2 years, 12 months ago (Photo: Sara D. Davis/Getty Images)
However, all this happened not in one day. It is about a problem which lasts since 2002. The matter is that the computer system which is responsible for the miscalculation of an imprisonment term and the "bonuses" reducing this term functions with problems. As a result some prisoners receive too many bonuses, and are released earlier planned term. 3200 prisoners were released earlier, than had to, since 2002. These are 3% of total quantity of the criminals sitting in prisons of the State of Washington.
Now the governor of the state decided that some prisoners who received freedom too early have to return to prison. It will be allowed to others to continue to be at large at corrective works. 5 criminals who were released because of an error of system already returned to prison.
2 years, 12 months ago
Hi, GT! Not so long ago we told (the truth, on Habré) about so-called "Red cards" — to system which helps to protect users of our search from dangerous content. Today we continue a subject of a safe brauzing. To filter results of search issue rather easily, but not always you pass to the new website with Google. The hyperlink conducting on the website with dangerous content can be met anywhere, so the browser has to protect users.
In Google Chrome today we will also talk about technologies of protection.
2 years, 12 months ago
The Tel-Avivsky startup of Rayzone Group executing orders for defense of Israel released the small InterApp device capable at the same time to crack one hundred smartphones on Android and iOS and to receive logins and passwords from social networks, e-mail, DropBox, the photo from gallery, the contact list and data on a geolocation. The main condition — the included WiFi.
Edward Snowden considers safety of the Telegram messenger insufficient. Snowden considers that the Telegram developers should update a messenger, having changed default settings. He reported about it in the account Twitter. Pavel Durov did not agree with this opinion, and got into argument with Snowden which also other bloggers soon joined.
Moks Marlinspayk (Moxie Marlinspike), the developer of one more protected messenger, Signal, scarified Telegram and the principle of its work. Marlinspayk, in particular, pointed that in Telegram enciphering is used only in "confidential chats", but not in normal correspondence.
Today in the Network there was most interesting information — the directory of the equipment which is used by intelligence agencies of the USA for supervision over cellular devices of citizens of the country. The directory was laid out by the The Intercept resource, and journalists of the website obtained information from the employee of intelligence agencies who does not like toughening of measures of supervision over citizens in the country.
In total in the directory 53 devices, including Stingray I/II observation systems quite famous now. The range — about 200 meters, and the cost of such gadget makes $134000. In general, there is also nothing a little cheap in the directory, intelligence agencies and military (they use such equipment too) obviously spare no expense for similar things.
3 years ago
Microsoft tried different methods how to incline users of Windows 7 and 8.1 to updating on Windows 10: files of installation of 3-5 GB are downloaded in the background, the pop-up messages "Your Upgrade Is Ready to Installation" constantly are shown, the installation program is "accidentally" started on execution. But now they surpassed itself.
Look at this screenshot. Nothing seems to you strange?
3 years ago
The Internet of Things market is today, perhaps, one of the most attractive to technology investments. Of course, it is worth realizing that in many respects its excessive activity is far-fetched and, besides, in reality similar technologies surround us for a long time. In certain cases, IoT perceive and as the beautiful combination of letters promising to turn your project collected on a knee into a lump sum on the bank account. Let's not go into details from the point of view of economy of this process, we will note only that the majority of expectations of investors is based on beautiful digits of forecasts of size of the market of years through five-ten. One of options looks as "15 billion devices this year – 200 billion devices in five years". How here not to be glad for growth rates … Unfortunately, similar forecasts are seldom close to truth and the set of factors, part from which we cannot even foresee now, exert impact on real succession of events.
However there is one question which occupies minds of developers, vendors and ultimate users of products of information technologies not one decade – safety. Today, when the number of "smart" devices in terms of one user significantly grew, he becomes even more important. It is possible to find a set of information on this subject in a network, but, as they say, "Safety does not happen much", and we hope that this material will appear to our useful readers.
If you have a PS4 video game console and you wait for it cracking, that is a few good news. The other day the developer known under CTurt nickname declared "an official dzheylbreyk of PS4" an output. To achieve a goal, CTurt decided to use an exploit for FreeBSD kernel.
The hacker is "S-programmer" who is interested in exploits and reverse engineering. Also he is interested in web development and game design.
3 years ago
The MacKeeper company developer constantly reminds owners of Apple Mac computers that they need protection. Today the company needs protection after in open access there was a base from 13 million user accounts MacKeeper.
The most interesting that the base was open for all comers on the Internet, it is enough to make simple request in the searcher of Shodan.io.
In base — names, telephone numbers, email'y, user names, password hashes of MD5 without salt, identifiers of computers, serial numbers, IP addresses, codes of software licenses and activation, type of the equipment and type of a subscription MacKeeper.
3 years ago
The prime minister Dmitry Medvedev suggests to adopt the code of behavior on the Internet in the form of the soft right. He read such sentence shortly before the visit to China on the World conference on management of the Internet, TASS reports.
"It is obvious that, still not late, it is necessary not to allow criminalizations of the Internet, to guarantee observance of human rights in the digital sphere — the prime minister told. — It is extremely difficult to make it in the conditions of absence of full-fledged international legal base of cooperation in the field of information security therefore adoption of the code or rules of conduct in the form of the soft right could become the first step in creation of the international security system in this area".