Cold, getting warmer, hot: New app helps blind people find each other

Lots of blind people have blind friends, so This game of cat and mouse takes place regularly. It can be funny but it’s certainly a little frustrating.

As smart phones are fast becoming a basic part of a blind person’s toolkit, it’s perhaps not surprising that someone has now created an app for that.

People Finder has a very basic but accessible interface. Like mainstream products with similar aims, such as Grindr for the gay community and Spotme for networking at conferences, you have to have the app running if you want to meet up with people in your circle.

It alerts a user, via a vibration and a noise, when someone else with the app comes within 50 feet. It uses Bluetooth to detect people.

As you search for your friend, the app will let you know how close you are, by saying near or cold as you walk around.

To aid social niceties, There’s the option to message the person through the app to say you’ve clocked them, before descending on them — via redwolf.newsvine.com

Why I Hacked Donkey Kong for My Daughter

My daughter, however, jumps at the chance to play games with her old man. She’s only 3, but she’s always exhibited a keen interest in games. Recently, she took a fancy to Ron Gilbert’s new puzzle adventure game The Cave. While she prefers not to play, she insists that I do and then she bosses me around in the game. She’s confident enough, however, to play some of the older arcade games. She’s not too shabby with Pac-Man; her favourite version is Pac-Man Arrangement.

But out of all of the older games, she most enjoys playing Donkey Kong. Maybe it was because it was the first game we really played together, or the fact that she watched the King of Kong documentary with me one afternoon from start to finish. Maybe it’s because Mario looks just like her Grandpa. Whatever the case, we’ve been playing Donkey Kong together for a while. She’s not very good at it, but insists on playing it over and over again until she finally hands me the joystick in total frustration.

Finally, one day after work, she asked to play Donkey Kong, only this time she raised a pretty innocent and simple question: “How can I play as the girl? I want to save Mario!”

It made sense. We had just played Super Mario Bros 2 on the NES a few days before, and she became obsessed with playing as Princess Toadstool. So to go back to Donkey Kong, I can see how natural it seemed to ask the question. I explained to her that Donkey Kong, while similar, is not the same game. On this occasion, I really could tell that she was disappointed. She really liked Donkey Kong, and really liked playing as Princess Toadstool. We left it at that and moved on.

But that question! It kept nagging at me. Kids ask parents all the time for things that just aren’t possible. But this time, this was different. I’m a game developer by day. I could do this — via redwolf.newsvine.com

4th Amendment Applies At Border, Password Protected Files Not Suspicious

Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion — via Slashdot

New Texas Rangers Web page hopes to breathe new life into cold cases

Say the name Kathleen Suckley to Corpus Christi Police Captain Tim Wilson and his response is immediate: 8 April 1993.

He never met her, but he thinks about her often. He checks the file he has checked a million times before, looking for something, anything, to solve the homicide cold case he first responded to 20 years ago.

Suckley was 29 when her throat was slashed and she was stabbed about 40 times inside her rented duplex, while her two sons, ages 4 and 1, were home.

I haven’t forgotten, Wilson said. It’s just a tragic incident; she was a young girl, she had a good life before her, she had two infants, she had a nice family. To me it seemed like such a useless crime.

The Department of Public Safety last week unveiled a new Web page dedicated to unsolved cold case homicides. It will rotate through the Texas Rangers Top 12 Cold Case Investigations, and Suckley is among the first 12 to be featured. Like Wilson, DPS spokeswoman Katherine Cesinger said the goal of the new website is to make sure the victims are not forgotten and to try to catch a break in even the coldest of cases — via redwolf.newsvine.com

Thanks To HTML5, This Website Can Fill Your Whole Hard Drive With Trash

Sometimes a browser needs to leave a little data on your computer, just a little 5-10KB nibblit, a cookie. HTML5 is a hungrier beast than that which came before it though, and sometimes wants a little more. Maybe 5MB or so. But that’s where it should end. Thanks to a little HTML5 vulnerability, however, this site can and will fill your entire hard drive with trash.

In order to keep sites from going to wild, most browsers put a hard limit on how much space any site can get. Google Chrome says 2.5MB, Firefox goes with 5MB, Internet Explorer opts for 10MB, etc. And HTML5 standards dictate that a single stash should apply to all affiliated sites. So a1.example.com should have to share with a2.example.com. Except in most browsers, as discovered by Feross Aboukhadijeh, they don’t.

