VnutZ's Articles, Page 2 of 73

← Previous    1 2 3 4 5 6 7 8 9 10     Next →
21 Jan 15
Newspaper

Project Blue Book Available

Recently, the CIA acknowledged their U2 flights accounted for nearly half of the UFO sightings across two decades. The other record of UFOs resides at the National Archives in Project BLUE BOOK. It used to require an in-person journey to DC in order to conduct any research. Now, the entire compendium of the Air Force’s documentation on UFOs is available to the masses on-line. Of course, my encounter’s with UFOs are not documented there – clearly the sign of either a government conspiracy or the pending Great Purge via alien overlords.

18 Jan 15
Page_white_text

How to Post YouTube Video on OmniNerd

YouTube has changed some things up on their site and no longer offers the clickable “old style” HTML embeddable code for their videos. But you can still do it easily on OmniNerd for your news posts. As a quick example, we will embed the George Washington video clip by Brad Neely into this article.

The OmniNerd syntax for embedding a video is:

[[Video:URL]]

Now you can’t take the URL directly from the YouTube titlebar. All you need is its content ID and then insert it into the older code YouTube used to provide.

18 Jan 15
Newspaper

Dragons Versus Apaches

Usually you hear people talking about the zombie apocalypse in terms of what weapons would best be applied, etc. Not the Smithsonian. Those sons-of-bitches went big and sent the rest of us home. Zombies? They saw your Zombie and raised you dragons. Rifles? Again … chump weapons, how about an AH-64 Apache with Hellfire missiles and a 30mm chaingun. The bottom line is the dragon pretty much wins unless the Apache fires every single Hellfire at once.

13 Jan 15
Newspaper

Silk Road Reloaded

The first Silk Road used to be the go to hub for all things dark and illegal lurking on the Internet – drugs, weapons, identities, etc. What was intriguing about it was the use of many technologies for anonymizing the participants such as Tor, Bitcoin, etc. But it was, of course, a target of the government and the whole thing came crashing down. Some attempts were made to resume its operation with Silk Road 2.0 but that effort did not make it very far.

05 Jan 15
Newspaper

Fingerprint Forging from Photographs

Biometrics are becoming increasingly popular as security mechanisms – visa terminals, smartphones, etc. The premise, of course, is that certain characteristics of a person are globally unique and therefore serve as both an identifier and authenticator. Therein lies an access vector for thieves. For years, movies have depicted the easiest method for fingerprint defeating simply by cutting people’s fingers off. But now, hacker Jan Krissler, demonstrated the ability to clone fingerprints of famous people (a politician for his demo) using nothing but high resolution photographs available all over the Internet.

31 Dec 14
Newspaper

CIA Admits - We Were the UFOs

The CIA has certainly taken to enjoy using it’s Twitter account. Most recently, the clandestine agency tweeted about their most read documents of 2014 and highlighted one about their U2 program. Essentially, the CIA took credit for more than half the UFO sightings from the 1950s through the 1960s based on the aircraft’s ability to fly so much higher than anybody thought possible back in the day. Their basis for assuming they were the UFOs was made on correlating UFO reports against their log (previously classified) of U2 flight activity. Of course, the CIA’s revelation only accounts for half the UFOs, the rest are still unknown.

24 Dec 14
Newspaper

More Hardware Based Infection Vectors

A vulnerability analyst developed a proof of concept for infecting OS X computers with a persistent rootkit simply by plugging in a Thunderbolt device. A customized Thunderbolt device can send unsigned firmware updates into the host machine that are accepted into the host’s Option ROM. Upon reboot, the rootkit begins execution before the OS even loads, allowing it to perform whatever nefarious functions it wants via hooks and patches on the loaded code before security software ever has a chance to see it. The technique is more dastardly version of existing techniques – exfiltrating/infiltrating data via FireWire DMA or the Dirty USB presented at 2014’s BlackHat.

19 Dec 14
Newspaper

Gamma Rays more Common

Gamma Rays – everyone knows they turn normal people into superheroes. They are a form of radiation that are correlated to mutating active DNA sequences. It turns out, the elusive Gamma Ray is not so elusive after all and occurs naturally with a high daily frequency. NASA’s Fermi satellite reveals nearly 1100 Gamma Ray bursts daily from Earth’s lightning storms. So if you want to gain superpowers (or die), go hang out next to lightning strikes.

19 Dec 14
Cup

My Year of BitCoin Mining

About a year ago, the price of a single BitCoin skyrocketed above $1200 apiece. I finally opted to get in on the action after having now missed the BitCoin boat for a fourth time. It began with getting myself a single 10GH/s miner and a little slice of cloud time as the days of CPU and GPU mining were long past. Although I eventually made it up to 120GH/s worth of Chili Miners, I never really kept any mining hardware longer than three months and continued to exchange it out on Craigslist to minimize monetary loss on equipment. I also dabbled in with the AltCoins [LiteCoin] and doing pooled exchanges which were possible with a home built GPU mining rig. All of this was quite entertaining at least to build the equipment, solve cooling, optimize hash rates, and plan a mining strategy. I eventually grew tired of the GPU fan noise and dumped that equipment before the summer time heat set in. At it’s peak, I was using nearly 2KW of power between the GPUs and the ASICs. In the end, I settled on trading GH/s as a derivative on CEX.io while using my “owned” speed for hashing.

