Thursday 16 October 2014

NASA Is Preparing Mars Spacecraft For A Close Clash With The Comet


Mars Spacecraft
Comet Siding Spring which was discovered on January 2012, is expected to fly pass just 87,000 miles away which is 140,000 km wawy from Mars. This distance is merely half the distance between the Moon and Earth. This is expected to happen on the 13th of October. According to the NASA scientists, this is the first time any comet has passed nearly 10 times close to Earth. On Thursday, NASA announced in a conference, that they have already prepared themselves for the extremely rare and close encounter by the passing comet. This is will be done from the outer boundary of the solar system.

According to Padma Yanamandra-Fisher, Senior research scientist from Space Science Institute in Rancho Cucamonga, California, it is really hard to plan any mission for Oort Cloud comets, as they are not so sure about the behavior of that particular comet as well as the origin point of the comet. This comet is a very rare and special visitor from the far-away Oort Cloud.

The Oort cloud is a collection of the frozen remnants which were formed during the formation of the solar system. Comet Siding Spring which is supposed to be a first-time visitor in the inner part of the solar system was gravitationally thrown out of the solar system nearly a million years ago by a passing star. The comet is believed to be maintaining a distance from the Sun, similar to that of Mars, Saturn, Jupiter and even Neptune.

This first time movement of the comet has been named as water-ice line. During the initial stages, NASA was very much concerned with the fact that the dusty tail of the comet might interfere and become a threat to the spacecrafts orbiting around in the solar system as it passes by Mars.

During the latest assessments, the threat has been confirmed as much as 90% and based on these assessments, NASA has already made changes to the orbits of the satellites to ensure that they are behind the planet when the comet passes by.

According to Rich Zurek, a NASA Mars scientist and also working with Jet Propulsion Laboratory in Pasadena, California, during this event, there are high chances that the remnant cloud might be very close to Mars and there are other chances of the comet completely missing Mars and will not leave any kind of particles. NASA’s current curiosity and the perfect opportunity is being protected by the fact that the atmosphere on Mars is very thin compared to Earth. NASA is very curious about this comet as it might lead to triggering of meteor showers.

Apart from India and the European Space Agency spacecraft orbiting the planet, NASA has two rovers apart from their three operational orbiters which are currently orbiting Mars. All of this probe is part of the study, which is based on a grand science campaign focusing on the comet during its contact time. NASA scientists are curious to learn about the impacts of the planet’s gravitational force on the comet and how the comet will be impacting the Mars atmosphere.

Importance of the Google Chromebooks for Work in the Business Field



Google Chromebooks
Google decides to launch a new feature that is recognized as the Chromebooks for work. It would include the advanced options that would help the users with the better performance. The features provide the increased security system that would enable the businesspersons to manage the system without facing any intricacies.

You can obtain the single sign-on facility here that aids you to maintain the systematic procedure along with the better output at the work place. Also, he employees can experience the suitable environment that inspires them to perform well. The Chromebook uses the Security Assertion Mark Up Language in short the SAML that restricts the space for the unauthorized users.

Other Technical Opportunities

You can even recognize the Wi-Fi connectivity that enables your business to set up a strong network. It gives you online access using which you can develop the overall business infrastructure. Here, the consumers would also need the authenticated licenses to enter the platform. The wireless networks allow you to maintain the overall condition along with the optimistic features for your business.

In this way, your business can attain the smart outlook accumulating the advanced approaches. Alongside, the signed-in employees can explore other manifold options and even the administrator can control the complete system. The administrator need to use the Admin console option using which they can view the entire status of the employees. So, it eliminates any sort of malfunction and sustains the suitable work environment increasing the business opportunities.

The Suitable Graphics Option

Moreover, the system consist the comprehensive graphics that you can easily understand. It represents the feasible 3D applications along with a suitable display on the Chromebooks. The advanced desktop settings also allow you to carry out the procedure efficiently at your ease. You can explore the options such as the Google Cloud print along with the effective visual opportunities.

