Happy Birthday Internet: 5 History Videos

Leonard-Kleinrock-and-IMP1

National Geographic has pegged September 2, 2009 as the 40th anniversary of the Internet. They do not cite their source and our source doesn’t make the same claim. But, August 30, 1969 is the date the first Interface Message Processor was delivered to the Arpanet. The IMP is what allowed different computer networks to talk to each other and so it follows that September 2 is probably an acceptable date to celebrate.

To commemorate this glorious day we’re sharing some of our favorite History of the Internet videos. Start with the National Geographic video and then take in the geeky, the new, the old, and the simple. Continue reading “Happy Birthday Internet: 5 History Videos”

Snow Leopard Ditches Real Math For Fake

snow_leopard_fake_math

We’ve always felt that hard drive manufacturers were dirty crooks because of their use of fake math to make drives sound bigger than they actually are. Here’s a quick refresher for those who need it: Because digital information consists of 1’s and 0’s (two possible settings), digital architecture revolves around powers of 2. Long ago, when nomenclature was setup for measuring data the term kilobyte was adopted to represent 2 to the 10th power bytes (base 2, aka real math). The problem here is that 2^10= 1024 and when laymen hear the root “kilo” they think 1000 which is 24 byes less (base 10, aka fake math). So, if you have a 500,000,000 byte drive, base 10 math would call that a 500GB drive, but base 2 math would call that 476.8GB.

We understand why hard drive manufacturers use the base 10 system; larger sounding drives sell better. Now we find out that OSX 10.6 Snow Leopard is using base 10 math to calculate storage space. While base 2 math is the standard storage measurement for operating systems it may at first be difficult to understand why Apple would change to a base 10 system. But think about it once more, doesn’t Apple have a lot to gain if all the storage-containing-hardware they sell sounds bigger than it actually is?

[via Gizmodo]

Update: Force Snow Leopard to calculate storage in base 2 [via Gizmodo]

Energy Efficient Fridge Hack

Green_Freezer

We’ve already covered a pipe bomb mini-fridge this week, but inventor [Tom Chalko] provides us with today’s fridge hack. He noticed that chest-style (laying down, see above) freezers were more energy efficient when compared to normal stand up refrigerators at the same size, despite the colder temperatures involved. This is largely due to the fact that these chest-style freezers keep cold air in like water in a bowl, even if the lid is open. He has written a very thorough report on his findings (pdf), as well as a detailed walk through of the manageable task of converting a chest-style freezer into a chest-style fridge. In the end, his fridge only used 103 Wh of electricity on the first day to reach and maintain between 4° and 7° C (39° to 45° F), and he noted that 30% of that was just getting it up to temperature. After that, the fridge only turned on for roughly 90 seconds an hour, making it a very quiet fridge as well.

Vonage On IPhone

vPhone2

Vonage has promised to release an official iPhone app to compete with other providers such as Skype, and it is currently working its way through Apple’s well documented approval process. Unfortunately, this app would most likely come with an initial cost and/or subscription fee, though a way has been figured out to retrieve Vonage’s SIP authentication information, which would allow use of the Vonage network over other iPhone SIP Clients such as Fring. This solution does still contain the Wi-Fi only clause, but we have ways of making you talk, iPhone. This could also possibly be used on other platforms with SIP clients such as Android or WinMo.

Simple, Low-tech Attack On Credit Unions

credit

The National Credit Union Administration is warning all Credit Unions about malicious hackers and a low tech attack by mailing branches CDs with malware on them.

Using a somewhat dated but still effective Social Engineering attack, a package designed to look as though it was mailed by the NCUA is sent to the branch. The package contains CDs with the attacker’s malware on it, and an accompanying letter (PDF) which informs the branches, ironically, about phishing scams. The letter directs the personnel to review the “training material” on the enclosed CD. Once branch employees proceed as directed, the malware is executed and gives the attackers access to the branch computer systems. Credit Unions seem to be targeted because they tend to be smaller local associations rather then larger banks with higher budgets for computer security.

When people think computer security, they usually envision high tech systems comprising of long passwords, expensive hardware, and updating software with the latest security patches. However, as famed social engineer and hacker Kevin Mitnick once said, “There is no patch for stupidity”.

[via threat post]

PS3 Slim Teardown

be1bSIBJJAk1dEvk.large

The new PS3 Slim has just been released, and ifixit has already posted a teardown. First, they easily removed the included 120GB hard drive, suggesting that upgrading it  shouldn’t be too hard. In order to get inside the cover, however, they needed to use a security Torx screwdriver. In the end, the Blu-ray drive turned out to be the bulkiest component, followed by some surprisingly gigantic fans. Hopefully this means that Sony won’t have to deal with overheating issues.

Related: Nintendo DSi Teardown

Twitter As A Botnet Command Center

twitter_botnet

The folks over at Arbor Networks were browsing Twitter and discovered something very strange: a Twitter account seemingly posting gibberish. At least, that’s how it appeared at first. Upon closer investigation, they discovered that the profile was posting base64 encoded links to PKZIP archives. When they extracted the contents and unpacked the contained DLL and EXE files, they discovered that the account was posing links to malware that would post user information back to certain URLs. The article was also updated to show that the scheme wasn’t limited to Twitter, but also affected users on Jaiku and Tumblr. It’s a bit scary to see that all malware isn’t as blatantly obvious as we usually would think it to be.