Latest Post

Facebook Introduces five new Privacy Tweaks

Written By Unknown on Tuesday 30 August 2011 | 06:38

facebook-privacy
Facebook is slowly rolling out its new privacy center, which offers a couple of long-awaited features (preapproved photo tags!) and reintroduces some older, lesser-known security options.

We've rounded up the most important new privacy options, including a few that Facebook had buried until now.

1. Approve tags before they're published.
Facebook finally lets you approve tagged photos and posts of you before they land on your profile. How many times has a friend tagged you in an unflattering photo? It's time to end these actions.

Go to Account > Privacy Settings and select Edit settings next to "How tags work." Then hit Edit next to Profile Review and you'll be prompted to turn on the settings. Now, every time someone tags you in a status, photo, or place, the post will appear in the Pending approval section on your profile (in the left sidebar).

2. Decide who gets to see your posts.
Facebook reintroduced selective posting in this privacy update. Once you write your status, click on the small triangle next to the Post button to make the post visible to: friends, public (anyone on the Internet), or custom (exclude individuals or lists).

To change the visibility after you've posted, head back to the post on your wall, hover over it, and click the drop-down menu in the upper-right to change the visibility.

3. Change privacy for any profile item.
It's now much easier to change the privacy for every element of your profile. For example, you can share your hometown with everyone, but your birthday to just your friends. Or, make it so that only close friends can see who you're in a relationship with.

Go to your profile and select Edit profile at the upper-right corner of the page. Then head to one of the categories (on the left) and change the privacy of its elements using the drop-down menu next to each field.

4. Select the default privacy setting for posts.
Head to your privacy settings, and scroll down to "Control your Default Privacy." Here, you can select the default audience for all your posts--Public (everyone on the Internet), Friends (all your friends), or Custom (exclude certain friends or lists).

Tip: If you frequently post content you'd rather keep private from a certain group of people (like your colleagues), create a list of all those people and exclude them by default using the Custom option in this privacy setting.

5. Preview your public profile.
Once you make all the privacy tweaks, see how your profile appears to certain friends or anyone on the Web. Go to your profile and select "View profile as..." in the upper-right corner. Enter a friends name or select the public link in the instructions above the field to see what it looks like to everyone.

Want to be your friend on Facebook? A Fake Facebook Request

Malicious spam messages generated by the infamous Cutwail botnet are targeting Facebook users as potential banking Trojan victims.

The messages arrive in the guise of a Facebook friend invite notification. The emails look genuine enough on casual inspection, thanks to the malware-spinners' apparent use of a genuine Facebook template. But where a genuine Facebook invite contains links to the real social networking site, the malicious emails feature custom links to malware sites. In addition, the emails differ from the genuine article because they do not feature Facebook profile photos. The recipient's email address is also absent from the fine print at the bottom of the bogus invites.

facebook-spam

Users tricked into clicking on the malicious link are exposed to a double-barrelled malware based attack. Firstly they are offered a bogus Adobe Flash update. In addition, clicking on the link opens a hidden iFrame, which then loads data from a remote server hosting the Blackhole Exploit Kit. The exploit kit attempts to exploit browser security holes, most notably involving insecure Java installations.

Both techniques attempt to download a variant of the infamous ZeuS banking Trojan onto compromised systems. Impersonating email notifications from Facebook is a common enough technique among spammers and purveyors of survey scams, but I've never seen it applied to punt banking Trojans before.

A full write-up of the scam can be found in a blog post by M86 Security here.

Microsoft Improves Windows Explorer with Ribbon UI on Windows 8

Microsoft today gave another sneak peek of Windows 8 — showing a new approach to Windows Explorer, the place where users search for and interact with files in the operating system. The change will be familiar to many Microsoft customers, because it’s styled as a “ribbon” of commands very similar to the interface used in recent version of Microsoft Office 2007.

According to a Microsoft Windows team Alex Simons, they've evaluated several different UI command affordances including expanded versions of the Vista/Windows 7 command bar, Windows 95/Windows XP style toolbars and menus, several entirely new UI approaches, and the Office style ribbon and that the ribbon approach offered benefits in line with their goals.

He said the motive of redesigning Explorer is based on opt-in data from hundreds of Windows users showing that, despite having over 200 commands, only ten of those represent 81.8% of Explorer's total usage and only two of the top 10 commands are featured prominently in Vista and Windows 7's command bar.

The new Windows Explorer on Windows 8 looks like this:


Goals of the new Windows Explorer
We set out to accomplish three main goals with this new version of Explorer.

  1. Optimize Explorer for file management tasks. Return Explorer to its roots as an efficient file manager and expose some hidden gems, those file management commands already in Explorer that many customers might not even know exist.

  2. Create a streamlined command experience. Put the most used commands in the most prominent parts of the UI so they are easy to find, in places that make sense and are reliable. Organize the commands in predictable places and logical groupings according to context, and present relevant information right where you need it.

  3. Respect Explorer’s heritage. Maintain the power and richness of Explorer and bring back the most relevant and requested features from the Windows XP era when the current architecture and security model of Windows permits.

The new approach is drawing a mixed reaction from Windows users in the comments on Simons’ post.

On the surface, the ribbon looks inconsistent with the tile-based, Windows Phone-style design and fonts that Microsoft has adopted for the default Start screen in Windows 8. Microsoft will be giving more details on Windows 8 next month, and it will be interesting to see how the company bridges the new and old elements of the overall Windows interface.

Check out the video below where Alex illustrates few of the changes in the next Windows Explorer:


The new operating system is set to roll out next year, i'll love to hear your opinions on this, especially the Ribbon UI design.

3 Best Apps for tracking Hurricanes on Android

Written By Unknown on Monday 29 August 2011 | 08:38

Hurricane season is open, and that means keeping track of whether these storms will reach your hometown. Following the local news can be cumbersome if you're on the go, so why not use your Android device to help out? Here are three Android apps that can keep you informed on severe weather conditions.

hurricanehound

Hurricane Hound

Hurricane Hound is an app designed specifically for tracking storms. Each storm is labeled by name with several icons denoting the path the hurricane is predicted to take. These icons are colored and labeled based on the category rating the storm will be at each location. Storm warnings are also illustrated on the map in the form of colored lines. Finally, the potentially affected area of the storm is noted by a yellow coloring of the map, displaying the other possible trajectories for the storm.

This app is great for the purpose it was designed for; storm directions and strengths are clearly labeled, and it's very easy to pick up the app and understand what it's showing you. Even though you can't see where storms have previously traveled, you can easily pinpoint the current location because there is no old data on the map to obscure it.

