Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

What would you use if you couldn't use your current distribution/operating system?

  • Linux
  • Windows
  • BSD
  • ChromeOS / Android
  • macOS / iOS
  • Open[DOS, Solaris, STEP, VMS]
  • I don't use a computer you insensitive clod!
  • Other (describe in comments)

[ Results | Polls ]
Comments:21 | Votes:43

posted by janrinok on Monday May 05 2014, @11:42PM   Printer-friendly
from the so-where-is-the-downside? dept.

Unisys unveils invisibility cloak for network traffic.

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

Stealth has been around since 2005, when it was developed exclusively for the Defense Department, which remains one of its largest customers. Several years ago Unisys took it to commercial enterprises and has paid for various independent tests to try to compromise the system, all of which have failed. This is because Stealth uses four layers of security: each packet is encrypted with AES256, then split into three separate pieces and dispersed across the network, destined for a particular group of users that have to be running its protocols. To deploy Stealth, you create virtual "communities of interest" that tie two or more PCs together in such a way that they can only communicate with each other. No one else can join in, and no one else can intercept the traffic.

The article continues:

Different PC endpoints can be associated with multiple communities, so your CEO for example can talk to both your finance group and your marketing group, but the members of each group can't see each other's network traffic, server shares, or even ping each other. All of this works on top of whatever directory services you are running, including Active Directory, LDAP or RADIUS.

Stealth uses a special packet driver that sits on top of Layer 2 and is available for a wide collection of both 32 and 64-bit Windows and Linux desktops and servers. Stealth's traffic is still routed by ordinary switches, firewalls and routers without any additional configuration. But the traffic now is hidden from prying eyes, even over the public Internet.

Think of this solution as an overlay to your existing network, essentially hiding your secrets in plain sight.

posted by janrinok on Monday May 05 2014, @09:48PM   Printer-friendly

Chris Mooney writes from Slate about Katharine Hayoe, a climatologist who is also a conservative evangelical Christian, about her efforts to reach out to fellow religious conservatives on the issue of dealing with climate change.

"Simply put, millions of Americans are evangelical Christians, and their belief in the science of global warming is well below the national average. And if anyone has a chance of reaching this vast and important audience, Hayhoe does. "

In this article, Hayoe outlines five arguments she believes resonate with conservative Christians, who have often come under fire for their perceived rejection of science. These arguments include "Conservation is conservative", "The Bible does not approve of letting the world burn", and "Even if you believe in a young Earth, it's still warming"

From the article:

Hayhoe's approach to science - and to religion - was heavily influenced by her father, a former Toronto science educator and also, at one time, a missionary. "For him, there was never any conflict between the idea that there is a God, and the idea that science explains the world that we see around us," says Hayhoe. When she was 9, her family moved to Colombia, where her parents worked as missionaries and educators, and where Hayhoe saw what environmental vulnerability really looks like. "Some of my friends lived in houses that were made out of cardboard Tide boxes, or corrugated metal," she says. "And realizing that you don't really need that much to be happy, but at the same time, you're very vulnerable to the environment around you, the less that you have."

"In terms of addressing the climate issue," says Hayhoe, "we don't have time for everybody to get on the same page regarding the age of the universe."

Her research today, on the impacts of climate change, flows from those early experiences. And of course, it is inspired by her faith, which for Hayhoe puts a strong emphasis on caring for the weakest and most vulnerable among us. "That gives us even more reason to care about climate change," says Hayhoe, "because it is affecting people, and is disproportionately affecting the poor, and the vulnerable, and those who cannot care for themselves."

posted by NCommander on Monday May 05 2014, @08:00PM   Printer-friendly
from the from-the-crack-team-of-flying-monkeys dept.
So, in a bid to keep my sanity while working on the manifesto, I felt an interesting side-project would be to do a series of articles going in-depth on our backend is put together, and what goes into the nuts and bolts of a decently large website. I'm sort of writing this as I get writers block on the manifesto, and I have no set agenda, so if interesting questions come up, I may dedicate an article or two about them. For this first one though, I wanted to give a relatively broad overview of our backend, then an article about each major component that comes together to form SN.
So, as of writing, SoylentNews is hosted almost entirely on Linode (in the Dallas, TX datacenter), and split across ten nodes. Four nodes are dedicated to our slash instance, with the others doing various auxiliary purposes.