In Chrome, Safari and Internet Explorer (FireFox users, pat yourselves on the back), subdomains all get their own little data cubbies, so as long as a site keeps churning out new ones, your hard drive will keep eating up the data until it’s bulging at the seams. And Feross Aboukhadijeh’s Filldisk.com does exactly that. Fortunately for you, it’s merciful enough to give you all your space back if you ask it to stop, but it’s easy to see how this could be a pain if it didn’t play nice — via redwolf.newsvine.com

France to invest €20bn in high-speed broadband for the entire country

French president François Hollande has confirmed plans to give every single household in the country high-speed broadband within the next 10 years, with around half getting getting superfast coverage by the end of 2017.

High-speed broadband strengthens [France’s] businesses competitiveness and the quality of [its] public services. [It] will bring more fluidity, more simplicity for communications between business, their customers, and the public sector as well, Hollande said on Wednesday, adding the rollout could directly generate 10,000 jobs — via redwolf.newsvine.com

The vast differences between the NBN and the Coalition’s alternative

The Coalition’s broadband policy slogan states that that they will Complete the current NBN cheaper and faster. This simply isn’t true.

We’ll continue to cover the sketchy claims of being faster and cheaper in other articles but for now we’ll focus on the supposed similarities and differences.

The Coalition’s NBN alternative is different by almost every measure. It uses different technologies to connect the bulk of the country; it has different uses and applications; it affects Australia’s health service differently; it provides different levels of support in emergencies and natural disasters; it requires a different amount of power to operate; the cost of maintenance is different; the overall cost, the return on investment and the re-sale value are different; the management, ownership, governance, competition and monopoly factors will be different; it has a different life-span and upgradability issues; the effect on businesses (of all sizes) and GDP is different; the effects on television are different; the effect on Senior Citizens is different; the viability and potential for cost blowouts is different; the costs of buying broadband will be different; the reliability is different; the effect on property prices will be different; the timescale is different; the legacy is different. Ultimately, it has completely different aims.

In just about every case the Coalition’s alternative compares unfavourably to the current plans – and usually in dramatic fashion. That’s based upon the facts and the information currently available in the public domain — via redwolf.newsvine.com

Yahoo CEO Mayer Now Requiring Remote Employees to Not Be (Remote)

According to numerous sources, Yahoo CEO Marissa Mayer has instituted a HR plan today to require Yahoo employees who work remotely to relocate to company facilities. The move will apparently impact several hundred employees, who must either comply without exception or presumably quit. It impacts workers such as customer service reps, who perhaps work from home or an office in another city where Yahoo does not have one — via redwolf.newsvine.com

Forget Dropbox, here’s Drobo-box: Small-biz array meets Barracuda cloud

Security appliance maker Barracuda Networks has agreed to marry its online file-sharing service to storage biz Drobo’s box of hard drives called 5N.

People can upload and download files to and from Barracuda’s Copy cloud, and share their data between desktop computers, iPhones, iPads, iPods, Android devices and Microsoft’s Surface slabs. The accompanying app and basic service offers 5GB of space for free. There are also group sharing functions.

Now Drobo, as part of today’s announced partnership, will plug its 5N desktop filer into Copy’s systems: each box will be able to extend its local storage and document sharing into the Barracuda cloud and back up its data to the remote service. An app for the 5N that can access Copy will ship in March — via redwolf.newsvine.com

How Google Fought Off Spammers Trying To Break Into One Million Accounts

The spam-blocking technology in Gmail is fairly effective, but that doesn’t mean spammers and criminals don’t want to use Gmail to send dubious messages. A blog post from Google notes a dramatic increase in attempts to hijack individual accounts.

We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time, Google security engineer Mike Hearn wrote in the post. A different gang attempted sign-ins at a rate of more than 100 accounts per second — via redwolf.newsvine.com

Any Two Pages on the Web Are Connected By 19 Clicks or Less

No one knows for sure how many individual pages are on the web, but right now, it’s estimated that there are more than 14 billion. Recently, though, Hungarian physicist Albert-László Barabási discovered something surprising about this massive number: Like actors in Hollywood connected by Kevin Bacon, from every single one of these pages you can navigate to any other in 19 clicks or less.

Barabási’s findings, published yesterday in Philosophical Transactions of the Royal Society, involved a simulated model of the web that he created to better understand its structure. He discovered that of the roughly 1 trillion web documents in existence — the aforementioned 14 billion-plus pages, along with every image, video or other file hosted on every single one of them — the vast majority are poorly connected, linked to perhaps just a few other pages or documents — via redwolf.newsvine.com

Bionic legs for military amputees

Military leg amputees are to be given the most up-to-date prosthetic limbs available after the government announced a £6.5m funding boost.