HurricaneSoftware

Hurricane Software

This app is very similar to Hurricane Hound in appearance and features. A notable difference is the inclusion of recorded (as opposed to predicted) readings from previous locations. The storm's current location is indicated by a white circle around the icon, which is colored in a similar fashion to Hurricane Hound.

Instead of the yellow-colored trajectory area on the map, this app uses a connect-the-dots-style path for storms. While this won't show the exact path of a hurricane, it can give you a good idea (and as history has shown, storms can decide to go a completely different direction anyway). Also, the names of storms are hidden until you tap on one of the dots in a trajectory. This can be helpful if a lot of smaller storms are grouped in one area, keeping the map free of clutter.

WPBF

WPBF Hurricane

Though the phone numbers and shelter locations provided within this app are specific to Florida areas, the other tools can work for people living anywhere. There is also a sister app for the Louisiana area.

Aside from monitoring tools, this app also provides links to news stories and a hurricane checklist to help prepare for the oncoming severe weather. The map in WPBF displays the current location of storms, colored by category rating and your location, but it omits the storm's trajectory. Instead, a threat meter is provided on the main page, which is similar to the usefulness of a visual path. Reading this meter tells you the likelihood of your area being hit by a storm on a scale of 0 to 5, with 0 being no danger and 5 being an almost 100 percent guaranteed hit.

This app is an invaluable tool for planning ahead. Having checklists available for preparing your home, family, and pets for hurricanes can be a literal lifesaver--both for veterans of hurricane territory and those new to the region. Also, the inclusion of an easy-to-find and constantly updated newsfeed on storms is a huge plus.

If you're looking for an Android app to monitor storms, you really can't go wrong with any of these. Despite being similar, each app has at least one feature that makes it worth grabbing if you're serious about getting prepared for any storms headed your way.

5 Superb Mozilla Firefox Secrets !!!

Firefox-logo
While Firefox might be your chosen browser for its speed, useful add-ons, and open-source culture, it's also packed with many useful built-in features.

I've tried to dug through Firefox's endless list of features to find you the best, little-known secrets you can start using right now.

1. Customize search with Smart Keywords
A little-known Firefox feature lets you run searches within any given Web site from the browser's address bar. For example, to search for "TouchPad" within Amazon.com, all you'd have to do is type "amazon touchpad" in the Firefox bar.

To create a smart keyword, head to a Web site and locate the search field. Then, right-click the search field and select "Add Keyword for this search...". Create the bookmark, store it in a folder, and your smart keyword is now enabled. Try it with reference sites like Wikipedia and IMDB for quick access to answers.

2. Open multiple Web sites at launch
Who says you can have only one home page? You can set Firefox to open all your favorite Web sites at launch. For example, I'd like Prohackingtricks, Facebook, and Twitter to launch every time I open my browser.

In Firefox, go to Options > General. In the home page field, enter URLs separated by pipes. For example "http://www.prohackingtricks.blogspot.com | http://www.facebook.com | http://...." and so on. Then, hit "OK" and relaunch your browser to see the magic happen.

3. Bookmark an RSS feed
If you check certain Web sites frequently, especially news sites, you can create a bookmark that automatically updates with new stories from that feed. For example, Firefox stocks your toolbar with a "Latest Headlines" bookmark, but you can create your own.

Right-click the Firefox toolbar and select "Customize...". Then, drag and drop the RSS logo to the toolbar. Now, head to the site you want to subscribe to and click the RSS button in the toolbar. Then, enter the name of the bookmark and click "Add".

4. Take your settings on the go
Instead of re-adjusting Firefox--bookmarks, passwords, etc.--every time you use a new computer, take all your accounts and settings on the go. This is done by simply installing Firefox on a portable USB drive, and inserting into any computer you use.


5. Master keyboard shortcuts and mouse gestures
Firefox has built-in shortcuts to help you browse a lot faster. For example, there are shortcuts for rotating through tabs, re-opening a closed tab, and toggling Private Browsing. View the full list here.

Firefox has mouse gestures, too. Although they're not as elegant as Mac OS X gestures, they'll become second-nature after some practice. For example, Shift + scroll down sends you back, and alt+scroll lets you scroll by line.

For advanced gestures--like reloading a page by drawing a circle with your mouse--check out the FireGestures add-on.

I am definitely sure there are still great tips you might know that I've omitted, please do share them in the comments below.

Mac OS X Lion blindly accepts any LDAP password

Written By Unknown on Saturday 27 August 2011 | 10:46

mac-os-x-lion
Apple's latest version of Mac OS X is creating serious security risks for businesses that use it to interact with a popular form of centralized networks.

People logging in to Macs running OS X 10.7, aka Lion, can access restricted resources using any password they want when the machines use a popular technology known as LDAP for authentication. Short for Lightweight Directory Access Protocol, LDAP servers frequently contain repositories of highly sensitive enterprise data, making them a goldmine to attackers trying to burrow their way in to sensitive networks.

“As pen testers, one of the first things we do is attack the LDAP server,” Rob Graham, CEO of auditing firm Errata Security, said. “Once we own an LDAP server we own everything. I can walk up to any laptop (in an organization) and log into it.”

The LDAP breakdowns in Lion aren't well understood because Apple still hasn't admitted there's any problem. But according to threads here and here, it affects Macs running Lion that use LDAP to authenticate users to different desktop machines. After the initial login, Lion users can log in with any password. Apple's latest operating system, which was released last month, blindly accepts whatever pass code it's given.

Machines running Linux, Windows, and earlier versions of OS X authenticate just fine on the same LDAP servers, participants in the discussions reported. The are no widespread reports of problems when Lion machines log into networks that use protocols that compete with LDAP.

“Even though we have Open Directory running now (snark snark), we use OpenLDAP for our datacenter access and for clients,” a MacRumors newbie named monachus wrote. “Simply having Lion installed is a security vulnerability, as any user who can access OD settings can connect to the datacenter as any other users. It's a HUGE hole.”

The user said his company has delayed a company-wide upgrade to Lion because of the issue.

Lion users said the problem arose only after upgrading from earlier OS X versions. The first report was made on July 25, five days after the newest OS was released. Amazingly, Apple allowed the the security hole to persist even after last week's release of Lion 10.7.1, which fixed audio, video, and Wi-Fi glitches.

Apple's Mac has long been considered a safe haven from the malware and social engineering attacks that mar the experience of so many users of Microsoft's Windows OS. That's partly because the Mac's considerably smaller market share doesn't make it worth the investment to write highly weaponized exploits that hijack OS X users. It's also due in part to the non-trivial amount of resources and talent Apple has put into securing the OS, particularly in Lion.

