Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Samsung "Conroes" the APS-C sensor market (slrlounge.com)

GhostX9 writes: SLR Lounge just posted a first look at the Samsung NX1 28.1 MP interchangeable lens camera. They compare it to Canon and Sony full-frame sensors. Spoiler: The Samsung sensor seems to beat the Sony A7R sensor up to ISO 3200. They attribute this to Samsung's chip foundry. While Sony is using 180nm manufacturing (Intel Pentium III era) and Canon is still using 500nm process (AMD DX4 era), Samsung has gone with 65nm with copper interconnects (Intel Core 2 Duo — Conroe era). Furthermore, Samsung's premium lenses appear to be as sharp or sharper than Canon's L line and Sony's Zeiss line in the center, although the Canon 24-70/2.8L II is sharper at the edge of the frame.

Submission + - Could Tizen be the next Android? (dailydot.com)

MollsEisley writes: Right now, Tizen is still somewhat half-baked, which is why you shouldn’t expect to see a high-end Tizen smartphone hit your local carrier for a while yet, but Samsung’s priorities could change rapidly. If Tizen development speeds up a bit, the OS could become a stand-in for Android on entry-level and mid-range Samsung phones and eventually take over Samsung’s entire smartphone (and tablet) lineup.
Intel

Submission + - Intel challenges ARM on power consumption... and wins. (tomshardware.com)

GhostX9 writes: Tom's Hardware just published a detailed look at the Intel Atom Z2760 in the Acer Iconia W510 and compared it to the NVIDIA Tegra 3 in the Microsoft Surface. They break it down and demonstrate how the full Windows 8 tablet outperforms the Windows RT machine in power consumption. They break down power consumption to include the role of the CPU, GPU, memory controller and display. Anandtech is also reporting similar findings, but only reports CPU and GPU utilization.
Security

Submission + - Living In An Unsecured World (tomshardware.com)

GhostX9 writes: Charlie Miller, Accuvant Principal Research Consultant, and keynote speaker at the recent NATO Cooperative Cyber Defence Centre of Excellence’s upcoming 3rd International Conference on Cyber Conflict, speaks with Alan Dang of Tom's Hardware about living in an unsecured world. In it, he goes over his recent MacBook battery exploit and the challenges of computing security in the upcoming future.

Comment Re:Not sure if this patent is still applicable (Score 1) 101

If you read the patent instead of skimming it, they talk about how the processors can be integrated into a single integrated circuit. The trick behind patent lawsuits is to wait long enough so that the infringing companies owe you a lot of money, but not so long that you lose your ability to successfully win the lawsuit.

Comment Explanation of the patent (Score 1) 101

Kodak hasn't patented the idea of a video preview for a still camera. They patented the idea of taking limited information for the sensor (i.e. skipping pixels) in a specific way to provide a faster, low-quality video preview instead of previewing the data off the entire sensor. Additionally, they talk about taking the data off the sensor in a specific way so that the pixels still maintain the Bayer-filter. When Kodak sold off their OLED technology, I thought they were screwed. With this patent, they may actually have a case...
Security

The iPhone SMS Hack Explained 94

GhostX9 writes "Tom's Hardware just interviewed Charlie Miller, the man behind the iPhone remote exploit hack and winner of Pwn2Own 2009. He explains the (now patched) bug in the iPhone which allowed him to remotely exploit the iPhone in detail, explaining how the string concatenation code was flawed. The most surprising thing was that the bug could be traced back to several previous generations of the iPhone OS (he stopped testing at version 2.2). He also talks about the failures of other devices, such as crashing HTC's Touch by sending a SMS with '%n' in the text."
Security

Submission + - The iPhone SMS Hack Explained

GhostX9 writes: Tom's Hardware just interviewed Charlie Miller, the man behind the iPhone remote exploit hack and winner of Pwn2Own 2009. He explains the (now patched) bug in the iPhone which allowed him to remotely exploit the iPhone in detail, explaining how the string concatenation code was flawed. The most surprising thing was that the bug could be traced back to several previous generation of iPhone OS's (he stopped testing at version 2.2). He also talks about the failures of other devices such as crashing HTC's Touch by sending a SMS with "%n" in the text.
Security

Security Threats 3 Levels Beyond Kernel Rootkits 264

GhostX9 writes "Tom's Hardware has a long interview with security expert Joanna Rutkowska (which is unfortunately split over 9 pages). Many think that kernel rootkits are the most dangerous attacks, but Joanna and her team have been studying exploits beyond Ring 0 for some years. Joanna is most well known for the BluePill virtualization attack (Ring -1) and in this interview she chats a little bit about Ring -2 and Ring -3 attacks that go beyond kernel rootkits. What's surprising is how robust the classic BluePill proof-of-concept is: 'Many people tried to prove that BluePill is "detectable" by writing various virtualization detectors (but not BluePill detectors). They simply assumed that if we detect a virtualization being used, this means that we are "under" BluePill. This assumption was made because there were no products using hardware virtualization a few years ago. Needless to say, if we followed this way of reasoning, we might similarly say that if an executable makes network connections, then it must surely be a botnet.'" Rutkowska says that for her own security, "I don't use any A/V product on any of my machines (including all the virtual machines). I don't see how an A/V program could offer any increased security over the quite-reasonable-setup I already deployed with the help of virtualization." She runs three separate virtual machines, designated Red, Yellow, and Green, each running a separate browser and used for increasingly sensitive tasks.
Security

Submission + - Security Threats 3 Levels Beyond Kernel Rootkits

GhostX9 writes: Tom's Hardware recently interviewed security expert Joanna Rutkowska. Many think that kernel rootkits are the most dangerous attacks, but Joanna and her team have been studying exploits beyond Ring 0 for some time. Joanna is most well known for the red pill/blue pill virtualization attack (Ring -1) and in this interview chats a little bit about Ring -2 and Ring -3 attacks that go beyond kernel rootkits. What's surprising is how robust the classic BluePill proof-of-concept is:

'Many people tried to prove that BluePill is "detectable" by writing various virtualization detectors (but not BluePill detectors). They simply assumed that if we detect a virtualization being used, this means that we are "under" BluePill.This assumption was made because there were no products using hardware virtualization a few years ago. Needless to say, if we followed this way of reasoning, we might similarly say that if an executable makes network connections, then it must surely be a botnet.'
Google

Submission + - A Closer look at Chromium and Browser Security (tomshardware.com)

GhostX9 writes: Tom's Hardware's continuing series on computing security has an exclusive interview with Adam Barth and Collin Jackson, members of Stanford University's Web Security Group and members of the team that developed Chromium, the open-source core behind Google Chrome. The interview goes into detail regarding the sandboxing approach unique to Chromium, compare the browser to their competitors, and discuss web security in general.
Editorial

Submission + - Could the Internet be taken down in 30 minutes? 1

GhostX9 writes: Tom's Hardware recently interviewed Dino A. Dai Zovi, a former member of Sandia National Labs' IDART (the guys who test the security of national agencies). Although most of the interview is focused on personal computer security, they asked him about L0pht's claim in 1998 if the Internet could still be taken down in 30 minutes given the advances on both the security and threat sides. He said that the risk was still true...

Slashdot Top Deals

nohup rm -fr /&

Working...