Sunday, December 16, 2012

Your Daily digest for Tech Geek`s Tools, Tips, Tricks and Tutorials

Tech Geek`s Tools, Tips, Tricks and Tutorials
Pipes Output
Huge Security Hole In Recent Samsung Devices
Dec 16th 2012, 23:27

An anonymous reader writes "A huge security hole has been discovered in recent Samsung devices including phones like the Galaxy S2 and S3. It is possible for every user to obtain root due to a custom faulty memory device created by Samsung." The problem affects phones with the Exynos System-on-Chip.

Share on Google+

Read more of this story at Slashdot.

When Writing, How Anonymous Can You Be, Really?
Dec 16th 2012, 22:33

An anonymous reader writes "Do you still think your online writing is, basically, anonymous? Think again! Research has it people put much of their personal traits into their writing, and computers may just be able to pick them up. That's at least what a recently announced competition on author identification (Given a document, who wrote it?) and author profiling (Given a document, what are its author's age and gender?) wants to find out. Alas, re-using other people's writing is no solution either; there's also a competition on plagiarism detection (Given a document, is it an original?). Wanna revisit your recent rants?"

Share on Google+

Read more of this story at Slashdot.

AMD Radeon Performance Preview On Linux 3.8
Dec 16th 2012, 21:35

skade88 writes "If you are like me, the proud owner of a Radeon card, and feeling left out of the Linux graphics driver revolution that swept Nvidia cards recently, then stay tuned — there might be hope for us seeing better graphics performance in the Linux 3.8 kernel."

Share on Google+

Read more of this story at Slashdot.

WW2 Pigeon Code Decrypted By Canadian?
Dec 16th 2012, 20:24

Albanach writes "At the start of November Slashdot reported the discovery of a code, thought to be from the Second World War, found attached to the leg of a pigeon skeleton located in an English chimney. Now a Canadian by the name of Gord Young claims to have deciphered the message in less than 20 minutes. He believes that the message is comprised mostly of acronyms."

Share on Google+

Read more of this story at Slashdot.

Views of the Asteroid Toutatis, From Earth As Well As Close-Up
Dec 16th 2012, 19:26

When Chinese probe Chang'e buzzed the asteroid Toutatis, it wasn't the only one watching. NASA's observatory in Goldstone, CA was taking radar images, which have now been assembled into a short (40-second) animation. The craft was recording the encounter, too, as reported by Sky & Telescope, which also gives a good summary of the history behind Chang'e's mission.

Share on Google+

Read more of this story at Slashdot.

Ask Slashdot: How To Collect Payments From a Multinational Company?
Dec 16th 2012, 18:07

An anonymous reader writes "I run a small dev shop focused on web development, based in Europe. For the past 6 years we've had lots of successful projects with clients from CEE, Western Europe and the US. One of our main clients was based in the US. We started working for them in 2008, while they were a 'promising start-up' and everything went smoothly until they were bought by a multinational corp. We couldn't be happier to work for such a big player in the market, we even managed to get by with huge payment delays (3-4 months on a monthly based contract), but now, after more than 2 years working for them I have the feeling we're getting left out, we got 6 months old unpaid invoices and we're getting bounced between the EU and US departments every time we try to talk to them. What can a small company do to fight a big corp that's NASDAQ listed and has an army of lawyers? They've been getting a lot of bad press lately so I don't think that will scare them either..."

Share on Google+

Read more of this story at Slashdot.

Google Map App's Version of Anonymity Might Violate EU Privacy Laws
Dec 16th 2012, 16:47

Ars Technica reports that Google's map application for iOS, however popular it might be with users, raises red flags with European regulators, who maintain that it by default does not sufficiently safeguard user privacy as required by EU privacy rules. Ars quotes Marit Hansen of Germany's Independent Centre for Privacy Protection on why: "Hansen's main gripe is that Google's use of 'anonymous' is misleading. 'All available information points to having linkable identifiers per user," she told Computerworld. Hansen added this would allow Google to track several location entries, thus leading to her assumption that Google's 'anonymous location data' would be considered 'personal data' under the European law."

