Articles about Document Pdf

'New' document shows how US forces carriers to allow snooping

Post-Snowden sensitivities to American spookery have been further inflamed after Australian website Crikey revealed a document that it says is a contract between the Federal Bureau of Investigation, the US Department of Justice and submarine cable operator Reach that allows the US entities to tap Reach's cables for national …
Simon Sharwood, 12 Jul 2013

Google, Rockstar to bury zombie Nortel patent lawsuit

Google has reportedly laid to rest its long-running squabble with zombie patent supertroll Rockstar, although terms of the settlement were not disclosed. Rockstar is the puerile moniker given to the consortium formed by Apple, BlackBerry, Ericsson, Microsoft, and Sony, which pooled their resources in 2011 to buy the patent …
Neil McAllister, 20 Nov 2014

Sony quietly POODLE-proofs Playstations

Sony has patched the POODLE SSL vulnerability in its Playstation 3 and 4 gaming consoles. The rolling patch, introduced over the last fortnight, brings Transport Layer Security into Playstation's browsers and apps. SSL 3.0 is dispelled, off the Padding Oracle on Downgrade Legacy Encryption attack. The patch is a 200MB mandatory …
Darren Pauli, 24 Nov 2014
iPhone shop Shenzhen

ITU thought bubble ponders mass mobe-tracking to kill fake IT

The International Telecommunications Union (ITU) will next week meet to consider the issue of “counterfeit and substandard ICT products” and what can be done about them, but some of the proposals on the table look more than a little worrying. Notice of the meeting was posted in late September, when the ITU announced next week's …
Simon Sharwood, 13 Nov 2014

Microsoft lets YOU kill POODLE in Protected Mode sites

Microsoft has granted sysadmins the ability to kill exposure to rabid POODLE websites under SSL 3.0 for Internet Explorer Protected Mode sites. The Christmas gift will be switched on by default from February next year as Redmond moves to euthanised the Padding Oracle on Downgrade Legacy Encryption attack across its web presences …
Darren Pauli, 11 Dec 2014
NBN Co logo

NBN Co reveals 1 Gbps business plans in new product roadmap

NBN Co, the entity charged with building and operating Australia's national broadband network (NBN), has released a detailed product roadmap stretching out until 2016. The document (PDF) offers a few interesting insights into the network's progress. One item of special interest is a promised “Enterprise Ethernet Service” that …
Simon Sharwood, 01 Jul 2014
Dunce

Australia to social media: self-censor or face AU$17,000 FINES

Australia's long-threatened plan to compel social networks to remove bullying material directed at children has emerged, complete with a naughty corner for networks who don't play nice with others. The bill seeks to ensure that all social networks operating in Australia implement “basic online safety requirements” including …
Simon Sharwood, 03 Dec 2014
Intel 'Haswell' 4th-Generation Core i7 Extreme Edition eight-core processor

Intel disables hot new TSX tech in early Broadwells and Haswells

One of Intel's new ways to make software go faster is called Transactional Synchronization Extensions (TSX), an innovation that gives developers fine control over how multi-threaded code uses a CPU's resources. TSX is a reasonably big deal, because as Intel never tires of pointing out it long-ago decided that grunt alone is not …
Simon Sharwood, 14 Aug 2014

IEEE signs off on 400 Gb/s Ethernet development

As we foreshadowed last month, the The Institute of Electrical and Electronics Engineers (IEEE) has green-lighted development of 400 Gb/s Ethernet. Now known as IEEE P802.3bs, the nascent standard now has an official IEEE task force working to make it a reality and a goal, stated in this IEEE document (PDF) , to “Define Ethernet …
Simon Sharwood, 04 Apr 2014

In dot we trust: If you keep to this 124-page security rulebook, you can own yourname.trust

NCC Group has published a set of security standards that you'll have to follow if you want to operate a .trust website. The company owns the rights to sell dot-trusts, and uploaded the 124-page policy document [PDF] earlier this month. It provides a technical rundown covering network security to secure DNS settings, and NCC …
Kieren McCarthy, 22 Oct 2014
Parrot Ar.Drone

Spain clamps down on drones

Spain's Agencia Estatal de Seguridad Aérea (State Air Security Agency - AESA) has issued a declaration in which it reminds citizens that the commercial or professional use of "drones" is illegal, and that amateur UAV operation is restricted to "authorised areas". The document (PDF) stresses that "the use of remote control …
Lester Haines, 07 May 2014

Doubts cast over FBI 'leaky CAPTCHA' Silk Road rapture

Rather than a conspiracy involving NSA wiretaps, the FBI claims the downfall of Silk Road begun with a leaky CAPTCHA. Responding to a request for information from former kingpin Ross Ulbricht's defence lawyers, the Feds says the CAPTCHA left a trail from the TOR-protected Silk Road servers to the public Internet. That revealed …
Darren Pauli, 08 Sep 2014

Eurocops want to build remote car-stopper, shared sensor network

Civil liberties monitoring group Statewatch has uncovered a document sent from the General Secretariat of the European Council to the Standing Committee on operational cooperation on internal security that suggests European law enforcement agencies develop technology that would allow them to stop any car using wireless networks …
Simon Sharwood, 31 Jan 2014

Operators get the FEAR as Ofcom proposes 275% hike in mobile spectrum fees

Ofcom has “rethought” the fees that UK mobile networks pay for their 900MHz and 1800MHz spectrum, based on the industry's reaction to its latest proposal. Previously Ofcom decided to hike the annual fee that the networks pay for access to spectrum from £65m to £309m – a relative rise of 375 per cent. That’s now been modified to …
Simon Rockman, 01 Aug 2014
Aston Martin DB5

Vodafone: SPOOKS are plugged DIRECTLY into our network

Vodafone has published a report detailing how cops, g-men and spies around the world tap into its systems – in some cases, directly hooking into phone networks without a warrant. The dossier covers the 29 countries in which the mobile telco operates, including joint-ventures in Australia, Kenya and Fiji. The document [PDF] …
Simon Rockman, 06 Jun 2014
Violin

Violin: We know VDI scares you, biz boss... But what if it was cheap?

Flash array biz Violin Memory claims it has found the lowest cost virtual desktops in the industry in Atlantis Computing. It's partnering with Atlantis Computing to deliver its ILIO virtual desktop infrastructure (VDI) software running on Violin's flash arrays and says this provides the lowest total cost of ownership for virtual …
Chris Mellor, 19 Jul 2013
Abbott and Costello dressed as policemen

Kiwi cops forgot Kim Dotcom's visa

New Zealand's Organised and Financial Crime Agency New Zealand (OFCANZ) seems to have forgotten or ignored Kim Dotcom's Permanent Resident status when it asked local spooks to tap his phones, according to a document posted online detailing arguments in the case. The document (PDF) uses the same format as other New Zealand court …
Simon Sharwood, 26 Sep 2012

Ofcom launches idiot's guide to traffic-shaping

UK net regulator Ofcom has published an idiots' guide to traffic shaping to try to encourage people to see how wonderful it is ahead of the inevitable battle over net neutrality. Starting with a history of the internet, the document (PDF, as silly as it sounds) explains that in the early days there wasn't any congestion – …
Bill Ray, 04 Sep 2013

Reg probe bombshell: How we HACKED mobile voicemail without a PIN

Special report Voicemail inboxes on two UK mobile networks are wide open to being hacked. An investigation by The Register has found that even after Lord Leveson's press ethics inquiry, which delved into the practice of phone hacking, some telcos are not implementing even the most basic level of security. Your humble correspondent has just …
Simon Rockman, 24 Apr 2014

NSA coughs to 1000s of unlawful acts of snooping on US soil since 2008

The NSA violated privacy laws thousands of times in the last five years by spying on US citizens, an internal audit by the super-snoopers has disclosed. The Washington Post reports that the intelligence agency also overstepped its legal remit since Congress gave it broad powers in 2008. Most of the violations involved …
John Leyden, 16 Aug 2013
Mustang drag racer

Dell tanks up with hot Fluid Cache, drives databases twice as fast

Dell has extended its Compellent array's automated data tiering to place hot data in connected server's PCIe flash caches, nearly doubling database access speed, increasing user counts 6 X and lowering per user costs by 70 per cent. The news of the Fluid Cache for SAN product came at Dell's Enterprise Forum in Frankfurt. Marius …
Chris Mellor, 15 Apr 2014
The Register breaking news

Ofcom: When shall we squeeze Freeview's girth?

Ofcom wants to know when Freeview broadcasts should be kicked down the dial in favour of iPad-friendly 4G signals - and, controversially, whether the BBC should be recompensed when it happens. Ofcom mooted the idea of shuffling Freeview aside onto new frequencies back in 2011, and put it into last year's plan with a 2018 date. …
Bill Ray, 24 Apr 2013
The Register breaking news

iPhones, 'droids go to WAR: US soldiers invade TOP-SECRET cloud

Spooks and soldiers will get iPhones and Android kit after the top brass promised to open up its top-secret communication networks to handsets beyond BlackBerrys. A new US Department of Defense implementation plan - which covers the Army, Navy, Air Force, CIA and tech research group DARPA - will allow employees of all levels to …
Anna Leach, 27 Feb 2013

US military: 'Help us build the ROBO-WARFIGHTER OF THE FUTURE'

The US military has issued a formal solicitation for ideas about technologies that could help create a futuristic fighting suit for its special forces. TALOS-wearing US serviceman You can only hope that when this guy is suited up, he's on your side The United States Special Operations Command (USSOCOM), headquartered at …
Rik Myslewski, 06 Sep 2013
Counterstrike Global Offensive

Steam spawns vulnerabilities, say researchers

A new security research outfit called ReVuln has presented its letter of introduction to the world in the form of a paper that analyses how the Steam protocol can expose gamers to attacks. In this document (PDF), the company analyses what happens when a URL using the protocol steam:// is redirected. Of the major browsers, …
Students using MacBooks in a lecture hall

You're more likely to get a job if you study 'social' sciences, say fuzzy-studies profs

There's great news this week for young persons who'd like to get a good job one day but don't want to do much work at university. A report just out says that actually there's no need to get a tough degree in real science, maths, engineering, medicine, IT or similar - in fact, you don't want one of those. What you want, …
Lewis Page, 30 Oct 2013
A still showing the crashed Street View car in a rocky gorge

New Oz road rules forbid touching mobes

Motorists in Australia's most populous state, New South Wales, will not be permitted to even touch their mobile phones while their car engine is running, under new laws to take effect on November 1st. Outlined in this document (PDF), the new road rules state that “While a vehicle is moving or stationary (but not parked), a …
Simon Sharwood, 19 Oct 2012
The Register breaking news

Publishers, Apple bend over for EU eBooks probe

Four of the publishers in the Europe’s antitrust ebooks price-fixing probe, along with Apple, have offered to scrap their agency model in Europe and allow retailers to set any price they want for ebooks. The offer, if accepted, would hold good for two years. The parties have also offered to suspend "most favoured nation" clauses …
Andrew Orlowski, 19 Sep 2012
The Register breaking news

Brit cyberwarriors, your country needs you

The government is proactively addressing its failure to retain internet specialists to deal with cyber security threats, according to a document (PDF) presented to Parliament by Prime Minister David Cameron. Cameron presented the document to Parliament as the government's response to issues raised by the intelligence and …
The Register breaking news

Universal Credit? Universal DISCREDIT, more like, say insiders

Exclusive The controversial Universal Credit online benefits system is so flawed that skilled IT staff working on a pilot scheme have been forced to enter data by hand, two high-ranking whistleblowers have told The Register. The senior civil servants contacted us separately to warn that a trial of the new benefits system shows it is …
Jasper Hamill, 10 Jul 2013
The Register breaking news

