The Queen Of Code

Short film on computer programming pioneer badass Grace Hopper who, among many things, worked on the first computer, invented the first languages that used words rather than symbols, and even had a pirate flag in her office in the Pentagon. She even had a clock that told the time backwards, keeping her on her toes, hating complacency - video embedded below:

You probably don’t know the name Grace Hopper, but you should.
As a rear admiral in the U.S. Navy, Hopper worked on the first computer, the Harvard Mark 1. And she headed the team that created the first compiler, which led to the creation of COBOL, a programming language that by the year 2000 accounted for 70 percent of all actively used code. Passing away in 1992, she left behind an inimitable legacy as a brilliant programmer and pioneering woman in male-dominated fields.

I can’t embed the video but you can watch it here - definately worth the fifteen minutes of your time.

7 things to read this weekend

If you’re at a loose end this weekend, here’s something to keep you entertained… Or if you’re a slow reader, there’s enough for one a day!

Some of these are a few months old but still a great read. I’ll be back with another 7 next weekend :)

How Intel Gave Stephen Hawking a Voice (wired.com)

The story of how technology helps Stephen Hawking communicate using tiny movements - but often at a shockingly slow rate.

Flying Upside Down (theatlantic.com)

Now here’s a very old read - this was published in 1981! A historic article detailing the secrecy and difficulty surrounding the development of some of the world’s very first computers.

We Know How You Feel (newyorker.com)

Computers are learning to read emotion, and the business world can’t wait.

The Sports Startup Being Sued For Nearly $500,000 By Its Former Employees (sports.vice.com)

The long title of this article says it all!

Sebastian Seung’s Quest to Map the Human Brain (nytimes.com)

The quest to map the human ‘connectome’ draws parallels with the quest to map the human genome - but is this project too hard to complete?

How ‘venture builders’ are changing the startup model (venturebeat.com)

Venture builders are effectively ‘startups that produce startups’, and plenty of well known companies are already products of their success.

The Abracadabra A.I. (slate.com)

Can artificial intelligence make magic more magical? And what does it mean if it can?

For more space, science, technology and gaming related stories, visit 8bitfuture.com.

Intel Compute Stick

Announced today - a fully working computer the size of a USB stick which just plugs into an HDMI port of a display:

The Intel® Compute Stick is a new generation compute-on-a-stick device that’s ready-to-go out-of–the-box and offers the performance, quality, and value you expect from Intel. Pre-installed with Windows 8.1* or Linux, get a complete experience on an ultra-small, power-efficient device that is just four inches long, yet packs the power and reliability of a quad-core Intel® Atom™ processor, with built-in wireless connectivity, on-board storage, and a micro SD card slot for additional storage. It’s everything you love about your desktop computer in a device that fits in the palm of your hand.

Computers are cheaper and smaller now - whilst it doesn’t appear to feature any specific graphical card for media capabilities, I’m sure there could be useful applications for tech arts (removing the need of a laptop)

More Here

Large Volume DDoS Attacks Are On the Rise

Towards the end of 2014, summary reports start showing up and security professionals who are trying to forecast next year’s trends begin their analyses.

Both Akamai and Verisign released the results of their studies regarding the increase in RDDoS (Reflected Distributed Denial of Service) attacks and the data shows that while application-layer DDoS attacks have slightly reduced, there’s an alarming spike of high volume attacks.

Additionally, it has been found that instances of repeated attacks have reduced while more victims have been reported. This represents a shift in the business model of the attackers, who are looking to expand their target bank rather than focus on singled-out targets that may either be down already or have finally implemented a DDoS mitigation solution.

With nearly half of all online businesses reporting a DDoS attack in their lifetime, according to this Incapsula research regarding the impact of DDoS attacks, mitigating the risk of being subject to one is a primary objective of any internet entrepreneur.

The losses are potentially show-stopping, as the average attack costs $40,000 per hour in down time and service restoration costs, totaling $500,000 for an average attack from start to finish, is a cost that would blow most SME’s out of the water.

In Q3 of 2013, the average attack bandwidth was 3 Gbps. In Q3 of 2014, it is already 14 Gbps.

The additional intensity of each attack comes not only from increased attacker resources, such as more extensive botnet collections and improved automation, but also from the usage of the highly susceptible Simple Service Directory Protocol (SSDP).

This protocol is mostly used by routers which find devices on the network and allow a simplified connection with them. It is based on the UDP – a staple for DDoS attacks – and omits the same crucial safety features such as a 3-way handshake.

Additionally, the increase in capabilities of malicious actors to infect and commandeer ARM-based devices such as routers has already been detected and analyzed.

Reflected attacks are easier using SSDP, due to its overly simplified process. Simply put, a Reflected DDoS is when the attacker spoofs (forges his network address or identity) the IP from which it sends requests to a horde of SSDP-running machines, which, in turn, reply to the victim.

In addition to the security lapses of SSDP, it also allows attackers a significant amplification multiplier, rated at x30, by requiring only little interaction as a request.