Macs may be an excellent choice for individuals looking for a machine that's resistant to today's malware attacks found in the wild, but enterprises should think twice before deploying large fleets of them, a prominent security consultancy said recently. The recommendation is based on the finding that many of the OS X components used to administer Macs lack secure authentication protocols, making networks vulnerable to so-called APTs.

Short for advanced persistent threats, APTs are used to describe stealthy attacks used to steal proprietary data and national security information, such as those that have penetrated Google, RSA, and dozens of other corporations over the past 18 months.

“It's a pretty big deal for customers using LDAP as their authentication scheme, and it demonstrates that enterprise deployment scenarios are obviously not part of Apple's regression testing plan,” said Alex Stamos, one of the researchers at iSec Partners who said large corporate customers probably shouldn't deploy large number of Macs for now. “Hopefully heavy coverage of these issues will lead Apple to invest security resources into improving the areas of OS X important to enterprise users, not just end consumers.” ®

This article was updated to change language describing protocols that compete with LDAP and threats facing Macs.

Steve Jobs Apple CEO Resigned

steve.jobs
Steve Jobs has resigned as CEO of Apple and handed over the reins to his successor Tim Cook.

His resignation letter copy is posted below:
To the Apple Board of Directors and the Apple Community:
I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple’s CEO, I would be the first to let you know. Unfortunately, that day has come.
I hereby resign as CEO of Apple. I would like to serve, if the Board sees fit, as Chairman of the Board, director and Apple employee.
As far as my successor goes, I strongly recommend that we execute our succession plan and name Tim Cook as CEO of Apple.
I believe Apple’s brightest and most innovative days are ahead of it. And I look forward to watching and contributing to its success in a new role.
I have made some of the best friends of my life at Apple, and I thank you all for the many years of being able to work alongside you.
Steve
Steve was an inspiration to millions and was one of the greatest CEO’s and some the best in the past 25 years. He single handedly took Apple to where it is today.

Steve Jobs was born in San Francisco, California and was adopted by Paul and Clara and grew up in Mountain View, California, Steve’s biological parents were a Syrian father and an American student.
Steve cofounded Apple with Steve Wozniak Mike Markkula and was a college dropout.
He was a visionary par excellence and a marketing genius.

He has recovered from pancreatic cancer and had a liver transplant. He had been on medical leave for the past few months and had returned for the launch of iPad 2.
He was the Buddhist with a temper.

We will miss you Steve and love the products envisaged by you. !

About the author: Catherine Jones writes for Toyoya Place. She enjoys content and writing about the social sphere

Facebook Adds Emoticons To Chat, Use Anyone’s Face As Chat Emoticon

Written By Unknown on Thursday 25 August 2011 | 09:20

Before you laugh and say this isn’t news, remember that Facebook Chat connects 900 million+ people across the world. Emoticons can help us all overcome language barriers and communicate, even if just basically, with people we couldn’t speak to. And Facebook hopes to allow kids under age 13 onto the service eventually, and having emoticons could make the social network seem like it’s not just for adults.

Right now there’s only 21 emoticons in the menu, including the standard frown and wink, as well as a heart, devil, and the Like icon. Click one, and the text code for it will be added to your chat. You can still use emoticons like :-* to show a kiss even though it’s not in the menu, and yes, you can still use any celebrity or friend’s face by putting their name in double brackets. Try [[Zuck]] to send the face of Facebook’s fearless leader.


There’s currently no emoticon menu in the formal Messages part of the site, even though it’s connected to chat. There’s also no emoticon menus in the mobile apps, and if you send someone on mobile one from the web, it will just appear as a text code instead of a real emoticon. For example the Like-moticon just appears as its code (y) when sent to mobile.

This all might seem childish but some of the smartest people I know including big tech company founders frequently use emoticons when they text message. We need to stop judging, feeling guilty, or fearing they’re the death of literature. We make the rules now. All forms of communication are appropriate in the right time and place. So :-) on!

Thermal Cameras Allows Anyone to Steal ATM Pin Numbers

Written By Unknown on Wednesday 24 August 2011 | 11:11

ATM-Numbers.jpg
Summary Scientists are warning thieves could use thermal imaging cameras to capture a person's credit card pin number or door entry code.

Security researchers have found that thermal cameras can be combined with computer algorithms to automate the process of stealing payment card data processed by automatic teller machines.

At the Usenix Security Symposium in San Francisco, the researchers said the technique has advantages over more common ATM skimming methods that use traditional cameras to capture the PINs people enter during transactions. That's because customers often obscure a camera's view with their bodies, either inadvertently or on purpose. What's more, it can take a considerable amount of time for crooks to view the captured footage and log the code entered during each session.

Thermal imaging can vastly improve the process by recovering the code for some time after each PIN is entered. Their output can also be processed by an algorithm that automates the process of translating it into the secret code.

atm-pin-theft

The findings expand on 2005 research from Michal Zalewski, who is now a member of Google's security team. The Usenix presenters tested the technique laid out by Zalewski on 21 subjects who used 27 randomly selected PINs and found the rate of success varied depending on variables including the types of keypads and the subjects' body temperature.

“In summary, while we document that post-hoc thermal imaging attacks are feasible and automatable, we also find that the window of vulnerability is far more modest than some feared and that there are simple counter-measures (i.e., deploying keypads with high thermal conductivity) that can shrink this vulnerability further still,” the researchers wrote.
A PDF of their paper, which is titled Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks, is here.

PHP users are warned to stay away from latest update

php-logo
Maintainers of the PHP scripting language are urging users to avoid an update released last week that introduces a serious bug affecting some cryptographic functions.

The flaw in version 5.3.7 involves the crypt() function used to cryptographically hash a text string. When using the command with the MD5 algorithm and some salt characters to help randomize the resulting hash value, the program returns only the salt, instead of the salted hash. The bug doesn't appear to affect the crypt() function when the DES or Blowfish algorithms are used.

“If crypt() is executed with MD5 salts, the return value consists of the salt only,” a bug report published on Wednesday stated. “DES and Blowfish salts work as expected.”

Despite the advisory, PHP maintainers released the update the following day. It fixed several security vulnerabilities, including a buffer overflow flaw on overlog salt in the crypt() function.

On Monday, the maintainers advised users to steer clear of the update.

“Due to unfortunate issues with 5.3.7 users should wait with upgrading until 5.3.8 will be released (expected in few days),” they wrote.

PHP gives webmasters the ability to render dynamically generated web pages that are customized to hundreds of thousands of variables, including where a visitor is located, the type of browser he's using, and when the pages are being accessed. The freely available open-source program is used by millions of websites, so a vulnerability in its source code has the ability to cause widespread security problems.

