Database of Private SSL Keys Published

By CmdrTaco, SlashdotDecember 20, 2010 at 09:53AM

Trailrunner7 writes “A new project has produced a large and growing list of the private SSL keys that are hard-coded into many embedded devices, such as consumer home routers. The LittleBlackBox Project comprises a list of more than 2,000 private keys right now, each of which can be associated with the public key of a given router, making it a simple matter for an attacker to decrypt the traffic passing through the device. Published by a group called /dev/ttyS0, the LittleBlackBox database of private keys gives users the ability to find the key for a specific router in several different ways, including by searching for a known public key, looking up a device’s model name, manufacturer or firmware version or even giving it a network capture, from which the program will extract the device’s public certificate and then find the associated private SSL key.”

Read more of this story at Slashdot.

Scientists attempt to predict flu spread, give ZigBee radios to 700 high school students

By Sean Hollister, Engadget RSS FeedDecember 20, 2010 at 07:43AM

This is the Crossbow TelosB wireless remote platform, and it did an important job for science in January of last year — it monitored the close proximity interactions among 788 students and staff at one US high school to track a virtual flu. After collecting over 762,000 sneeze-worthy anecdotes among the module-toting teachers and teens, Stanford researchers ran 788,000 simulations charting the path the virus might take and methods the school might try to keep it in line. Sadly, the scientists didn’t manage to come up with any easy answers, as virtual vaccination seemed to work equally well (or poorly) no matter who got the drugs, but that if only we could actually monitor individuals in real life as easily as in a study, prevention would be much easier. But who will bell the cat, when it’s so much less political to ionize?

Scientists attempt to predict flu spread, give ZigBee radios to 700 high school students originally appeared on Engadget on Mon, 20 Dec 2010 08:43:00 EDT. Please see our terms for use of feeds.

Permalink Medgadget  |  sourceStanford University  | Email this | Comments

Most Popular Hive Fives of 2010 [Best Of 2010]

By Jason Fitzpatrick, LifehackerDecember 17, 2010 at 08:00PM

Most Popular Hive Fives of 2010Every week we put out a Hive Five Call for Contenders and ask you a simple question: Which is best? From DVD rippers to web hosts and everything in between, here’s a look back at the most popular Hive Fives of 2010.

Photo remixed from an original by Matt Katzenberger

The Hive Five gives us a chance to put interesting topics before the Lifehacker readership, see what’s popular, and then round up the top five contenders for a vote. Sometimes the winner seems obvious from the start but the real value of the Hive Five isn’t finding out the absolute most popular tool around, it’s finding out four other very solid options you may have been unaware of.

Five Best DVD-Ripping Tools

Most Popular Hive Fives of 2010
You’ve got DVDs and you’ve got media servers and portable devices that need to be fed with fresh media. DVD-ripping tools bridge the gap and help you turn your optical media into files you can enjoy without a DVD player.

Five Best Windows 7 Tweaking Applications

Five Best Windows 7 Tweaking Applications
Windows 7 brought numerous improvements over previous incarnations of Windows-especially for those making the leap from Windows XP to Windows 7. People still love to tweak and customize their operating system, no matter how many improvements it contains. The Windows Tweaking Hive Five was one of our most popular for the entire year, testifying to the love the Lifehacker readership has for customization.

Five Best Netbook Operating SystemsMost Popular Hive Fives of 2010

Netbooks are inexpensive, popular, and prime targets for tweaking and custom operating systems. From Windows, Linux, and OS X as well as custom netbook-centric packages all made an appearance in this popular Hive.

Five Best Email Clients

Most Popular Hive Fives of 2010
Despite the popularity of web-based email clients more than a few desktop clients made a solid showing in the email Hive Five. If you’re looking for something beyond your web-client that isn’t Outlook, it’s worth taking a peek.

Five Best Start Pages

Most Popular Hive Fives of 2010
The start page is the first thing you see when you open your browser or launch a new tab. If you’re tired of looking at your browser’s default page, the start pages Hive Five offers a variety of alternative pages.

Five Best Music Streaming Services

Most Popular Hive Fives of 2010
You like tunes? You like tunes delivered to you by the magic of the internet wherever you are? Check out the music streaming Hive Five for Lifehacker readers’ five favorite music streaming services.