In addition, the secured SSL connections increase the overall security measures. It improve the status of the entire system helping the users as well as the administrators. Also, it does not involve any large investment due to which you can easily incorporate the suitable option for your business. Currently, the new price range is available in US and Canada where the businesses can experience the outputs. So, you can recognize the improved business results using the particular technical apparatus from Google.

Have a Detailed Communication with the Technical Expert

After you decide to implement the suitable features, once consult with a technical person knowing the detailed opportunities that you would receive. Make sure that you obtain the customized attributes that would take your business to a different level.

Gradually, your business would accumulate the advanced technical facets that would enable the users to maintain a clean profile. Also, it would save the time and effort, as it completely maintains the automated system. You can even browse the reviews where you can gain ample information. It would help you to understand the usability of the system. While installing the system make sure that you handle the entire technology efficiently along with the suitable performance.

Windseeker – A Malicious App


Windseeker

A malicious app dubbed Windseeker has been detected by security experts at Lacoon Mobile Security that utilizes a rare injection in hooking techniques to spy on the users. It is one of those dangerous Android apps which have drawn the attention of experts at the Lacoon Mobile security and the main features of the app are its injection and techniques to spy on mobile users. The techniques are very rare in mobile ecosystem wherein Windseeker operated on rooted Android devices enables attackers to probe on popular instant messaging apps in China, WeChat and QQ.

Lacoon noticed Windseeker in third party app marketplace though an attacker would need physical access to the device to get installed and to register the app. In a recent interview with SC Magazine, Avi Bashan, CISO at Lacoon Mobile Security states that the app’s injection and hooking techniques are a focal point of the threat wherein the techniques has two sections.

The first being the injection that occur on the native file which uses ptrace procedure and is also used to inject a second file to target instant messaging app while in the second section, the injected native file loads a java file which enables to monitor the activity of the messaging app through the API hooking.

Threat – Cause for Worry

This discovery is a cause for worry and Bashan explains that these types of treat could be utilized in spying data of any kind of application. In his blog he has also mentioned about the threat that it was `important to understand that this type of threat could be implemented anywhere’. Bashan further states that `hooking over an API code would mean that each time the app calls to the API, instead of going directly to the system, the data is intercepted by the attacker and when it is on the device, it is called “hooking” and when it is over the network it is known as a man-in-the-middle attack which PC malware has been doing it for years. Bashan has also highlighted in his blog post that the hooking techniques does not seem to be a common attack method in the mobile field.

How Does the Windseeker Functions

Initially the Windseeker checks if the device is rooted since it is essential for the app to run and if rooted, it performs the following process:
  • Creates a process monitoring thread which is used to identify if IM apps such as WeChat or QQ are active. 
  • Request the user to register with its management server through SMS 
  • It injects a malicious code which in fact is the hooking process that enables the Windseeker to spy on WeChat and QQ 
  • It directs the monitored data back to the threat actor’s controlled server where the details from the IM chat could be viewed conveniently from a web interface.
The target gets the opportunity of viewing the Windseeker app that is installed but will be unaware of its capabilities of monitoring their instant messaging chats. According to Bashan, till now commercial mobile surveillance apps sought an app’s data through a file system or a memory dump and the hooking techniques indicates a new step in the evolution of threat in mobile resembling the way PC based malware evolved all through the years.

Steps to be taken for Protection - 

  • Avoid rooting the device since it exposes the device to these kinds of threats. 
  • Avoid installing application from unreliable application marketplaces or unknown sources. 
  • Ensure to review your list of installed applications frequently to see if there is anything that is unfamiliar.

Wednesday 15 October 2014

Internet Revolution: Now to Get the Speed of 1 Gbps


Elon
With the increasing number of people relying on the internet and the increase in the demand of high speeds, one should be expecting new applications which will change the complete face of the online era. According to the research conducted by Elon University's Imagining the Internet Center and US-based think-tank Pew Research Center, by the end of 2025, huge changes are expected in every aspect of life.

This new speed era wherein internet is touching the speed of 1 Gbps, positive impacts is being expected in the fields of education, health, business and science. According to industry experts people will be able to carry out Hyper-personalized interaction within their surroundings with the help of video and Telepresence. There will be extreme dependence o the machines and the life will become virtual, people will be able to tap into information about others as they would have done without the internet.

