Fabbing a chip that could encode data in a twisted vortex of light

Photons possess a number of quantum properties that can be used to encode information. You can think of photon polarization as like the rotation of a planet on its axis. In this view, the helical shape of the light wave—known as its orbital angular momentum (OAM)—is akin to the planet’s orbit around the Sun. These properties are independent of each other, and of the wavelength of light, so they can be manipulated separately. Whereas polarization occurs as a combination of two possible orientations, the OAM theoretically can have infinite values, though in practice far fewer states are available. Nevertheless, exploiting OAM greatly expands the potentially exploitable quantum states of photons we could put to use.

via Fabbing a chip that could encode data in a twisted vortex of light | Ars Technica.

The Honeynet Project

The HoneyMap shows a real-time visualization of attacks against the Honeynet Project’s sensors deployed around the world. It leverages the internal data sharing protocol hpfeeds as its data source. Read this post to learn about the technical details and frequently asked questions. Before going into explanations, take a look at the map itself: map.honeynet.org!

via Blogs | The Honeynet Project.

The Future of Mobile News

Half of all U.S. adults now have a mobile connection to the web through either a smartphone or tablet, significantly more than a year ago, and this has major implications for how news will be consumed and paid for, according to a detailed new survey of news use on mobile devices by the Pew Research Center’s Project for Excellence in Journalism (PEJ) in collaboration with The Economist Group.

via The Future of Mobile News – Pew Research Center.

News remains an important part of what people do on their mobile devices-64% of tablet owners and 62% of smartphone owners say they use the devices for news at least weekly, tying news statistically with other popular activities such email and playing games on tablets and behind only email on smartphones (not including talking on the phone). This means fully a third of all U.S. adults now get news on a mobile device at least once a week.

What Penetration Testers Find Inside Your Network

Why is network segmentation so important? “Today, there is still more focus on the perimeter than on internal network segmentation. Network engineers don’t realize that one successful social engineering or client-side attack could mean ‘game over’ once the attacker has that foothold,” Sanders says. Segmentation based on asset importance and level of trust is one of the most effective ways to prevent many of the attacks advanced attackers — and even himself — perform once inside a target network, he says.

via Tech Insight: What Penetration Testers Find Inside Your Network – Dark Reading.

Twitter, PayPal reveal database performance

Cole revealed that Twitter’s MySQL database handles some huge numbers — three million new rows per day, the storage of 400 million tweets per day replicated four times over — but it is managed by a team of only six full-time administrators and a sole MySQL developer.

via Twitter, PayPal reveal database performance – Software – Technology – News – iTnews.com.au.

Daniel Austin, a technology architect at Paypal, has built a globally-distributed database with 100 terabytes of user-related data, also based on a MySQL cluster.

Austin said he was charged with building a system with 99.999 percent availability, without any loss of data, an ability to support transactions (and roll them back), and an ability to write data to the database and read it anywhere else in the world in under one second.

20 Iptables Examples For New SysAdmins

This Linux based firewall is controlled by the program called iptables to handles filtering for IPv4, and ip6tables handles filtering for IPv6. I strongly recommend that you first read our quick tutorial that explains how to configure a host-based firewall called Netfilter (iptables) under CentOS / RHEL / Fedora / Redhat Enterprise Linux. This post list most common iptables solutions required by a new Linux user to secure his or her Linux operating system from intruders.

Via Linux: 20 Iptables Examples For New SysAdmins.

Docsis 3.1 Targets 10-Gig Downstream

ORLANDO — SCTE Cable-Tec Expo — The Docsis 3.1 platform will support capacities of at least 10Gbit/s downstream and 1Gbit/s upstream, a move that will certainly prolong the industry’s need to deploy fiber all the way to the home.

via Light Reading Cable – Cable – Docsis 3.1 Targets 10-Gig Downstream – Telecom News Analysis.

To hit its capacity targets, the cable industry wants to increase its spectral efficiency by about 50 percent. As expected, the new specs will do away with 6MHz- and 8MHz-wide channel spacing and instead use smaller (20KHz-to-50KHz-wide) orthogonal frequency division multiplexing (OFDM) subcarriers; these can be bonded inside a block spectrum that could end up being about 200MHz wide. (See Docsis 3.1 Will Change Cable’s Data Channels.)

The definition of ofdm from wiki.

Orthogonal frequency-division multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies. OFDM has developed into a popular scheme for widebanddigital communication, whether wireless or over copper wires, used in applications such as digital television and audio broadcasting, DSLbroadband internet access, wireless networks, and 4G mobile communications.

And the primary advantage using ofdm is:

The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions (for example, attenuation of high frequencies in a long copper wire, narrowband interference and frequency-selective fading due to multipath) without complex equalization filters.  Channel equalization is simplified because OFDM may be viewed as using many slowly modulated narrowband signals rather than one rapidly modulated wideband signal.

Verizon draws fire for monitoring app usage, browsing habits

Verizon Wireless has begun selling information about its customers’ geographical locations, app usage, and Web browsing activities, a move that raises privacy questions and could brush up against federal wiretapping law.

via Verizon draws fire for monitoring app usage, browsing habits | Politics and Law – CNET News.

Verizon Wireless’ marketing literature acknowledges that it sells “mobile-usage data that offers insights on the mobile-device habits of an audience, including URL visits, app downloads and usage.” (Not all carriers do: Google guarantees that its proof-of-concept Google Fiber project “will not engage in deep packet inspection” except when necessary to fend off network attacks.)

Apple loses UK tablet design appeal versus Samsung

Apple still needs to run ads saying Samsung had not infringed its rights.

The US firm had previously been ordered to place a notice to that effect – with a link to the original judgement – on its website and place other adverts in the Daily Mail, Financial Times, T3 Magazine and other publications to “correct the damaging impression” that Samsung was a copycat.

via BBC News – Apple loses UK tablet design appeal versus Samsung.

Apple declined to comment. It can still appeal to the UK Supreme Court, otherwise the ruling applies across the European Union.

Hackers Exploit ‘Zero-Day’ Bugs For 10 Months On Average Before They’re Exposed

One aspect of zero-day exploits use that’s made them tough to track and count has been how closely targeted they are. Unlike the mass malware infections that typically infect many thousands of machines using known vulnerabilties, the majority of the exploits in Symantec’s study only affected a handful of machines–All but four of the exploits infected less than 100 targets, and four were found on only one computer.

via Hackers Exploit ‘Zero-Day’ Bugs For 10 Months On Average Before They’re Exposed – Forbes.

Unsurprisingly, the study shows that hackers target common software like Microsoft Word, Flash and Adobe Reader. Sixteen of the 18 zero-day exploits discovered and analyzed in the study affected Microsoft and Adobe software.