General Information
Our nodes are named after elements in the periodic table, starting with hydrogen, and going up from there; named roughly in the order they were brought online. With two exceptions, we're standardized on Ubuntu 12.04 Precise Pangolin. Nodes dedicated to running slashcode are Linode 4096s, with everything else being Linode 2048s due to Linode's recent free upgrade.

Where possible, all services (with the exception of MySQL) are high-availability, and can survive any node suddenly flaking out. This includes our internal DNS, LDAP, Kerberos, gluster, web frontends, and slashd*. It is our goal to get us to a 100% HA configuration so we can easily offline nodes, or upgrade systems without any interruption in service though we're still somewhat short of that (mostly due to limitations in MySQL).

User management and single-sign-on are handled by a combination of kerberos and LDAP, with SSH keys for users storied in the LDAP backend with a bit of voodoo to allow them to be dynamically loaded whenever staff wish to access a machine. Service accounts (i.e., slash or icinga) use Kerberos keytabs to perform passwordless authentication to allow us to be able to centrally revoke and replace any compromised keys instead of playing the age-old game of editing authorized_keys in 20 places.

Furthermore, we use AppArmor quite extensively internally to try and keep ourselves relatively well protected. Its no secret that we're currently stuck on an outdated Perl and Apache which no longer receives security updates. While we have plans to work through, and migrate to mod_perl 2, the frontend is horribly tied to Apache (including hooks in various stages of the httpd lifecycle). I plan to run a dedicated article about this, but lets just say its a bit in-depth.

The li694-22 Domain
I've mentioned this on comments, and its on the wiki as well, but we use an internal gTLD for referencing nodes throughout the backend. Every node can access each other at hostname.li694-22. The name itself is a reference to the original private URL which we used for bringing up Slashcode way back before SN was decided as our temporary name. We have full forward and reverse resolution available, and only publish AAAA records for normal services. Oh yeah, about that ...

Use of IPv6 internally
Yeah, we were serious when we axed IPv4 internally. Since that article was written, we've had to re-introduce IPv4 addressing for the internal webservices (via ipv4.hostname.li694-22) due to compatibility issues with gluster. Using IPv6 internally allows us to have kerberos and other IP dependent services work properly from multiple places across the internet such as our off-site backup box.

Anyway, enough that, let's get a look at the machines themselves:

Production Cluster
  • hydrogen/fluorine - web frontends
  • helium/neon - database backends
  • beryllium - wiki host + mail accounts; runs CentOS 6
  • boron - gluster+slashd

Services Cluster

  • carbon - IRC server
  • nitrogen - tor proxy (also runs staff slash)
  • oxygen - off-site backup

Development

  • lithium - dev.soylentnews.org, running Ubuntu 14.04

As you can tell, its quite a bit of virtual iron that keeps this site up and running. We've got considerable excess capability at the moment, so I'm not too worried about us having to bring up additional frontends any time soon, and we're trying to keep it that if half our web/DB servers were offline, we'd still be able to remain up and functional. Perhaps its a bit overkill, but you never know when you need to bring a node offline

The next article is going to go somewhat in-depth into the system administration aspects, including a hands-on look at our Kerberos, LDAP, and Iciniga instances, including a brief overview of each of these technologies in turn. Many who have worked on staff had no previous experience with kerberos in a UNIX-like environment, which I consider unfortunate, since it can drastically simplify administration burdens. Drop your questions below, and I'll either answer them inline, or later in this series of articles. Until the next time, NCommander, signing off.

posted by janrinok on Monday May 05 2014, @06:22PM   Printer-friendly
from the Dracula-School-of-Medicine dept.

The Wall Street Journal writes that transfusing blood from young mice to old mice makes them smarter and improves functions such as exercise capacity, according to reports from two research teams that point to new ways to study and potentially treat diseases of aging. In a Stanford University and the University of California study found that blood transfusions from young mice reversed cognitive effects of aging, like memory and learning ability. The report was published Sunday in the journal Nature Medicine. Two other reports appearing in Science from researchers at Harvard University found that exposing old mice to a protein present at high levels in the blood of young mice and people improved both brain and exercise capability. An earlier report by some of the same researchers linked injections of the protein to reversal of the effects of aging on the heart. What isn't known from all this research, said Buck Institute's Dr. [Brian] Kennedy, is whether young blood might also increase the life span of mice and, if so, what such implications for humans might be. Other research show that specific antioxidants may affect lifespan of mice.