Although, the Gigabytes connections are faster when compared to the traditional fixed line internet, they are still limited in America. According to the reports from Akamai (cloud service provider), 3.9 Mbps speed was recorded until the first quarter of 2014 around the globe. While countries like America and South Korea are the leaders, India is far behind in the list in terms of usage as well as peed.

Things that can change if increase in popularity of Gigabyte connectivity:

  1.  A simple interaction with friends, family or even doctors will no longer be limited to email. Without any set-up requirement, a user will be able to have video interactions. 
  2. Until now we have been documenting each moment of our lives through different medium, but with this connectivity, live streaming of our lives itself can be very much possible. 
  3. People will be able to buy health monitoring systems and it the monitoring of the patient will be much easier and cheaper when compared to the inside of the hospital. Robotic surgery will become something very common. 
  4. 3D imaging will be used for designing clothes every day. 
  5. Schools will be able to divide the classes and session between home and school. Interaction with the tutors and teaching will become much simpler. 
  6. People will no longer divide themselves into groups based on race and finance, the new division will be based on the fact who has the technology and who doesn’t.
Google initiated a project for building their Google fiber network and among the 1100 communities; Kansas was one of the chose city for the running of 1 Gbps. The company is now focusing on carrying the same project to cities like Texas, Austin and 34 others.

According to Rex Troumbley who is a research assistant at the University of Hawaii, people shouldn’t be comparing the bandwidth they are receiving with others as it can’t be equally distributed. On a low side, if a person is not getting high speed, they will have to settle down with low speed and bandwidth. This can give rise to a completely new divergence.

United States Hospitals Will Use Robots to Kill Ebola

Ebola Bot
With the increasing number of cases of the Ebola virus all around the world, it has been able to create an extreme level of panic in every person. Ebola being one of the deadliest viruses can kill a person within a few days after the symptoms appear. If people being informed about various precautionary measures, there is no doubt that this virus can spread as quickly as a wildfire.

With the remote decontamination service market expected to have a good growth, many countries are leaving no stone unturned to handle the virus. Authorities in Madrid have already declared that they will euthanize the dogs of the people who contract Ebola outside Africa. Dogs seem to be showing the symptoms later on. WHO has already declared this situation to be completely unavoidable with increasing number of Ebola cases in Europe.

What is the robot all about? 

With the recent incident of emergency landing of the US Airlines Flight 2791, it has again given rise to the fact that Ebola can be highly infectious in airplanes. Hospitals around the world are taking measures to tackle this virus and they have gone to the extent to using a robot, called Ebola bot or little more. This robot was made by texas-based Xenex Disinfection services, which is basically a UV bulb being moved around on wheels. Although the machine costs around $115000 also, nearly 250 hospitals in America have already started using the device. This robot is being used to treat the first person who was diagnosed with the virus.

The robot emits UV lights which can kill the bacteria, destroys virus, bacteria and other infectious bugs, where ever the light practically falls on. This virus has the tendency to survive for 6 days on solid surfaced and spreads through faces, urine, vomit and blood. The aim of this robot is to eliminate any potential source for virus spreading.

This robot has the capability to clean an entire hospital within 5 minutes and also destroy the Ebola virus. It has the capacity to scatter 1.5 pulses every second in every direction to kill the virus.

Uses of this Robot: 

This robot will be mainly used to protect the healthcare workers in the hospitals, so that they are healthy to treat the ailing patients. According to Mark Stibich, Xenex’s chief science officer, they are ultimately aiming to ensure that the virus doesn’t spread outside the hospital. The company is in touch with government and other agencies to find out ways to tackle the situation in Africa.

What is the Advantage? 

Currently, most of the hospitals are spraying chlorine on these workers, but it can’t guarantee complete disinfection. UV rays will ensure that nothing is missed out. Although currently this robot requires manual operation, the company is hoping to make it automatic so that it can send to infected areas to handle the situation. Recent reports have claimed that the use of this robot has reduced the number of infection cases bay nearly 50 percent.