Create an Account
username: password:
 
  MemeStreams Logo

dcnstrct's MemeStream

search

dcnstrct
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

dcnstrct's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

PBS: Google's Secret Plans For All That Dark Fiber?
Topic: Technology 11:13 am EST, Nov 27, 2005

The probable answer lies in one of Google's underground parking garages in Mountain View. There, in a secret area off-limits even to regular GoogleFolk, is a shipping container. But it isn't just any shipping container. This shipping container is a prototype data center. Google hired a pair of very bright industrial designers to figure out how to cram the greatest number of CPUs, the most storage, memory and power support into a 20- or 40-foot box. We're talking about 5000 Opteron processors and 3.5 petabytes of disk storage that can be dropped-off overnight by a tractor-trailer rig. The idea is to plant one of these puppies anywhere Google owns access to fiber, basically turning the entire Internet into a giant processing and storage grid.

While Google could put these containers anywhere, it makes the most sense to place them at Internet peering points, of which there are about 300 worldwide.

Two years ago Google had one data center. Today they are reported to have 64. Two years from now, they will have 300-plus. The advantage to having so many data centers goes beyond simple redundancy and fault tolerance. They get Google closer to users, reducing latency. They offer inter-datacenter communication and load-balancing using that no-longer-dark fiber Google owns. But most especially, they offer super-high bandwidth connections at all peering ISPs at little or no incremental cost to Google.

Where some other outfit might put a router, Google is putting an entire data center, and the results are profound. Take Internet TV as an example.....

PBS: Google's Secret Plans For All That Dark Fiber?


Cisco 7200 Simulator
Topic: Technology 10:33 am EST, Nov 25, 2005

started recently (August 2005) a project to emulate a Cisco 7200 on a traditionnal PC. This kind of emulator would be useful to:

* Check that an IOS version is working properly and can be deployed safely on a production network,

* Be used as a training platform, with software used in real world. It would allow people to become more familiar with Cisco devices.

a cool project to boot a 7200 IOS image on x86:

For those of us who can't afford a 7200, and / or have girlfriends who don't think that a 7200 fits nicely in the living room, this is a project to track :)

Cisco 7200 Simulator


Cracking safes with thermal imaging
Topic: Technology 9:40 am EST, Nov 25, 2005

“attacker can perform the aforementioned attack by deploying an uncooled microbolometer thermal imaging (far infrared) camera within up to approximately five to ten minutes after valid keycode entry”

interesting stuff from Michal Zalewski

Cracking safes with thermal imaging


Wired News: Dark Cloud Hovers Over Black Hat
Topic: Technology 9:31 am EST, Nov 25, 2005

Last week Black Hat, the Vegas security conference that was at the center of the Ciscogate controversy last summer, was purchased by CMP Media. The sale has the internet hens clucking about whether ownership by a larger, wealthier corporation will protect Black Hat from future legal challenges, or make it more susceptible to pressure from companies wanting to control vulnerability disclosures.

Wired News: Dark Cloud Hovers Over Black Hat


Bypassing Windows Hardware-enforced Data Execution Prevention
Topic: Technology 6:28 am EST, Nov 24, 2005

This paper describes a technique that can be used to bypass Windows hardware-enforced Data Execution Prevention (DEP) on default installations of Windows XP Service Pack 2 and Windows 2003 Server Service Pack 1. This technique makes it possible to execute code from regions that are typically non-executable when hardware support is present, such as thread stacks and process heaps. While other techniques have been used to accomplish similar feats, such as returning into NtProtectVirtualMemory, this approach requires no direct reprotecting of memory regions, no copying of arbitrary code to other locations, and does not have issues with NULL bytes. The result is a feasible approach that can be used to easily bypass the enhancements offered by hardware-enforced DEP on Windows in a way that requires very minimal modifications to existing exploits.

This is a fairly technical computer security whitepaper that deals with M$ Windows internals, so beware. This is part of the uninformed journal.

Bypassing Windows Hardware-enforced Data Execution Prevention


Linux Clustering with Ruby Queue: Small is Beautiful
Topic: Technology 6:12 am EST, Nov 24, 2005

Ruby Queue software package lowers the barriers scientists need to overcome in order to realize the power of Linux clusters. It provides an extremely simple, economic, and easy-to-understand tool that harnesses the power of many CPUs while simultaneously allowing researchers to shift their focus away from the mundane details of complicated distributed computing systems and back to the task of actually doing science. The tool set is designed with a K.I.S.S, research-focused, philosophy that enables any ordinary (non-root) user to set up a zero-admin Linux cluster in 10 minutes or less. It is currently being used successfully in such diverse fields as bio-chemical research at the University of Toronto, geo-mechanical modeling at IGEOSS, and studying the nighttime lights of the world at the National Geophysical Data Center.

Linux Clustering with Ruby Queue: Small is Beautiful


VirtualWiFi: Software
Topic: Technology 6:07 am EST, Nov 24, 2005

Just to remind all the haters that Google Labs isn’t the only research game in town, Microsoft Research has just busted out VirtualWiFi: a bit of software that makes your computer believe a single WiFi card is multiple configurable cards, allowing connections with multiple networks. There are all sorts of applications for this — beyond tricking people into thinking that you have more WiFi cards than them — such as connecting to multiple ad-hoc networks, or getting your internet from a for-pay WiFi subscription and then sharing it over ad-hoc. Sounds like fun, no? =]

VirtualWiFi: Software


 
 
Powered By Industrial Memetics
RSS2.0