Archive for the ‘Technology Related Articles’ Category

Material bends, stretches and conducts electricity?

Friday, August 8th, 2008

Julie Steenhuysen
Sun

CHICAGO – In the latest twist on electronics, Japanese scientists said on Thursday they have developed a rubbery material that conducts electricity, a finding that could be used to make devices that bend and stretch.

The material, described by Tsuyoshi Sekitani of the University of Tokyo in the journal Science, could be used on curved surfaces or even in moving parts, they said.

Sekitani’s team developed their material using carbon nanotubes, a long stretch of carbon molecules that can conduct electricity.

polymer to form the basic material. Next, they attached a grid of tiny transistors to the material and then put it to the test.

They stretched the sheet of material to nearly double its original size and it snapped back into place, without disrupting the transistors or ruining the material’s conductive properties.

The elastic conductor would allow electronic circuits to be mounted in places that would have been impossible up to now, including “arbitrary curved surfaces and movable parts, such as the joints of a robot’s arm,” Sekitani and colleagues wrote.

Earlier this week, a U.S. team reported developing an elastic mesh material that allowed them to use standard electronics materials to build an electronic eye camera based on the shape and layout of the human eye.

That device could be the basis for the development of an artificial eye implant.

John Rogers of the University of Illinois at Urbana-Champaign, who wrote about the eye camera in the journal Nature, said the development of materials that can be shaped and molded to curved surfaces will allow for a whole new class of electronics devices that can be used to better interact with the human body, such as brain monitoring devices.

© Reuters 2008

 

Internet flaw a boon to hackers

Thursday, August 7th, 2008

Glenn Chapman
Sun

While most businesses are still hustling to protect their Internet traffic, 15 per cent Fortune 500 companies have “done nothing” to defend their computers. Photograph by : Justin Sullivan/Getty Images

Computer security professionals crammed into a Las Vegas ballroom on Wednesday for the first public briefing on an Internet flaw that lets hackers hijack traffic on the World Wide Web.

“There is bunch of weird (stuff) going on out there right now,” expert Dan Kaminsky told AFP, confirming that attacks are being launched online despite efforts to conceal and patch the vulnerability in the Internet’s foundation.

Kaminsky, the director of IOActive penetration testing, was met with applause and cheers when he stepped to a podium at the premier Black Hat conference to reveal details of an attack that is a boon to ill-willed hackers.

An elite squad of computer industry engineers labored in secret to solve the problem, and released a software “patch” in early July but sought to keep details of the vulnerability hidden until Black Hat to give people time to protect computers from attacks.

The Domain Name System (DNS) flaw was figured out and spread online within two weeks of the patch’s release and US telecom giant AT&T was the first confirmed victim of an attack.

Kaminsky said that while most businesses are still hustling to protect their Internet traffic, 15 per cent of Fortune 500 companies have “done nothing” to defend their computers.

“How do you force a server to 1.badguy.com?” Kaminsky asked rhetorically as he addressed the crowd. “Oh, let me count the ways. God, it’s good to be finally able to talk about this stuff.”

Kaminsky stumbled upon the DNS vulnerability about seven months ago and reached out to industry giants to collaborate on a solution.

DNS is used by every computer that links to the Internet and works similar to a telephone system routing calls to proper numbers, in this case the online numerical addresses of websites.

The vulnerability allows “cache poisoning” attacks that tinker with data stored in computer memory caches that relay Internet traffic to its destination.

The flaw has existed since 1983 and may well have been exploited without victims noticing.

The vulnerability also lets hackers hijack emails and supposedly secure online transactions.

The potential for using it as a weapon in nation-sanctioned cyber war or organized crime sprees were “wide open,” said Jerry Dixon, former director of cyber security for the US Department of Homeland Security.

“I’ve spent the last month terrified of large companies having all their email stolen because of a bug I found out about,” Kaminsky said.

The vulnerability is centered in servers used by companies to access the Internet and handle email.

Home computer users whose online activities are channeled through Google, Yahoo, Microsoft or other major Internet properties should be safe because those firms have been alerted to the problem, according to Kaminsky.

“Most home users are more likely than not operating in a protected environment,” Kaminsky said. “It is more likely they will be less protected at work that when they are at home.”

