Five Indicators To Watch For On Your Networks

First, companies need to monitor the right logs, including data from firewalls, virtual private networking (VPN) appliances, Web proxies and DNS servers. Next, the security team must collect data on what “normal” looks like inside the company’s network. Third, analysts must identify the indicators of attacks in their log files. Finally, the security group must have a procedure for responding to incidents identified by log analysis.

via Five Indicators To Watch For On Your Networks — Dark Reading.

NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust

Hitching a ride on LADEE is an experimental laser communication system designed to handle higher data rates than currently available. NASA hopes to eventually replace its traditional radio systems with laser communications, which uses less power and requires smaller transmitters and receivers, while providing lightning-fast bandwidth.

via NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust – The Washington Post.

Toshiba has invented a quantum cryptography network that even the NSA can’t hack

A quantum network uses specially polarized photons to encode an encryption key—a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering.

via Toshiba has invented a quantum cryptography network that even the NSA can’t hack – Quartz.

Current quantum cryptography systems from companies like ID Quantique start at around $50,000, and only connect two parties at a time. “If up to 64 people can share a single photon detector than you can spread out those costs,” Shields said.

The Best CPU Coolers: 10-Way Roundup

With the recent arrival of Ivy Bridge-E (see our Core i7-4960X review), I felt it was a good time to check out the latest aftermarket coolers. The new chip is fully compatible with Sandy Bridge-E/EP’s LGA2011 socket. We contacted all the major players and received 10 heatsinks to test including units from Noctua, Thermalright, Xigmatek, Silverstone and Thermaltake.

via The Best CPU Coolers: 10-Way Roundup – TechSpot.

Qcloud puts quantum chip in the cloud for coders to experiment

The team behind the project believes that the limited availability of quantum computers would deter extensive research and there would be shortage of skilled quantum researchers, engineers and programmers once quantum computers actually make it to the main stream. Through Qcloud the team is keen to open up quantum computing research and make it available to as many researchers, engineers, entrepreneurs and engineers as possible.

via Qcloud puts quantum chip in the cloud for coders to experiment.

Inside News Corp’s $540 Million Bet on American Classrooms

The company plans to cash in on education with custom-made tablet computers and curricula, as American classrooms move ever closer to complete digital integration. It began by purchasing a company called Wireless Generation, rebranding it as Amplify and pouring in more than half a billion dollars.

via Inside News Corp’s $540 Million Bet on American Classrooms.

IPv6 To Complicate Threat-Intelligence Landscape

Yet with the gradual — some would say “glacial” — move to the Internet Protocol Version 6 (IPv6) address scheme, the Internet’s address space will grow from merely big to nearly infinite. The vastness of the address space will cause problems for many threat-intelligence firms, from allowing attackers to use a new address for every attack to causing a rapid expansion in the size of the database needed to track the data on various sources, says Tommy Stiansen, chief technology officer for Norse, a real-time threat intelligence provider.

via IPv6 To Complicate Threat-Intelligence Landscape — Dark Reading.

About Wireless Leiden

The Wireless Leiden Foundation has established an open, inexpensive, fast wireless network for Leiden and surrounding villages. It is an independent network, which technically links up seamlessly to the Internet, but can also be used for free local communication within the Leiden region. Wireless Leiden is a non-profit organisation, operating completely with professional volunteers and aiming at infrastructure and not services. All our software, technological and organisational knowledge is freely available to others under an open source license.

via About Wireless Leiden | Stichting Wireless Leiden.

Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.

via Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s – NYTimes.com.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

There once was a time, back when the old AT&T existed,  when all  phone companies viewed customer privacy sacrosanct.