Tuesday, August 30, 2011

Hackers allegedly overcome security system of the Xbox 360

Hackers allegedly overcome security system of the Xbox 360

Overcome because the hackers, the security system of the software of the
Xbox 360 could not, they conducted noise on the board of the console
hardware.
Image: The two hackers GliGli GliGli and Tyre have published over the
weekend and a description of a YouTube video showing how they have
overcome the security system of Microsoft's game console Xbox 360 to
inject and execute arbitrary code. Unlike previous attacks, aimed at
either the drives or exploiting errors in the game software, the new
attack was the CPU and can not be blocked by future software updates
from Microsoft, claiming that hackers.
To overcome the security questions of the Xbox 360, the attacker the CPU
clock slowed during the boot process. They used the slim model as an
externally accessible bus (I2C) of the HANA chip, to describe the
divider tabs in the new clock generator. When they sent down cycles with
a soldered circuit board at a particular time a 20 nano-second pulse on
the reset line. According to their description, however, this brings
about a restart of the CPU. Then they overclocked the CPU again. In the
opinion of the two hackers can be such a command to compare memory areas
(memcmp) manipulate. With luck, this means that the Xbox, the signature
of a boot loader does not properly checked - meaning you can start your
own boot loader.
For this no inspections would take place the revocation backups more, so
the interference was not by a software update can be prevented. In the
video, start hacking the Linux Loader (Xell) and an N64 emulator. The
attack will work regardless of the firmware that is played or dashboard
version. However, it needed an average of four attempts to call forth
the reset pulse, the desired effect. Vulnerable are the new Slim models
of the console and the latest revision (Jasper) of the earlier model. At
the first hardware generation of the Xbox 360, nor for their power
supply 175 watts or more is designed (Xenon, Falcon), the attack has not
been tested.

CodePlex supports cloud platform AppHarbor

CodePlex supports cloud platform AppHarbor
. NET developers can use their hosted at CodePlex projects in future
also install directly in the cloud service AppHarbor. The platform
provides a service to the build, unit testing and deployment of ASP.NET
applications in a cloud environment (much like it Heroku with Ruby and
Java applications, or cloudControl do with PHP projects) .
If you have registered for AppHarbor and set up his project for the
service, hosted at CodePlex, the source code to be pushed into the
AppHarbor. Here then there is the build, unit tests should also be
conducted. For source control of Team Foundation server and Mercurial
are supported, and the folder structure of Subversion (/ trunk /
branches / tags).
AppHarbor can be used free of charge in the base version, extra features
(other web workers, more memory or a variety of add-ons) cost extra

Monday, August 29, 2011

In-memory cache for the cloud: Amazon ElastiCache

In-memory cache for the cloud: Amazon ElastiCache
With Amazon Amazon ElastiCache supplemented its cloud services to a
style similar to memcached in-memory cache. Here, stored data will be
used to read much faster than hard disk drives, which should increase
the performance of Web applications.
For his ElastiCache Amazon provides several nodes available, with
between 1.3 GB and 68 GB of memory and having 1 to 26 ECUs (Elastic
Compute Unit, here spread over 1 to 8 virtual cores). Prices start from
U.S. $ 0.095 per hour on the smallest available cache node.
Multiple cache nodes can be summarized as ships in a cache cluster, each
cluster (if several) of AWS availability zone is allocated. Individual
nodes can be as needed to remove it or add to the cluster. Each node
also gets its own DNS name assigned to the above it can be addressed.
Memcached as a cache engine currently in version 1.4.5 is used.
Accordingly, Amazon could be fully addressed ElastiCache compatible
Memchached. Applications that use memcached for caching, should thus
benefit without further adjustments in the Amazon cloud in-memory
caching. All settings related to caching, protocol, algorithm and
strategy are summarized for each type and version of the caching engine
parameters in a cache group. This would enable different cache nodes
operate with different settings. Further details also provides Amazon
Web Services blog.
Amazon ElastiCache is initially as a beta version and only in the U.S.
East region available, Amazon wants to expand the service in the coming
months, however, on further AWS regions.

Kenya relies on energy from the deep

Kenya relies on energy from the deep
In Kenya, the seemingly underdeveloped use of geothermal energy is much further advanced than in most industrialized nations. From 2030 to the heat from the depths provide more electricity for the country than any other source, reports Technology Review (ordered on Thursday at a kiosk or shop from now on heise online) in its latest September issue. By 2030 the geothermal power are in the country with billions of investment and multiplies including German assistance to almost five gigawatts. The intention of the Kenyan cover more than one-quarter of its estimated electricity demand.
In Kenya, heat from the earth and can easily be tapped in such large quantities as almost nowhere else on the globe. Made possible by the special location: The east African coastal State is geologically the middle of the Rift Valley, a rift system of approximately 3,500 kilometers between Ethiopia and Mozambique in the north to the south. For example, in Kenya, some already in 900 meters depth more than 300 degree steam reservoirs found. These are almost ideal conditions for the generation of electricity from geothermal energy.
Already in the fifties, the then British colonial government had begun exploratory drilling. Since 1981, in Kenya actually produces electricity from geothermal energy. By now a total of 198 MW Kenya may now be far behind the leading United States with 3100 MW - but still well ahead of developed nations such as Germany, which only lead to much deeper drilling into usable heat. In this country, why are only just under seven MW of geothermal power at the mains - a share of less than one tenth per thousand of the total German capacity.
Main site for geothermal power generation is Olkarioa, northwest of Nairobi, where previously three power plants are located, each with several blocks. With its proven fruitful sources of steam to the site will now be expanded even further. Will cost the whole thing around a billion euros, partly financed by a consortium of World Bank, European Investment Bank, French Development Bank, the Japanese Development Agency and the German KfW Development Bank.