That is because some companies have yet to safeguard their computer networks.

The patch is a temporary fix and doesn’t defend against every kind of what is referred to as a “man in the middle” attack.

The US Computer Emergency Readiness Team (CERT), a joint government-private sector security partnership, is among the chorus urging people to quickly protect computers linked to the Internet.

Kaminsky built a web page, www.doxpara.com, where people can find out whether their computers have the DNS vulnerability. On Wednesday, he released details of the vulnerability on the website.

“We have to get better about fixing the infrastructure,” Kaminsky said. “We got lucky fixing this bug but may not be so lucky next time.”

In a warm touch, Kaminsky’s grandmother Raia Maurer baked cookies for the security experts attending her grandson’s talk.

“I’m so proud of him,” Maurer said. “He explained it so even I can understand it.”

© AFP 2008

Eye spy: U.S. scientists develop eye-shaped camera

Thursday, August 7th, 2008

Julie Steenhuysen
Sun

An eye-shaped camera is seen in an undated handout photo. REUTERS/Beckman Institute, University of Illinois/Handout

A view shows the completed electronic eye camera, mounted on printed circuit board (green) for connection to a computer for image acquisition in this undated handout image. REUTERS/Beckman Institute, University of Illinois/Handout

CHICAGO – Borrowing one of nature’s best designs, U.S. scientists have built an eye-shaped camera using standard sensor materials and say it could improve the performance of digital cameras and enhance imaging of the human body.

The device might even lead to the development of prosthetic devices including a bionic eye, they said.

“This is the first time we’ve demonstrated a camera on a curved surface to really make it look like a human eye,” said Yonggang Huang of Northwestern University in Evanston, Illinois, who reported his findings on Wednesday in the journal Nature.

Huang, who worked on the project with John Rogers of the University of Illinois at Urbana-Champaign, developed a relatively simple solution to the long-running problem of transferring microelectronic components onto a curved surface without breaking them.

“If you simply bend it, those materials are brittle like a ceramic bowl. They break,” Huang said in a telephone interview.

To solve this, Huang and Rogers developed a mesh-like material made up of tiny squares that hold the photodetectors and electronic components. The squares are connected by tiny wires that give each component the ability to mold to a curved surface.

IMPROVING THE FIELD OF VISION

“This approach allows us to put electronics in places where we couldn’t before,” Rogers said in a statement.

With funding from the National Science Foundation and the U.S. Department of Energy, Huang and Rogers built a digital camera that has the size, shape and layout of a human eye. Huang said the curved shape greatly improves the field of vision, bringing the whole picture into focus.

“Currently when you take photos, the middle part of the picture is very clear but when you go to the edge, it is not so clear,” Huang said. “The curved technology will make the entire picture clear.”

But the applications extend beyond taking better vacation photos.

“It really extends to all of the electronics that we use on humans. You want to have a curved surface to fit the human body. That is really the place it can be used,” he said.

Huang said the device could be used to make better imaging equipment, such as curved sensors to monitor brain activity that follow the contours of the brain. It could even be used in the development of an artificial retina or a bionic eye.

“If you want to develop an eye to replace a human eye, certainly you want the shape to look like a human eye,” he said.

“Right now we’ve already got a camera working. It works very well with computers. It’s just how to connect the camera to the brain. That is the issue to be solved,” he said.

© Reuters 2008

 

New Google box for offices can search 10 million files

Wednesday, August 6th, 2008

Eric Auchard, Reuters
Sun

A Google search page is seen through the spectacles of a computer user in Leicester, central England, in this file photo from July 20, 2007. Web search leader Google said on Friday that it would participate in an upcoming wireless spectrum auction if the U.S. Federal Communications Commission added a key condition. REUTERS/Darren Staples

A Google sign is seen at its headquarters in Mountain View, California May 22, 2008. REUTERS/Robert Galbraith

SAN FRANCISCO – Google Inc said on Tuesday it is an offering an upgraded version of the hardware appliance its sells to companies and government organizations for Google-style Web search of office documents.

The Web search leader said the latest version of the Google Search Appliance, a pizza-sized box that holds a self-contained search system for managing an organization’s electronic files, can store up to 10 million documents in a single box.

