body~politic

Saturday, November 21, 2015

Cyber plants: Scientists create analogue, digital electronic circuits inside living flowers - ABC News (Australian Broadcasting Corporation)

Cyber plants: Scientists create analogue, digital electronic circuits inside living flowers - ABC News (Australian Broadcasting Corporation)



Scientists have created the world's first electronically augmented plant, building analogue and digital circuits inside living flowers using semi-conductive polymers.
The team of researchers at Linkoping University in Sweden added the polymers to water, which were dissolved and absorbed through a rose's natural vascular system where they formed electrical components that resembled wires.
The wires were able to spread evenly through the plant, forming conductive structures up to 10 centimetres long without restricting its ability to carry water and nutrients.
Everything occurs naturally, and we use the plants' own very advanced, unique systems.
Professor Magnus Berggren
From there scientists were able to create simple transistors, switching the current through the wires on and off, and also used vacuum infiltration to send another polymer into the rose leaf, creating a basic display with pixels partitioned by veins.
The rudimentary display allowed the research group, under the leadership of Professor Magnus Berggren, to change the colour of the leaf to different shades of green.
"Now we can really start talking about 'power plants' — we can place sensors in plants and use the energy formed in the chlorophyll, produce green antennas or produce new materials," Professor Berggren said.
"Everything occurs naturally, and we use the plants' own very advanced, unique systems.
"As far as we know, there are no previously published research results regarding electronics produced in plants. No one's done this before."
The research, published in Science Advances, "paves the way for new technologies and tools based on the amalgamation of organic electronics and plants in general", the report read.
"Distributed conducting wires and electrodes along the stems and roots and in the leaves are preludes to electrochemical fuel cells, charge transport, and storage systems that convert sugar produced from photosynthesis into electricity, in vivo."
ABC

Nice Try, Quantico, But That's Not How Hacking Works | WIRED

Nice Try, Quantico, But That's Not How Hacking Works | WIRED



Email Scrubbing

One of the slightly more accurate plot lines in Quantico is actually a dramatic detail—that an FBI agent is trying to scrub his email to remove incriminating details of an affair. But the show doesn’t seem to understand that simply deleting an email doesn’t mean it’s unrecoverable.

Why IT and Operations are on a collision course | Computerworld

Why IT and Operations are on a collision course | Computerworld



Long autonomous, IT and operations are now forced to work together, spurred by increasingly complex digital devices that pose fearsome cybersecurity threats.


What would you do if you found out some of the software running your company was behind schedule on dozens of patches and updates — including critical security patches that were several years out of date? You might think that could never happen. You'd be wrong.






Thursday, November 19, 2015

Ask HN: What's the best programming language to learn for security? | Hacker News

Ask HN: What's the best programming language to learn for security? | Hacker News



I love a question with a simple right answer:

(Ruby OR Python) AND C.
You can skip C if you don't want to do low-level work (embedded, kernels, writing shellcode for memory corruption exploits). Only a small fraction of security people do this kind of work. You cannot skip (Ruby OR Python), even if you don't ever plan to do web work (which is a dumb plan anyways).


professional education - Programming language for network security - Information Security Stack Exchange

professional education - Programming language for network security - Information Security Stack Exchange



As for your intent to persue a CISSP or CEH...I hold both and can't code my way out of a paper bag. 




Microsoft gets Edge on blocking ad injectors • The Register

IEEE Xplore Abstract - A simple speed estimation algorithm for mobility-aware SON RRM strategies in LTE

IEEE Xplore Abstract - A simple speed estimation algorithm for mobility-aware SON RRM strategies in LTE




Fading - Wikipedia, the free encyclopedia

Fading - Wikipedia, the free encyclopedia



In wireless communicationsfading is deviation of the attenuation affecting a signal over certain propagation media. The fading may vary with time, geographical position or radio frequency, and is often modeled as arandom process. A fading channel is a communication channel that experiences fading. In wireless systems, fading may either be due to multipath propagation, referred to as multipath induced fading, or due to shadowing from obstacles affecting the wave propagation, sometimes referred to asshadow fading.

