13.8 and 20 megapixel cameras from Kodak

http://www.democratandchronicle.com/biznews/0922story4_business.shtml

So they are getting closer to film, but still have a ways to go. For example, what about contrast, film speed, etc? Take a look at http://pic.templetons.com/brad/photo/pixels.html and http://www.templetons.com/brad/nondig/ for good discussion on the relationship between digital and film.

Also, every "pixel" in film has at least 8 bits of red, green, and blue. But in most digital sensors, each pixel only record 8 bits of red, green, or blue; the pixels are laid out in a mosaic. So the effective resolution compared to film is only 1/2 to 1/3. The exception is the (still in prototype) Foveon X3 sensor. The Foveon does 8 bits of RGB for every pixel. They have a good discussion at http://www.foveon.com/X3_better.html with image comparisons at http://www.foveon.com/X3_comparison.html

A new crime: interference with a business model?

The entertainment industry is desperate.

First they convince congress to pass the Digital Millennium Copyright Act (DMCA), which, among other things, could make it illegal to loan a copy of your e-book to a friend.

Now they've convinced Rep. Howard Berman to submit the "Peer-to-Peer Piracy Prevention Act, a bill (PDF) that gives the entertainment industry the special right to hack your personal computer if they suspect you are violating copyright (they don't need to prove anything, just suspect). Think of it like this: If a mugger steals your wallet, are you allowed to burn down his house? No, that's called vigilantism and it's illegal. But that's what the entertainment industry is asking for the right to do.

Bruce Schneier this to say in the 15 Aug 2002 issue of Crypto-Gram (emphasis mine):

To me, it's another example of the insane lengths the entertainment companies are willing to go to preserve their business models. They're willing to destroy your privacy, have general-purpose computers declared illegal, and exercise special vigilante police powers that no one else has…just to make sure that no one watches "The Little Mermaid" without paying for it. They're trying to invent a new crime: interference with a business model.

xplanet (desktop background)

Renders an image-mapped picture of Earth (or other planets) as your background

http://xplanet.sourceforge.net/

Also has support for mapping a "cloud layer" onto the Earth, using real time(!) visible image data from satellites (eg. GOES). It can do a ton of other stuff too, including plotting satellite tracks, earthquake locations and magnitudes, city names, etc.

Available for unix and Windows.

Analysis of TCP sequence number vulnerability

This is some very technical stuff. But if you already know what they are talking the whole article is very interesting. They look at a variety of OS's including the Windows versions, Solaris, Mac, etc. Below is an excerpt of the introduction from the paper:

Upon connection via TCP/IP to a host, the host generates an Initial Sequence Number (ISN). This sequence number is used in the conversation between itself and the host to help keep track of each packet and to ensure that the conversation continues properly. Both the host and the client generate and use these sequence numbers in TCP connections.

As early as 1985 there was speculation that by being able to guess the next ISN, an attacker could forge a one-way connection to a host by spoofing the source IP address of a trusted host, as well as the ISN which would normally be sent back to the trusted host via an acknowledgement packet. It was determined that to help ensure the integrity of TCP/IP connections, every stream should be assigned a unique, random sequence number. The TCP sequence number field is able to hold a 32-bit value, and 31-bit is recommended for use by RFC specifications. An attacker wanting to establish connection originating from a fake address, or to compromise existing TCP connection integrity by inserting malicious data into the stream [1] would have to know the ISN. Because of the open nature of the Internet, and because of large number of protocols that are not using cryptographic mechanisms to protect data integrity, it is important to design TCP/IP implementations in a way that does not allow remote attackers to predict an ISN (this is called a "blind spoofing" attack).

Read More …

New optical pointing device

Researchers at Philips have created a laser-based optical pointing device that would integrate nicely into small electronic devices. It's kind of like a touch-pad, but instead of a "large" pad on which you slide your finger around, there's a small contact point that you slide your finger over. A laser tracks how your finger moves. At first it could replace the "scroll buttons" found on most cell phones, or the "jog dials" found on some (these mechanical bits are always the first to go). You could also add it to PDAs for a more mouse-like interface.

Schematic of optical scrolling
Optical scrolling
Prototype device
Prototype device

A pen that has no ink

http://www.otmtech.com/vpen.asp

Instead, the pen converts motion at the tip into latin (or asian) characters and sends to your PDA, cell phone (think SMS), etc. It can also send the raw movements to allow you to sketch.

I've seen the idea floating around for several years, but this looks like it might be the first company to actually implement it (although their site does not mention when it will be available, so maybe not…)