Home Blog Page 316

Researchers Developed First Light-Based Microprocessor Chip to Create More Powerful Computers & Ultrafast Communications

Light-Based Microprocessor Chip

Researchers at the University of Colorado Boulder, in collaboration with the University of California, Berkeley and the Massachusetts Institute of Technology (MIT), have developed a groundbreaking light-based microprocessor chip to create more powerful computers and ultrafast communications. Since this microprocessor chip uses light, rather than electricity, to transfer data at rapid speeds while consuming minute amounts of energy.

The technology involved in creating light-based microprocessor, called silicon photonics, is an active area of research at chipmakers like Intel and IBM. The new light-based microprocessor measures just 3 millimeters by 6 millimeters and  utilises multiple wavelengths of light, simultaneously sending data through a single fibre. And the new chip has the potential of transmitting data at nearly 300Gbps per square millimetre, which is close to 50 times faster than conventional electronic wires.

Also Read : Power Paper – A Paper to Store Electricity Coming Soon

Why Light-Based Microprocessor Chip

 Light-Based Microprocessor Chip
Light-based microprocessor chip showing optical circuits (left), memory (top) and 2 compute cores (right). | Image Credits : Colorado Univ

Data transport across short electrical wires is limited by both bandwidth and power density, which creates a performance bottleneck for semiconductor microchips in modern computer systems—from mobile phones to large-scale data centres. Since fibre optics offer larger bandwidth that could facilitate higher rate of communications over greater distances. Fibre optics also utilises less energy. The prototype researchers used had fibre optic links instead of conventional electric wires, also demonstrating that optical chips can be made without any alteration to existing semiconductor manufacturing processes, which has been a challenge thus far.

“One advantage of light based communication is that multiple parallel data streams encoded on different colors of light can be sent over one and the same medium – in this case, an optical wire waveguide on a chip, or an off-chip optical fiber of the same kind that as those that form the Internet backbone,”  — said Popović, whose CU-Boulder-based team developed the photonic device technology in collaboration with a team led by Rajeev Ram, a professor of electrical engineering at MIT.

“Another advantage is that the infrared light that we use – and that also TV remotes use – has a physical wavelength shorter than 1 micron, about one hundredth of the thickness of a human hair,”  —  said Popović. “This enables very dense packing of light communication ports on a chip, enabling huge total bandwidth.”

Also Read : Li-Fi Is Here, 100 Times Faster Than Wi-Fi

Future of Light-Based Microprocessor Chip

Light-Based Microprocessor Chip
Electrical signals are encoded on light waves in this optical transmitter consisting of a spoked ring modulator, monitoring photodiode (left) and light access port (bottom), all built using the same manufacturing steps and alongside transistor circuits that control them (top). | Image Credits : Colorado Univ

The new light-based microprocessor chip bridges the gap between current high-speed electronics manufacturing and the needs of next-generation computing for chips with large-scale integrated light circuits.

Also Read : Nanoparticle Quantum Dot Will Charge Your Phone In 30 Seconds

If they succeed in bringing their prototype out of the research lab, consumers will eventually benefit. For data centers, where messages shuttle among thousands of servers, silicon photonics could speed up services like Google search or Facebook image recognition or let those companies introduce performance-intensive features not economical today. For personal computers and smartphones, silicon photonics could uncork performance bottlenecks without hampering battery life.

“Light based integrated circuits could lead to radical changes in computing and network chip architecture in applications ranging from smartphones to supercomputers to large data centers, something computer architects have already begun work on in anticipation of the arrival of this technology,”  — said Miloš Popović, an assistant professor in CU-Boulder’s Department of Electrical, Computer, and Energy Engineering and a co-corresponding author of the study.

So when can we expect it? The researchers are expecting that data-centers will be the first to utilise the chips, and they will eventually find their way into the mobile and PC market. They also expect the test versions of these chips to be ready by early 2017. The team has published a paper in the journal Nature.

Also Read : A Smart Glove That Translates Sign Language Into Text And Speech

What do you think about this new light-based microprocessor chip. Do they opens new door to more advanced technology? We’d love to hear from you in the comments!

[Infographic] 8 Deadly Computer Viruses That Brought the Internet to Its Knees

Deadly Computer Viruses

We all heard about computer viruses, yes not a new thing. Everyday new type of computer viruses are created by cyber-criminals to compromise our gadgets and personal data.

Did you know first computer virus was created by a 15-year-old high school student, Rich Skrenta in February 1982. And the name of the first computer virus was Elk Cloner. Since Elk Cloner virus was a harmless prank, displaying random messages to users and played subtle tricks when the infected floppy disk was booted.

