Upgrade Redux

Microsoft, having given Longhorn a far more marketing-exec friendly name in the form of Vista, has now revealed just how powerful computer needs to be to run this all-new version of the Windows operating system. Surprisingly, the spec is actually far lower than the system inside my Dell laptop which died unceremoniously just last week (out of warranty, of course, but only 26 months old).

Would you be surprised if this new spec were not up to actually running Vista though? Of course, not. Throw a CAD program, a tabbed browser, and maybe some DVD burning and the kind of spec MS suggests as a minimum is going to grind to a halt regardless. So, inevitably users will find themselves having to ditch perfectly serviceable and adequate computer equipment and replacing it once again with the next great chip and googol’s of RAM just to get their software to run.

Anyway, this is the spec:
Minimum processor clock speed: 800MHz (recommended 1GHz 32 or 64 bit), System memory (RAM) 512MB min with 1GB, Graphics card needs to be DirectX 9 capable to run all the new 3D icons in the Windows Aero interface and have at least 128MB. You will need 15GB of free space on your hard drive.

Puritan Trojans

Lots of pundits point out that the antivirus/firewall/antispyware companies are making big profits from the fear instilled in computer users the world over. Whether every threat is real or not, who’s got the guts to go out into the cyber world unprotected these days, or even plugin in someone else’s USB key for all that.

Now, it seems a Trojan horse program has surfaced that looks rather suspiciously like a goody-two-shoes kind of application. Rather than handing over access to your hard drive to the nearest script kiddy, opening ports to every electronic eavesdropper, and emailing itself to all your business contacts complete with some salacious come on, this little critter simply deletes all the porn, p2p shared files, and eradicates warez from your computer. It’s almost as if, could it possibly be, a puritanical application created with the sole intent of cleaning up the net?

The clever guys at Sophos have dubbed this latest threat to geek sanity “trojerazera” (like Trokan melded to Kazaa I guess)

http://www.sophos.com/virusinfo/analyses/trojerazera.html

It also goes by the name of TROJ_P2PCOPY.A, Trojan.Win32.Eraser.a, Erazor, and Troj/Erazer-A.

If you’re desperate to retain your collection of electronic smut, don’t fancy losing all those painstakingly downloaded illegal copies of software package, and are hoping to hang on to your p2p-shared folders just long enough for the RIAA to find you, then download the latest update for your antivirus software and do a detailed trojerazera eraser job.

Growing Threat of Spyware (updated)

Spyware threat

More than one in twenty executable files on your PC could be a spyware program, according to researchers at the University of Washington. Computer scientist Hank Levy and his colleagues analyzed over 20 million internet addresses, to track down programs that can get on to your computer without you knowing and perform tasks ranging from displaying annoying advertising banners and pop-ups to gathering personal information, redirecting you Web browser to a client’s site or even utilising your modem to call out to costly toll numbers abroad. These scams are the reason why People are looking for IT Services Ottawa, New York, Tokyo, etc.”

The researchers examined sites in the most popular Web categories, such as gaming, news, and “celebrity” sites. [Not sure whether that includes porn sites or not, Ed.]

They found that more than one in twenty executable files contained spyware piggybacking on the legitimate software users might want to install. On average, almost 2% of Internet domains performed drive-by download attacks to force spyware on users who simply visit a Web site. Game and celebrity Web sites were the worst offenders the researchers told the 13th Annual Network and Distributed System Security Symposium in San Diego, California, on Thursday. Perhaps obvious is the finding that sites offering pirated software topped the list for drive-by attacks.

“For unsuspecting users, spyware has become the most ‘popular’ download on the Internet,” explains Levy, “We wanted to look at it from an Internet-wide perspective – what proportion of Web sites out there are trying to infect people? If our numbers are even close to representative for Web areas frequented by users, then the spyware threat is extensive.”

If you’re worried about spyware, which can be anything from “annoying to catastrophic”, then you should read the major security sites for advice on general computer security, firewalls, antivirus software, and, of course, how to get rid of spyware and other computer pests.

You can read Levy’s paper in PDF format here.

Anandamide Cannabinoid

Anandamide cannabinoid

There’s a heated debate underway on the NASW discussion groups about whether marijuana is addictive or not.

Deborah Frisch came up with a great comic dialogue between two dudes [has to be two if it’s dialogue, Ed.] discussing the issues and whether or not we should be talking gently about the anandamide receptor or boldly about the cannabinoid receptor in scientific circles. My cartooning colleague Peter Welleman did a great satirical cartoon to illustrate the dudish dialogue, which we reproduce with permission from Deborah and Peter on Sciencebase.

Heavy….maaaan!

Searching, Always Searching

I find it endlessly fascinating the things visitors to the site search for…hopefully, a few sciencebase readers are at leasst vaguely interested too, otherwise these posts are a total waste of time. Anyway, a selection from the almost virginal monthly log for May reveals some nice topics:

wiffle ball science, what is the origin of the asteroid belt, x chromosone recombination, physics problems in movies, x-ray vision fact or fiction (also), obliquity earth.

Maybe some day I’ll write some short items on each of those, but for now you’ll have to settle for the links I found.

One final search query has got me stumped – what in fact is its size in ratio compared to the earth – well, if anyone can tell me to what the “its” is referring I might be able to offer an answer

Lost in Translation

Altavista’s translation service Babelfish, named for the critter in The Hitchhiker’s Guide to the Galaxy, does a superb job of providing very rough translations between dozens of different languages. But, have you ever tried translating an English web page into French, say and then back again?

Martin G at Really Magazine thought that might be fun and contacted Sciencebase with a sample of text from the site that he had two-wayed using a little form he’s created in his blog to demonstrate what a site might “look like” to a non-English speaker using autotranslation (http://www.reallymag.com/2Xlation.htm).

Needless to say the results are not at all pretty, this was from a current item:

“In the visitor the chance which puts out their opinion with voice in order period me is late in small quantity and recently the conference, in order to arrange a new poll that le or comfort in order to manufacture in SciScoop location the hazard was in the mongering disease which covers.”

Basically, Mr G picked up on my announcement of the SciScoop poll on disease mongering. But you cannot really get a sense of that from the 2x translation can you, which might suggest that a non-English speaker viewing the site with 1xtrans switched on really isn’t going to get the best out of SciScoop.

Martin had this to say about the process, “I thought it gave a nice real-world overview of how the engines are coping with (the admittedly very difficult job of) auto-translation.”

Give it a whirl with your favourite blog or site.

Nugache P2P Bot

Just as email worms are at their lowest ebb for years, a new threat looms on the horizon – the P2P (peer-to-peer) bot. These insidious creatures worm their way through instant messanging systems (naming no names, but anyone using MSN and AOL products might just be at risk).

Rather than doing the usual email address look-up that is common to most mail worms, this form of malware, of which Nugache is the current threat being popularised by the media, bypasses address books and even circumvents DNS lookup (the tool that converts net addresses into a numeric IP address) and instead scans for other infected machines with which to hook up and create a P2P network. These are not to be confused with the networks that P2P file sharing software uses. Once established, encrypted packets of information can be transferred across the bot network all-but invisible to the usual detection systems.

It looks like most of the antivirus companies have responded with appropriate updates (is it the companies themselves that write these darned things, by the way?) and I’d recommend you do an update immediately, even if it’s not convenient to ensure you’re safe from Nugache at the least.

For those with an interest in the ins and outs of this particular worm, it opens a back door on TCP port 8, and installs a bot to wait for commands from the attacker. The command and control channel it uses is unique and it is difficult to block commands issued to the bot. Anyone looking for the perpetrator would simply see the various peers in the bot network making tracking them down almost impossible.

Da Vinci de Leonardo

A letter in Physics Today this month discusses the archetypal renaissance man and his impact or otherwise on science, engineering and art…

Who is he?

According to the letter head, some fella by the name of Da Vinci. Perhaps he’s the same guy to whom Dan Brown is referring in his eponymous code book. I assume so. Either way, surely they don’t mean the Italian polymath born in Vinci in 1452 known to his mum as L’il Leonardo. I bet they do you know…

A Little Bit of Housekeeping

Good Housekeeping

Proud to report that Sciencebase received a Good Housekeeping Site of the Day award today! From a quick glance at the site, which seems to have an archive of future awardees as well as those already given, it doesn’t look like it’s actually anything to do with the eponymous magazine, but it’s still nice to get some recognition for the site anyway.

If anyone can tell me who Good Housekeeping (not the magazine) actually are, I’d be interested to learn about them. Apparently, their hosting system has changed they were DailyinBox.com but that service is now run by BeliefNet.

Air Guitar

air guitar

Imagine the hoards of adoring fans, sellout arenas, the groupies, these are now virtually within the grasp of anyone who can play a searing solo on the air guitar, thanks to researchers at Helsinki University of Technology.

The Virtual Air Guitar uses a computer to monitor the hand movements of an air guitarist and adds genuine guitar sounds to match the player’s fret work. The innovative application combines gesture recognition with musical interpretation software and could be a boon to all those who aspire for rock stardom, but really cannot be bothered to actually learn the instrument.

The idea emerged at HUT’s Telecommunications Software and Multimedia Laboratory and progressed to the Otaniemi International Innovation Centre (OIIC). It was further developed through the Tekes’ TULI programme to Technopolis Ventures Oy incubator services. The idea was processed into a business plan with the aim of establishing a significant international business.

A Virtual Air Guitar company was set up in February 2006, and in March 2006 it received an award in the second stage of the Venture Cup Business Plan Competition. At the moment, the founders of the company are in the process of negotiating funding and publishing contracts with various parties.

‘The company’s first product will be a console game which will be on the market in time for Christmas 2007, and later on other games applications will be added to the product family. We are working on completely new and unprecedented applications,’ explains Virtual Air Guitar MD Aki Kanerva.