Low-Orbit Servers? Or A Pirate Prank?

“We’re going to experiment with sending out some small drones that will float some kilometers up in the air,” wrote “MrSpock” on the Pirate Bay blog. “This way our machines will have to be shot down with aeroplanes in order to shut down the system. We’re just starting, so we haven’t figured everything out yet. But we can’t limit ourselves to hosting things just on land anymore.”

via Low-Orbit Servers? Or A Pirate Prank? » Data Center Knowledge.

This is the only true implementation of cloud computing — the servers are literally in the clouds.  Exchanging torrents or magnet links is a relatively low bandwidth operation.  There really could be something to this scheme but I would think doing it with satellites would be better.  Transmitters and servers can use a lot of power.

The Pirate Bay said it was experimenting with using GPS to control servers using Raspberry Pi, a credit-card sized Linux computer.

Raspberry Pi servers aren’t going to be able to handle any kind of web load.  They should consider some kind of broadcast system.

System Development Life Cycle

Computerworld – Once upon a time, software development consisted of a programmer writing code to solve a problem or automate a procedure. Nowadays, systems are so big and complex that teams of architects, analysts, programmers, testers and users must work together to create the millions of lines of custom-written code that drive our enterprises.

To manage this, a number of system development life cycle (SDLC) models have been created: waterfall, fountain, spiral, build and fix, rapid prototyping, incremental, and synchronize and stabilize.

via System Development Life Cycle – Computerworld.

If Barnes & Noble Wants To Take Its Nook Tablet Abroad, It Has A Lot Of Work To Do

She noted that at the moment “over 70 percent” of buyers of the Nook are women aged between 25 and 45. They live within 15 minutes of a B&N store and often have kids. “When you go in, you can see kids running around loose in the store,” she said. “We even have nook tables in the stores for the kids to try out apps.

via If Barnes & Noble Wants To Take Its Nook Tablet Abroad, It Has A Lot Of Work To Do | TechCrunch.

Google Defends Hotfile (and Megaupload) in Court

Two weeks ago the movie studios asked the court to issue a summary judgment against Hotfile and shut the site down. The MPAA argues that Hotfile is a piracy haven that should not be eligible for DMCA safe harbor protection.

This request didn’t go unnoticed by Google, who have now filed an amicus brief in support of the file-hosting site. According to Google, the movie studios are misleading the court by wrongfully suggesting that Hotfile is not protected by the DMCA.

via Google Defends Hotfile (and Megaupload) in Court | TorrentFreak.

A unique ‘fileless’ bot attacks news site visitors

Analysis of the exploit’s JAR file demonstrated that it exploits a Java vulnerability (CVE-2011-3544). Cybercriminals have been exploiting this vulnerability since November in attacks targeting both MacOS and Windows users. Exploits for this vulnerability are currently among the most effective and are included in popular exploit packs.

via A unique ‘fileless’ bot attacks news site visitors – Securelist.

After successfully injecting and launching the malicious code (dll), Java begins to send requests to third-party resources, which look like Google search requests: “search?hl=us&source=hp&q=%s&aq=f&aqi=&aql=&oq=”…

These requests include data on the browsing history taken from the user’s browser, as well as a range of additional technical information about the infected system.

How To Catch a Criminal With Data

The researchers ultimately turned the department onto a predictive software called SPSS, which had for years been used to crunch data in a host of disciplines not necessarily connected to crime. The department launched a pilot program with it to analyze trends, as part of a strategy of fighting crime by real-time data-mining.

via How To Catch a Criminal With Data – Technology – The Atlantic Cities.

IBM acquired SPSS back in 2009, and did the same late last year with Knisley’s software company, i2. On a computer monitor, Knisley had pulled up a program called COPLINK, which sucks into one massive database all that disjointed information that was once scribbled down by hand.

Dropbox: LAN sync protocol

If all the dropbox clients have LAN sync enabled, then each of them should be able to understand and respond to the Discovery packet (assuming it’s able to distinguish between different user accounts. I believe it uses namespaces to identify them uniquely). This response packet called DB LAN sync(DB-LSP) is a TCP packet where the dropbox clients exchange data.

via Dropbox: LAN sync protocol – GeekLogs.

Overview | fogproject.org

FOG is a Linux-based, free and open source computer imaging solution for Windows XP, Vista and 7 that ties together a few open-source tools with a php-based web interface. FOG doesn’t use any boot disks, or CDs; everything is done via TFTP and PXE. Also with fog many drivers are built into the kernel, so you don’t really need to worry about drivers (unless there isn’t a linux kernel driver for it). FOG also supports putting an image that came from a computer with a 80GB partition onto a machine with a 40GB hard drive as long as the data is less than 40GB.

via Overview | fogproject.org.

FOG is centralized. Most of tasks done on FOG don’t require the user to visit the client PC. For example if you imaging a computer all you need to do is start the task. After the task is started WOL will turn the computer on if it is off, PXE will load the OS, DHCP will give it an IP address, FOG will tell the server it is in progess, and PartImage will image your computer. Then when imaging is done FOG will tell PXE not to boot the machine to the fog image and your computer boots up. After the computer is booted, if the FOG service is installed, FOG will change the computer’s hostname and that computer is ready to use!

Xeon E5-2600 Review

http://www.anandtech.com/show/5553/the-xeon-e52600-dual-sandybridge-for-servers

Intel’s Sandy Bridge architecture was introduced to desktop users more than a year ago. Server parts however have been much slower to arrive, as it has taken Intel that long to transpose this new engine into a Xeon processor. Although the core architecture is the same, the system architecture is significantly different from the LGA-1155 CPUs, making this CPU quite a challenge, even for Intel.

 

Are Yahoo’s patents strong enough to topple Facebook?

“What likely will happen in the short term is Facebook will make a decision as to whether it thinks this lawsuit is having a significant impact on its forthcoming IPO,” Patras said. “If it thinks it is having a significant impact then I suspect Facebook will come to a relatively quick license agreement with Yahoo to make this issue go away. If Facebook concludes it’s not having a significant impact they will fight on and get to the merits of these claims down the road.”

via Are Yahoo’s patents strong enough to topple Facebook?.