OpenLeaks-media published vulnerability of Wikileaks

OpenLeaks-media published vulnerability of Wikileaks
The weekly newspaper The Friday has released details about a file that is supposed to include all unedited dispatches from U.S. ambassadors, just published by Wikileaks, the crowdsourcing in a big way. The encrypted file "Cables.csv" and the corresponding password circulating on the Internet. In the past week to Wikileaks boss Julian Assange have tried in a telephone call, to prevent the publication of the details. Friday is a media partner of the OpenLeaks.
The leak at Wikileaks is not linked from Friday, but described as the search for it on the Internet is possible. According to the sheet is at the 1.73 GB big file is a copy of which was held by a blunder at Wikileaks their way into the public domain. Perhaps it is the complete copy of the U.S. dispatches which had leaked to Wikileaks, a disgruntled employee of the Norwegian newspaper Aftenposten.
The existence of this file, including your password in the Internet plays an important role in the dispute between Julian Assange and Daniel Domscheit Mountain. The latter, after his eviction from Wikileaks, which differ from paid him off and the secure server on these computers available files. Among them, the entry platform Wikileaks was with all the submissions from whistleblowers from January to September 2010th Assange had then CCC board member Andy Mueller-Maguhn switched as a mediator to bring the data back to whistleblower in the possession of Wikileaks.
After Domscheit-Berg was expelled after his OpenLeaks presentation at the Chaos Communication Camp from the CCC, the conflict escalated. OpenLeaks initially wanted only the access key to delete the material, but later destroyed all the data. Cables.csv told heise online Domscheit-founded the Mountain deletion with the release of the file: If you make such mistakes, which he trusted not to further material, which could bring people into trouble.

Google TV will launch in early 2012 in Europe

Google is entering the European TV market. Google TV will start in early
2012 in Europe, said, Eric Schmidt, Chairman CEO and former CEO of
Internet company, on Friday on a TV Festival , Edinburgh.

Google searches the TV program, TV and video sites on the net.

Image: Google Google TV will merge the television with the Internet:
With the set-top boxes you searched the Internet and television content,
from the results list you can start to record them or not. In the U.S.,
the devices since October 2010 are available, but are selling poorly .
Bring new impetus to the now open for Android Apps .

The television industry is Google TV so far, the cold shoulder, the
major U.S. broadcast their online content does not provide . The German
private broadcasters association VPRT expressed 2010 also skeptical: If
Google switched their own advertising, it was a threat to the business
model of broadcasters.

Eric Schmidt said on Friday in his speech that Google wants to compete
with broadcasters and content providers. The goal is to support the
industry and "an open platform for next-generation television" provide.

Steve Jobs resigns


Steve Jobs resigns
Steve Jobs has stepped down as CEO of Apple. That the 56-year-old said on Wednesday in Cupertino (local time) with. Job changes in the supervisory board, said in a release of the group. Successor in the management team is therefore Tim Cook, who has been responsible for business operations as COO of the iPhone maker.

Steve Jobs
Image: Apple make on the reasons neither jobs nor the Group for more information. "I've always said that when the day comes that I no longer fulfill my duties and the expectations from Apple, can I be the first to know you can," Jobs wrote in a personal communication. "Unfortunately, this day has come."
He was sure that the brightest and most innovative days were before Apple. "And I'm looking forward to seeing a new role in the success of Apple and help him to."
Jobs had been taken in January due to health reasons, a further break from work. The founders of Apple has a cancer and a liver transplant behind. Represented were the CEO as with his break in 2009 by Cook, who now takes the helm.
Steve Jobs had founded the company in 1976 with Steve Wozniak and Ronald Wayne. In 1985, he had to leave Apple after an internal power struggle in 1997 and returned to the Board. Since then, Jobs has the once-ailing computer manufacturers out on the top. With the iPhone, which was launched in 2007, the company has revolutionized the mobile industry.
Jobs regarded as the intellectual father of the successful products iPhone, iPod and iPad. "Steve's exceptional vision and leadership have saved Apple, and the most innovative and valuable technology companies made," said board member Art Levinson. Apple's stock dropped by more than 6 percent of post-trade.
[Update]:
The resignation was not seen as indicating a sudden deterioration of Jobs' health, said a confidant of the financial news agency Bloomberg. Jobs've spent Wednesday in the Apple headquarters and attended a regular meeting of the Board of Directors. In recent weeks, but he was bound to his house and he felt weak.