The latest technology micro processor limbs, known as bionic legs, will be available to service personnel who have been wounded in Iraq or Afghanistan.

The move is expected to benefit about 160 members of the armed forces.

Defence Secretary Philip Hammond said it was a top priority to give troops the best possible care and support.

And Chancellor George Osborne, who is making the money available from the Treasury’s Special Reserve, said: Our troops are heroes who have and continue to give absolutely everything for their country and it is only right that we do everything possible to help them, especially when they suffer injury — via redwolf.newsvine.com

The computer that never crashes

Out of chaos, comes order. A computer that mimics the apparent randomness found in nature can instantly recover from crashes by repairing corrupted data.

Dubbed a systemic computer, the self-repairing machine now operating at University College London (UCL) could keep mission-critical systems working. For instance, it could allow drones to reprogram themselves to cope with combat damage, or help create more realistic models of the human brain.

Everyday computers are ill suited to modelling natural processes such as how neurons work or how bees swarm. This is because they plod along sequentially, executing one instruction at a time. Nature isn’t like that, says UCL computer scientist Peter Bentley. Its processes are distributed, decentralised and probabilistic. And they are fault tolerant, able to heal themselves. A computer should be able to do that — via redwolf.newsvine.com

Exploit Sat on LA Times Website for 6 Weeks

The Los Angeles Times has scrubbed its Web site of malicious code that served browser exploits and malware to potentially hundreds of thousands of readers over the past six weeks.

On 7 February, KrebsOnSecurity heard from two different readers that a subdomain of the LA Times’ news site (offersanddeals.latimes.com) was silently redirecting visitors to a third-party Web site retrofitted with the Blackhole exploit kit. I promptly asked my followers on Twitter if they had seen any indications that the site was compromised, and in short order heard from Jindrich Kubec, director of threat intelligence at Czech security firm Avast.

Kubec checked Avast’s telemetry with its user base, and discovered that the very same LA Times subdomain was indeed redirecting visitors to a Blackhole exploit kit, and that the data showed this had been going on since at least 23 December 2012.

Contacted via email, LA Times spokeswoman Hillary Manning initially said a small number of users trying to access a subdomain of the site were instead served a malicious script warning on 2 and 3 February. But Manning said this was the result of a glitch in Google’s display ad exchange, not a malware attack on the company’s site — via redwolf.newsvine.com

W3C Declares DRM In-Scope For HTML

The W3C has ruled DRM in-scope for their HTML standard. A lot of big businesses have supported advancing the Encrypted Media Extension, including Google, Microsoft, and Netfix. The BBC calls for a solution with legal sanctions. The EME could well be used to implement a DRM HTML engine. A DRM-enabled web would break a long tradition of the web browser being the User’s Agent, and would restrict user choice and control over their security and privacy. There are other applications that can serve the purpose of viewing DRM video content, and I appeal to people to not taint the web standards with DRM but to please use other applications when necessary — via Slashdot

Ancient languages reconstructed by computer program

A new tool has been developed that can reconstruct long-dead languages.

Researchers have created software that can rebuild protolanguages — the ancient tongues from which our modern languages evolved.

To test the system, the team took 637 languages currently spoken in Asia and the Pacific and recreated the early language from which they descended.

The work is published in the Proceedings of the National Academy of Science — via redwolf.newsvine.com

TV station hacker warns of zombies in Montana

A Montana television station’s regular programming was interrupted by news of a zombie apocalypse.

The Montana Television Network says hackers broke into the Emergency Alert System of Great Falls affiliate KRTV and its CW station Monday.

KRTV says on its website the hackers broadcast that dead bodies are rising from their graves in several Montana counties.

The alert claimed the bodies were attacking the living and warned people not to approach or apprehend these bodies as they are extremely dangerous.

The network says there is no emergency and its engineers are investigating — via redwolf.newsvine.com

Spam attack getting worse

The YahooXtra email service is the victim of two separate, but potentially related malicious attacks, Telecom has said.

The security breach, which began on Saturday morning, saw emails sent to everyone on users’ contact list, asking them to click on a link directing them to an online advertisement.

Telecom responded in a statement issued this afternoon, saying the attacks were believed to have similarly affected other Yahoo mail users using Yahoo servers — via redwolf.newsvine.com