For those who can't wait until the next release, fixes are available in intermediate versions available here and here.

Online IDE - C/C++, Java, PHP, Python, Perl and 40+ compilers & intepreters

online_ide
ideone.com is a... pastebin. But a pastebin like no other on the Internet. More accurate expression would be online mini IDE and debugging tool.

Ideone is an Italian word for great ideas - because ideone.com is a place where your greatest ideas can spring to life.

ideone.com is designed mostly for programmers (but, of course, common plain text can also be uploaded). You can use it to:

  • Share your code (that's obvious - it is a pastebin, isn't it? :)) in a neat way,

  • Run your code on server side in more than 40 programming languages (number still growing)

  • Do it all with your own input data!

  •  ideone.com also provides free Ideone API which is availabe as a webservice. It's functionality allows you to build your own ideone-like service!

  • For logged in users Ideone offers possibility to manage their codes, publish multiple submissions at one go, and more.


All codes can be accessed through convenient hash links. Source code pages provide information about the code and its execution: memory usage, execution time, language and compiler version, code itself, input uploaded by the user, output generated by the program and error messages from compilers and interpreters.

Read More

Marketing By Numbers.



Many people are commenting about the staggering innumeracy that features on today's cover of the UK's largest free newspaper.



Now, they could be suggesting that the whole is greater than the sum of the parts and that the more you eat the more delicious it becomes, but that sort of counting only works in effectiveness awards papers.



But it is important and not just because it will get passed around the internet. It's important because the people who usually are numerate i.e the finance department will yet again use it to diminish the credibility of those expensive arty marketers.



Marketing is not just about selling. It's about understanding business. If you don't understand numbers, you cant understand business and you should get your coat.



Anonymous hacks Defense Contractor

Written By Unknown on Saturday 20 August 2011 | 09:51

anonymous_hacks_defense_contractor
Hacktivist group Anonymous has infiltrated and downloaded sensitive email messages of a major U.S. government defense contractor.

The email data, purportedly belonging to Richard Garcia, senior vice president at Vanguard and former FBI agent, belongs to Vanguard Defense, a military contractor, which makes unmanned drones for the field.

The documents are publicised in a post on Pastebin, which links to the leaked cache of documents and data on another site.

The hack is said to have occurred by exploiting weaknesses in the Wordpress blogging system, through two out-dated plug-ins.

Part of the wider AntiSec movement — devoted to releasing data held by high-profile targets lacking appropriate security — this comes as another blow to the U.S. law enforcement capability, only a fortnight after AntiSec hackers released the largest cache of law enforcement data to date.

The Anonymous group in a statement says the leak contains: “internal meeting notes and contracts, schematics, non-disclosure agreements, personal information about other VDI employees, and several dozen “counter-terrorism” documents classified as “law enforcement sensitive” and “for official use only.”
It is not clear whether the ’schematics’ stolen relate to the drones manufactured by Vanguard Industries or not. The email data, however, are marked as classified material, with “confidential” and “for official use only” markings.

The hackers did not point to a reason why Vanguard Industries was targeted, except crediting the hack as part of the ongoing “F**k FBI Friday” campaign.

“We are doing this not only to cause embarrassment and disruption to Vanguard Defense Industries, but to send a strong message to the hacker community. White hat sellouts, law enforcement collaborators, and military contractors beware: we’re coming for your mail spools, bash history files, and confidential documents”, reads the Pastebin-posted statement.
Another key message in the statement points to InfraGard, which the message calls a “sinister alliance of law enforcement, military and private security contractors” which protect infrastructure that “[Anonymous] aim to destroy.”

Quick Tips to Backup your Linux Computer

Linux gives you plenty of control over your computer, but with great power comes great responsibility. That means backing up your files regularly (among other things), and while cloud storage is attractive, for many of us, it's not enough. Here's how to back up your data (note: I am using Ubuntu, so the details may differ somewhat if you use a different distribution):

Related tutorial: 16 Cool Ubuntu Tips for Linux Users

1. From the search bar, just type "backup" to bring up preinstalled options. I'll be using Simple Backup Suite.

2. From the first tab (General), tell Linux how often you want to perform a complete back up and what format, if any, to use for compression.


Step 2: General tab.

3. Select the Include tab to add files and directories. The default is pretty good for most users, but you may have some files hidden away that deserve to be backed up, so be thorough! You only have to do this once.

4. Select the Exclude tab if you want to keep some files or subfolders from being archived. There's no special reason to do this unless you're trying to save space (or you're a bit compulsive).

5. Make sure to select the Destination tab to pick your storage location. As with any other backup, you'll want it to be as secure as possible. A network location is probably best, though your needs may vary.


Step 5: Destination tab.

6. The Schedule tab lets you set a schedule to do incremental backups of files that have changed since the last backup. This happens in the background and shouldn't interrupt your day-to-day work.

7. Click the disk icon at the top to save your settings, then click the drive icon to back up your files. The first one will take a while, most likely, as will future complete backups, so you may want to schedule them for downtimes.

That's it. Once you've worked through this, the only reason you'd need to revisit the tool is to change the frequency, location, or contents of your backups. Do it as soon as you can--even Linux can't protect you from disk failure!

Pypy 1.6 Released: Alternative Implementation of Python 2.7.1

Written By Unknown on Friday 19 August 2011 | 09:09

Pypy-1.6
The Pypy team has just announced the release of PyPy 1.6. This release brings a lot of bugfixes and performance improvements over 1.5, and improves support for Windows 32bit and OS X 64bit. This version fully implements Python 2.7.1 and has beta level support for loading CPython C extensions.

What is PyPy?

PyPy is a fast, compliant Python interpreter, almost a drop-in replacement for CPython 2.7.1. It's fast (pypy 1.6 and cpython 2.6.2 performance comparison) due to its integrated tracing JIT compiler.

This release supports x86 machines running Linux 32/64 or Mac OS X. Windows 32 is beta (it roughly works but a lot of small issues have not been fixed so far). Windows 64 is not yet supported.

The main topics of this release are speed and stability: on average on our benchmark suite, PyPy 1.6 is between 20% and 30% faster than PyPy 1.5, which was already much faster than CPython on our set of benchmarks.

The speed improvements have been made possible by optimizing many of the layers which compose PyPy. In particular, we improved: the Garbage Collector, the JIT warmup time, the optimizations performed by the JIT, the quality of the generated machine code and the implementation of our Python interpreter.