EC data protection proposals could open up Zuck's 'social graph'

Draft proposals on the European Commission's "general data protection regulation" have been leaked online. The authenticity of the 116-page document (PDF) was corroborated by the EC, which The Register contacted on Wednesday afternoon. Version 56 of the draft proposal was issued by Brussels on 29 November this year, and …
Kelly Fiveash, 08 Dec 2011
The Register breaking news

ICO offers new code of practice

The Information Commissioner's Office has written a code of practice that offers organisations practical advice on sharing data. The document (PDF) looks at both regular data transfers and one-off events. It covers when data can be shared and how it should be protected. This version includes more case studies from both the …
John Oates, 11 May 2011
For Sale sign detail

NEC slashes 10,000 jobs – blames Thai floods, smartphone slump

NEC is set to slash 10,000 jobs including 3,000 unlucky employees from its workforce outside of Japan, after its revised forecast revealed the Japanese electronics giant would make a year end net loss of ¥100bn (£820m). The firm did not reveal exactly where in the business the jobs would go, and said the overseas cuts would be …
Phil Muncaster, 26 Jan 2012

Telstra’s filter supplier also blocks for Qatar, Yemen, UAE

Updated: Telstra Responds, stops collection Netsweeper, the Internet filtering supplier linked to Telstra’s voluntary filter trial is also a supplier to the Yemen, the UAE and Qatar. Telstra’s URL data collection for users of its 3G data services was originally noted in Australian broadband community site Whirlpool and followed up by the Australian Network Operators Group …

Why data storage technology is pretty much PERFECT

Feature Reliable data storage is central to IT and therefore to modern life. We take it for granted, but what lies beneath? Digital video guru and IT author John Watkinson gets into the details of how it works together and serves us today, as well as what might happen in the future. Brain cells at the ready? This is gonna hurt. Digital …
John Watkinson, 18 Jul 2013
hands waving dollar bills in the air

Chatter foreshadows major NetApp ONTAP refresh

Update NetApp is poised to announce a major release of its ONTAP software, if you believe the analyst buzz coming from the press, blogs and Twitter. ONTAP 8.1 was first publicly discussed back in late 2009 and it is widely thought that the integration of Spinnaker clustering and allied functionality into ONTAP is still a lengthy work …
Chris Mellor, 13 Jun 2011
The Register breaking news

FCC demands AT&T prove spectrum scarcity claims

The US regulator has asked AT&T to provide documented proof of the forthcoming spectrum crunch, given that shortage justifies provides much of the justification for its merger with T-Mobile. As part of its investigation into the proposed merger of AT&T and T-Mobile USA the FCC has requested "all plans, analyses, and reports" …
Bill Ray, 01 Jun 2011
The Register breaking news

Mobile scaremongers want warning stickers on EVERYTHING

Analysis Mobilewise - the tireless promoters of the dangers inherent in mobile telephony - has a new report blaming mobiles for everything from cancer to infertility, and it wants sticky warning labels to alert the world. Not that Mobilewise has any new research to report, or any specific claims to make, it's just bundled all the various …
Bill Ray, 10 Nov 2011
The Register breaking news

Feds use phony MySpace profiles to nab bad guys

Undercover US agents are infiltrating MySpace, Facebook, and other social networking sites with false online profiles in an attempt to nab users under investigation for breaking the law, a Justice Department document reveals. The revelation exposes the Kafkaesque double standard employed by federal prosecutors, who in 2008 …
Dan Goodin, 16 Mar 2010
The Register breaking news

Antitrust nemesis accuses Google of 'WMD program'

Foundem – the UK-based vertical search engine that sparked antitrust investigations into Google on both sides of the Atlantic – has accused the web giant of demoting vertical search competitors with the latest major update to its famous search algorithms, an update officially aimed at reducing "webspam". In a document (PDF) …
Cade Metz, 01 Sep 2011
graph up

Does FCoE really need TRILL?

Comment Does Fibre Channel over Ethernet (FCoE) require TRILL (Transparent Interconnection of Lots of Links)? Brocade and NetApp say or imply it does. A distinguished engineer from Cisco says it doesn't. The background to the issue is that FCoE is going to run over Ethernet networks and these run at layer 2 in the OSI 7-layer network …
Chris Mellor, 10 Aug 2010
The Register breaking news

Durban failed: Relax, everyone

Analysis The United Nations Organisation's COP17 climate conference has finished - and if you're a concerned energy user in IT manufacturing, an investor, or simply taxpayer, there shouldn't be anything the draft agreement to worry you. Not any more than you have to worry about already. The two-week long gathering of 15,000 was intended …
Andrew Orlowski, 12 Dec 2011
European Union Flag

Reading Reding: Pouring water on DP draft bill

It's been a busy few days for the future of data protection at a European level. However, the celebrations and commiserations are well and truly over for policy wonks, internet businesses and watchdogs who have all been eagerly poring over the Justice Commissioner's freshly-tabled draft Data Protection (DP) bill. Now the real …
Kelly Fiveash, 01 Feb 2012

Euro guidelines will allow Bluetooth spam

The Mobile Marketing Association has published its guidelines for advertising pushed over Bluetooth connections, and considers anyone who hasn't opted out to be fair game for spammers. The guidelines are now available for public review until 26 September, and take a distinct step beyond the UK's Direct Marketing Association (DMA …
Bill Ray, 27 Aug 2008
globalisation

Ofcom's radio carve-up could cut out mesh

Ofcom has published the first of its consultation documents looking at how Spectrum Usage Rights (SURs) are going to work in the real world, and the future looks bad for mesh networks with their lack of centralised control. The document is a follow-up to the Ofcom statement on SURs, published last December, and represents a …
Bill Ray, 09 Jan 2008
arrow pointing up

Ballmer backs away from 'Vista Capable' legal row

Steve Ballmer has distanced himself from the ongoing “Vista Capable” legal spat by claiming he had no direct involvement in Microsoft’s marketing campaign for the operating system. In a document (pdf courtesy of SeattlePI) filed last Friday, the software giant’s CEO effectively exonerated himself in the Windows Vista Capable …
Kelly Fiveash, 06 Oct 2008
The Register breaking news

Orange predicts death of bosses and birth of P2P offices

Orange has been studying how we'll be working over the next decade or two, and apparently we'll be dumping the CEO but not all working from home. The analysis - entitled Connected Britain - is more downbeat than previous efforts, no doubt reflecting a slightly-less-optimistic economy. But the document (pdf) is much more than …
Bill Ray, 02 Sep 2009
The Register breaking news

DARPA to build nothingness detector for tunnel sniffing

Renowned US military tech bureau DARPA has issued a request for an ultrasensitive gravity-measuring instrument which could be mounted in a low flying aircraft and detect underground tunnels. The project, known as Gravity Anomaly for Tunnel Exposure (GATE), was formally announced on Friday. In essence, it will detect an absence …
Lewis Page, 16 Mar 2009
Flag United States

US Air Force: Looking for a few good cyber warriors

Uncle Sam wants you ... to become a cyberspace warrior. In a document released this week, the US Air Force is laying out plans for a new cyber command, which is scheduled to become operational in October. It tries to make the case that the ability to wage war and parry attacks over electronic networks is crucial to maintaining …
Dan Goodin, 05 Mar 2008
The Register breaking news

ICO to focus on reducing risk, not enforcement

The Information Commissioner's Office (ICO) has said that its aim is to protect people from the risks associated with abuses of their personal data rather than strictly enforce the law. It has announced its broad aims in a new strategy document (pdf). The document will guide its activities overall, prioritising the use of its …
OUT-LAW.COM, 19 Mar 2008