18 Dec 14
Newspaper

Sony Caves to North Korea

The motivation behind the massive hack against Sony Pictures became more clear in the past few days. Seth Rogen’s and James Franco’s new film The Interview is at the heart of the attacks from North Korea for its portrayal of a comedic assassination attempt on Kim Jong-un. Following the cyber-attack were many messages posted to pastebin from the alleged hackers included one presumably threatening violence to movie-goers that simply stated, “We will clearly show it to you at the very time and places ‘The Interview’ be shown, including the premiere, how bitter fate those who seek fun in terror should be doomed to. Remember the 11th of September 2001.” At first, Sony pictures remained defensive but on Wednesday night the media giant caved to North Korea’s threats after five major chains dropped the movie.

12 Dec 14
Cup

Science Fiction and the Speed of Gravity

If you haven’t seen the new Christopher Nolan film, Interstellar, I’m about to ruin parts of it for you. The movie touches on time travel in a scientific way using General Relativity but then makes a huge leap into an ability to influence the past via gravitational waves and wormholes. Personally, I thought that brought back the whole notion whether time travel actually implied fate (in this case yes) or could a traveler actually alter the timeline.

Anyway, if for no other reason, the movie made me go back and look at the notion of the speed of gravity. The question comes up with how gravity can influence objects over vast distances and whether if an object were to suddenly disappear whether the affects of its vanishing mass (to energy) would outrun the light. So for example, an object is orbiting a black hole at distance of several light years and that black hole suddenly exploded. Would the object continue to orbit even though there is no longer a gravitational attraction or suddenly split off into space even though the information (light) from the explosion is not yet “visible” (hence gravity effects are faster than light speed). The explanations behind warped space indicate the orbit will continue even without the mass because the warping does not instantaneously cease – like it does in classical Newtonian physics. Of course, none of those models talk about what a wave would do through a wormhole …

12 Dec 14
Newspaper

CIA Torture Report

The bad press for the CIA is old news, everyone already knew about the waterboarding and the torture allegations at secret sites around the world. However, everything has come back into the limelight with the Senate Select Committee on Intelligence’s release of a scathing report on the CIAs’ detention and interrogation programs. Originally, the document was a highly classified 6000 page report that after heavy redactions, resulted in a few hundred pages available to the public. The public version seems highly damning with regards to the methods and techniques not working effectively, but it really makes one wonder what is hidden in the other 5500~ish pages? The CIA leadership are not denying the methods but are adamant the methods were effective and continue to insist they were instrumental in located the Hide-n-Seek World Champion Osama bin Laden. Regardless of how the politicians spin the fingerpointing, the government is already bracing for reprisal attacks from the terrorist cells that can now read about what happened to their captured brethren.

06 Dec 14
Newspaper

NASA's Orion Success

NASA pushed itself forward again with a “successful Orion launch and orbital flight”http://www.nasa.gov/orion/. This launch utilized the powerful Delta IV booster, capable of putting 23 tons into space. Once in low Earth orbit, the second stage pushed the Orion capsule out to 3600 miles where it orbited 15x further out than the ISS. NASA notes this as remarkable because no craft designed for humans has been out that far since the lunar missions in the 70s. It’s planned to be an entire system of equipment with an even larger booster set to push manned spaceflight back outside of Earth’s orbit for deep space missions.

06 Dec 14
Newspaper

North Koreans Hacking Sony Pictures

The great hack against Sony Pictures has gotten a lot of press lately as one of the largest hacks of all time. Not only was the breach itself large, but the hackers posted an incredible amount of information to the public including unreleased movies, internal memos, salary information, and personal information about employees (medical, etc). The current belief is the group responsible for the attack is actually a state sponsored effort from North Korea. It’s still unclear how the initial intrusion took place, but the security researchers are attributing the North Koreans based on similar tradecraft and tools found in forensics to include those tools containing Korean language strings. The upcoming movie, The Interview has been suggested as the motive behind North Korea leveraging its cyber force against Sony Pictures.

29 Nov 14
Question

Global War On Terrorism Deserters

America has fought the Global War on Terror for thirteen years now. As a result of various reasons – conscientious objectors, political disagreement, cowardice, and others – a large number of Americans have deserted the military. Their stories vary, but many are hidden away in Canada facing deportation back to the United States where they face UCMJ (though allegedly only 1,866 of 35,598 deserters have been prosecuted in twelve years). Officially, Article 85, subjects deserters found guilty to death, “c) Any person found guilty of desertion or attempt to desert shall be punished, if the offense is committed in time of war, by death or such other punishment as a court-martial may direct.”

← Previous    1 2 3 4 5 6 7 8 9 10     Next →

What is OmniNerd?

Omninerd_icon Welcome! OmniNerd's content is generated by nerds like you. Learn more.

Voting Booth

The police in the United States?

8 votes, 3 comments