Share on Google+

Read more of this story at Slashdot.

Google+ Chief Grounded From Twitter By Larry Page
Dec 16th 2012, 15:31

theodp writes "Vic Gundotra, formerly Sr. VP of Social (and now, of Engineering) at Google, and head of the company's social networking service Google+, hasn't posted anything on his Twitter account since July 2011. Why? Responding to a question about his own social networking behavior at SMX 2012, Gundotra explained that he was asked by Google CEO Larry Page not to tweet anymore. 'I was asked not to tweet again.' Gundotra said (video). 'I was asked not to do that by my boss [Page]. I tweeted a tweet about two companies [Microsoft, Nokia] that went viral, went very very viral and made a lot of headline news.' So, what does it say when the Google CEO who reportedly tied all Googlers' bonuses to social networking apparently finds it too dangerous to permit the head of Google+ to participate in social networking?"

Share on Google+

Read more of this story at Slashdot.

Is the Flickr API a National Treasure?
Dec 16th 2012, 14:20

First time accepted submitter somekind writes "Over the past few months Twitter imposed restrictions on the use of its client API, and Facebook shut down the facial recognition API supporting face.com after acquiring the company. Mathew Ingram noted these and other examples (Google starting to charge for high-volume use of Google Maps) as evidence that 'open APIs' published by a single vendor can't be trusted by outside developers. Worried about the possibility that Yahoo! might do the same with Flickr, Dave Winer has just launched a petition to Obama asking the President to declare the Flickr API a National Historic Landmark, thus (by Dave's reckoning) legally protected from arbitrary withdrawal or wholesale changes by its corporate masters."

Share on Google+

Read more of this story at Slashdot.

Researchers Develop an Internet Truth Machine
Dec 16th 2012, 13:25

Hugh Pickens writes "Will Oremus writes that when something momentous is unfolding—the Arab Spring, Hurricane Sandy, Friday's horrific elementary school shooting in Connecticut—Twitter is the world's fastest, most comprehensive, and least reliable source of breaking news and in ongoing events like natural disasters, the results of Twitter misinformation can be potentially deadly. During Sandy, for instance, some tweets helped emergency responders figure out where to direct resources. Others provoked needless panic, such as one claiming that the Coney Island hospital was on fire, and a few were downright dangerous, such as the one claiming that people should stop using 911 because the lines were jammed. Now a research team at Yahoo has analyzed tweets from Chile's 2010 earthquake and looked at the potential of machine-learning algorithms to automatically assess the credibility of information tweeted during a disaster. A machine-learning classifier developed by the researchers uses 16 features to assess the credibility of newsworthy tweets and identified the features that make information more credible: credible tweets tend to be longer and include URLs; credible tweeters have higher follower counts; credible tweets are negative rather than positive in tone; and credible tweets do not include question marks, exclamation marks, or first- or third-person pronouns. Researchers at India's Institute of Information Technology also found that credible tweets are less likely to contain swear words (PDF) and significantly more likely to contain frowny emoticons than smiley faces. The bottom line is that an algorithm has the potential to work much faster than a human, and as it improves, it could evolve into an invaluable 'first opinion' for flagging news items on Twitter that might not be true writes Oremus. 'Even that wouldn't fully prevent Twitter lies from spreading or misleading people. But it might at least make their purveyors a little less comfortable and a little less smug.'"

Share on Google+

Read more of this story at Slashdot.

