
Forschung: KI findet Antibiotikum gegen multirestistentes Bakterium
Forscher zeigen, dass die Hoffnungen in KI bei der Entwicklung von Medikamenten berechtigt sind. Ihre Entwicklung soll deutlich schneller werden. (Innovation & Forschung, KI)

Just another news site
Forscher zeigen, dass die Hoffnungen in KI bei der Entwicklung von Medikamenten berechtigt sind. Ihre Entwicklung soll deutlich schneller werden. (Innovation & Forschung, KI)
Dank Mikromechanik soll Frores Airjet kleiner und leiser sein als Lüfter. Der erste PC damit wird aber recht teuer. (PC, Intel)
Ein Anwalt wollte sich von ChatGPT bei der Recherche unterstützen lassen – das Ergebnis ist eine Blamage. (ChatGPT, KI)
Viele Optimierungen machen den winzigen Compiler möglich. Einige Einschränkungen der Programmiersprache C sind allerdings erforderlich. (Compiler, Programmiersprachen)
Seit Ende Februar folgen im Monatsrhythmus neue Previews von Version 8 des .NET Frameworks. Wir werfen einen genauen Blick auf die Neuerungen der dritten Vorschauversion. Von Fabian Deitelhoff (.Net, Microsoft)
Vor 30 Jahren wuselten die ersten Siedler über den Bildschirm. Golem.de hat den Aufbauspiel-Klassiker von Blue Byte neu ausprobiert. Von Andreas Altenheimer (Die Siedler, Aufbauspiel)
The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending May 6, 2023, are in. A group of friends try and meet Tom Brady in the top-seller for this week. Find out what movie it was in our weekly DVD, Blu-ray and Ultra HD Blu-ray sales stats and analysis feature.
The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending May 6, 2023, are in. A group of friends try and meet Tom Brady in the top-seller for this week. Find out what movie it was in our weekly DVD, Blu-ray and Ultra HD Blu-ray sales stats and analysis feature.
The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending May 6, 2023, are in. A group of friends try and meet Tom Brady in the top-seller for this week. Find out what movie it was in our weekly DVD, Blu-ray and Ultra HD …
The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending May 6, 2023, are in. A group of friends try and meet Tom Brady in the top-seller for this week. Find out what movie it was in our weekly DVD, Blu-ray and Ultra HD Blu-ray sales stats and analysis feature.
While it’s nice to share a bottle of fine wine over a tasty meal with a loved one, some things are best unshared. Take torrent client web interfaces, for example. They can be convenient and in some cases look very nice but with no security, every download has a global audience, including new torrent transfers added by passing strangers.
From: TF, for the latest news on copyright battles, piracy and more.
The word ‘open’ in a connected world can be something positive. Open source, for example, or open library. On other occasions the opposite can be true; unnecessary ports left open on a router springs to mind.
For millions of people using devices that appear to configure themselves, whether something is open or closed is irrelevant. If a device immediately works as promised, oftentimes that’s good enough. The problem with some internet-connected devices is that in order to immediately work in the hands of a novice, security gives way to ease of use, and that can end in disaster.
Many of today’s torrent clients can be operated via a web interface, commonly known as a WebUI. A typical WebUI is accessed via a web browser, with the client’s IP address and a specified port number providing remote access.
In a LAN environment (the part of a network behind the router, such as a home) the torrent client’s web interface serves local users, i.e those with direct access to the local network, typically via Wifi. The problems begin when a torrent client’s WebUI is exposed to the wider internet. In broad terms, instead of the client being restricted to IP addresses reserved for local uses (starting 192.168.0.0 or 10.0.0.0), anyone with a web browser anywhere in the world can access the UI too.
In many cases, a WebUI can be secured with a password or by other means but when users are allowed to do that themselves, many never do, despite the warnings. That could end in disaster if the wrong person decides to let rip from the other side of the world.
Internet-connected devices are easily found using services such as Shodan, Censys, Fofa and Onyphe.io and those that are poorly configured are in plentiful supply.
The image above shows a WebUI for the Tixati torrent client. With zero security, everything is on full display, just as it is for the person who operates the client, whoever they might be. This means that all downloads and uploads can be browsed, including data related to those transfers, as seen below.
It can take just a couple of minutes to find hundreds of open clients. A common WebUI seen in the wild belongs to qBittorrent but the overwhelming majority are locked down, just as they should be.
For reasons that aren’t entirely clear, the Android torrent client ‘tTorrent‘ is quite popular in Russia.
It’s possible that people install tTorrent on always-on set-top boxes, so the latest movies are ready to go as soon as they get home from work, or the local bar. The problem here is that with an entirely exposed WebUI, people can find out what Russians are downloading.
The average Russian citizen probably won’t mind if outsiders discover their Mortal Kombat habit; they made the decision to download it, so that’s that.
But what if strangers passing by in the night had influence over content consumed locally? What if those strangers decided to utilize their control of an open WebUI to share news from the other side of the world, downloaded directly to their new friend’s Android device?
If they did, it might look a lot like this….
From: TF, for the latest news on copyright battles, piracy and more.
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
Enlarge (credit: Farrar, Straus and Giroux)
In November 1988, a graduate student at Cornell University named Robert Morris, Jr. inadvertently sparked a national crisis by unleashing a self-replicating computer worm on a VAX 11/750 computer in the Massachusetts Institute of Technology's Artificial Intelligence Lab. Morris had no malicious intent; it was merely a scientific experiment to see how many computers he could infect. But he made a grievous error, setting his reinfection rate much too high. The worm spread so rapidly that it brought down the entire computer network at Cornell University, crippled those at several other universities, and even infiltrated the computers at Los Alamos and Livermore National Laboratories.
Making matters worse, his father was a computer scientist and cryptographer who was the chief scientist at the National Security Agency's National Computer Security Center. Even though it was unintentional and witnesses testified that Morris didn't have "a fraudulent or dishonest bone in his body," he was convicted of felonious computer fraud. The judge was merciful during sentencing. Rather than 15–20 years in prison, Morris got three years of probation with community service and had to pay a $10,000 fine. He went on to found Y Combinator with his longtime friend Paul Graham, among other accomplishments.
The "Morris Worm" is just one of five hacking cases that Scott Shapiro highlights in his new book, Fancy Bear Goes Phishing: The Dark History of the Information Age in Five Extraordinary Hacks. Shapiro is a legal philosopher at Yale University, but as a child, his mathematician father—who worked at Bell Labs—sparked an interest in computing by bringing home various components, like microchips, resistors, diodes, LEDs, and breadboards. Their father/son outings included annual attendance at the Institute of Electrical and Electronics Engineers convention in New York City. Then, a classmate in Shapiro's high school biology class introduced him to programming on the school's TRS-80, and Shapiro was hooked. He moved on to working on an Apple II and majored in computer science in college but lost interest afterward and went to law school instead.
You must be logged in to post a comment.