Archiv der Kategorie: IT News

Debian-Zertifizierung für Bull-Server

Das Open Source Support Center von Credativ arbeitet derzeit für den Server-Hersteller Bull an einer Debian-Zertifizierung. Diese soll noch Ende des dritten Quartals 2007 abgeschlossen sein. (Debian)

(219)

IBM uses nanotechnology to craft miniscule art

Gefunden auf engadget.com:

It’s not like we haven’t seen art on silicon before, nor is IBM any stranger to the more bizarre world of design, but the firm is nevertheless „touting one of the tiniest pieces of art ever made.“ The project, which consists of an „image of the sun made from 20,000 microscopic particles of gold,“ was reportedly „etched on a silicon chip wafer“ with a process that managed particles some 60-nanometers in diameter. Of course, IBM isn’t planning on entering the abstract art business anytime soon, but the achievement could purportedly pave the way for „high-performance transistors in molecular-scale chips“ while „leading to a nanotech race inside IBM and rival companies.“….

Naja, IBM hat eben etwas übrig für kleine Dinge.
)

(437)

Scientists Use the „Dark Web“ to Snag Extremists and Terrorists Online

The Dark Web project team catalogues and studies places online where terrorists operate.
Terrorists and extremists have set up shop on the Internet, using it to recruit new members, spread propaganda and plan attacks across the world. The size and scope of these dark corners of the Web are vast and disturbing. But in a non-descript building in Tucson, a team of computational scientists are using the cutting-edge technology and novel new approaches to track their moves online, providing an invaluable tool in the global war on terror.
Funded by the National Science Foundation and other federal agencies, Hsinchun Chen and his Artificial Intelligence Lab at the University of Arizona have created the Dark Web project, which aims to systematically collect and analyze all terrorist-generated content on the Web.
This is no small undertaking. The speed, ubiquity, and potential anonymity of Internet media–email, web sites, and Internet forums–make them ideal communication channels for militant groups and terrorist organizations. As a result, terrorists groups and their followers have created a vast presence on the Internet. A recent report estimates that there are more than 5,000 Web sites created and maintained by known international terrorist groups, including Al-Qaeda, the Iraqi insurgencies, and many home-grown terrorist cells in Europe. Many of these sites are produced in multiple languages and can be hidden within innocuous-looking Web sites.
Because of its vital role in coordinating terror activities, analyzing Web content has become increasingly important to the intelligence agencies and research communities that monitor these groups, yet the sheer amount of material to be analyzed is so great that it can quickly overwhelm traditional methods of monitoring and surveillance.
This is where the Dark Web project comes in. Using advanced techniques such as Web spidering, link analysis, content analysis, authorship analysis, sentiment analysis and multimedia analysis, Chen and his team can find, catalogue and analyze extremist activities online. According to Chen, scenarios involving vast amounts of information and data points are ideal challenges for computational scientists, who use the power of advanced computers and applications to find patterns and connections where humans can not.
One of the tools developed by Dark Web is a technique called Writeprint, which automatically extracts thousands of multilingual, structural, and semantic features to determine who is creating 'anonymous' content online. Writeprint can look at a posting on an online bulletin board, for example, and compare it with writings found elsewhere on the Internet. By analyzing these certain features, it can determine with more than 95 percent accuracy if the author has produced other content in the past. The system can then alert analysts when the same author produces new content, as well as where on the Internet the content is being copied, linked to or discussed.
Dark Web also uses complex tracking software called Web spiders to search discussion threads and other content to find the corners of the Internet where terrorist activities are taking place. But according to Chen, sometimes the terrorists fight back.
"They can put booby-traps in their Web forums," Chen explains, "and the spider can bring back viruses to our machines." This online cat-and-mouse game means Dark Web must be constantly vigilant against these and other counter-measures deployed by the terrorists.
Despite the risks, Dark Web is producing tangible results in the global war on terror. The project team recently completed a study of online stories and videos designed to help train terrorists in how to build improvised explosive devices (IEDs). Understanding what information is being spread about IED methods and where in the world it is being downloaded can improve countermeasures that are developed to thwart them.
Dark Web is also a major research testbed for understanding the propaganda, ideology, communication, fundraising, command and control, and recruitment and training of terrorist groups. The Dark Web team has used the tools at their disposal to explore the content and impact of materials relating to "virtual imams" on the Internet, as well as terrorist training and weapons manuals.
Dark Web's capabilities are also being used to study the online presence of extremist groups and other social movement organizations. Chen sees applications for this Web mining approach for other academic fields.
"What we are doing is using this to study societal change," Chen says. "Evidence of this change is appearing online, and computational science can help other disciplines better understand this change."
-NSF-

(205)

Staatsgeheimnis im Internet

Zitat aus „Die Zeit“: Militär-Technologie Staatsgeheimnis im Netz

Ein wohlgehütetes Geheimnis des US-Militärs ist der Propeller-Antrieb von Atom-U-Booten. Jetzt kann ihn jeder im Internet sehen – dank Microsoft. Das Pentagon ist sauer.
Luftaufnahmen waren früher oft strenggeheime Dokumente, die der Öffentlichkeit nicht so einfach zugänglich gemacht wurden. Vor mehr als vierzig Jahren haben solche Aufnahmen sogar einmal den Kalten Krieg befeuert: Die Kubakrise im Jahr 1962 wurde ausgelöst, nachdem die Amerikaner die karibische Insel überflogen und fotografiert hatten ……

Nicht ganz so gefährlich (staatstragend) wären dagegen Nacktfotos von Google Earth, siehe Top 10 Naked People on Google Earth

(330)

Netz des Sturm-Wurms stärker als Supercomputer

Sicherheitsexperten sind sich einig: Das Bot-Netz des Sturm-Wurms ist inzwischen so groß, dass es jeden Supercomputer auf dieser Welt mit Leichtigkeit übertrumpfen könnte. Der Virus verbreitet sich inzwischen seit über drei Monaten.

Man geht derzeit davon aus, dass rund zwei Millionen PCs aktiv an diesem Bot-Netz beteiligt sind. Die genaue Zahl ist nur sehr schwer zu ermitteln – fest steht lediglich, dass es das größte Bot-Netz ist, was jemals existiert hat. Mit der Rechenpower, die hinter diesem System steckt, könnte jeder Server in die […]

(231)