Tuesday, 24 September 2013

News GPS Antenna Filters out Roise to Boost Urban Accuracy 2013

GPS antenna filters out noise to boost urban accuracy
Now VRay, a new type of antenna that eliminates multipath interference, has been developed by the US Air Force Institute of Technology and Locata Corporation of Canberra, Australia. It is based on Locata's previous work with ground-based positioning technology. The problem is multipath interference, the curse of all radio-based location systems. When signals from satellites are reflected off buildings navigation systems get confused.  "Multipath is the dominant source of interference for GPS in cities and indoors," says consultant David Last, former president of the UK's Royal Institute of Navigation. "Nothing else causes as much serious error." For something we rely on so heavily, GPS is pretty rubbish. In the open, it is accurate to within a few metres, but in built-up areas it frequently cannot even locate the correct city block. Now a new type of antenna promises to improve its accuracy in urban areas – even indoors 2013.

VRay is a "beam-forming" antenna that combines the signal from an array of receiving elements to identify and subtract multipath and other interference to extract a clean signal. The antenna scans for millions of virtual beams a second, which helps it differentiate the valid GPS signal from the rest of the clutter, says Locata's CEO Nunzio Gambale.This design means VRay will be much smaller, cheaper and simpler than previous designs. Early VRay prototypes are still bulky, but the plan is to build antennas that are flush with airframes and vehicle roofs, and to create a portable version within a helmet.Previous beam-forming antennae have been large and expensive, with a separate radio receiver for each antenna element. VRay has a single receiver that switches at high speed between dozens of elements."The concept of beam-steering for GPS is well known. However, its use has been mainly confined to the military due to the high cost. Locata's breakthrough is to time-multiplex the receiver," says Last.

Thursday, 19 September 2013

News Salvage of Costa Concordia wreck is most expensive ever

Now the ship may finally be on the move again, thanks to the most expensive salvage operation in history. The ambitious plan to right, refloat and tow away the wreckage, before dismantling it, has now reached a crucial stage: the ship is ready to be rotated off its side.But the cruise liner poses an unprecedented challenge to the salvagers – it is teetering on the brink of a steep slope at a precarious angle. The team has already drilled into the underwater slope to construct platforms for the ship to rest on once righted, preventing it from tumbling into the depths. Now, the most difficult stage of the operation is about to commence.

Hooray and up she rises.

The process of heaving the enormous wreckage off its side might begin as soon as Monday, depending on the weather. Righting the ship, a technique called parbuckling, will use computer-controlled jacks to haul it upright – hopefully in one piece. The team will then assess the damage and weld on caissons – a sort of steel floatation belt – to give the ship buoyancy before it departs on its final journey.The Concordia can't be broken up where it lies because of the threat this would pose to the ecosystems in the Tuscan Archipelago National Park, which Giglio is a part of.The salvage team has one chance to shift the mammoth 290-metre-long ship. With the Italian summer fading fast, the salvagers say that the weather is their worst enemy.

Lying on its side in the azure waters of Giglio, Italy, the hulk of the Costa Concordia makes for a lasting reminder of the disaster that stuck the cruise ship in January 2012.

Wednesday, 11 September 2013

How NSA weakens encryption to access internet traffic

The internet is full of holes. The spy agencies in the US and UK have forced technology suppliers to deliberately weaken security measures in the online computing systems that everyone uses. As a result they may have compromised everybody's security - since the vulnerabilities can be exploited by anybody who discovers them.

The revelations appear in the latest batch of NSA and GCHQ documents leaked by the former NSA contractor Edward Snowden, now an exile in Russia.

The leaks appear to confirm long-held suspicions that the agencies covertly collude with tech firms to introduce "back doors" that bypass built-in computer security measures - like passwords, two-factor authentication and encryption - to get straight to the files they want.

Today's joint reports from The Guardian, The New York Times and website ProPublica might leave you with the impression that the agencies have made a mathematical breakthrough that renders encryption defunct. But the NSA has simply relied on plain old-fashioned spying to influence and infiltrate the internet security firms we trust.

"I'm pretty sure they are reporting well-known possibilities of cheating around cryptography," says Markus Kuhn of the University of Cambridge, placing "back doors" in commonly used software to allow the agencies access to secret messages.

One of the leaked documents reveals that the NSA and GCHQ aim to "insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets". An "endpoint communications system" simply means a computer, tablet or cellphone.