After that many different types of viruses have been created. Some, like the Elk Cloner, can be annoying but harmless to your computer. Others can do actual damage and end up costing you money due to wasting computer resources, causing system failures, corrupting or deleting your data, or even stealing your private information.

While many of these computer viruses can easily be defeated and others have gone rampant and cost millions of dollars in damage. And also it’s difficult to count the actual number of computer viruses in existence because everyone defines new viruses and categorizes them differently. Some estimates range from in the thousands, to the tens of millions, while others categorize all viruses to a couple dozen different types.

Governments and big companies aren’t the only ones at risk. Your computer can be hacked by computer viruses as well, giving hackers access to your personal information, corrupting your data, wiping your hard drive, and even using your computer to spread the virus to your friends and family.

8 Deadly Computer Viruses

So here is an infographic from WhoisHostingThis, where they show 8 deadly computer viruses in history, the effects they had on their victims — and how you can keep yourself safe.

Deadly Computer Viruses

Did you ever created any computer viruses to prank your friend, if not then create one now and scare him.

 

Edward Snowden Doubts Security of Telegram, but Founder Pavel Durov Disagrees

Edward Snowden Doubts Security

Popular messenger Telegram, the rival messaging app to WhatsApp which recently hit headlines over its popularity with terror group ISIS, is facing criticism on Twitter over its claims that it is totally secure and encrypted with NSA whistleblower Edward Snowden also raising the issue.

The concern over Telegram was first raised by Matasano Security’s firm’s Thomas H Ptacek who posted that the app “stores the plain text of every message every user has ever sent or received” on its servers. According to Ptacek’s tweet, Telegram is not relying on encryption for the data it saves on its cloud servers, contrary to the app’s claims.

The tweet was then re-shared by NSA whistleblower Edward Snowden who posted, “I respect @durov, but Ptacek is right: @telegram’s defaults are dangerous. Without a major update, it’s unsafe.” 

Also Read : Why we are Addicted to Facebook ? – Interesting Survey Results

Pointing towards the vulnerability of such a setup, Snowden hinted that the plaintext of the messages should not be accessible to a service provider at all for a connection to be truly secure.

Telegram has recently been branded the “favorite” messenger among international terrorists in the US media, after Islamic State jihadists allegedly used it while claiming responsibility for attacks in Paris and on the Russian plane over Sinai. Laith Alkhouri, director of Research at Flashpoint Global Partners, called Telegram “the new hot thing among jihadists” in a CNN Money report. The messenger’s encryption might have provided them with the opportunity to exchange secret messages, he alleged.

While Ptacek’s and Snowden’s conclusions appear to contradict the allegations of Telegram’s self-professed complete security, Pavel Durov apparently disagrees. The founder responded to Snowden’s tweet by saying: “Skipping the sarcastic part: users who don’t need cloud sync or do not trust us, use secret chats – https://telegram.org/privacy.”

Also Read : Mark Zuckerberg Quit His Job At Facebook Because Of This Bug

But Durov’s reply that the app doesn’t store the messages hasn’t convinced all. London-based Mustafa Al-Bassam asked on Twitter, “How can http://web.telegram.org work while the phone is off then,” to which WhatsApp’s Jan Koum replied saying that unlike Telegram, WhatsApp for web won’t work without a phone as they don’t store any chat history on their servers.

Koum tweeted, “that is exactly why WhatsApp web client doesn’t work w/o your phone – because we don’t store you chat history on our servers 🙂 ” 

Interestingly WhatsApp has been accused of blocking links to the Telegram app on Android. Telegram claims to have over 60 million monthly users. Telegram co-founder’s reply hasn’t convinced critics, who are pointing out that the default settings in the app are not really that secure.

Also Read : Microsoft Joint Hands with a Chinese Partner to Accelerate Adoption of the Windows 10 Operating System

Are you concern over security of Telegram ? We’d love to hear from you in the comments!

Did you Know, Apple Has Over 800 Engineers Working on the iPhone Camera

iPhone Camera

If you ever wondered why the iPhone camera is among the top rated in the industry, it is because Apple has an army of people working on developing its technology. The company has more than 800 engineers working on perfecting the camera, arguably the most used part of the iPhone. In a wide-ranging interview, the company’s executives laid bare the great effort that goes into their devices.

Also Read : Hackers Claim $1 Million Bounty For Remotely Jailbreaking iOS 9

Speaking to 60 Minutes’ Charlie Rose, Graham Townsend, Apple Senior Director of Camera Hardware, revealed that the tiny camera module on the iPhone 6s Plus is made of 200 individual parts. To just get an idea of how important this aspect of the phone is to Apple, Townsend added that the company has a team of more than 800 engineers that work on it. Inside the camera are four tiny wires, Townsend said, that create a “microsuspension” to offset the shakes and disturbances raising from a user’s hands. Each wire is thinner than a human hair.

Why iPhone Camera So Special

Then he demonstrated how Apple simulates various conditions to test out the camera’s performance, from sunsets to lousy indoor lighting. “We can simulate all those here,” Townsend said. Apple’s competitors certainly conduct many of those same tests, but the sheer size of Apple’s camera team shows you how high up on the priority list it’s risen. Apple has built entire ad campaigns around the iPhone’s camera, and always makes it a point to highlight improvements with each new iPhone revision.

Also Read : Finally Samsung Agreed To Pay Apple $548 Million In Patent Dispute

iPhone Camera

There’s a lab inside Apple’s campus where it assesses the camera output. Some engineers test the camera photographs in a range of lighting situations and make the required calibration for getting the best shot. “To capture one image, there’s actually 24 billion operations going on,” Townsend told Rose.

The interview also saw Apple executives talk about its stand on encryption, taxation, and land labour, among other aspects.

Also Read : Apple Developing Advanced Display Technology at their New Secret Laboratory in Taiwan

Say Happy Birthday to World’s First Website, it’s now 25 years old

First website

On December 20, 1990, British scientist Sir Tim Berners-Lee hosted the first website in the world on his NeXT computer at CERN (European Organization for Nuclear Research). Today marks its 25th anniversary. The page which was basically an explanation of how hypertext worked went public little over 8 months later in August 1991.

Also Read : Google’s Project Loon will Offer Affordable Internet Access to Millions of Indians

After inventing the World Wide Web in 1989 as a way for institutes around the globe to share information, Berners-Lee launched the first website with a description of how to set up a server and how to access content shared by others. However, it’s safe to say that this plain page laid the groundwork for much of the internet as you know it — even now, you probably know one or two people who still think the web is the internet.

Also Read : Vulnerability in Popular Bootloader Puts Locked-Down Linux Computers at Risk

World's First Website
First Website Screenshot

The Web has evolved greatly since then, with powerful apps, services and limitless sources of information about any topic you can think of. It’s fascinating to look at the humble beginnings of the internet as we know it and see how far we’ve come.

CERN still has the original server that hosted Berners-Lee’s first online creation; in 2013, it reinstated the site to its original address.

Also Read : 5 Quick YouTube Shortcuts You Must Know About

So why are you waiting for, say happy birthday to the first website in comments and also don’t forget to browse the first website !

5 Quick YouTube Shortcuts You Must Know About

Quick YouTube Shortcuts

Are you a regular YouTube viewer and everytime you reaches for the mouse to play, pause, forward, or rewind YouTube videos, locate the cursor, direct it to the right button/link, and click — but it’s so much more convenient to tap a single key on the keyboard instead. That’s why you need to know these handy one-key YouTube shortcuts.

So checkout some important YouTube shortcuts that’s going to save your valuable time. You can use these shortcuts on Windows, Mac, and Linux, across Chrome, Firefox, and Microsoft Edge. They also work on YouTube videos embedded on other websites, but their behavior might sometimes be erratic.

Also Read : YouTube Will Soon Make You Pay To Watch Some New Videos

YouTube Shortcuts

 • J Key

The J key take video backward by 10 seconds

L Key

The L key takes the video forward by 10 seconds.

• K Key

The K key allows you to play/pause YouTube videos, just like spacebar does. Sandwiched between the J and L keys, it functions like the Play/Pause button found in media player controls on various keyboards.

Also Read : Secret Features Of Youtube → Some YouTube Tricks That You Don’t Know

• 1-9 Keys

The 1-9 keys allow you to skip to certain percentages in the video, so pressing 1 takes you 10% into the video, pressing 2 takes you 20% into the video, etc.

• 0 Key

The 0 key takes you to the start of the video. This works both when you’re playing the video and when you have paused it.

Also Read : Why we are Addicted to Facebook ? – Interesting Survey Results

So do these YouTube shortcuts really save your time ? Tell us if you know some other YouTube shortcuts that you think convenient to regular YouTube viewers. We’d love to hear from you in the comments!

With this New Fuel Drones can Fly for Hours

drones can fly

If drones are going to become the commercial vehicles that the industry hopes, they need to be able to fly for much longer and to recharge quickly. So a new fuel is coming into the world and with it drones can fly for hours.

What’s this new fuel, how it help drones to fly for hours?.

The new fuel is a hydrogen fuel cell has been developed that can extend flight time to several hours — rather than the typical 20 minutes. The range extender can also be recharged in just two minutes, as opposed to one to two hours.

Loughborough-based Intelligent Energy, which developed the range extender, hopes it will accelerate the commercial possibilities for drone use.

“Drones are one of the most exciting new technologies. Even with advanced batteries their value is limited. For commercial use, they need to offer better flight times and range,”  —  said Julian Hughes, who works at Intelligent Energy.

drones can fly

Hughes claimed the cell could lead to drones being used for inspection of offshore platforms, search and rescue, aerial photography, and for deliveries.

Flytrex, makers of commercial drones, released the “world’s first” personal delivery drone this year. The drone can carry parcels about the weight of a smart phone for up to seven miles. Its average flight time is 32 minutes. DJI commercial drones also have flight times of around 15 minutes.

The hydrogen range extender isn’t the first instance of drone flight times being extended to hours. Back in July solar-powered drone AtlantikSolar broke the world record for endurance in unmanned aerial vehicles under 50kg when it flew non-stop for 81 hours.

Intelligent Energy has been testing the hydrogen fuel cell against hybrid energies for over a year and concluded the hydrogen cell was better than the hybrid options.

The fuel cell was also used to power the “world’s first” manned hydrogen-powered flight earlier this year.

What do you think about this new fuel going to power up future drones ? We’d love to hear from you in the comments!

Vulnerability in Popular Bootloader Puts Locked-Down Linux Computers at Risk

Linux computers at risk

A new major vulnerability in Grub2 bootloader has been in found in Linux computers that can can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And so, the attacker may take control of the computer.

Pressing the backspace key 28 times can bypass the Grub2 bootloader’s password protection and allow a hacker to install malware on a locked-down Linux computers.GRUB, which stands for the Grand Unified Bootloader, is the bootloader used by most Linux computers system including some embedded systems. It has a password feature that can restrict access to boot entries, for example on computers with multiple operating systems installed.

Also Read : What Is SQL Injection Attack And How Does It Works ?

This protection is particularly important within organizations, where it is also common to disable CD-ROM, USB and network boot options and to set a password for the BIOS/UEFI firmware in order to secure computers from attackers who might gain physical access to the machines.

Without these boot options secured, attackers or malicious employees could simply boot from an alternative OS — like a live Linux installation stored on a USB drive or CD/DVD — and access files on a computer’s hard drive.

Of course, it’s also possible for an attacker to remove the drive and place it in another machine that doesn’t have these restrictions, but there can be other physical access controls in place to prevent that.

Also Read : What Is DDoS Attacks And How Does It Works ?

How Linux Computers Compromised ?

Hector Marco and Ismael Ripoll, two researchers from the Cybersecurity Group at Universitat Politècnica de València, found an integer underflow vulnerability in Grub2 that can be triggered by pressing the backspace key 28 times when the bootloader asks for the username and lockdown your Linux computers.

Locked-Down Linux Computers

To do this, the researchers first modified an existing boot entry to load the Linux kernel and initialize a root shell. Then they used it to replace a Mozilla Firefox library with a malicious one designed to open a reverse shell to a remote server whenever the browser is started by the user.

“When any user executes Firefox, a reverse shell will be invoked,”  —  the researchers said in a detailed write-up of their exploit, which they presented last week at the STIC CCN-CERT Conference in Madrid. “At this time all data of the user is deciphered, allowing us to steal any kind of information of the user.”

Modifying the kernel to deploy a more persistent malware program is also possible, the researchers said. “The imagination is the limit.”

Also Read : The Anatomy Of A Data Breach

An attacker which successfully exploits this vulnerability will obtain a Grub rescue shell. Grub rescue is a very powerful shell allowing to:

  • Elevation of privilege: The attacker is authenticated without knowing a valid username nor the password. The attacker has full access to the grub’s console (grub rescue).
  • Information disclosure: The attacker can load a customized kernel and initramfs (for example from a USB) and then from a more comfortable environment, copy the full disk or install a rootkit.
  • Denial of service: The attacker is able to destroy any data including the grub itself. Even in the case that the disk is ciphered the attacker can overwrite it, causing a DoS.

The vulnerability, which is tracked as CVE-2015-8370, affects all versions of Grub2 from 1.98, released in December, 2009, to the current 2.02. Ubuntu, Red Hat, Debian and probably other distributions too, have released fixes for this flaw. Users are advised to install any updates they receive for the grub2 package as soon as possible.

For detailed report check out this link.

Also Read : How To Dual Boot Kali Linux v2.0 With Windows 10

Are your Linux computers are vulnerable to this exploit? Did you try to press Backspace 28 times ? We’d love to hear from you in the comments!