This can make one think of movies like The Hunger (1983), Traitement de choc (1973).

posted by janrinok on Monday May 05 2014, @04:18PM   Printer-friendly
from the back-to-the-postit-under-the-keyboard dept.

An Ars Technica article entitled "Pavlovian password management" aims to change sloppy habits. Policy would reward or penalize people based on the passwords they pick.

For more than a decade, the virtues of strong passwords have been lost on most end users, despite frequent sermons from security experts and IT administrators over their importance in locking down accounts. Now, a consultant is proposing a system that provides rewards or penalties based on the passcode choices people make. For instance, a user who picks test123@# might be required to change the password in three days under the system proposed by Lance James, the head of the cyber intelligence group at Deloitte & Touche. The three-day limit is based on calculations showing it would take about 4.5 days to find the password using offline cracking techniques. Had the same user chosen t3st123@##$x , the system wouldn't require a change for three months.

posted by janrinok on Monday May 05 2014, @02:06PM   Printer-friendly
from the round-and-round dept.

Science daily reports about a recent paper in nature where a gamma ray burst (GRB) afterglow from a dying star collapsing into a blackhole was measured to have 10000 times more than expected circular polarization.

The GRB 121024A was detected at 2:56:12 UTC on 24 October 2012 and measurements of polarization began 2.57 hours after the burst using very large telescope (VLT). Currently we have circular polarization measurements for only one other GRB 091018 afterglow. In both of them the sources are less than 5% linearly polarized (much lower than 70% for a perfectly ordered magnetic field). Circularly polarized light is measured to be 0.61%+/-0.13% (intergalactic dust effects between us and GRB included in this error) while basic model predictions expect it be be about 10^(-4) smaller than that for the measured frequency. The authors note that "The observed polarimetric behavior poses a challenge to the long-standing assumption of isotropic electron pitch-angle distributions in the GRB forward shock afterglow".

From the article:

"This means that the assumptions we've been making about Gamma-ray Bursts need to be completely reconsidered - assumptions of how electrons are accelerated to the incredible speeds we observe. Our results show that Gamma-ray Bursts are far more complex than we thought." Gamma-ray Bursts are the brightest objects in the entire Universe, only lasting a fraction of a second, but sending out as much energy in that time as the Sun will in its entire life.

These bursts are emitted by dying stars collapsing to black holes that form jets of material traveling at over 99.995 percent of the speed of light.

"These extreme objects are like super-powered versions of the world's largest and most powerful particle accelerator, the Large Hadron Collider, except very far away in space," Dr Curran said.

posted by n1 on Monday May 05 2014, @12:01PM   Printer-friendly
from the sometimes-a-good-idea-is-a-bad-one dept.

With the upcoming release of Mint 17 LTS, I am looking to upgrade from Mint 13 primarily because of the new BTRFS file system. I have an older netbook with very limited hard disk space that just won't die, so a compressed file system is very attractive to me.

I've found instructions how to do it so the only issue is whether to go ahead... This is where I ask for your wisdom!

posted by n1 on Monday May 05 2014, @10:35AM   Printer-friendly
from the you-can-see-my-house dept.

Direct view of the spinning Earth from the underbelly of the ISS space station 400 km up is now available as a high definition (HD) live video stream provided at Ustream and also embedded in an article by ExtremeTech. The video feed comes from four high-definition cameras, delivered by last month's SpaceX CRS-3 resupply.

[Editor's Note: The stream appears to be inaccessible at this time.]

posted by n1 on Monday May 05 2014, @09:10AM   Printer-friendly
from the i've-been-doing-it-for-centuries dept.

The New York Times is reporting:

Two teams of scientists published studies on Sunday showing that blood from young mice reverses aging in old mice, rejuvenating their muscles and brains. As ghoulish as the research may sound, experts said that it could lead to treatments for disorders like Alzheimer's disease and heart disease.

The research builds on centuries of speculation that the blood of young people contains substances that might rejuvenate older adults.

Perhaps Dracula's blood sucking compulsion isn't so crazy after all!

posted by n1 on Monday May 05 2014, @07:21AM   Printer-friendly
from the cant-afford-to-retire dept.

