“In the interim period, apps will be very successful,” said Jay Sullivan, vice president of Mozilla’s mobile division, in an interview with PC Pro. “Over time, the web will win because it always does.” Google, with its investment in Web-based operating systems, is behind this too, and stresses how much money companies and users can save by going to the cloud. (No mention of the privacy lost however.)

So should mobile developers be learning objective-C (used for native iPhone apps) or HTML 5 + JavaScript (used for any old Web apps)?

Bookmark this category

“In the interim period, apps will be very successful,” said Jay Sullivan, vice president of Mozilla’s mobile division, in an interview with PC Pro. “Over time, the web will win because it always does.” Google, with its investment in Web-based operating systems, is behind this too, and stresses how much money companies and users can save by going to the cloud. (No mention of the privacy lost however.)

So should mobile developers be learning objective-C (used for native iPhone apps) or HTML 5 + JavaScript (used for any old Web apps)?

#img1#This article from the New York Times discusses forensic photogrammetry, a way of analysing crime scenes with techniques familiar from 3D modelling. So if that job as a game animator falls through, there’s always CSI…

img1 caption=’Image from the New York Times’

>

#img1#This article from the New York Times discusses forensic photogrammetry, a way of analysing crime scenes with techniques familiar from 3D modelling. So if that job as a game animator falls through, there’s always CSI…

img1 caption=’Image from the New York Times’

>

Bookmark this category

This article from the New York Times discusses forensic photogrammetry, a way of analysing crime scenes with techniques familiar from 3D modelling. So if that job as a game animator falls through, there’s always CSI…

Image from the New York Times

NYT-ForensicPhotogrammetry

http://www.engadget.com/2009/12/11/mit-gestural-computing-makes-multitouch-look-old-hat/

A new form of 3d gestural computing by MIT Media Lab. Optical sensors are used to record hand data and motion, allowing for gestures to be performed in a 3d environment.

http://www.engadget.com/2009/12/11/mit-gestural-computing-makes-multitouch-look-old-hat/

A new form of 3d gestural computing by MIT Media Lab. Optical sensors are used to record hand data and motion, allowing for gestures to be performed in a 3d environment.

Bookmark this category
http://www.engadget.com/2009/12/11/mit-gestural-computing-makes-multitouch-look-old-hat/

A new form of 3d gestural computing by MIT Media Lab. Optical sensors are used to record hand data and motion, allowing for gestures to be performed in a 3d environment.

The hacker tool, dubbed DECAF, is designed to counteract the Computer Online Forensic Evidence Extractor, aka COFEE. The latter is a suite of 150 bundled, off-the-shelf forensic tools that run from a script. Microsoft combined the programs into a portable tool that can be used by law enforcement agents in the field before they bring a computer back to their forensic lab. The script runs on a USB stick that agents plug into the machine.

The tools scan files and gather information about activities performed on the machine, such as where the user surfed on the internet or what files were downloaded.

Someone submitted the COFEE suite to the whistleblower site Cryptome last month, prompting Microsoft lawyers to issue a take-down notice to the site. The tool was also being distributed through the Bit Torrent file sharing network.

This week two unnamed hackers released DECAF, an application that monitors a computer for any signs that COFEE is operating on the machine.

According to the Register, the program deletes temporary files or processes associated with COFEE, erases all COFEE logs, disables USB drives, and contaminates or spoofs a variety of MAC addresses to muddy forensic tracks.

The hackers say that later releases of the program will allow computer owners to remotely lock down their machine once they detect that it has fallen into law enforcement hands. The hackers, however, have not released source code for the program, which would make it easy for anyone to see if the program contains malware that might also harm a computer or allow the attackers to take control of it.

Update: The developers of DECAF have taken issue with Threat Level referring to them as hackers. “We’re just two developers who support the free flow of information and privacy,” one of them wrote Threat Level in an anonymous e-mail. “You could say we’re just average joes.”

Photo: Jim Forest/Flickr

The hacker tool, dubbed DECAF, is designed to counteract the Computer Online Forensic Evidence Extractor, aka COFEE. The latter is a suite of 150 bundled, off-the-shelf forensic tools that run from a script. Microsoft combined the programs into a portable tool that can be used by law enforcement agents in the field before they bring a computer back to their forensic lab. The script runs on a USB stick that agents plug into the machine.

The tools scan files and gather information about activities performed on the machine, such as where the user surfed on the internet or what files were downloaded.