Analysis of Dexter Malware Uncovers Mystery Man, and Links To Zeus
Dec 16th 2012, 11:22

chicksdaddy writes "The newly discovered Dexter malware is one of the few examples of a malicious program that targets point of sale terminals, but also communicates, botnet-like, with a command and control infrastructure. According to an analysis by Seculert, the custom malware has infected 'hundreds POS systems' including those operated by 'big-name retailers, hotels, restaurants and even private parking providers.' Now a detailed analysis by Verizon's RISK team suggests that Dexter may be a Lcreation of a group responsible for the ubiquitous Zeus banking Trojan. By analyzing early variants of Dexter discovered in the wild, Verizon determined that the IP addresses used for Dexter's command and control were also used to host Zeus related domains and several domains for Vobfus, also known as 'the porn worm,' which has been used to deliver the Zeus malware. Verizon also produced some tantalizing clues as to the identity of one individual who may be a part of the crew responsible for the malware. The RISK team linked the domain registration for a Dexter C&C server to an unusual online handle, 'hgfrfv,' that was used to post a number of suggestive help requests ('need help with decrypting a table encrypted with EncryptByKey') in online technical forums, where a live.com e-mail address was also provided. The account name was also linked to a shell account on the outsourcing web site freelancer.com, which lists 'hgfrfv' as an individual residing in the Russian Federation."

Share on Google+

Read more of this story at Slashdot.

China's ZTE and Huawei Join the German Patent Fray
Dec 16th 2012, 08:50

An anonymous reader writes "Germany has pretty much become the new Eastern District of Texas, the world's most popular patent battleground. After Apple, Samsung and Motorola, the Chinese are now going to Germany as well to sort out their domestic patent squabbles. Huawei and ZTE, arguably the People's Republic's leading wireless tech companies, started suing each other in April last year. On Friday the Mannheim Regional Court held a Huawei vs. ZTE hearing, reports a local patent watcher. Huawei says ZTE infringes a 4G/LTE handover patent and wants its rival's base stations and USB modem sticks banned in Germany. More clashes between the two are coming up in the same court and in other places in Europe, including France."

Share on Google+

Read more of this story at Slashdot.

Solar Impulse Announces Flight Across America For 2013
Dec 16th 2012, 06:02

cylonlover writes "Flush with success from their 6,000-km (3,728-mile) Europe-to-Africa round-trip flight earlier this year, the duo behind the Solar Impulse solar-powered aircraft are now planning on flying it across America next spring. It will mark the first time that a solar-powered plane has traversed the country. Solar Impulse partners Bertrand Piccard and André Borschberg made the official announcement this Tuesday, although the logistics of the flight have yet to be finalized. They have stated that the trip will be broken into 20-hour legs, starting at San Francisco and proceeding to New York City. As with their previous multi-leg flights, the two pilots will take turns flying the aircraft." You can read about it straight from the doers, too.

Share on Google+

Read more of this story at Slashdot.

Ask Slashdot: What To Tell Non-Tech Savvy Family About Malware?
Dec 16th 2012, 03:03

First time accepted submitter veganboyjosh writes "I got an instant message from an uncle the other day, asking me what was in the link I sent him. I hadn't sent him a link so I figured that his account had been hacked and he'd received a malicious link from some bot address with my name in the 'From' box. This was confirmed when he told me the address the link had come from. When I tried explaining what the link was, that his account had been hacked, and that he should change the password to his @aol.com email account, his response was 'No, I think your account was hacked, since the email came from you.' I went over it again, with a real-life analog of someone calling him on the phone and pretending to be me, but I'm not sure if that sunk in or not. This uncle is far from tech savvy. He's in his 60s, and uses Facebook several times a week. He knows I'm online much more and kind of know my way around. After his initial response, I didn't have it in me to get into the whole 'Never click a link from an unfamiliar email address' bit; to him, this wasn't an unfamiliar email address, it was mine. How do I explain this to him, and what else should I feel responsible for telling him?"

Share on Google+

Read more of this story at Slashdot.

Music Industry Suits Could Bankrupt Pirate Party Members
Dec 16th 2012, 00:32

An anonymous reader writes "Music industry group BPI has threatened legal action against six members of the UK Pirate Party, after the party refused to take its Pirate Bay proxy offline. BPI seems to want to hold the individual members of the party responsible for copyright infringements that may occurs via the proxy, which puts them at risk of personal bankruptcy. Pirate Party leader Loz Kaye criticized the latest music industry threats and reiterated that blocking The Pirate Bay is a disproportionate measure."

Share on Google+

Read more of this story at Slashdot.

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions