Category Archives: Newsworthy

What do Certified Ethical Hackers do?

To know the taste of a specific food item, you have to put it in your mouth. To know how durable an item is, you need to subject it to a battery of tests and then compute its MTBF. As industry moves from traditional devices to using more modern, connected devices and systems that are always on, security is seen as a major obsession.

People need to know how secure their network is against external attacks. However, just as an arch can withstand a good amount of external load, but crumbles easily against an internally applied pressure, so can networks. Some of the biggest security threats faced by networks unwittingly comes from people on the inside and not from those who are outside the network.

Companies employ a Certified Ethical Hacker to hack into their networks in an attempt to expose security weaknesses that they might have overlooked while securing their network. A company may have several external infrastructures – VPN access points, email servers, domain name servers, web servers, perimeter firewalls and other applications – accessible publicly from the internet. Typically, this is where the Certified Ethical Hacker starts his work.

The hacker has several tools to help him in his task. They include password crackers, keystroke loggers, eavesdropping, denial-of-service, sniffers and remote controls. In fact, hackers usually employ powerful digital tools akin to an expert lock-picker’s toolkit and they use these to attack the firewall systems.

Most companies take great care to make their networks impenetrable against external attacks. Therefore, it is no surprise to hackers if they are unable to get in. However, these same companies often overlook insider threats. Hackers can expose these vulnerabilities, especially, people working on the inside. This depends on a very simple fact – most people’s response is highly predictable when they are placed in a particular situation.

For example, consider what someone will do with an unclaimed innocent-looking USB flash drive lying on the toilet paper holder in the company’s washroom. That’s right, 90% of those finding the USB key will want to know what it contains and plug it into their computer to find out!

Now, a hacker may have knowingly planted a computer program on the flash drive that would auto-run and execute a remote connection to his computer as soon as someone operated the drive. That would give the hacker instant access to the company’s network. The program would take the computer owner’s encrypted credentials and pass them to the company’s own server, thus mimicking a normal and real login.

Once the hacker is able to log into the network of the company, he can unleash any amount of mayhem. He can extract usernames and passwords, open and interact with any file on the compromised system and even take screenshots of current activities on the desktop of the user.

The Certified Ethical Hacker will report his findings to the company management about how easy or difficult he found it to hack into the company’s network. This highlights the fact that security is not just about the protection of the firewall of the network. Even when there are no disgruntled employees, internal threats can be real.

What is a diskless computing system?

Today’s data centers and Hybrid Compute Clusters or HPC work with thousands of computers. With every computer having its own operating system, even a team of highly skilled administrators would find it hard to keep up with the demands required for maintaining each system. Typically, admins strain to keep the myriad types of computers they have, all functioning, as they should. Sysadmins must duplicate their efforts over and over, as they install new systems with new system software and handle configuration problems individually as they arise on each of the various systems. However, things need not always be so complicated and difficult.

There can be an alternative scenario, where all that the admins must do is reboot a machine for it to enter into a pre-configured operational environment. Such operational environments or images, as they are called, can exist in multiple numbers with each image acting as an individual container for the system software, configuration and behavior of the group of nodes the image was designed to run on.

For example, a specific image managing the operational requirements of a large multi-user cluster, would contain the necessary software, its configuration, including the behavior of compute nodes, admin nodes, login nodes, IO nodes and anything else needed. A second image might be based on the latest Linux distribution that is currently under test for a future deployment. Images could be configured to handle web servers, database programs, application servers, user desktops or render farms.

With one root image controlling the behavior of all machines, the complexity of the overall system and the overhead of system administration are scaled down drastically. It also leads to a stable environment as administrators can focus on hardening only one system instead of spreading their attention thin across the various setups.

In such a cluster, individual computers are typically devoid of hard disks, although with-disk computers are also supported. Diskless computers can be any subset of nodes and may be booted into any image as required. When an image is changed, all the nodes see it simultaneously. Only a reboot is what it takes to interchange a system image. Moreover, an image may be cloned with only a simple copy. Any number of functionally different machines may use the same image, with a simple synchronization propagating a working modification made to one system to all other systems. Since the image remains the same no matter which machine is using it, the behavior of each configured node remains the same.

Local networks may have many nodes with the image being cloned for each of them, with each clone being capable of serving the image to as many diskless clients as the network or the machine is capable of handling. The nodes operate normally using the configuration designed, which determine their role at boot time. The functional role of any node can be changed on the fly, once the node has booted.

An open-source software package, oneSIS, offers such a method for building and maintaining compute systems of any size. The lightweight, easy to configure and flexible package reduces the cost of cluster administration drastically.

Transfer Power Efficiently – Through Superconductors

At some point in our daily lives, almost all of us have heard of superconductors. These materials conduct electricity very well – with almost zero resistance. In comparison with normal wires carrying electricity, superconductors – because they offer no resistance – are almost loss-free. The caveat – superconductors need to be cooled to very low temperatures, making them almost impossible to operate at regular operating temperatures.

However, the situation may be about to change. Argonne National Laboratory has been researching on superconductors. Lately, scientists there have discovered that iron arsenics, a special class of superconductors, have a unique phase that has remained undiscovered so far. Using iron arsenics as a superconductor material may make it possible to harness the capabilities of energy efficient power transmission and use it in addition for a wide range of other technologies as well.

Electricity conduction is dependent on electrons, atoms and their interactions. Superconductivity occurs when these atoms and electrons behave in a special way, mostly at very low temperatures also called cryogenic temperatures.

The new discovery is about a magnetic phase of the electrons and atom interaction. This has offered significant implications over our understanding of unconventional superconductivity.

The new material is BAFe2As2 and scientists have doped 24% of the barium sites on the material with sodium. When neutrons are diffracted from a polycrystalline sample of the doped material, three different diffraction peaks are observed. These peaks vary with temperature as the magnetic and atomic structures change. In the graph, the structures are shown on the right, the blue balls represent the iron atoms and the red arrows show the direction of their magnetic moments.

Although superconductors allow electric current to flow without any resistance, they are not used for power transmission lines because they require to be cooled to cryogenic temperatures to operate efficiently. In comparison, copper wires operate at normal ambient temperatures and since they have resistance, are not loss-free. The recently discovered specific range of unconventional superconductors may soon offer better prospects.

Researchers at Argonne are trying to figure out how the new unconventional superconductor works. This knowledge might help to raise the temperature at which superconductors work, paving the way for harnessing their power for a wider range of new technologies.

In conventional metals carrying current, electrons bounce off atoms, thereby producing heat. In conventional superconductors, electrons – instead of repelling each other – pair off by binding together. This distorts the surrounding atoms, helping each other to travel through the metal. In the new type of superconductors also, the main process is still electron pair formation, but it is yet to be discovered what binds them together.

Normally superconductors have to be coaxed into allowing free flow of electricity. Although iron arsenide is normally magnetic, addition of sodium suppresses the magnetic behavior. As the material is cooled, it turns superconductive at roughly below -400 degree F, the transition temperature. Where, at room temperatures, iron atoms form a square lattice with a four-fold symmetry, at the transition temperature, this distorts to a rectangular lattice and a two-fold symmetry.

However, close to the onset of superconductivity, the new material demonstrates a phase where it returns to its four-fold symmetry. This is the phase intriguing the researchers.

Forget Keys Use Raspberry Pi Face Recognition

Now it is no longer necessary to use a key or a password to protect your treasures from prying eyes. Just teach your treasure box to recognize your face and it will open to no one except only when you are near it. The trick is to use the tiny, credit card sized, single board computer, the Raspberry Pi (RBPi) and its camera. When you are near, the camera and the RBPi recognize your face and the box unlocks itself.

The RBPi is the best-suited platform for this project, as it is very small and you can fit it almost anywhere. Additionally, all algorithms for this project are from the OpenCV computer vision library, which the RBPi is able to run. The advantage in building this project is that being an intermediate-level design, the project will teach you how to compile and install software on the RBPi.

For this project, you will need an RBPi model A or B and it should be running the Raspbian or the Occidentalis OS. You will also need Internet access when you are building the project. Additionally, you will require the RBPi camera module.

For the treasure box, you can use any type as long as it opens from the top and is big enough to hold the RBPi, and of course, your treasure. Among the other things you will require are a battery holder to hold 4x AAA batteries – this will be used to power the servo. For making the latch, you may use a wooden dowel and a few planks – these will be used to make a frame for the RBPi. A momentary push button may also be used – you can mount that on the side of the box.

As a start, you will have to make a hole on the top cover of the box for fitting the RBPi camera. You will also need a few more holes on the side of the box for the power cables and the push button. Mount a dowel in front of the box – the latch will catch this when the servo turns. You will need a small frame to support the RBPi and the latch servo. Clamp the servo to the frame using some wood scraps and machine screws. Fit the RBPi under the top cover of the box, such that the latch servo can swing down and catch the dowel to lock the box.

For the software, you will require the latest version of OpenCV. However, you will need to compile this from source, as the binary versions available are too old to be of use for face recognition. Compiling OpenCV on the RBPi will take about 5 hours.

For training the system to recognize you, you need to press the button to let the camera take a picture of your face and save the picture in the training directory. RBPi requires at least five pictures from different angles, with different lighting etc., for making a positive identification. The images form a database of the permitted faces that are allowed to open the treasure box.

Large scale electricity storage with graphene

At the National Graphene Institute, University of Manchester, researchers are trying to reduce the size and weight of batteries. For this, they are experimenting with graphene, as this will also increase the lifespan of the batteries. However, before they can start building lighter batteries, they need to understand how graphene interacts with the other chemical components within the battery, especially the electrolytes.

The new project has attracted considerable attention and many commercial partners are involved. They include Morgan Advanced Materials, Sharp and Rolls-Royce. All of them are interested in the future applications of graphene. The research project and applications has attracted over 30 companies from around the world.

Among the many experiments that researchers are conducting, one is to analyze the chemical interaction that takes place between graphene and lithium ions. The quest is to find out how quickly electrons move across graphene, the magnitude of capacitance and the amount of electrical energy that a graphene surface can hold.

The project is also focusing on super-capacitors, especially graphene based, as these tend to have high power densities and longer cycles of life compared to batteries, although their energy storage capacities are lower. However, the advantage they have is they can complement batteries and form an integrated storage solution.

For example, electric cars could use a combination of graphene batteries and super-capacitors to lighten up their load. Typically, batteries for electric cars weigh 200kg or as much as three passengers. If the weight of batteries were to be reduced, it would boost the efficiency of the vehicle and increase its driving range. Electric cares typically have a limitation of 100km, and this is a hindrance to their widespread use.

Increasing the distance the cars travel between charge points will definitely improve their popularity. However, it is still not very clear how the batteries will be able to stand up to the rigors and strains of daily driving. Like all other vehicles, electrical cars too are not driven smoothly; as drivers accelerate, the power demand on the batteries peaks. That stresses the battery and may be a potential cause for limiting its lifespan.

For testing the batteries, researchers will be subjecting prototype graphene batteries and super-capacitor combination to real world stresses that will mimic the profiles presented by different driving conditions. They will even test the batteries under driving in extreme conditions. Batteries are notorious underperformers in cold conditions; therefore, weather chamber tests will be rigorous. That will be instrumental in\ bringing out the weaknesses in the combinations.

The best part is that graphene based storage is useful not only in transport, but in the case of renewable energy sources as well. Usually, wind and solar energy are reliable, but there are times when the wind drops or clouds eclipse the sun. High capacity electrical storage will help to store electricity during periods of low generation.

Manchester is going to be home to a system consisting of a converter system and a grid-scale battery. This will be used for testing possibilities for large-scale electrical storage.

What are terrorist robots?

Increases in terrorist activities around the world are forcing the military to train their units in different ways for tackling the menace, especially for urban engagements. Marathon Robotics, an Australian company, in conjunction with the Australian Department of Defense, has revolutionized the way police and military personnel can train their personnel. They have adapted the two-wheeled gyro-stabilized Segway personal transporter and turned it into a Terrorist Robot.

Marathon fits their Terrorist Robots with a Segway transporter and target silhouettes. These form the remote controlled, wheeled robot targets for the military personnel to practice. Moving and responding like humans, these Segway robots can duck into doorways or disperse at the sound of gunfire. That provides the police and military sharpshooters a challenging and ultra-realistic training in engaging the moving enemy. Australian Special Forces units train using mock urban centers populated with the rolling robots from Marathon. Now, the US Marine Corps is looking forward to a similar live-fire training venue, fully equipped with Marathon’s Terrorist Robots.

Marathon has created the ultimate moving targets of the twenty-first century. They have done this by combining remote-controlled, armored Segway and computer gaming technology. With the lower half of the robots armor-plated, the expensive electronic innards remain safe from errant shots. The top has a replica of a human torso. During the training, clothing the torso section differently, enables distinguishing military targets from civilians or hostages from terrorists.

Marathon uses sophisticated software for controlling multiple Segway robots simultaneously. The software program allows a group of these robots to mimic a group of terrorists holding hostages or simply a squad on a patrol. Furthermore, the control part of the software allows the robots to demonstrate autonomous or intelligent behavior.

For example, the sound of a gunshot makes the robots disperse automatically, just as humans would. The robots can further be trained to seek cover behind objects or in hallways. More importantly, the robots can behave very similar to humans – stopping quickly, turning a full circle, retreating slowly or accelerating to a human pace of running. Just as people do, the Segbots also lean forward slightly as they move forward. To avoid running into obstacles or people on the move, Marathon equips their robots with laser range finders. Watch the Terrorist Robots in action below.

For the military or the police personnel, a battlefield is not the right place for on-the-job training. The Marathon smart targets thus provide a realistic method to address this fundamental gap in training. This is the first time shooters can fire live ammunition in a firefight at realistically moving targets. That provides the soldiers the optimum way of training to fight – using live ammunition against unpredictably moving targets.

Programming the robots is simple. The computer shows a map of the entire terrain and the placement of the robots. The possible routes that the robots can take are superimposed on the map. From here onwards, the Terrorist Robots are on their own, moving around autonomously, avoiding obstacles in their path and other robots, until a sudden gunshot changes their behavior.

Making City Streetlights Smart with DALI

Big cities are changing over to LED lights for illumination of their streets. They find this to be a smart solution in terms of cost-reduction and efficiency. STMicroelectronics is taking an important next step by adopting LEDs for street illumination. They are doing this in conjunction with smart power supplies that turn the LED street lamps into intelligent devices. For example, the streetlamps reduce their brightness as the sun rises while gradually increasing their brightness with failing daylight. They also communicate with the smart grid in their effort to reduce the power consumption.

To avoid losses and manage electricity consumption smartly, STMicroelectronics is using LEDs that are dimmable and connected to smart grid systems. Microcontrollers drive the LEDs, and the system avoids the power losses commonly associated with non-optimized management of power such as with the use of incandescent bulbs and other forms of commonly utilized lights.

STMicroelectronics present their new solution in the form of a demo board based on STLUX385A, a digital power controller. Using a proprietary power conversion protocol, the controller drives a row of LEDs for the smart-lighting applications. DALI forms the core of the new STsystem for smartly driving the LED row.

DALI or the Digital Addressable Lighting Interface, is also standardized as IEC 929, and is a new interface for controlling lighting as defined by the lighting industry. The DCM or the DALI Communication Module generally implements DALI protocol. DCM is a serial communication circuit designed especially for controllable electronic ballasts – the device or circuit that provides the required starting voltage and operating current for the LEDs.

LEDs are different from CFLs and incandescent bulbs. LEDs require a supply of constant current. They start emitting light as soon as their forward electric threshold voltage is reached. Effectiveness of the illumination provided by a string of LEDs depends on the product of the current and the voltage applied to the string, and this must be stable in time.

HF fluorescent ballasts use the DSI protocol, and DALI is a step further. Unlike DSI and other 1-10V devices that address and control devices in a group, DALI can address each device separately on a segment of a data cable. Therefore, for achieving similar control functionality, DALI requires a simpler wiring topology as compared with DSI or 1-10V devices.

Devices that DALI can control include, apart from LEDs, wall switches, gateways to other protocols, motion detectors, PE cells, low-voltage transformers and HF ballasts for Fluorescent tubes. A single DALI network can address up to 64 DALI devices. When sites require more than 64, multiple separate DALI networks are established, each limited to 64 devices. DALI gateways then link these separate networks together, forming a data backbone running a high-level protocol, typically, DyNet from Dynalite.

