3G solutions are not going to solve the problems of the cost of online access in the establishing countries. An internet package can price a lot more than twenty percent of an averages person’s salary in a few African cities where 3G is obtainable. Data sites are also expensive and take a lengthy time to build. Consequently, 3G availability in Africa has not changed much in the last couple of years. This solution can be catered entirely, and according to their approach a mobile network company in Nigeria plans on working with them.

Pangea’s service model is unique. Iuhas does not think that low income among Pangea’s targeted sector is a problem. If one thinks about it, there are more than a billion people to sell this to. Interestingly, one opportunity that the company is discovering is to let mobile network operators supply the service to users much like a coordinator for the 3G network. However, one of the problems that cellular networks operators have in developing nations is that people do not comprehend why do they need to buy internet packages. They just do not see any use for it because of that sensed absence of value. So the founder of the organization wants the mobile network operators to offer Pangea’s service to regular mobile voice users to get them to discover the value of the internet. Eventually, this will help create a means for profits producing 3G subscribers.
Living in 2015 makes it hard to believe that the internet can still be used via the old school way, and yet there are billions of people who do not know what the Internet even is.

Saturday, August 29, 2015

Does Indian people also more vulnerable to attack ??

President Obama unveiled a number of proposals to crack down on hackers. It’s great that the government is working on this but we need to do a better job of protecting ourselves.

Another interesting fact is most of the common and default password among US is password123.
Watch out the social engineering .

Evade late OTP's pay with your heatbeat insted

Yet another biometric: your heartbeat.

Android Lock Patterns predictability

Interesting:
Marte L√łge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her master's thesis. She found that a large percentage of them­ -- 44 percent­ -- started in the top left-most node of the screen. A full 77 percent of them started in one of the four corners. The average number of nodes was about five, meaning there were fewer than 9,000 possible pattern combinations. A significant percentage of patterns had just four nodes, shrinking the pool of available combinations to 1,624. More often than not, patterns moved from left to right and top to bottom, another factor that makes guessing easier.

Essentials of End Point Encryption

An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls.

Tuesday, August 25, 2015

MIT's New File System Won't Lose Data During Crashes

MIT researchers will soon present a file system they say is mathematically guaranteed not to lose data during a crash. While building it, they wrote and rewrote the file system over and over, finding that the majority of their development time was spent defining the system components and the relationships between them. "With all these logics and proofs, there are so many ways to write them down, and each one of them has subtle implications down the line that we didn’t really understand." The file system is slow compared to other modern examples, but the researchers say their formal verification can also work with faster designs. Associate professor Nickolai Zeldovich said, "Making sure that the file system can recover from a crash at any point is tricky because there are so many different places that you could crash. You literally have to consider every instruction or every disk operation and think, ‘Well, what if I crash now? What now? What now?’ And so empirically, people have found lots of bugs in file systems that have to do with crash recovery, and they keep finding them, even in very well tested file systems, because it’s just so hard to do.