Five Best Computer Diagnostic Tools

Five Best Computer Diagnostic Tools
Just because computers get easier and easier to use doesn’t mean they don’t need a checkup now and then. Load up your tool bag with five great tools so that when trouble strikes-and it will-you’ll be ready to diagnose the problem.

Five Best Public BitTorrent Trackers

Most Popular Hive Fives of 2010
If you’re looking to set sail for the Isle of Sharing you’ll need some directions. Torrent trackers help you find new files and direct your client to the swarm of people out there sharing them. Check out the five best public BitTorrent trackers to find the files you’re looking for.

Five Best VPN Tools

Most Popular Hive Fives of 2010
Virtual Private Network software allows you to join together far flung networks and the computers on them as though they were all sitting together in the same office. Whether you need to link your entire office to another office across the country on your home network to your buddy’s across town, you’ll find a tool to help in this Hive Five.

Five Best Online File Sharing Services

Five Best Online File Sharing Services
BitTorrent is great for sharing popular files, a dedicated server is great for sharing private files, but what about the times you just want to shoot a big file from your computer to a remote one? When you want to share files with no fuss and in private the five solutions in the file sharing Hive have you covered.

Five Best Tools for Managing Your Multi-Monitor Setup

Five Best Tools for Managing Your Multi-Monitor Setup
You’ve got monitors and lots of them. Grab some apps to maximize your bountiful screen real estate; don’t let any of those precious pixels go to waste just idling away. This Hive Five includes tools that extend your task bar, manage your wallpapers, and enhance window and monitor management.

Five Best Offline Backup Tools

Five Best Offline Backup Tools
If you’re not backing up your data you’re playing a dangerous game-all disks die, it’s just a matter of when. Hop into the Offline Backup Hive Five and grab an application or two to help you wrangle offline backups and ensure your data is secure.

Five Best Personal Web HostsFive Best Personal Web Hosts

Massive enterprise-level web hosting solutions are overkill for private and small-time web sites. In this particular Hive we took a look at the best personal web hosts and what made them well suited for adventures in personal web mastering.

Five Best Places to Buy Cheap Textbooks

Five Best Places to Buy Cheap Textbooks
Who wants to spend a fortune on textbooks? Nobody, which is why the Cheap Textbooks Hive Five was so popular. If you’re in school, have kids in school, or are returning to school yourself, you can save a boatload of cash by shopping on textbook web sites.

Five Best File Encryption Tools

Five Best File Encryption Tools
Unless you enjoy people climbing in your windows and snatching your data up, you better be encrypting it. From whole disk encryption to encrypted volumes and portable files, the Encryption Tools Hive Five has everything you need to make sure your tax returns, diary, and extensive Sailor Moon collection is safe from prying eyes.

Five Best Music Discovery Services

Five Best Music Discovery Services
Gone are the days of relying on a local DJ or record shop employee to introduce you to new music. If you’re in the mood for new music make sure to check out the Music Discovery Services Hive Five to see where you fellow readers discover new artists.


Curious what Hive topics were popular last year? You can check out the most popular Hive Fives of 2009 here.

How To Build A Basic Web Crawler To Pull Information From A Website (Part 2)

By James Bruce, MakeUseOfDecember 17, 2010 at 12:31PM

build a webcrawlerThis is part 2 in a series I started last time about how to build a web crawler in PHP. Previously I introduced the Simple HTML DOM helper file, as well as showing you how incredibly simple it was to grab all the links from a webpage, a common task for search engines like Google.

If you read part 1 and followed along, you’ll know I set some homework to adjust the script to grab images instead of links.


I dropped some pretty big hints, but if you didn’t get it or if you couldn’t get your code to run right, then here is the solution. I added an additional line to output the actual images themselves as well, rather than just the source address of the image.

<?php
include_once('simple_html_dom.php');
$target_url = "https://www.tokyobit.com";
$html = new simple_html_dom();
$html->load_file($target_url);
foreach($html->find('img') as $img)
{
echo $img->src."<br />";
echo $img."<br/>";
}
?>

This should output something like this:

build a webcrawler

Of course, the results are far from elegant, but it does work. Notice that the script is only capable of grabbing images that are on the content of the page in the form of <img> tags – a lot of the page design elements are hard-coded into the CSS, so our script can’t grab those. Again, you can run this through my server and if you wish at this URL, but to enter your own target site you’ll have to edit the code and run on your own server as I explained in part 1. At this point, you should bear in mind that downloading images from a website is significantly more stress on the server than simply grabbing text links, so do only try the script on your own blog or mine and try not to refresh lots of times.

Let’s move on and be a little more adventurous. We’re going to build upon our original file, and instead of just grabbing all the links randomly, we’re going to make it do something more useful by getting the post content instead. We can do this quite easily because standard WordPress wraps the post content within a <div class=”post”> tag, so all we need to do is grab any “div” with that class type, and output them – effectively stripping everything except the main content out of the original site. Here is our initial code:

<?php
include_once('simple_html_dom.php');
$target_url = "https://www.tokyobit.com";

$html = new simple_html_dom();

$html->load_file($target_url);
foreach($html->find(‘div[class=post]‘) as $post)
{
echo $post.”<br />”;
}

?>

You can see the output by running the script from here (forgive the slowness, my site is hosted at GoDaddy and they don’t scale very well at all), but it doesn’t contain any of the original design – it is literally just the content.

Let me show you another cool feature now – the ability to delete elements of the page that we don’t like. For instance, I find the meta data quite annoying – like the date and author name – so I’ve added some more code that finds those bits (identified by various classes of div such as post-date, post-info, and meta). I’ve also added a simple CSS style-sheet to format the output a little. Daniel covered a number of great places to learn CSS online if you’re not familiar with it.

As I mentioned in part 1, even though the file contains PHP code, we can still add standard HTML or CSS to the page and the browser will understand it just fine – the PHP code is run on the server, then everything is sent to the browser, to you, as standard HTML. Anyway, here’s the whole final code:

<head>
<style type=”text/css”>
div.post{background-color: gray;border-radius: 10px;-moz-border-radius: 10px;padding:20px;}
img{float:left;border:0px;padding-right: 10px;padding-bottom: 10px;}
body{width:60%;font-family: verdana,tahamo,sans-serif;margin-left:20%;}
a{text-decoration:none;color:lime;}
</style>
</head>

<?php
include_once(‘simple_html_dom.php’);

$target_url = “https://www.tokyobit.com”;

$html = new simple_html_dom();

$html->load_file($target_url);
foreach($html->find(‘div[class=post]‘) as $post)
{
$post->find(‘div[class=post-date]‘,0)->outertext = ”;
$post->find(‘div[class=post-info]‘,0)->outertext = ”;
$post->find(‘div[class=meta]‘,0)->outertext = ”;
echo $post.”<br />”;
}

?>

You can check out the results here. Pretty impressive, huh? We’ve taken the content of the original page, got rid of a few bits we didn’t want, and completely reformatted it in the style we like! And more than that, the process is now automated, so if new content were to be published, it would automatically display on our script.

build a webcrawler

That’s only a fraction of the power available to you though, you can read the full manual online here if you’d like to explore it a little more of the PHP Simple DOM helper and how it greatly aids and simplifies the web crawling process. It’s a great way to take your knowledge of basic HTML and take it up to the next dynamic level.

What could you use this for though? Well, let’s say you own lots of websites and wanted to gather all the contents onto a single site. You could copy and paste the contents every time you update each site, or you could just do it all automatically with this script. Personally, even though I may never use it, I found the script to be a useful exercise in understanding the underlying structure of modern internet documents. It also exposes how simple it is to re-use content when everything is published on a similar system using the same semantics.

What do you think? Again, do let me know in the comments if you’d like to learn some more basic web programming, as I feel like I’ve started you off on level 5 and skipped the first 4! Did you follow along and try yourself, or did you find it a little too confusing? Would you like to learn more about some of the other technologies behind the modern internet browsing experience?

If you’d prefer learning to program on the desktop side of things, Bakari covered some great beginner resources for learning Cocoa Mac OSX desktop programming at the start of the year, and our featured directory app CodeFetch is useful for any programming language. Remember, skills you develop programming in any language can be used across the board.


Follow MakeUseOf on Twitter. Includes cool extras.


 

 

Similar MakeUseOf Articles

How to Stay Secure Online [Video]

By Adam Dachis, LifehackerDecember 17, 2010 at 10:00AM

How to Stay Secure OnlineIn light of recent events, security has been a serious priority for all of us. Although there is no 100% full-proof plan, there are ways to greatly improve your online security and plan for the worst. Here are our recommendations.

The Bad News: Nobody’s Safe

How to Stay Secure OnlineDuring the Summer of my freshman year in high school, I worked at a grocery store as a bag boy and saved up for a laptop. At the end of the Summer I was finally able to buy one. Nowadays laptops are commonplace, but this was back when they were pretty rare. I loved it, and I put my life into that computer. A year later I set it up to print in the computer lab and ran into the other room for 30 seconds. When I returned, the laptop was gone. I was amongst people I trusted and gone for under a minute but, still, it didn’t matter: the laptop was gone. I thought I’d somehow get it back, but it didn’t take long to realize that wasn’t going to happen. But, ultimately, it wasn’t the laptop I wanted back. I quickly realized all my personal information—all my secrets—were in the hands of someone I’ll never find. Someone gained the potential to know the darkest parts of my life and I’ll never know who they are. This experience taught me two things:

  1. No matter how safe you think you might be, something bad can always happen.
  2. The only way to ensure your private information always remains private and in your control is if it never leaves your own head.

The internet and reality aren’t much different, in that sense. There is plenty of, if not more, risk in the real world than there is on the web, but we’re just more accustomed to dealing with it. The online world is still very young and so we’re learning to protect ourselves as we go along. Nonetheless, like with anything, there is no surefire protection. The web is imperfect. We are imperfect. Ultimately, no site is un-hackable. A person or group with enough knowledge and determination can bring nearly any site down. That said, we can certainly try our best to protect ourselves and be prepared for worst-case scenarios.

Create Strong, Resilient Passwords

How to Stay Secure Online
There are several ways to keep remarkably strong passwords, but every strategy has a point of weakness and a level of inconvenience that you’re going to have to accept. We’re going to go over a method that we feel is all-around the best way to go, but include a few variations along the way so you can decide what suits you best.

Create Strong, Secure Passwords that Even You Don’t Know

How to Stay Secure OnlineWhen it comes to our own, individual online security we put a lot of trust in our password managers. Password managers keep track of your passwords on multiple sites so you never need to remember your password when it’s time to log in. This way you can memorize your one master password and never have to worry about remembering any of the others. This is enormously convenient, but what’s more important is the added security benefits. A good password manager can help generate incomprehensible passwords, store them in its database, and decode them locally, only one your machine, when it needs to enter them into the web site. You can use a password manager to generate a unique, complex password for every site you visit. Each site will have a different password, you’ll have no idea what any of them are, and all you’ll have to do is remember the one master password you set for it.

How to Stay Secure OnlineWhile there are a number of good password managers out there, like KeePass and 1Password, our favorite is LastPass. LastPass offers incredibly wide support for several operating systems, web browsers, and mobile phones. It’s also completely free, remarkably secure, and comes with many features to help you stay as protected as possible. Since you’re likely not without a few passwords at this point in your life online, LastPass can help you audit and update your passwords to make them more secure.

But what about creating a secure master password?

While all the passwords LastPass (or your other password manager) will generate will be about as strong as they can be, you want to have a strong master password as well. While your password manager can generate one for you, often times it’s going to be too hard to remember and too inconvenient to type (especially on a mobile phone). If you don’t mind the extra work for the extra security, your best bet is to have the most secure password you can have. If you want something you’re sure you won’t forget, Mozilla offers an easy way to create a strong password you’ll be able to remember:

How to Stay Secure Online

If you’re not in the mood for a cute strong password public service announcement, the concept goes something like this:

  • Pick a phrase you can remember with a number in it, like “A bird in the hand is worth two in the bush.”
  • Change that number (in this case, “two”) to its numerical equivalent: A bird in the hand is worth 2 in the bush
  • Condense the phrase by only using the first letter of each word: Abithiw2itb
  • Add some special characters you can remember: #Abithiw2itb!

How to Stay Secure OnlineDoing this gives you all the characteristics of a good, strong password: lowercase and capital letters, at least one number, special characters, and a combination of those things that basically makes no sense when you look at it and turns out to be longer than eight total characters.

While we recommend generating complex passwords with your password manager, you can use this same technique to create unique passwords for individual sites. You can take the password and add a suffix specific to each web site. Sticking with out example, let’s say you wanted to use this password for Lifehacker. Just add :L1feh@cker, :Lh, or whatever you’ll be able to remember to the end of the password: #Abithiw2itb!:Lh. This way you can type your complex password as you normally would and just append your abbreviation for the site you’re logging into. This method is a little easier, but it’s not impossible for someone to figure out. Ideally you’ll want to let your password manager handle your password generation for you, but if that’s just not for you then this method is a reasonable alternative.

How to Stay Secure Online If at any point you’re not sure about your password’s security, head on over to How Secure Is My Password? to get an approximation of how long it would take to crack using an average desktop computer. Our example (#Abithiw2itb!) would take about seven billion years, which seems pretty good. If you’re satisfied with the password you’ve derived, you’ve got your new master password. If you’re not, keep trying and checking.

Keep Your Other Information Protected

Your passwords are not the only kind of important information you don’t want floating around the internet, and chances are you have a few gadgets you wouldn’t want to fall into the wrong hands. Fortunately there are quite a few ways you can

Protecting Your Credit Cards

How to Stay Secure OnlineIf you shop online, your credit card number has been entered into at least one web site. While this is unavoidable, and just about as safe as using your credit card out in the real world, the fact still remains that your number could be intercepted and used to make unauthorized purchases. One easy way around that problem is using temporary credit card numbers. While not every bank offers this service, if yours does you might want to take advantage of it. If you’re making a purchase online—especially at a site you don’t trust—you just generate a unique credit card number that will expire after its first use. This is also extremely helpful if you sign up for a trial and want to prevent automatic re-billing.

Keeping Your Mobile Technology Secure

How to Stay Secure OnlineThere really isn’t any assurance your technology won’t get stolen someday. As previously mentioned, it happened to me in less than a minute. Fortunately there are a number of tools to keep your laptops and mobile phones secure from tampering, or at least initiate a remote data wipe in the event of a breach.

One of our favorite tools is Prey, which is a free tool (for up to three devices) that can help you track and (potentially) recover your stolen laptop or Android smartphone. If you’re looking for a solution for your iOS device, Apple now offers find my iPhone for free. If you’re not using an iPhone 4, it is still possible to enable the free Find My iPhone, but it’ll take a little bit of extra work. Once you get it up and running, you’ll be able to remotely locate your iPhone, send it a message, and wipe your personal data. To get started, you can download Find My iPhone in the iTunes App Store. Despite the name, it’ll work with any iOS device (but GPS and 3G service certainly help).


That just about wraps it up for guide to online security. With so many options out there, it’s hard to cover the entire spectrum. If you feel we’ve missed something or have some good tips, please share them in the comments. Thanks for reading, and stay safe!

You can contact Adam Dachis, the author of this post at adachis@lifehacker.com. You can also follow him on Twitter and Facebook.

Microsoft Security Essentials 2 Released, Still the Best Darn Antivirus Around [Downloads]

By Whitson Gordon, LifehackerDecember 17, 2010 at 08:35AM

Microsoft Security Essentials 2 Released, Still the Best Darn Antivirus AroundWindows: We’ve learned to stop worrying about antivirus software since Microsoft released their great Microsoft Security Essentials suite, but today it gets even better, improving Windows Firewall integration, network traffic inspection, and an heuristic scanning engine.

Microsoft’s next version of Security Essentials is actually a pretty great update from its already-great predecessor. Microsoft’s option has always been adequate at finding new malware without definitions, but the addition of an heuristic engine bumps its power up quite a bit. It may be subject to a few more false positives, but you’re much less likely to get hit with malware than ever before.

It also includes some Windows Firewall integration that lets you tweak the Firewall from inside Security Essentials, as well as a network inspection feature that can inspect traffic as you browse, which is pretty neat. All in all, if you’re using Microsoft Security Essentials (and why wouldn’t you be?), you’ll want to grab this update. Hit the link below to manually download and install the update.

Microsoft Security Essentials is a free download for Windows.

Dropbox Hits Version 1.0, Brings Big Performance Boosts and Selective Sync [Downloads]

By Adam Dachis, LifehackerDecember 17, 2010 at 07:15AM

Dropbox Hits Version 1.0, Brings Big Performance Boosts and Selective Sync Our favorite file-syncing tool, and yours, just hit version 1.0, leaving beta and adding the long-awaited selective syncing features, as well as a significant speed increase.

We already looked at the release candidate for this version of Dropbox, but those of you waiting for the official version can grab the update now. Not only is it officially out of beta, but the update brings significant performance bumps and the long-awaited selective sync, which allows you to choose which parts of your Dropbox you sync to which computers—for those times you don’t want to fill up extra space on your tiny netbook drive, for example.

For the full overview, check out their blog post.

Dropbox Hits Version 1.0, Brings Big Performance Boosts and Selective SyncDropbox hits 1.0! | Dropbox Blog via #tips

The 12 Geek Trees of Christmas

By Robin Parrish, ForeverGeekDecember 16, 2010 at 05:17PM

The modern Christmas tree is more than a thing to put presents under. It’s a representation of your tastes, your hobbies, even your personality. Mash up some wildly outside-the-box creativity with the kind of devotion that only a geek can have, and you get some amazingly awesome Christmas trees.

Like these.

Dalek Tree

Such a perfect marriage, it’s a wonder no one’s done it before. It’s all the more impressive when you zoom in and see just how simple it was to make out of ordinary household items like a laundry basket and a plunger. By Lindsay Testolin.

Lightsaber Tree

Okay, so technically these aren’t lightsabers — they’re flourescent light bulbs. But you know you thought “lightsabers” when you saw it, too. By Gareth Pugh.

Tron Tree

At first pass, this tree looks like it came straight out of the old-school Grid from the original Tron. But zoom in and you’ll see that these rows of lights are just that: lights still inside their plastic holders that they come in when you buy ‘em. Very clever. By Richard Whittaker.

Hard Drive Tree

They may look like CDs, but these are really old hard drives, repurposed as a shiny, metal Christmas tree. It took 70 hard drives to create. By Trigger.

LEGO Tree

Straight from this year’s Christmas display at Legoland in San Diego, this is reportedly the world’s largest LEGO Christmas tree. It stands 30 feet tall and was made using 245,000 green Duplo-sized bricks. It’s decorated with over 240 LEGO ball ornaments, and real lights.

Tesla Tree

Made using a huge Tesla coil and a long photo exposure, it’s not technically the exact shape of a Christmas tree (the traditional triangular pine), but it’s still wicked cool. Even more impressive are all of the different colors that electricity addict Peter from Australia managed to create with it, which you can see more of on his website.

Old Computer Parts Tree

What better use for old computer parts like keyboards, motherboards, mice, and chipsets could there be than to paint them red and attach them to a wagon? By Sunny Brook.

Pac-Man Tree

By now, I’ll be more surprised if you haven’t already seen this popular Pac-Man inspired Christmas tree from Madrid. It’s been a yearly installation for a while now. But it’s still awesome. Photo by Antonio Garcia Rodriguez.

Cars Tree

This one’s for my son, who’s obsessed with all things Cars. It took one devoted parent to create this spiral, winding ramp and fill it with Pixar characters. By Danny Novo.

Spinning Tree

You know those tacky LED/fiber optic Christmas trees? This is what they look like when they’re attached to a motor and spun around with a long-exposure camera running. I want one. Even though it reminds me of that Doctor Who episode where Rose and her family were attacked by a killer Christmas tree. By Kevin Kotterell.

Apple Tree

Because there’s no such thing as a “geek list” that doesn’t include at least one Apple entry. By Metamorphosis.

OLED Tree

The computer geeks at GE made this tree a couple years ago out of some of those shmancy, bendable OLED computer screens that will someday allow us to wear flexible screens as bracelets and whatnot. A world’s first, at the time. By GE.

How to raise a smart and happy child

By GuyKawasaki, How to Change the WorldDecember 16, 2010 at 01:51PM

Who among us has not wondered if we’re doing the right things as we raise our children? If you have, then you should check out this interview with John Medina, author of Brain Rules for Baby: How to Raise a Smart and Happy Child From Zero to Five. John is a developmental molecular biologist, and he shoots down a lot of the things that helicopter parents are imposing on their kids.