Highlights
  • Numerous performance improvements, overall giving considerable speedups

  • JitViewer: this is the first official release which includes the JitViewer, a web-based tool which helps you to see which parts of your Python code have been compiled by the JIT, down until the assembler. The jitviewer 0.1 has already been release and works well with PyPy 1.6.

  • The CPython extension module API has been improved and now supports many more extensions. For information on which one are supported, please refer to our compatibility wiki.

  • Multibyte encoding support: this was of of the last areas in which we were still behind CPython, but now we fully support them.

  • Preliminary support for NumPy: this release includes a preview of a very fast NumPy module integrated with the PyPy JIT. Unfortunately, this does not mean that you can expect to take an existing NumPy program and run it on PyPy, because the module is still unfinished and supports only some of the numpy API. However, barring some details, what works should be blazingly fast :-)

  • Bugfixes: since the 1.5 release we fixed 53 bugs in our bug tracker, not counting the numerous bugs that were found and reported through other channels than the bug tracker.


Download and Install
(Note: windows binary are not available yet)

These binaries include a Just-in-Time compiler. They only work on x86 CPUs that have the SSE2 instruction set (most of them do, nowadays), or on x86-64 CPUs. (This is the official release 1.6; for the most up-to-date version see below.)

If your CPU is really old, it may not have SSE2. In this case, you need to translate yourself with the option --jit-backend=x86-without-sse2.

Notes:

  • It is recommended to use PyPy to do translations, instead of using CPython, because it is twice as fast. You should just start by downloading an official release of PyPy (with the JIT).

  • If RAM usage is a problem, then you can (for now) tweak some parameters via environment variables and command-line options. The following command takes a bit more time, but finishes with only using 3.0 GB of RAM (on Linux 64-bit; probably not much more than 1.5 GB on 32-bit). It should be noted that it is less than with CPython.


PYPY_GC_MAX_DELTA=200MB pypy --jit loop_longevity=300 ./translate.py -Ojit
  • Because of asmgcroot, compiling the generated C files containing the JIT is delicate. It requires using either MSVC or gcc with no particularly fancy options. It does not work e.g. with clang, or if you pass uncommon options with the CFLAGS environment variable. You can also try to compile PyPy with the shadow stack option.


Checksums

Here are the checksums for each of the downloads (md5 and sha1):

ee949986fc5ec5c4a11ecbd546b87fbb    pypy-1.6-linux.tar.bz2
a34e3113508449393e874f409dd888fc    pypy-1.6-linux64.tar.bz2
78bbf70f55e9fec20d7ac22531a997fc    pypy-1.6-osx64.tar.bz2
1bdef4c7adc023033552754258fd02bb63612632    pypy-1.6-linux.tar.bz2
4a42625139351f9a1c2f8d7ec13ff636cfc9d8ac    pypy-1.6-linux64.tar.bz2
d703aa34fe1a45682ce4a09470ee9b1fa873d9be    pypy-1.6-osx64.tar.bz2
Or read more here.

IBM Plans To Create Chips That Mimic Human Brain

ibm-chips-thinks-like-human-brain
Computers, like humans, can learn. But when Google tries to fill in your search box based only on a few keystrokes, or your iPhone predicts words as you type a text message, it's only a narrow mimicry of what the human brain is capable.

The challenge in training a computer to behave like a human brain is technological and physiological, testing the limits of computer and brain science. But researchers from IBM Corp. say they've made a key step toward combining the two worlds.

IBM announced yesterday that it has received $21 million in funding from the Defense Advanced Research Projects Agency (DARPA) to develop a series of experimental computer chips designed to replicate the human brain’s perceptive, active and cognitive abilities.

According to IBM, the “neurosynaptic” chips “recreate the phenomena between spiking neurons and synapses in biological systems, such as the brain, through advanced algorithms and silicon circuitry” — meaning that they can be used to build complex, multi-sensory learning systems (“cognitive computers”) that behave more like human brains than calculators.

These computers will be able to learn through experiences, detect patterns and develop hypotheses, as well as remember and learn from the outcomes.

IBM and its partners even think the computers will be able to rival the brain’s compact size and relatively low power usage. The team’s long-term goal is to build a system with 10 billion neurons and 100 trillion synapses that is less than two liters in volume and consumes merely one kilowatt of power. To do so, they’ll need to abandon traditional Von Neumann architecture in favor of more efficient architecture that does away with set programming and integrates memory and processors.

The chips will be particularly advantageous in processing and reacting to information from multiple sensory modes in real time. IBM describes two potential use cases, one in which a system monitoring the world’s water supply could record and report metrics such as temperature, pressure, wave height, acoustics and ocean tide, and issue tsunami warnings based on its decision making; and another in which a grocer stocking shelves could use an instrumented glove that monitors sights, smells, texture and temperature to flag bad or contaminated produce.

“This is a major initiative to move beyond the von Neumann paradigm that has been ruling computer architecture for more than half a century,” observes Dharmendra Modha, project leader for IBM Research. “Future applications of computing will increasingly demand functionality that is not efficiently delivered by the traditional architecture. These chips are another significant step in the evolution of computers from calculators to learning systems.”
To learn more, watch IBM researchers John Arthur and Paul Merolla describe the inspiration for the project (called “SyNAPSE”) below, and/or check out research.ibm.com.

HP murders WebOS tablets, PC Business up for Sale!

Am still finding it hard to believe, but it's the truth. HP has announced that it will discontinue its webOS TouchPad and webOS phones, just weeks after the arrival of the TouchPad and a little more than a year after the company acquired the webOS mobile operating system from Palm in a $1.2bn purchase.

To make matters even more confusing the company, according to Bloomberg and reported by tech blogger Paul Thurrott, plans to sell off it’s PC business, the biggest PC making business in the world that is, and move solely into servers for the future.

In a press release floated before the company's quarterly earnings call, HP also confirmed that it is considering a spinoff of its PC business. In April, the company announced that it would bring webOS to PCs as well as new mobile devices.

Separately, the statement confirmed that HP is in discussions to buy enterprise software company Autonomy. The HP homepage, however, clearly says that the company is "to acquire Autonomy":


"HP...plans to announce that its board of directors has authorized the exploration of strategic alternatives for its Personal Systems Group (PSG). HP will consider a broad range of options that may include, among others, a full or partial separation of PSG from HP through a spin-off or other transaction," read Thursday's press release from HP.

"In addition, HP reported that it plans to announce that it will discontinue operations for webOS devices, specifically the TouchPad and webOS phones."

The company said it would "continue to explore options to optimize the value of webOS software going forward."

This week, AllThingsD reported that US retailer Best Buy is sitting on about 250,000 unsold TouchPads, and HP had slashed the price of the tablet in hopes of selling more units.

