West Virginia auditor blasts Cisco, state for “oversized” router buy

The auditor also found Cisco “showed a wanton indifference to the interests of the public” in recommending the investment in its model 3945 branch routers, the majority of which were “oversized” for the requirements of the state agencies using them, the report stated.

via West Virginia auditor blasts Cisco, state for “oversized” router buy – Network World.

Bypassing Google’s Two-Factor Authentication

TL;DR – An attacker can bypass Google’s two-step login verification, reset a user’s master password, and otherwise gain full account control, simply by capturing a user’s application-specific password (ASP).

via Bypassing Google’s Two-Factor Authentication – Blog · Duo Security.

Also From:  Google Security Vulnerability Allowed Two-Step Verification Bypass – Dark Reading.

A successful attack would require first stealing a user’s ASP, which could theoretically be accomplished via malware or a phishing attack.

A Race, a Crash and the Nascar Approach to YouTube Video Takedowns

A video of the wreck, shot by a fan and uploaded almost immediately to YouTube, detailed some of the carnage that swept across the stands and the race-goers that filled them. In a particularly intense moment, one person appeared to be pinned down by an errant wheel that flew off one of the wrecked cars.

But just as quickly as it was uploaded, the video was taken down from YouTube at Nascar’s request, citing copyright concerns.

via A Race, a Crash and the Nascar Approach to YouTube Video Takedowns – Mike Isaac – Media – AllThingsD.

The copyright to any video or photograph is owned by the person taking that video or photograph.  This is clearly an abuse of DMCA.  Here’s an update from the above linked to site with a restored link to the video in question.

Update 7:45 pm PT: Well would you look at that. Not more than a few hours later, the video in question has been unblocked, and is now viewable on YouTube user Tyler4DX’s page.

The Tunnels of NYC’s East Side Access Project

A huge public works project is currently under construction in New York City, connecting Long Island to Manhattan’s East Side. Deep underground, rail tunnels are extending from Sunnyside, Queens, to a new Long Island Rail Road terminal being excavated beneath Grand Central Terminal. Construction began in 2007, with an estimated cost of $6.3 billion and completion date of 2013. Since then, the cost estimate has been raised to $8.4 billion, and the completion date moved back to 2019. When finished, the line will accommodate 24 trains per hour at peak traffic, cutting down on commute times from Long Island, and opening up access to John F. Kennedy International Airport from Manhattan’s East Side. Collected here are images of the progress to date, deep beneath Queens and Manhattan.

via The Tunnels of NYC’s East Side Access Project – In Focus – The Atlantic.

Scammers Extort BitTorrent Users Posing as Law Enforcement

According to information obtained by SJD the accusations are not made up. This means that the IP-addresses were indeed “caught” sharing the files listed in the letter. However, it is a mystery how the “Internet Copyright Law Enforcement Agency” obtained the home addresses of the subscribers.

via Scammers Extort BitTorrent Users Posing as Law Enforcement | TorrentFreak.

It was only a matter of time before these kind scams surfaced.  The outfit in question is here.  Fearful of real life charges of real crimes involving interstate commerce probably convinced them to publish this on their site:

Effective immediately, the Internet Copyright Law Enforcement Agency has ceased operations. Please disregard any notices you received from us, and please do not send us any payments.

Throwing and catching an inverted pendulum

Armed with a good theoretical model and knowledge of its strengths and limitations, the researchers set out on a process of engineering the complete system of balancing, throwing, catching, and re-balancing the pendulum. This involved leveraging the theoretic insights on the problem’s key design parameters to adapt the physical system. For example, they equipped both quadrocopters with a 12cm plate that could hold the pendulum while balancing and developed shock absorbers to add at the pendulum’s tips.

via Video: Throwing and catching an inverted pendulum – with quadrocopters | Robohub.

Below is the Youtube video.

More info at the Flying Machine Arena.

The Flying Machine Arena (FMA) is a portable space devoted to autonomous flight. Measuring up to 10 x 10 x 10 meters, it consists of a high-precision motion capture system, a wireless communication network, and custom software executing sophisticated algorithms for estimation and control.

What is AP Isolation Mode and why should I disable it on my router?

In the computer networking world, AP stands for Access Point, or in this case, a wireless access point. AP Isolation effectively creates a “virtual” network among wireless clients, in which each device is an individual entity that cannot communicate with other wireless devices on the same Wi-Fi access point. This configuration can be useful for public Wi-Fi hotspots to separate potentially malicious network traffic from other.

via What is AP Isolation Mode and why should I disable it on my router? – Customer Feedback & Ideas for Photosmith.

The tomato router has this option.  Other APs do not.