Reuters reports that last week's computer glitch at a California air traffic control center that led officials to halt takeoffs at Los Angeles International Airport was caused by a U-2 spy plane still in use by the US military, passing through air space monitored by the Los Angeles Air Route Traffic Control Center that appears to have overloaded ERAM, a computer system at the center. According to NBC News, computers at the center began operations to prevent the U-2 from colliding with other aircraft, even though the U-2 was flying at an altitude of 60,000 feet and other airplanes passing through the region's air space were miles below. FAA technical specialists resolved the specific issue that triggered the problem on Wednesday, and the FAA has put in place mitigation measures as engineers complete development of software changes," said the agency in a statement. "The FAA will fully analyze the event to resolve any underlying issues that contributed to the incident and prevent a reoccurrence." The U.S. Air Force is still flying U-2s, but plans to retire them within the next few years. The U-2 was slated for retirement in 2006 in favor of the unmanned Global Hawk Block 30 system, before the Air Force pulled an about-face two years ago and declared the Global Hawk too expensive and insufficient for the needs of combatant commanders.

posted by n1 on Monday May 05 2014, @05:48AM   Printer-friendly
from the not-for-you dept.

Chemists from Europe have developed a process to produce syngas from CO2 and water. Cerium oxide is used to produce the syngas and oxygen in separate stages. This is the key that allows for the Fischer-Tropsch process to be used safely without the dangerous presence of oxygen, to produce kerosene and other fuels.

The chemists believe that a full scale system using just 1 square kilometer of space could produce 20,000 litres per day of jet fuel. At this time the efficiency is only 1.7% but chemists predict that they could achieve 15% and economic viability through testing of larger scale systems and have identified promising avenues to find greater efficiency.

Don't expect to see smaller systems for sale for point-source energy production though, Shell Oil has partnered with the chemists and in the event of success will be used to produce jet fuel for sale.

posted by n1 on Monday May 05 2014, @04:11AM   Printer-friendly
from the nestle-hydroelectric-coming-soon dept.

As reported by TreeHugger.com:

The giant candy and pet food maker MARS Inc has announced that it will soon begin construction of a massive wind farm in Texas that will produce enough clean energy to power all of MARS' operations in the United States. (Yhey have 37 factories and 70 offices, so it's a pretty big deal.) The wind farm will be erected near Lamesa, Texas, with 118 GE wind turbines (1.7MW each) producing annually about 800,000 megawatt-hours, equivalent to what it takes to power 61,000 U.S. households. This will be enough for MARS' 37 US factories, and represent about 24% of their global factory and office carbon footprint. Hopefully they keep rapidly improving that number and reach 100% before their target date.

Construction of the Texas wind farm will begin at the end of 2014, with about 10 turbines going up each week. It should be finished and fully operational by mid-2015. And to be clear, while the wind farm will produce an amount of electricity equivalent to what they use across the USA, it won't be directly connected to all those offices.

posted by n1 on Monday May 05 2014, @02:33AM   Printer-friendly
from the what-is-that-in-the-sky?-oh,-sh... dept.

A small asteroid zipped by Earth at a distance less than the moon's orbit early Saturday (May 3), but posed no threat to our planet. About the size of a city bus, the asteroid was discovered Wednesday, April 28th. The rock is one of over 1400 potentially hazardous asteroids currently being monitored by NASA.

Not much warning, eh?

posted by janrinok on Monday May 05 2014, @12:48AM   Printer-friendly
from the he-started-it-no-she-did! dept.

Stop the Cap! reports that in a tit-for-tat action Viacom has decided to block all of Cable ONE's internet users from accessing the Viacom website. Viacom and Cable ONE are in the middle of a contract dispute and Cable ONE has stopped carrying Viacom's cable tv channels because their previous contract expired. Sucks to be a cable-tv cord-cutter if you have to use Cable ONE for your ISP.

posted by janrinok on Sunday May 04 2014, @10:38PM   Printer-friendly
from the contender-for-quote-of-the-week dept.

Even as Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent's patchwork of online police was right for the job. The exercise, called Cyber Europe 2014, is the largest and most complex ever enacted, involving 200 organisations and 400 cybersecurity professionals from both the European Union and beyond. Yet some critics argued that herding together normally secretive national security agencies and demanding that they spend the rest of 2014 sharing information amounted to wishful thinking. Others questioned whether the law enforcement agencies taking part in the drill should be involved in safeguarding online security, in the wake of American whistleblower Edward Snowden's revelations of online spying by western governments.

The report does contain a contender for quote-of-the-week: One industry insider said the view in Brussels is that EU cybersecurity was "like teenage sex: everyone says they are doing it but not that many actually are."

Today's News | May 6 | May 4  >