In its press release, HP said that its fiscal third quarter revenues reached $31.2 billion, up from $30.7 billion a year ago. This is less than Wall Street analysts anticipated, and they will also be disappointed with HP's fourth quarter forecast, which puts revenues between $32.1 billion to $32.5 billion.

HP announced that its total fiscal 2011 revenue will be $127.2 billion to $127.6 billion range, which is less than its previous estimates: between $129 billion and $130 billion.

Apple releases Lion Update, Promises to fix Bug

Written By Unknown on Wednesday 17 August 2011 | 08:39

Mac OS X Lion
Apple has released an update for its new Mac OS X 10.7, aka Lion, that promises to fix a number of vexing bugs that have been burbling into view in discussions on Apple's user forums.

The update, version 10.7.1, comes in four flavors: a general update for both Mac OS X Lion client and server, an update specific to the 2011 versions of the MacBook Air and Mac mini client, and one for the Mac mini server.

Each update, Apple says, will fix the oft-reported problem of system audio clamming up when using HDMI or optical audio–out ports. Also fixed is the tendency for the system to hang when playing a video in Safari, and the failure to transfer data, settings, and compatible applications to a new Mac also running Lion.

There are also improvements in Wi-Fi reliability, and a fix is included for the occasional disappearance of an admin account – oops – after updating to Lion from a Snow Leopard system.

The two server-specific upgrades add to this list improved reliability of the Apple File Service. The MacBook Air update also fixes occasional screen flickering and the Air's tendency to boot up when its MacSafe power adapter is attached to it, and the Mac mini updates fix an SD card-slot speed drop when reading either an SD or SDHC card.

As usual, you can either install the 10.7.1 update by selecting Apple > Software Update, or by downloading it from the appropriate link.

General client update:

This update addresses a number of issues, including:

  • Address an issue that may cause the system to become unresponsive when playing a video in Safari

  • Resolve an issue that may cause system audio to stop working when using HDMI or optical audio out

  • Improve the reliability of Wi-Fi connections

  • Resolve an issue that prevents transfer of your data, settings, and compatible applications to a new Mac running OS X Lion

79.29 MB download

Update for MacBook Air and Mac mini 2011 (Client):

This update addresses a number of issues, including:

  • Address an issue that may cause the system to become unresponsive when playing a video in Safari

  • Resolve an issue that may cause system audio to stop working when using HDMI or optical audio out

  • Improve the reliability of Wi-Fi connections

  • Resolve an issue that prevents transfer of your data, settings, and compatible applications to a new Mac running OS X Lion

  • Resolve an issue where MacBook Air may boot up when MagSafe Adapter is attached

  • Resolve an issue causing intermittent display flickering on MacBook Air

  • Resolve an issue that causes the SD card slot in Mac mini to run at reduced speed with SD and SDHC media

68.86 MB download

Neither of these patches includes security updates.

Android Malware Posing as Google+ app

android-malware
A new flavor of Android malware is disguising itself as a Google+ app in an attempt to capture instant messages, GPS, location, call logs, and other sensitive data.

Uncovered by the team at Trend Micro, the new malware known as ANDROIDOS_NICKISPY.C can also automatically answer and record phone calls. To capture data, the app loads at boot-up and runs certain services that can monitor messages, phone calls, and the user's location, thereby stealing e-mail and other content.

Detailing its findings in a blog Friday, Trend Micro said it discovered that the malicious app tries to trick people by installing itself under the name Google++.

But instead of providing access to Google's new social network, the app sends its stolen user data to a remote site where presumably cybercriminals can grab it. Unlike some malware in the past that masqueraded as legitimate apps through Google's Android Market, this particular one must be downloaded by an unsuspecting user from a malicious Web site and then manually installed.

And even if installed, the app can be uninstalled from an Android device by selecting Settings > Application > Manage applications, choosing Google++ and then clicking Uninstall, according to Trend Micro.

Trend Micro gives the app a low-risk rating, but it's still something that Android owners should be sure to avoid.

Android users concerned about security can learn how to better protect themselves through Trend Micro's online guide "5 Simple Steps to Secure Your Android-Based Smartphones."

Mozilla Releases Firefox 6 for Coders

firefox
Mozilla has officially released Firefox 6, offering a new JavaScript editor and several other tools aimed at web developers.

Over the weekend, the open source outfit posted the latest stable version of Firefox to its FTP servers, but the browser wasn't formally released on the web until Tuesday.

Firefox 6 is the second incarnation of the browser released under Mozilla's new quarterly development cycle. Previously, the organization rolled out a new Firefox every eighteen months or so, but then Google upped the ante.

With the latest version, Mozilla says, it has improved the startup time of Panorma, a means of organizing your browser tabs, and it has tweaked the "Awesome Bar" – the Firefox address bar – to make it easier to identify exactly where you are on the web. But the biggest changes are for developers.

Mozilla has added a text editor called Scratchpad that lets developers enter, execute, test, and tweak JavaScript code. The idea to offer an alternative to Firefox's Web Console or the Firebug command line, which are designed around a single-line interface. "Interaction with Scratchpad is quite different. It throws away the 'one line of input gives you a line of output' interaction in favor of a text editor that knows how to run JavaScript," Mozilla says.

But if you prefer the Web Console, Mozilla has updated it as well, improving the auto-complete tool and letting you change where the console is located. In the past, the console was anchored to the top of the browser window, but you can now move it to the bottom or open it in a separate window.

The open source outfit has also added a "Window.matchMedia" API to help developers optimize their site or web app across disparate platforms, and "Prefixed WebSockets" and "server-sent event" APIs, designed to facilitate communication between Firefox and back-end web servers.

Packed with all sorts of additional security and bug fixes, Firefox is available for Windows, Mac, and Linux. You can download it here.

Mozilla also released a new version of Firefox for Android on Tuesday, adding a new welcome screen designed to provide quicker access to various tools, working to improve image rendering, and rolling in a few tools for those building mobile web apps. This includes a "single touch events" API, for detecting screen touches and gestures, and IndexedDB API, which provides local database storage for apps that need to work offline.

The new Firefox for Android is now available from Google's Android Market.

Apple's Mac OS X 10.7 Available on Flash Drive for $69

lion_thumb
You can now purchase Apple's Mac OS X 10.7, aka Lion, on a flash drive for $69 – and, yes, it's the exact same operating system that's available at the online Mac Store for $29.99.

The USB thumb drive is available through Apple's online store, where Apple explains that the $69 lets you install the company's new OS without a broadband connection. That's a $40 convenience free.