Wednesday, November 18, 2015

The International Obfuscated C Code Contest

The International Obfuscated C Code Contest



Obfuscate: tr.v. -cated, -cating, -cates.

    1. To render obscure.
    2. To darken.
  1. To confuse: his emotions obfuscated his judgment.
    [LLat. obfuscare, to darken : ob(intensive) + Lat. fuscare,
    to darken < fuscus, dark.] -obfuscation n. obfuscatory adj

Perl - Wikipedia, the free encyclopedia

Perl - Wikipedia, the free encyclopedia



thus it is possible to program in multiple languages at the same time (e.g., for generating a Web page using HTML,JavaScript, and SQL in a here document).









Monday, November 16, 2015

Keep calm Catalonia: We are on the brink of liberation from Spain

Keep calm Catalonia: We are on the brink of liberation from Spain

NERSC’s ‘Shifter’ Makes Container-based HPC a Breeze

NERSC’s ‘Shifter’ Makes Container-based HPC a Breeze



While Docker has taken the general computing world by storm in recent years, like container-based computing it has yet to be fully recognized in HPC. To facilitate the use of both of these tools in HPC, NERSC is enabling Docker-like container technology on its systems through a new, customized software package known as Shifter. Shifter, designed as a scalable method for deploying containers and user-defined images in an HPC environment, was developed at NERSC to improve flexibility and usability of its HPC systems for increasingly data-intensive workloads. It is initially being tested on NERSC’s Edison system — a Cray XC30 supercomputer — by users in particle physics and nuclear physics and will eventually be made available as an open source tool for the general HPC community.






Sunday, November 15, 2015

Forget insurance. These Delaware docs only take fees

Forget insurance. These Delaware docs only take fees

9 Biggest Myths About Protein | Muscle & Fitness

9 Biggest Myths About Protein | Muscle & Fitness

Life with Aspergers: Aspergers and Dreams

Life with Aspergers: Aspergers and Dreams



Normal(?) Dreams
My normal dreams were always a bit weird and particularly in my childhood, they didn't focus so much on people as the mechnanics of things. I suspect that this might be one of the ways that aspergers manifests itself in dreaming.



Life with Aspergers: Aspergers and Dreams

Life with Aspergers: Aspergers and Dreams





I eventually overcame the night terrors by;
  1. Adopting my mother's belief that bad dreams were your body's way of waking you for a toilet break.
  2. Getting myself a bed lamp which I could reach out and switch on whenever I got scared.

Paul Joseph Watson on Twitter: "Deserted Paris. https://t.co/mNPzgJD3ZK"

Paul Joseph Watson on Twitter: "Deserted Paris. https://t.co/mNPzgJD3ZK"

Terror attacks in france.

Terror attacks in france.



Looks like Paris's strict gun control laws did a great job in keeping guns out of the hands of those Muslim fanatics.

I'm just shocked the left here in the US isn't trying to call it "workplace violence", and trying to claim it was totally random and there's no connection to Islam.

Of course we do hear a bit of blaming Bush for it, and the current administration and those on the left running for president won't say "radical" and "Islam" together.

Police Body Cameras Come With Pre-Installed Malware - Slashdot

Police Body Cameras Come With Pre-Installed Malware - Slashdot



An anonymous reader writes:The old Conficker worm was found on new police body cameras that were taken out of the box by security researchers from iPower Technologies. The worm is detected by almost all security vendors, but it seems that it is still being used because modern day IoT devices can't yet run security products. This allows the worm to spread, and propagate to computers when connected to an unprotected workstation. One police computer is enough to allow attackers to steal government data. The source of the infection is yet unknown. It is highly unlikely that the manufacturer would do this. Middleman involved in the shipping are probably the cause.

Twitter

-view CSL mobile version -



Webring Translator Thingamajig