The new product has the same capacity as a previous version that came in a five-box rack. Google already sells a 12-box version of the appliance in a rack the size of a stand-up refrigerator that can search up to 30 million documents.

The appliances contain Google software to power the search services, running on storage hardware from Dell Inc .

Once installed in a network, the appliances help staff find documents in various different corporate store houses, from EMC Corp’s Documentum, IBM’s FileNet, Open Text’s LiveLink and Microsoft Corp’s SharePoint.

New features in the latest model include greater encryption powers and the ability for Google Alerts to notify users when new documents are stored on the network by colleagues.

Network administrators will be able to manage Google Search Appliances in 27 languages, adding Turkish, Czech, Vietnamese and Portuguese. The boxes can, in turn, deliver search results to office workers in 40 different languages.

Mountain View, California-based Google does not disclose revenue for search appliances, which are part of its enterprise software and services business aimed at corporate buyers.

Roughly 98 percent of its revenue comes from advertising sold alongside services on Google.com and affiliated sites.

But because Google does not reveal revenue for the business, it is hard to verify its claims to be the market share leader in enterprise, as well as consumer, search.

“We estimate, with obviously imperfect information, that we are the market leader,” Matt Glotzbach, product management director for Google Enterprise, said in a phone interview.

Rival providers of search used inside company networks include Microsoft, IBM, and Autonomy of Britain.

© Reuters 2008

 

Olympus, Matsushita to offer smaller SLR cameras

Tuesday, August 5th, 2008

Kiyoshi Takenaka, Reuters
Sun

TOKYO – Japan‘s Olympus Corp and Matsushita announced a new digital camera format on Tuesday that will make single lens reflex (SLR) models smaller and lighter, in a bid to drive sales of their advanced machines.

SLR cameras, which are high-end models with interchangeable lenses, are the most lucrative and fastest growing segment of the overall digital camera market.

But some compact digital camera users are reluctant to move up to SLR models because they are bulkier and heavier.

The new format, called the Micro Four Thirds System, would make digital SLR cameras thinner and lens units smaller than those based on the existing Four Thirds System.

The Four Thirds System is an open standard that specifies the size of the imaging sensor and lens mount, ensuring compatibility of lenses between products.

Olympus and Matsushita Electric Industrial Co Ltd, maker of Panasonic brand electronics, offer digital SLR cameras based on the Four Thirds standard, while Sigma Corp makes Four Thirds-based lenses.

“Packing high picture quality into a body thin enough to slide into a pocket. That is the basic concept of Micro Four Thirds,” Haruo Ogawa, head of Olympus Imaging Corp’s SLR business division, told a news conference.

Olympus Imaging is Olympus Corp’s digital camera subsidiary.

Matsushita and Olympus did not disclose the actual size or design of their new cameras based on the new standard, and declined to comment on prices and launch timing.

Olympus is the world’s fourth-largest digital SLR camera maker behind Canon Inc, Nikon Corp and Sony Corp. Matsushita ranks sixth.

© Reuters 2008

 

Meet A-Z: The computer hacker behind a cybercrime wave

Tuesday, August 5th, 2008

Byron Acohido
USA Today

Web security expert Don Jackson is hunting the hacker known as A-Z and has even had chats with the “well-spoken, business-savvy and discreet” man. By Allison Diaz for USA TODAY

He goes by the nickname A-Z and is one of Russia‘s bright young tech stars. He’s a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions.

Trouble is, A-Z’s masterstroke is a computer program called ZeuS that helps cybergangs steal people’s identity data and pull off Web scams on a vast scale. Last fall, German criminals used ZeuS to pull off an Ocean’s Eleven-like caper, hijacking $6 million from banks in the United States, United Kingdom, Spain and Italy, says SecureWorks, an Atlanta-based company that monitors Internet crime and supplies security systems for 2,100 companies and government agencies.

A few years ago, skilled hackers such as A-Z concentrated most of their efforts on setting loose globe-spanning Internet viruses, mainly for bragging rights. But cybercrime is now a fast-expanding, global industry, security researchers and law enforcement officials say. Because it most often goes undetected and unreported, cybercrime is difficult to measure. A benchmark widely cited by the tech-security community is that its value tops $100 billion a year, outpacing global drug trafficking.

“All you need is a computer, Internet access and programming skills, and now you have a viable career path in front of you,” says Nick Newman, a computer crime specialist at the National White Collar Crime Center, a federally funded non-profit that trains local law enforcement. “It’s easy money, and because the Internet is anonymous you don’t think you’ll ever get caught.”

A-Z is an archetypical new-generation hacker. No one outside of his close associates knows his true identity, virus hunters say. But security researchers and government authorities have exhaustively triangulated his presence in the cyber-underworld for nearly two years. Based on A-Z’s marketing activities in Russian chat rooms and forums, and distinctive coding signatures in ZeuS, investigators peg him to be a male in his early 20s, living in Moscow, working full time as an independent software developer for hire.

“He’s well-spoken, business-savvy and discreet,” says Don Jackson, a senior researcher at SecureWorks who has investigated A-Z’s movements online. Jackson belongs to a fraternity of about 200 other professional virus hunters who shadow hackers and scrutinize Internet traffic to flush out data-stealing programs and curtail Web scams. A-Z is “very careful to maintain a professional image, and he always leaves his clients wanting more.”

Crafting a sneaky ZeuS

Hackers such as A-Z craft the code that enables crime groups to continually inundate your e-mail inbox with spam scams and taint millions of popular Web pages with snares to take control of your PC.

Cybercrime has evolved into big business and created a market for highly specialized individuals,” says Steve Santorelli, director of investigations at research firm Team Cymru, who has studied how ZeuS helps cyber-intruders control infected computers. A-Z identified an underserved market niche and hustled to fill it, Jackson says. He recognized latent demand for software that could more efficiently infect home and workplace PCs and turn them into bots — obedient machines that could be controlled remotely without the owners’ knowledge or consent. Cybergangs now routinely assemble thousands of infected PCs in networks, called botnets, which they then use to spread spam, infect other computers, steal data and hijack online accounts.

A-Z perfected ZeuS — a customizable botnet creation and management program that readily slips through computer firewalls and sidesteps detection by anti-virus filters. He began hawking ZeuS for $3,000 on Internet forums, where hackers and scammers congregate. By early 2007, ZeuS began to catch on, according to reports from Sunbelt Software, Symantec, McAfee, Kaspersky Lab, Finjan and other security firms.

One customer used ZeuS to steal user names and passwords from patrons of a Russian online stock-trading site. Another used ZeuS to take control of at least 150,000 PCs and encrypt personal files stored on the hard drives, leaving behind a ransom note demanding $300 for the keys to decrypt the files.

ZeuS was also deployed to swipe 1.6 million sensitive records from job seekers at Monster.com and several other online job sites. Monster has since taken an “extremely aggressive approach” to preventing fraud, says spokesman Steve Sylven. “We continually refine our site technologies to prevent unauthorized access to Monster services,” he says.

ZeuS was so effective that it inspired cheap knockoffs. This cut into A-Z’s revenue and tarnished his reputation, Jackson says. “His money began to dry up when U.S. and German groups began selling counterfeit versions.”

Much as a young Bill Gates did when hackers began to pirate early versions of Microsoft Windows, A-Z took steps to prevent the theft of his intellectual property, Jackson says. A version of ZeuS began to circulate with a statement strictly limiting the purchaser’s use of his brainchild. Violators, A-Z warned, would have key coding revealed to the anti-virus companies, effectively neutralizing their copies of ZeuS.

In spring 2007, soon after the restricted version of ZeuS showed up, A-Z adopted a lower profile. He stopped advertising ZeuS for sale on criminal forums and began supplying ZeuS only to repeat or referred customers, Jackson says.

Theft on a grand scale

In early summer 2007, A-Z agreed to form a partnership with a German cybergang to pursue an ambitious heist worthy of a Hollywood thriller, Jackson says. The gang was known for executing “man-in-the-middle” attacks. This involved infecting a PC with a virus that sits dormant until the user logs into an online bank account. The virus then comes alive and tries to execute a cash transfer to an account controlled by the crooks — while the victim is logged on and doing other banking, says Ken Dunham, research director at iSight Partners, a Dallas-based risk-management firm.

“The really bad actors are using code that can mess with your transactions on the fly,” says Dunham. “They’re manipulating what comes into and leaves your browser in real time.”

Still, man-in-the-middle attacks are notoriously hit-and-miss. Some banks have moved to thwart them by only allowing cash transfers from commercial accounts, and requiring bank patrons to type in a special code, called a security certificate.

Jackson caught wind of the alliance between A-Z and the German gang and began reporting on it within tech-security circles. Here is what Jackson has extensively documented about the partnership’s elaborate caper:

It was executed in two stages. In Stage 1, the gang sent millions of spam e-mail messages purporting to carry a Web link to Father’s Day greeting cards, celebrity videos, stories on real and bogus news events and other ruses. Anyone who clicked on such a link received an error message — and the PC got infected. A generic version of ZeuS then began to harvest all data typed by the PC user on any Web forms: shopping pages, online applications, account logon pages and the like. ZeuS also slotted each infected PC into a large botnet standing at the ready and awaiting further commands.

Through the summer and fall, gang members combed through the stolen data that poured in from generic ZeuS infections. They were on the hunt for PC users with online access to commercial bank accounts equipped with the ability to make online cash transfers. By November, the gang had a list of several thousand such accounts and was ready to move to Stage 2, which hinged on a “spear phishing” campaign, Jackson says.

Generic phishing scams that try to trick people into typing their usernames and passwords at spoofed Web pages are typically mass-e-mailed indiscriminately. By contrast, spear phishers target specific individuals. The gang began spear phishing the commercial bank account holders.

The e-mails advised the account holders that their security certificates were “out of sync” and asked them to “click here” to reset them. Since the messages included great detail about the individual and did not ask for any sensitive data, the ruse was “very convincing,” Jackson says.

According to Jackson, several thousand online banking patrons fell for the ruse and clicked on the hyperlink. A fresh copy of their security certificate, indeed, popped up. But a fresh infection also got installed: a customized version of ZeuS tweaked by A-Z to alert the gang the next time the PC user logged into the account, Jackson says.

Anticipating that ZeuS would reel in thousands of such alerts, A-Z prepared the botnet created in Stage 1 to lend a helping hand. Jackson says the botnet was set to automatically react to alerts. Each alert triggered a cash transfer of $5,000 to $10,000 that took only a few seconds to complete, he says. According to SecureWorks, British law enforcement and affected banks compiled an estimate of ZeuS‘ total take over the course of two weeks: $6 million.

A break in the case came when Jackson discovered a computer server in Turkey where the gang stored instructions for making cash deposits into accounts it controlled. Network operators in the U.K., Germany and Turkey cooperated with U.S. law enforcement to shut down the server and curtail the scam, SecureWorks says.

Though the robbery was widely discussed in tech-security circles, the names of the banks that suffered losses were never disclosed. Members of the German gang and A-Z remain at large and under investigation by U.S. authorities. The FBI and U.S. Secret Service declined comment.

As a rule, tech-security firms help banks under non-disclosure agreements. The names of the 20 affected banks have remained undisclosed.

Hacker’s free to ‘live large’

Pursuing cybercrooks, especially hackers who mainly write code, is a low priority for Russian police, says John Pironti, a banking security expert at systems integration firm Getronics. As long as A-Z doesn’t leave Russia, he is effectively beyond the rule of law. “Unless he causes someone physical or political harm, he can live large,” Pironti says.

A-Z, in fact, has admirers in legitimate tech circles. Yuval Ben-Itzhak, a virus hunter at San Jose-based security firm Finjan, marvels at the finesse it took to develop ZeuS. “To write a program that needs to run on millions of PCs all around the world and not break them is truly an art,” Ben-Itzhak says. “I’m telling you, I’d be willing to hire a person like this at any price.”

In online chats, Jackson says, A-Z has told him that he presumes his clients used ZeuS strictly for legal endeavors, and expressed a desire to be taken seriously as a programmer. In one chat session, A-Z divulged his goal to earn enough to trade in his 1995 Zhiguli sedan for a Mercedes-Benz SLR sports coupe. In another chat, Jackson asked A-Z about ZeuS‘ history of being used for mass infections and other criminal activity. Jackson says the hacker insisted that his materials are provided for research purposes and said that he could not control his clients’ actions.

Such facile answers come as no surprise to security experts and social scientists who track the behavior of hackers and scammers immersed in a virtual world where cheating and stealing — and getting away with it — are badges of honor.

“Unfortunately, many of these new specialists rationalize their actions in the absence of ethical guidance,” says Santorelli of Team Cymru. “They represent a serious challenge to those who seek to protect Internet users.”

 

Pioneer’s AVIC LINC Advanced GPS, Blutooth, USB & IPOD device available for $700

Friday, August 1st, 2008

Plan your route, avoid speed traps and stay green

Lowell Conn
Sun

In early July, I accused Pioneer Electronics of withholding good American inventory from Canadian buyers. The company issued a brisk statement to the contrary — and I do admit it probably knows its inventory better than I do. So, let bygones be bygones as we join hands and sing Kumbaya to Pioneer’s new AVIC Linc Advanced Multimedia On-Dash Navigation System. Featuring the F500BT GPS and the ND-G500 4-Channel Gateway amplifier to integrate into the car stereo, this portable device sports an array of AVIC in-dash staples including voice recognition, Bluetooth, an MSN Direct tuner and satellite radio capability. It also features SD Card and USB slots to play an array of multimedia formats as well as iPod control with the sold-separately CD-UI200VM iPod Audio/Video Direct Cable. The company’s AVIC FEEDS software runs on home PCs and features a point of interest creator, picture editor and other utilities, rounding out an impressive package that I can definitely proclaim to be available in Canada. $700; visit www.pioneerelectronics.ca.

– SPEED-TRAP INTELLIGENCE

Phantom Alert’s M.A.D. Database of more than 15,000 speed trap, photo radar, red light and speed camera locations across the United States, Canada, Europe, Australia and Africa would be a very reasonable investment for those committed to breaking traffic laws.

The site maintains this ongoing list of speed traps for regular uploading to compatible Garmin, Magellan and TomTom GPS devices. The service is not endorsed by these manufacturers, but it makes use of the ability within these devices to update points of interest so that the GPS interface alerts drivers when they are approaching a flagged area. Bear in mind that the Canadian data is still in its infancy and interested consumers should search the company’s online registry to make sure there is enough data in your area to make it worthwhile.

Maps are constantly updated, however, by regular site visitors — one hopes the volume of Canadian information will rise when this paragraph hits the streets. $10 to $100 (subscription service); visit www.phantomalert.com.

– REDUCE YOUR FOOTPRINT

While the PLX Kiwi is not the first vehicle diagnostic system featured in these pages, it may be the first one designed to specifically show consumers how to drive more efficiently. Plugging into the vehicle’s OBDII port, this device provides ongoing information regarding gas consumption and trip details as well as an engine scan tool, which can diagnose the cause of any warning light or engine trouble.

But most effective for today’s environment of expensive fuel, the device has a built-in efficiency trainer that tests smoothness, drag, acceleration and deceleration.

According to PLX’s CEO, the environmental upside is a reduction in your carbon dioxide signature by up to two tons per year, which is a good green compromise for those of us still inclined to crank the home air conditioning up to penguin levels. (Sorry, Mr. Suzuki!) $300; visit www.plxkiwi.com.

© The Vancouver Sun 2008

 

Technology overwhelming real life

Tuesday, July 29th, 2008

Time spent on the online universe in virtual engagement is supplanting human experience, author says

Misty Harris
Sun

Guitar solos have vanished from the concert scene at the same time millions of gamers are pretending to be a Guitar Hero.

Gym memberships are down while stores can’t keep the home exercise game Wii Fit in stock.

Precious hours of real life are being sacrificed to the online universe Second Life, and high-powered marketing campaigns this fall are planned to sell still more virtual fantasy trussed up as reality.

Forget concern over counterfeit goods such as watches and handbags. Increasingly, it’s organic human experience that’s being knocked off.

“People are just too overwhelmed by all the technologies that exist to be active participants in real life,” says Robert Lanham, who has written three books on the idiosyncrasies of contemporary human behaviour.

“When you’re microblogging on Tumblr and juggling Twitter, Facebook, and Myspace accounts, who’s got time for yoga classes or guitar lessons? Perfecting your Stratocaster licks playing Rock Band is simply less time-consuming than trying to become the next Jimi Hendrix or Eddie Van Halen.”

NPD Group reports Rock Band Special Edition Bundle for the Xbox 360 was Canada‘s No. 2-selling video game in February, followed by Guitar Hero 3: Legends of Rock. The titles’ successes are in stark contrast with a new report by Maclean’s magazine that, in using Top-40 music as a metric, declares “the guitar solo is dead.”

Hoping to capitalize on the yen for virtual engagement is Nintendo, which this holiday season will launch an air-guitar game for the symphony set. With Wii Music, users will have a choice of playing more than 60 instruments — among them, hand bells, the saxophone, violin, trumpet and piano — in a video game environment that reinvents band camp as a place where kids needn’t learn to read music, can’t make a mistake, and can practise as often or as little as they please.

Wii Music isn’t intended to replace the experiences you’d get by actually playing the real instruments,” says Matt Ryan, a spokesman for Nintendo Canada. “What [it] allows is for people to be able to feel what it would be like to strum a guitar or play a flute or saxophone or the drums.”

Although there’s evidence to suggest performance games are leading some people to take up an instrument, experts say they’re coming to the craft with severely distorted expectations.

“In a way, it’s comparing two very different things: one is a diversion, a game; the other is a curriculum of study, a demanding pursuit,” says Jeffrey McFadden, a classical guitarist and music professor at the University of Toronto.

“But while the satisfaction you get from playing an instrument is certainly in line with the effort it takes to learn, the satisfaction of being a good Guitar Hero player would be fleeting and shallow … It’s like the price of admission is higher for a more profound experience.”

Given the choice of feeling like a rock god or a moderately accomplished individual, it’s easy to see how tempting the former can be.

Sony hopes to leverage that sentiment with PlayStation Home, which starting this fall will allow people to reinvent their lives in a simulated universe. Whether it’s designing a dream apartment, going to a virtual movie theatre with someone who’s thousands of kilometres away, or creating a virtual self with the body of Zeus, Home life will be whatever players make it.

“People see your character as you, so it allows you to be someone that you’re not,” says Matt Levitan, marketing manager for PlayStation Canada. “That kind of freedom is a lot of fun for people.”

Eventually, Home — a free download for PS3 owners — will allow people to attend real concerts without ever entering a stadium, play golf without setting foot on the green, and shoot hoops without breaking out the muscle cream.

“It’s more than just communication,” says Levitan. “It’s your life experiences online.”

But however convenient or ego-stoking these hi-tech encounters, cultural commentator Lanham says they’ll never be as fulfilling or as sexy as the real thing. “Saying, ‘Dude, my virtual band totally rocks … we’re playing a gig in my living room tonight’ is never going to have the same allure as securing a real gig in an actual rock band,” says Lanham. “And it’s unlikely the words ‘he’s such a romantic text-messager, his SMS skills made my knees buckle’ have ever been uttered, or sent via SMS for that matter.”

© The Vancouver Sun 2008

 

Getting the most from your gadgets

Saturday, July 26th, 2008

Sun

Lumix, LX3, Panasonic

Photosmart A630 compact photo printer

Wireless Notebook Optical Mouse 3000, Microsoft

1. Lumix, LX3, Panasonic, $550

The top of the point-and-shoot cameras from Panasonic’s new lineup are arriving in stores in August. And this is also at the high-end price-wise, but it has features you won’t find in a lower-cost camera. Its appeal is likely the SLR (single lens reflex) for the user who wants a compact camera to slip in a pocket. It has a 10-megapixel sensor and an f/2.0-f/2.8, 24 to 60 mm Leica wide-angle lens — which to put in perspective for those vacation shots, delivers more than twice as much of the viewing area as a 35 mm, plus it works well in low light. An optional add-on can bring the wide angle to 18 mm, giving you a sweeping shot that should take in that entire cathedral or other vacation sight that just doesn’t squeeze in the smaller-angle shots. www.panasonic.com

2. Photosmart A630 compact photo printer, HP, $150

Print photos on the go with a compact printer that has a 12-cm touchscreen billed as the largest available on a portable photo printer. This gives you more than 300 ways to edit, customize photos up to 12-by-18 cm, and you can do it with your computer or without. It has an optional Bluetooth adapter so you can print straight from your cellphone or other Bluetooth-enabled device. www.hp.com

3. Wireless Notebook Optical Mouse 3000, Microsoft, $40

Pomegranate, strawberry sorbet, milk chocolate, blue snow cone — sounds more like a menu than something you’d use with your computer. But those are the colour choices, along with green aloe, for Microsoft’s new wireless optical mouse. There’s one for every outfit. Go to www.microsoft.com/hardware/mouseandkeyboard and click on wireless.

4. Wave for iPhone 3G, Griffin Technology, $25

I’ve been trying out the new iPhone 3G now available with Rogers, and it’s driving me crazy keeping that slick little screen polished to a high gleam. So the first accessory has to be a protective case. The Wave, so named for the wave-shaped closures on the side, includes a rigid screen protector for the touchscreen while giving full access to all the iPhone controls, connectors and jacks. In black, blue, pink or white. www.griffintechnology.com

© The Vancouver Sun 2008

Hackers get hold of critical Internet flaw

Friday, July 25th, 2008

“We are in a lot of trouble,” says expert. “This is a big deal.”

Glenn Chapman
Sun

A skull-and-crossbones symbol is placed over a computer keyboard at a ‘hacker academy’ in Paris, France. Internet security researchers on Thursday warned that hackers have caught on to a “critical” flaw that lets them control traffic on the Internet. Photograph by : AFP/File/Joel Saget

by  Thu Jul 24, 7:33 PM ET

Internet security researchers are warning that hackers have caught on to a “critical” flaw that lets them control traffic on the Internet.

An elite squad of computer industry engineers that labored in secret to solve the problem released a software “patch” two weeks ago and sought to keep details of the vulnerability hidden at least a month to give people time to protect computers from attacks.

“We are in a lot of trouble,” said IOActive security specialist Dan Kaminsky, who stumbled upon the Domain Name System (DNS) vulnerability about six months ago and reached out to industry giants to collaborate on a solution.

“This attack is very good. This attack is being weaponized out in the field. Everyone needs to patch, please,” Kaminsky said. “This is a big deal.”

DNS is used by every computer that links to the Internet and works similar to a telephone system routing calls to proper numbers, in this case the online numerical addresses of websites.

The vulnerability allows “cache poisoning” attacks that tinker with data stored in computer memory caches that relay Internet traffic to its destination.

Attackers could use the vulnerability to route Internet users wherever the hackers wanted, no matter what website address is typed into a web browser.

The threat is greatest for business computers handling online traffic or hosting websites, according to security researchers.

The flaw is a boon for “phishing” cons that involve leading people to imitation web pages of businesses such as bank or credit card companies to trick them into disclosing account numbers, passwords and other information.

“I was not intentionally seeking to cause anything that could break the Internet,” Kaminsky said Thursday during a conference call with peers and media. “It’s a little weird to talk about it out loud.”

Kaminsky built a web page, www.doxpara.com, where people can find out whether their computers have the DNS vulnerability. As of Thursday, slightly more than half the computers tested at the website still needed to be patched.

“People are spending tens of thousands of hours getting this patch out the door,” Kaminsky said.

The US Computer Emergency Readiness Team (CERT), a joint government-private sector security partnership, is among the chorus urging people to quickly protect computers linked to the Internet.

“Just like you should wear a seat belt going down the road to be safe in a car accident, the same applies here,” said Jerry Dixon, a former director of cyber security at the US Department of Homeland Security.

“The patch is your seat belt. The exploit is out there and you definitely need to take precautions. Now is not the time to keep waiting.”

Two “exploits,” software snippets that take advantage of the vulnerability, have been unleashed on the Internet in the past 24 hours, Securosis analyst Rich Mogul said during the conference call.

“The threat is there,” Mogul said.

© AFP 2008