Apple doesn't note the size of the flash drive upon which Lion resides, but the Mac App Store download weighs in at 3.49GB, so we're betting that their slim, oh-so-sexy, Apple-branded thumb drive is a 4GB model.

Do note that you can pick up a 4GB Kingston DataTraveler 101 Gen 2 for $7.99 at Amazon (£4.26 in the UK).

If you don't feel like shelling out seventy bucks for the privilege of owning your own Lion-installation flash drive, Lifehacker has a handy tutorial on how to make your own – or an installation DVD, for that matter. We haven't needed to give their method a try, and we don't vouch for its legality, but you're mature enough to make your own decisions, right?

Exclusive: Google Buys Motorola For $12.5 Billion

Written By Unknown on Monday 15 August 2011 | 05:04

Motorola-Mobility
Nobody saw this coming: Google just announced that it is acquiring Motorola Mobility. The search and online advertising company is buying the company for approximately $12.5 billion (or $40 per share), in cash. As the press release puts it,

The acquisition of Motorola Mobility, a dedicated Android partner, will enable Google to supercharge the Android ecosystem and will enhance competition in mobile computing. Motorola Mobility will remain a licensee of Android and Android will remain open. Google will run Motorola Mobility as a separate business.

According to a blog post, Larry Page CEO & co-founder of Google writes that Google has acquired Motorola not only because of its strength in Android smartphones and devices, but also for being a “market leader in the home devices and video solutions business.”

He said the move is to also strenghten the company's patent portfolio as it will “enable us to better protect Android from anti-competitive threats from Microsoft, Apple and other companies”.

Full press release is as follows:

Google to Acquire Motorola Mobility

Combination will Supercharge Android, Enhance Competition, and Offer Wonderful User Experiences

MOUNTAIN VIEW, Calif. & LIBERTYVILLE, Ill.–(BUSINESS WIRE)–Google Inc. (NASDAQ: GOOG) and Motorola Mobility Holdings, Inc. (NYSE: MMI) today announced that they have entered into a definitive agreement under which Google will acquire Motorola Mobility for $40.00 per share in cash, or a total of about $12.5 billion, a premium of 63% to the closing price of Motorola Mobility shares on Friday, August 12, 2011. The transaction was unanimously approved by the boards of directors of both companies.

“Motorola Mobility’s total commitment to Android has created a natural fit for our two companies. Together, we will create amazing user experiences that supercharge the entire Android ecosystem for the benefit of consumers, partners and developers. I look forward to welcoming Motorolans to our family of Googlers.”

The acquisition of Motorola Mobility, a dedicated Android partner, will enable Google to supercharge the Android ecosystem and will enhance competition in mobile computing. Motorola Mobility will remain a licensee of Android and Android will remain open. Google will run Motorola Mobility as a separate business.

Larry Page, CEO of Google, said, “Motorola Mobility’s total commitment to Android has created a natural fit for our two companies. Together, we will create amazing user experiences that supercharge the entire Android ecosystem for the benefit of consumers, partners and developers. I look forward to welcoming Motorolans to our family of Googlers.”

Sanjay Jha, CEO of Motorola Mobility, said, “This transaction offers significant value for Motorola Mobility’s stockholders and provides compelling new opportunities for our employees, customers, and partners around the world. We have shared a productive partnership with Google to advance the Android platform, and now through this combination we will be able to do even more to innovate and deliver outstanding mobility solutions across our mobile devices and home businesses.”

Andy Rubin, Senior Vice President of Mobile at Google, said, “We expect that this combination will enable us to break new ground for the Android ecosystem. However, our vision for Android is unchanged and Google remains firmly committed to Android as an open platform and a vibrant open source community. We will continue to work with all of our valued Android partners to develop and distribute innovative Android-powered devices.”

The transaction is subject to customary closing conditions, including the receipt of regulatory approvals in the US, the European Union and other jurisdictions, and the approval of Motorola Mobility’s stockholders. The transaction is expected to close by the end of 2011 or early 2012.

Adobe Releases Muse, Building Website without Coding knowledge

Muse-code-name
Adobe Systems today is expanding its efforts at putting Web design tools within reach of those who don't want to learn how to hand code.

The company is introducing a new application codenamed Muse. Built on its AIR platform, Muse lets users create and publish Web sites like they would make a site mock-up in the company's InDesign or Illustrator software. Adobe promises it will simplify the process for designers who would have previously had to hand off their designs to developers to do the coding necessary to turn that mock-up into an actual site.

Adobe says part of the reason to build such a tool stemmed from a study it did that found most Web design products require users to learn code, something that could be problematic for the more than half of designers surveyed who still did mainly print work.

"What we're seeing is that the tools that have been made available for designers to be able to create digital experiences require people to learn code. And most designers either don't want to, or they're not interested--or they've learned, and it's just not the way their brain works," said Jane Brady, the senior product marketing manager of Adobe's creative suite. "What they kept telling us is that they want to be able to create a Web site or other kinds of digital content as easily as if they're working in InDesign, Illustrator, or Photoshop."

The company's solution was to grab some former InDesign engineers and put them to work on a product that would do just that, with Muse being the result.

Muse
Adobe's Muse software aims to give designers a way to mock up site designs that are actual full-working Web sites.

The software (which Adobe says will get a new name when it's out of beta) lets users design a Web site using a familiar Adobe creative tool set, plugging in backgrounds, headers, footers, menus and Web widgets in a what you see is what you get (WYSIWYG) menus. Page assets like photos and image elements can then be worked on in the company's other design software including Photoshop. All the while, any code that's powering the site sits quietly behind the scenes. Designers can see how their work looks by loading it up in a built-in, Webkit-based browser, or sending it to open in a browser that's installed on their computer.

Muse is being offered up as a standalone app, and has not been designed to interact with Dreamweaver, the company's other Web design software product. It cannot, for instance, open up Dreamweaver files, or offer a way to make edits to Muse code within Dreamweaver.

"We're in an interesting world where our primary goal is to support that visual designer, but they don't live in a vacuum. There's so much going on around them, that we do need to make Muse extensible," said Danielle Beaumont, Muse's group product manager. "But a little bit like a PDF or a Postscript file, we feel like it's our job to generate fantastic code that loads very very quickly and is cutting edge, but we're not looking at generating code that a hand-coder would like to take forward and try to wrap it back into Muse."

Muse has, however, been set up to accept chunks of arbitrary HTML, and make use of Web widgets that can be embedded into pages, things like YouTube videos and Google Maps.

