DARPA announced the 40 Grand Challenge teams selected to advance to the
National Qualification Event. The teams come from a variety of
backgrounds including universities, individuals, corporations, and a
high school. U.S. Department of Defense Joint Robotics Program (JRP)
offers free use of Autonomous Vehicle Practice Facility to all DARPA
Grand Challenge semifinalists. more
15 minutes to crack a WEP key
As if you needed any further warnings that WEP is rubbish, here is a
short demo of a wireless WEP attack. This is a very interesting
technique, where packets are injected to the access point, making it
release weak IVs. You’ll think twice about WEP after this! This is
really important: even though there is not much traffic on the AP, we
generate our own by replaying a single packet over and over again! more
Google Earth Software Rocks!
Google has released a beta of it’s Google Earth software to subscribers
of the existing Keyhole service. New features include 3D models of
buildings in selected cities, input from your gps receiver and a better
search system. This product is in competition with Microsoft’s Virtual
Earth. Fly from space to your home town. Visit exotic
locales such as Maui, Tokyo, Rome and Paris.
Satellite imagery makes it real. Explore restaurants,
hotels, parks and schools. Think magic carpet ride! more
Camellia Encryption Algorithm Wins Approval from ISO
Camellia, the 128-bit common-key block encryption algorithm which was
jointly developed by Nippon Telegraph and Telephone Corp. and
Mitsubishi Electric Corp. in 2000 has been adopted as an international
standard by ISO/IEC. This algorithm has already been standardized as
the recommended encryption by the EU and the Japanese e-government.
Further, standardization of Camellia is now under deliberation by IETF.
more
1 Minute Charge Batteries
Toshiba Corporation has developed a lithium-ion secondary battery that
can be charged up to 80% of its total capacity in only 1 minute. In
addition to the conventional capabilities of the lithium-ion secondary
battery, this battery has also achieved charge-discharge behavior that
is equivalent to that of the electric double layer capacitor. A test
cell for high-power output realized the volumetric energy density of
150 – 250 Wh/L and the volumetric output density of 10kW/L.
Want a new house? Just print one!
Contour Crafting is a fabrication process by which large-scale parts
can be fabricated quickly in a layer-by-layer fashion. The chief
advantages of the Contour Crafting process over existing technologies
are the superior surface finish that is realized and the greatly
enhanced speed of fabrication. The success of the technology stems from
the automated use of age-old tools normally wielded by hand, combined
with conventional robotics and an innovative approach to building
three-dimensional objects that allows rapid fabrication times. Actual
scale civil structures such as houses may be built by CC. more
Mouse and Keyboard sharing the proper way!
Synergy lets you easily share a single mouse and keyboard between
multiple computers with different operating systems, each with its own
display, without special hardware. It’s intended for users with
multiple computers on their desk since each system uses its own
monitor(s). Redirecting the mouse and keyboard is as simple as moving
the mouse off the edge of your screen. Synergy also merges the
clipboards of all the systems into one, allowing cut-and-paste between
systems. more
Flocks of communicating UAVs: Gridswarms
Imagine a large group of small unmanned autonomous aerial vehicles that
can fly with the agility of a flock of starlings in a city square at
dusk. Imagine linking their onboard computers together across a
short-range, high-bandwidth wireless network and configuring them to
form an enormous distributed parallel computer. Imagine using this huge
computational resource to process the sensory data gathered by the
swarm, and to direct its collective actions. You have now grasped the
idea of a flying gridswarm. Essex University are are working to bring
this vision to reality. more
Diamonds in double quick time
Researchers at the Carnegie Institution’s Geophysical Laboratory have
learned to produce 10-carat, half-inch thick single-crystal diamonds at
rapid growth rates (100 micrometers per hour) using a chemical vapor
deposition (CVD) process. This size is approximately five times that of
commercially available diamonds produced by the standard
high-pressure/high-temperature (HPHT) method and other CVD techniques.
In addition, the team has made colorless single-crystal diamonds,
transparent from the ultraviolet to infrared wavelengths with their
process. more
Honda ASIMO can run now!
I love this video of Honda’s new-and-improved Asimo robot running. From
the press release:
"The combination of newly developed high-response hardware and the new
Posture Control technology enables ASIMO to proactively bend or twist
its torso to maintain its balance and prevent the problems of foot
slippage and spinning in the air, which accompany movement at higher
speeds. ASIMO is now capable of running at a speed of 3km/hour. more
RF Access control card hacking
Lots of companies use proximity cards to control physical access. An
employee holds their card within a few inches of the reader; the reader
receives a unique id from the card and transmits it to some central
computer that tells it whether or not to open the door. Alas, reading
those cards without permission is just as easy with only hobby
electronics and some knowhow more
Fibre reinforced bendable concrete
A new type of fiber-reinforced bendable concrete will be used for the
first time in Michigan this summer- and University of Michigan
scientists hope that their new material will find widespread use across
the country. The new concrete looks like regular concrete, but is 500
times more resistant to cracking and 40 percent lighter in weight. Tiny
fibers that comprise about 2 percent of the mixture’s volume partly
account for its performance. more
Create your own buffer overflows
Every now and again we all hear about an exploit that takes place
thanks to a buffer overflow, but what is a buffer overflow? By
definition it is when a program attempts to store more data in an array
(buffer) than it was intended to hold and attempting to overwrite the
return address of a function. To show how this is actually done, lets
do a simple attack on a fairly small program more
Hyper-Threading Considered Harmful
Hyper-Threading, as currently implemented on Intel Pentium Extreme
Edition, Pentium 4, Mobile Pentium 4, and Xeon processors, suffers from
a serious security flaw. This flaw permits local information
disclosure, including allowing an unprivileged user to steal an RSA
private key being used on the same machine. Administrators of
multi-user systems are strongly advised to take action to disable
Hyper-Threading immediately; single-user systems are not affected.more
Serious Crypto problem with VPN Tunnels
Britain’s national emergency response team, the National Infrastructure
Security Coordination Centre, issued a warning this week about the
safety of virtual private networks that use IPsec encryption and
tunneling to connect remote workers to corporate networks. The flaw,
which the NISCC rates as "high" risk, makes it possible for an attacker
to intercept IP packets traveling between two IPsec devices. more
Nuclear battery with 10 year life
A battery with a lifespan measured in decades is in development at the
University of Rochester, as scientists demonstrate a new fabrication
method that in its roughest form is already 10 times more efficient
than current nuclear batteries—and has the potential to be nearly 200
times more efficient. The details of the technology, already licensed
to BetaBatt Inc., appears in today’s issue of Advanced Materials. more
Wire in the Blood!
A Japanese research team has developed a fuel cell that runs on blood
without using toxic substances, opening the way for use in artificial
hearts and other organs. The biological fuel cell uses glucose, a sugar
in blood, with a non-toxic substance used to draw electrons from
glucose.“Since the electron mediator is based on Vitamin K3, which exists in
human bodies, it excels in safety and could in the future generate
power from blood as an implant-type fuel cell,” the group said in a
statement.
Most other bio-fuel cells under study use a metal complex, spawning concern about harm if used for implants.
The newly developed cell in the size of a tiny coin is able to
generate 0,2 milliwatts of electricity, enough to power a device that
measures blood sugar level and transmits data elsewhere, the group said.
RDP A Go-go!
Ask any Windows box administrator, and they’ll tell you how useful RDP
can be in tricky situations such as when the server is nowhere near the
administrator! Today I had cause to use an RDP session over 72000
kilometers…. can’t give many specific details, but round trip time
was not such an issue as you might imagine: with all the options turned
to minimum, the session was surprisingly agile. Anyone beat 72K? For
you non-metric fans that’s around 44,000 miles.
Micro Meccano
Well, its as simple as this: I’d like to have a bash at building my own
robot and the construction toys around are too large. What’s needed is
a mini-meccano product that uses much smaller components to enable the
construction of smaller robots and other such devices.
SCO v IBM. We know who the judge supports!
Today was a big day in the SCO v IBM dispute (or SCO v Linux if you will). Not the
big day I hasten to add. Judge Kimball today ruled on IBMs motions for
partial summary judgement. Basically, they said ‘SCO are talking
rubbish, dismiss this case’.Now although judge Kimball did not actually throw the case out
completely, he has clearly seen through the different facades that SCO
are putting up in court. He specifically commented on the way that they
are making accusations in public which are not even slightly consistent
with what they say in court. Here is one of the relevant snippets.
"Viewed against the backdrop of SCO’s plethora of public
statements concerning IBM’s and others’ infringement of SCO’s purported
copyrights to the UNIX software, it is astonishing that SCO has not
offered any competent evidence to create a disputed fact regarding
whether IBM has infringed SCO’s alleged copyrights through IBM’s Linux
activities. Further SCO, in its briefing, chose to cavalierly ignore
IBM’s claims that SCO could not create a disputed fact regarding
whether it even owned the relevant copyrights.
"Nevertheless, despite the vast disparity between SCO’s
public accusations and its actual evidence — or complete lack thereof
— and the resulting temptation to grant IBM’s motion, the court has
determined that it would be premature to grant summary judgment on
IBM’s Tenth Counterclaim."
So SCO have to basically come up with some amazing evidence if they are to salvage anything from this case.
Good news all round really.
TurboTas 2005