For example, most encryption algorithms require a random number generator to produce secure keys. "One of the oldest tricks in the book is to modify the random number generator so it outputs only a tiny subset of all the random numbers it normally should," says Kuhn – a bit like subtly weighing a die to roll 6 more often than it should.

This change would mean the software can only produce a much smaller list of secret keys than it should, though the number of keys is still too vast for you to notice the change without looking closely. If you know about the vulnerability, however, you can attempt to crack encrypted messages using only the smaller list of keys. That makes it more feasible to use brute force to crack the encryption – all you need is enough computing power, which of course the NSA and GCHQ have in abundance.

The Snowden files say the NSA spends $250 million a year on covertly influencing the product designs of technology companies, suggesting inserting such vulnerabilities is a high priority for the agency.

It could also be swiping keys directly from online service providers, says Kuhn. The TLS encryption protocol, which puts the "s" in secure https connections, relies on servers storing a secret key to decrypt incoming messages or transactions. The NSA could bribe a system administrator or otherwise infiltrate the organisation to gain access to these keys, allowing it to decrypt any intercepted traffic to the relevant server.

To avoid the NSA's gaze, Kuhn says people should turn to open-source software, where many people evaluate the underlying code and can identify any attempts to weaken it. "There is going to be a lot of pressure on IT decision-makers to justify why they gambled the security of their infrastructure on some close-sourced offering that is very likely infiltrated by NSA programmes."

Security agencies have the job of both intercepting harmful communications and defending nations from outside attack, but criminals or other nation states could also exploit NSA-mandated backdoors in internet systems. "If they have weakened the structure of the internet in the ways that the revelations say, then they have failed in the mission to protect national critical infrastructure," says Nigel Smart of the University of Bristol, UK.

For security technologist Bruce Schneier, who has helped The Guardian understand hundreds of the leaked NSA documents it is covering, it is all a breach too far: he has appealed for engineers on the inside of such tech company security subversion to turn whistleblower and tell their stories. He hopes the information they provide will help the Internet Engineering Task Force, a loose group of researchers and network security experts, "take the internet back" from the surveillance state at its next meeting in November.

Kenny Paterson at Royal Holloway, University of London has previously discovered flaws in the TLS protocol that could allow an attacker access to encrypted data in certain circumstances, but he says these exploits pale in significance if the NSA has direct access to company servers. "You don't know which companies have been required to hand over their secret keys and which haven't."

Many technology firms say they only work with intelligence agencies when legally compelled to – and largely because the right to run telecoms-related services depends on allowing "lawful interception" of their technologies under the terms of the UN's International Telecommunications Union's rules.

But some firms are engineering deep internet surveillance systems, according to a third tranche of product data sheets from the suppliers of wire-tapping and sub-sea cable interception systems, posted on the Wikileaks website.

Friday, 6 September 2013

Free Download Angry Bird for PC


Angry Birds Game Free transfer For computer - these days, Gamescluby need to share a game that developed by Rovio amusement (computer game developer from Finland). 1st unleash of Angry Birds in Gregorian calendar month 2009. In Angry Birds game, player will controls numerous color of birds and also the target square measure to retrieve their eggs that purloined by hungry inexperienced pigs. The pigs secure by stone, ice or wood. Players should destroyed all the pigs on every level. this is often a puzzle game, that creates player should launch a birds mistreatment toy and targeted at pigs stationed. New kinds of birds can unlock if players passed every level of this game. Players will activated every birds special skills. Birds special skills is numerous and completely different than alternative birds skills. as an example, black bird will explodes, blue bird will separate and become three birds, associate degreed white bird has an skills to drop eggs that may be explodes.   In angry birds game, there square measure numerous kinds of birds that incorporates a completely different color. At the start, players simply have Red Bird. If players will through every stage of the sport, alternative birds with special skills become obtainable. Some birds are often accustomed destroy some materials that can’t be destroyed by alternative birds. There square measure many alternative kinds of pigs too, as an example little pigs square measure simply destroyed and for larger pigs, players want several attack for makes its eliminate. Sometimes, some pigs mistreatment helmets for his or her armor, creating tough to destroy this pigs. alternative square measure hair Pigs and King Pig.   Points in Angry Birds computer Game square measure scored for every pig defeated still as destruction of structures or hits injury to the pigs and players can get bonus points for all of unused birds. If all the pigs square measure defeated on time, players will head to next level.