Implementation of DALI facilitates equipment from different vendors to the integrated easily. This reduces the installation costs drastically, offering a finer granularity of control for a given price. However, DALI still does not totally remove the need for a data cable connect to fixtures. It also does not reduce the time required for programming and commissioning the lights. Additionally, unless extra equipment is used, DALI does not help to save the maximum possible amount of energy.

LED High Bay Lighting Produces 23650 Lumens

Hubbell Lighting, the pioneer in lighting innovation, has recently launched LUNABAY. This is an LED high bay lighting for the company’s high output categories, one that maintains an optimum efficiency of 95 Lumens per watt. The LUNABAY range can generate as high as 23,650 Lumens. Three levels of lighting are available in this range: 23,650 Lumens, 18,000 Lumens and 12,300 Lumens. Another aspect is the lights offer a CRI of 68 and is tagged with Uplight components. The LED high bay lighting ranges from 130W to 260W of total the system wattage. The lighting functions in an ambient environment within a temperature range of -40°C to +40°C. The lighting has an assured life of 50,000 hours at L70.

Lighting public places require specific features. It must cover the entire area uniformly as well as it has to present a pleasant ambiance. At the same time, it must also be safe and affordable. LUNABAY from Hubbell Lighting provides efficient lighting with a low-glare light and high level of durability. The places where this LED High bay lighting could be utilized are quite vast. They include multipurpose rooms in educational institutions, retail stores, gyms, light industrial facilities and all other places where it is essential to light the interior locations in an attractive and effective manner. LUNABAY provides lighting that cannot be matched for efficiency and durability by any other product currently available in the market.

The most important aspect of LUNABAY is its low glare feature of the LED light it produces. This feature is specifically patented and it remains an exclusive domain for Hubbell. Typically, conventional downlights in large areas generate glare and create a cave-like effect. The special optical system used in LUNBAY totally removes this discrepancy. It offers smoothly and evenly distributed light, which is consistent, has a low glare and a high CRI.

Another aspect to be noted is that the two refractors, 22” crystal clear and 23” aluminum possess Uplight components of 10% and 20% respectively. The LUNABAY lighting offers five color temperatures. The chimney part at the top can have a choice of seven colors matching the interiors. Apart from custom colors, users may select colors from white, red, black, forest green, dark bronze and platinum silver. LUNBAY offers multiple options, which includes control over on/off, fusing, wire guard, no light or 50% light output – leading to additional saving of energy. In emergency, LUNABAY is also compatible with 250VA Light Gear Inverters.

Hubbell Lighting is one the leading and largest producers of lighting fixtures in the USA. Their range covers the complete category of indoor and outdoor lighting products catering to residential needs, commercial lighting, institutional requirements and industrial markets. One of the special features of Hubbell Lighting is that the company has been consistent in developing new products in lighting, resulting in energy savings while at the same time remaining affordable to customers. The LUNABAY LED High bay Lighting is their latest product and is the only one to produce up to 23,650 Lumens. This new LED lighting is sure to make a significant positive impact on the market.

No more mobile phone batteries?

Now the time has come when you can do away with the battery of your mobile phone. A new material promises to transform the entire device of your phone into a super-battery, so you do not need batteries any longer.

Researchers have managed to combine the best features of batteries and super-capacitors into one single hybrid material. When made into a case suitable for the device, it can replace the battery. Although the energy density of the material does not yet stand up to that of a lithium-ion battery, it makes up for the lower density by the case being made up of a much larger volume. Additionally, the space that the battery normally occupies could now be taken up by the case.

Researchers call these hybrid capacitors. Actually, these batteries behave just like capacitors. They can maintain the ultra-long cycling lifetimes just as super capacitors do, but also store and deliver about as much energy as the current lithium-ion batteries can. Now they are trying to build this super-capacitor material into the structure of different types of constructions materials, such as sidings, drywalls of homes, chassis of airplanes and of course, cases of mobile phones.

One of the advantages in developing such energy storage materials that integrate into homes is the increase in the economic value of solar cells. These can be placed on the roof and they enable a distributed energy electric grid system.