Someone submitted the COFEE suite to the whistleblower site Cryptome last month, prompting Microsoft lawyers to issue a take-down notice to the site. The tool was also being distributed through the Bit Torrent file sharing network.

This week two unnamed hackers released DECAF, an application that monitors a computer for any signs that COFEE is operating on the machine.

According to the Register, the program deletes temporary files or processes associated with COFEE, erases all COFEE logs, disables USB drives, and contaminates or spoofs a variety of MAC addresses to muddy forensic tracks.

The hackers say that later releases of the program will allow computer owners to remotely lock down their machine once they detect that it has fallen into law enforcement hands. The hackers, however, have not released source code for the program, which would make it easy for anyone to see if the program contains malware that might also harm a computer or allow the attackers to take control of it.

Update: The developers of DECAF have taken issue with Threat Level referring to them as hackers. “We’re just two developers who support the free flow of information and privacy,” one of them wrote Threat Level in an anonymous e-mail. “You could say we’re just average joes.”

Photo: Jim Forest/Flickr

Bookmark this category

The hacker tool, dubbed DECAF, is designed to counteract the Computer Online Forensic Evidence Extractor, aka COFEE. The latter is a suite of 150 bundled, off-the-shelf forensic tools that run from a script. Microsoft combined the programs into a portable tool that can be used by law enforcement agents in the field before they bring a computer back to their forensic lab. The script runs on a USB stick that agents plug into the machine.

The tools scan files and gather information about activities performed on the machine, such as where the user surfed on the internet or what files were downloaded.

Someone submitted the COFEE suite to the whistleblower site Cryptome last month, prompting Microsoft lawyers to issue a take-down notice to the site. The tool was also being distributed through the Bit Torrent file sharing network.

This week two unnamed hackers released DECAF, an application that monitors a computer for any signs that COFEE is operating on the machine.

According to the Register, the program deletes temporary files or processes associated with COFEE, erases all COFEE logs, disables USB drives, and contaminates or spoofs a variety of MAC addresses to muddy forensic tracks.

The hackers say that later releases of the program will allow computer owners to remotely lock down their machine once they detect that it has fallen into law enforcement hands. The hackers, however, have not released source code for the program, which would make it easy for anyone to see if the program contains malware that might also harm a computer or allow the attackers to take control of it.

Update: The developers of DECAF have taken issue with Threat Level referring to them as hackers. “We’re just two developers who support the free flow of information and privacy,” one of them wrote Threat Level in an anonymous e-mail. “You could say we’re just average joes.”

Photo: Jim Forest/Flickr

http://www.theraconteurs.com/

complete with beeping and key commands :-)

*Rebekah Doherty* 4th Year New Media, Public Relations and Film and Video minors Maine Campus Assistant Photo Editor Maine Channel 42 Advertising & Promotions Director 159 Memorial Union (207) 581-1559 www.youtube.com/themainechannel

http://www.theraconteurs.com/

complete with beeping and key commands :-)

*Rebekah Doherty* 4th Year New Media, Public Relations and Film and Video minors Maine Campus Assistant Photo Editor Maine Channel 42 Advertising & Promotions Director 159 Memorial Union (207) 581-1559 www.youtube.com/themainechannel

Bookmark this category
http://www.theraconteurs.com/

complete with beeping and key commands :-)

*Rebekah Doherty* 4th Year New Media, Public Relations and Film and Video minors Maine Campus Assistant Photo Editor Maine Channel 42 Advertising & Promotions Director 159 Memorial Union (207) 581-1559 www.youtube.com/themainechannel

These whimsical projects by Aram Bartholl remind me of projects from this past semester’s Contagious Media class:

http://datenform.de/indexeng.html

These whimsical projects by Aram Bartholl remind me of projects from this past semester’s Contagious Media class:

http://datenform.de/indexeng.html

Bookmark this category

These whimsical projects by Aram Bartholl remind me of projects from this past semester’s Contagious Media class:

http://datenform.de/indexeng.html

ommwriter_interfaceAbout as far from Microsoft Word as you can get:

Ommwriter screencast.

http://www.engadget.com/2009/12/11/mit-gestural-computing-makes-multitouch-look-old-hat/

http://www.engadget.com/2009/12/11/mit-gestural-computing-makes-multitouch-look-old-hat/

© 2011 UMaine NMDNet Suffusion theme by Sayontan Sinha