This way, one machine used by the attacker can spoof its address when making a request to millions of geographically-distributed SSDP machines. This will make a rudimentary defense mechanism employed by the victim unable to filter out the DDoS traffic from the legitimate traffic.

Despite NTP’s almost 10 times bigger amplification multiplier (at x300), a decline in its application for deleterious purposes is observed. This comes after it being the hot news in 2013, with yesteryear’s evidence of NTP DDoS attacks going on the rise. For 2014, NTP is showing a steady and expected decline because savvy administrators are slowly protecting the vulnerable “monlist” function of their NTP services.

Besides SSDP-enabled routers, other ARM devices such as smartphones and web-enabled household devices (thermostats, refrigerators, etc) are unwillingly becoming conduits of attacks.

What used to be barriers for perpetrators – the quirkiness of ARM operating systems and their low processing power is now becoming an enabler, as the malicious tools have been ported to run under ARM and the proliferation of this architecture means their low power is offset by their vast availability.

The impact of DDoS attacks proves to be a macro-economic factor on a world-wide scale. With more and more business getting on-line exposure and more services becoming exclusively web-based, malevolent intent has more targets, more pathways and more money to rob.

It is even speculated that DDoS attacks are used to as a strategic weapon employed on a political level.

As the motivations for committing cybercrime increase, the reasons not to employ multi-layer risk mitigation are irrelevant. Large corporations and government sites are the target of industrial or political malevolence by competitors or activists. Medium-sized businesses are subject to illegitimate actions in the battle for market share and small enterprises can be pushed around and extorted by cyber criminals or just used by the attackers to try out new harmful technologies or to gain reputation in the black market by terrorizing the web.

An organization-wide deletion policy makes sense. Customer data should be deleted as soon as it isn’t immediately useful. Internal e-mails can probably be deleted after a few months, IM chats even more quickly, and other documents in one to two years. There are exceptions, of course, but they should be exceptions. Individuals should need to deliberately flag documents and correspondence for longer retention. But unless there are laws requiring an organization to save a particular type of data for a prescribed length of time, deletion should be the norm.

Do you live near Diamond creek, 3089 or any of the surrounding areas and need a mobile computer technician to help you with your home computer or devices? Do you have a small business operating in these areas and need assistance with your work computers?

Contact us on 0479 100 163

Visit our website for more information: http://www.tattwanetworks.net.au

Service areas on our blog : http://www.tattwanetworks.com/wp


Video: Intro to Windows 10.

Windows 10 has been shown off today as a free upgrade for existing users. A lot of the existing apps like mail, photos etc look a bit meh, but I’d be excited about Cortana.

You can also download the ‘Windows 10 Technical Preview’ here.

cynthias-studblr asked:

Im a senior in HS and im debating on getting a macbook air or just a ipad+keybord attachment. Oh, and I plan on being a Computer Scientist so id be using my computer for coding. I prefer Apple but I Its just that I dont want to spend a TON of money :/ What do you think?

First thing to say here is that I am not the most technologically minded person. Macbook Airs are good because they’re so light which makes them much easier to transport (for example to lectures or meetings). I’ve never had an I-pad but again the transportability is one of the main advantages. I’ve always been tempted by I-pads but really it’s the price of them that puts me off. I do use a tablet (Samsung) and bluetooth keyboard for taking my notes in lectures though and I can definitely vouch for that method (of note taking at least). Apple products are expensive but there are student discounts available which you can find out a bit more about here (X) which mean that you can save up to £26 on i-pads and up to £159 on a new Mac. Because I’m not familiar with coding I can’t offer any help on that part of your question; I don’t know what products are best for that.

#teletextartoftheday #pixelart Tribute to Amstrad CPC type-in Boss of Chicago, Dan Farrimond, 2013. And yes, the big bad boss really does look like a weird skeleton. ;)

Source: http://danfarrimond.co.uk / http://illarterate.co.uk

Ms. Candina Heath, the prosecutor in Brown’s case, said to me — and here I must paraphrase from memory — Isn’t it true that the people who uncover credit cards generally work for the companies that issue or hold them? I told her that is rarely the case. She protested this was my opinion. I said no, it wasn’t, and gave her the best brief on-the-spot explanation of how the security field actually works: People who work in the field (or in security academia) find or are alerted to abnormalities. They can be everything from a phishing link in their email to a DDoS that’s generating notable traffic to a post including code that exploits a flaw in software. When they investigate, they will look for traces of what happened, and often this leads to a cache of data that has been collected from a set of victims. There’s no way to know what’s in such a cache until you look at it. It can be anything: pictures, personal info, banking details, credit cards. According to this Texas prosecutor, and many more law enforcement agents, once someone grabs this data cache and examines it, passes it along to expert eyes, or to a journalist, they are committing crimes for which they may be ripped from their home, job, family, and the future they expected to have. They may be incarcerated for doing their job.