Apple, in an independent research – for which they have filed a patent – have developed a photovoltaic touchscreen that harvests ambient light for keeping a mobile device with a super-capacitor case charged without a power cord.

Irrespective of the application, the purpose is to allow structural materials to store energy while retaining the same load-bearing durability. The structural materials thereby harbor inside them systems for storing energy and in many cases, their lifetime exceeds that of the objects for which they are acting as the building materials.

The major advantage here is that an extra battery compartment is no longer required. Either the device volume can be reduced by that extent or the structural material can double up for the redundant battery. Although these super-capacitors store about ten-percent less energy compared to lithium-ion batteries, they can make up for it in the volume where they are a part of the structure. Additionally, with an operating life more than a thousand times that of a battery, these super-capacitor-batteries are ideally suitable for mobile devices, homes, aircraft, automobiles, and more.

That makes eminent sense. What matters more is the total energy the product offers. With 10-percent less storage capacity, but distributed over a thousand discharge cycles, it means the material is capable of supplying 100-times more energy over the lifetime of the system. When such materials are used for building a home or the chassis of a car, it would be a nuisance if they required to be replaced every few years because they expired.

In the prototype, the super-battery had electrodes made of silicon wafers. One side of the wafers was covered with Nano scale pores and then with an ultra-thin layer of carbon. Between the two layers, is a polymer film holding charged ions much like an electrolyte in a battery. The whole structure is then solidified.

The Raspberry Pi-Fi bundle

The mighty single board computer, the credit card sized Raspberry Pi or RBPi, as it is fondly called, is making waves for all the good reasons. Developed by the Raspberry Pi foundation as a low-cost, hands-on for children learning about the inner workings of a computer, this tiny SBC has caught the imagination of hobbyists all over the world. As a result, people have developed innumerable projects based on the RBPi, and the flood shows no signs of abating.

For those still not initiated in the RBPi bandwagon, it is best to buy the SBC as a bundle. The Pi-Fi bundle will include the RBPi, a preloaded 8GB SD card, a Wi-Fi dongle along with an instruction manual “Getting Started with Raspberry Pi.” Add an appropriate power supply, a USB keyboard, a mouse and a display and viola – you have a fully functional Linux computer, fully Wi-Fi enabled, capable of playing games, writing programs, streaming media and web browsing. The USB keyboard and mouse is not a strict requirement. You may also use a wireless keyboard and mouse with their USB receiver.

Other sundry things you may need are an HDMI cable and a USB A to micro cable. Make sure the power supply is capable of supplying 5V at 1.0A on its USB port, and you are good to go.

To start, plug in your keyboard, mouse and monitor to the RBPi. Next insert the SD card and plug in the power cable between the RBPi and the power supply. Hook up the power supply to the mains and switch it on. On the monitor screen, the NOOBs (New Out Of Box) interface from your SD card will prompt you with a choice of the operating system you would like to install. If you dislike the OS you just installed, shut down, switch off, and reboot but hold down the shift key while the RBPi reboots. You will be returned to the NOOBs interface to select a new OS.

The RBPi consists of a System on Chip, a Broadcom BCM2835 that has a CPU, a 700MHz ARM 1176jZF-S and a GPU, a Broadcom VideoCore IV that supports MPEG-2, OpenGL, h.264/MPEG-4 AVC and 1080P. For memory, the SBC has 512MB of RAM, and an onboard storage of MMC/SD/SDIO card slot, for which a minimum size of 4GB is recommended. The board consumes about 700mA or 3.5W of power at 5VDC via the Micro USB or the GPIO header.

The RBPi is capable of outputting video as composite RCA or HDMI, audio via 3.5mm jack or HDMI. It has two USB-2.0 ports and a Micro USB port, exclusively for power. An onboard Ethernet network is available – 10/100 RJ-45. There is support for low-level peripherals such as SPI bus (along with two chip selects at +3V3 and +5V), I2C bus, UART and 8x GPIO or General Purpose Interface Bus.

If you are not too keen on an Ethernet cord dangling from your RBPi, simply plug in the wireless USB adapter to get 802.11b/g/n networks. In case power flakiness is observed, go for a powered USB hub to plug in the adapter. Wi-Fi requires substantial amounts of power.