One thing you won't find in the initial release are templates, a mainstay of consumer-facing Web site builders, and even Adobe's own Dreamweaver site building software. "I'll be really honest--templates sometimes really insult visual designers," said Beaumont. "Examples of Web sites that [designers] might want to emulate? Sure that makes a lot of sense." What Beaumont said the company doesn't want is something where users plug in a different photo and consider their work done. Users, however, can import things like .png, .gif, animated .gif, and .flv files, along with content from the company's Edge product.

Building a builder

Like the reason for making the software in the first place, the ramp-up to actually build Muse centered on consumer research. Following its market research, Adobe's plan involved hosting workshops in San Francisco and Seattle to talk with designers about work flows and features. The company also tapped print-centric designers at a local San Francisco design academy, giving them early access to the software and seeking feedback on ways to improve it.

"Early on we realized that as we developed the product, we wanted input from the community. But the community we're working with isn't a Web community necessarily," Beaumont said. "These are visual designers, they're probably highly accomplished. They're not necessarily folks who play with beta software that hasn't been stabilized. They don't necessarily search the Web and go to pre-release sites and post comments in forums to figure out how to intuit a product that's being evolved."

That puts Adobe in a tight spot with the product's release since that's exactly what Muse will be during its beta phase. The company's answer to that is to offer as a free beta for the next six months in order to squash bugs and tighten up features, followed by a version 1.0 software in the first quarter of next year. Following the end of that beta period, Adobe's going to offer it as a subscription service that users pay $20 a month to use, or $15 a month if they buy a whole year at a time ($180). The company admits that the system may not be for everyone but notes that offering it as a subscription service comes with some benefits as a result.

"The way we recognize revenue, once you ship something, we can't add another feature until we add another version," Brady said. "We want to be able to add functionality, and from a product development standpoint, if we know everybody on the marketplace is on the same version, we don't need to worry about different versions--with a subscription they're always on the latest version." That's especially important given the rapid development of browsers and Web standards, Brady argued.

That strategy also continues the trend of Adobe offering its software as a subscription, something it took a big step in as part of an update to its Create Suite product line in April. One big difference in that case is that you can continue to purchase that software bundle up front. The big incentive Adobe's offering with both the subscription-based version of its Creative Suite and Muse is giving paying subscribers the most up to date version of those products.

Muse follows hot on the heels of Adobe's public preview of its Edge software. That tool lets people create animation effects for Web pages using a timeline approach, akin to a video editor, as opposed to having them hand-code everything. Like Muse, that product too is being offered up as a preview ahead of becoming a paid service next year.

Adobe has set up a website where interested parties can download the free beta, view a gallery of Muse-created websites, and access instructional tutorials. Some 40 websites designed with Muse have already been published by Adobe's pre-release community.

Muse requires a dual core Mac running OS X 10.6 or higher and Adobe AIR 2.7 or higher. The program is cross-platform. Complete system requirements are listed on Adobe's website.

Anonymous hacks SF’s myBART website. Thousands of names, addresses & numbers released.

Anonymous has apparently made good on a promise to wreak havoc on the Web site of the Bay Area Rapid Transit System today, although not exactly as planned.

Earlier, the amorphous collective had threatened to take Bart.gov offline for six hours today, or twice the amount of time BART managers took cell phone service offline at some BART stations Thursday night in order to head off a planned protest then. The distributed denial of service (DDoS) attack was supposed to begin at noon pacific time, according to a release from Anonymous.

As of 30 minutes past noon, the BART site was still online but running a little slow and with one notable change to the mybart.org Web site, which currently displays the Anonymous logo as seen below.

mybart
MyBart.org was still defaced as of 12:35 PM Pacific time on Sunday.

As screen captures of the defacement began rocketing around Twitter, news came that Anonymous hackers had also accessed and posted online a database of mybart.org with user e-mails and some addresses and phone numbers.

Shortly after the mybart.org defacement, a more elaborate mark was left on californiaavoid.org, a Web site maintained by the California Office of Traffic Safety. The #opBART Facebook page claims the defacements are part of Anonymous' protest effort against BART.


caavoid
Californiaavoid.org as of 12:40 PM Pacific on Sunday.


For a brief period, BART posted two news releases on its Web site, one advising customers that its Web site could be attacked and go offline Sunday afternoon, another warning of possible interruptions to train service due to Anonymous' planned peaceful, in-person protest during Monday evening's rush hour. As of this writing, both releases are no longer visible, and BART.gov remains online almost an hour after Anonymous planned to take it down for the remainder of the afternoon.

Anonymous plans to take down BART Web site today

opbarttw.PNG
Hacktivist group Anonymous says it will take the Web site of the Bay Area Rapid Transit (BART) system off line later today for six hours while also inundating BART fax lines and e-mail accounts. A press release published online detailing the group's plans says the actions are in retaliation for BART's unilateral shutdown of cell phone service Thursday night at some BART stations to prevent another planned protest.

The Thursday demonstration had been planned to protest the fatal shooting of a man by a BART police officer last month. BART officials said they took cell phone service offline in an attempt to disrupt the planned protest, which was to be coordinated via mobile devices, because they worried the demonstration could "lead to platform overcrowding and unsafe conditions for BART customers, employees and demonstrators." An earlier protest last month had disrupted BART service.

Chatter about #OpBART cropped up Friday on Twitter, but few details could be found until plans for a peaceful protest Monday evening outside a central San Francisco BART station began circulating. That was followed with this posting late Saturday of the planned attack on BART's e-mail, faxes, and Web site:

Anonymous will take the following actions over the next 48 hours.
1) We have begun at once a massive Black Fax and E-Mail Bomb action, where we will fill every inbox and fax machine at BART with thousands of copies of our message that this outage was unacceptable
2) Tomorrow, Sunday - August 14, 2011 at High Noon Pacific Time we, Anonymous - will remove from the internet the web site of BART located at www.bart.gov for exactly six hours. That's twice as long as they shut off the cell phones for.
3) On Monday - August 15, 2011 at 5:00 PM Pacific Time there will be a physical protest at the Civic Center Bart Station. Expect us !
BART spokesman Jim Allison said, they are aware of both the planned cyberattacks and Monday's planned protest. He would not elaborate on any plans to deal with either, but said that BART will "continue trying to provide information to our customers [via the BART Web site.]"

Allison says he has not yet heard or seen any evidence of the e-mail and fax "bomb" campaign that the Anonymous release claims is already underway.

As Sunday commuting was just getting underway, at least one sympathetic Twitter account was already reporting support for Anonymous' cause:

"Wow...walking to the @SFBART and I'm starting to see people with masks on. "

Buku Accurate

Written By Unknown on Friday 12 August 2011 | 19:27

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger