Sunday, March 30, 2014

Ping trace: Flight MH 370 never turned westward

Ping and radar data are not consistent. That means radar data are fake or ping data are fake. Or both. In that case airplane had fuel for more than thousand km south more. That was the first location searched. But if found nothing than even less will be found these days.

Therefore, the logical stream of events would assume that at IGARI point , they both agreed to disable the transponders, ADB, and ACARS to data mask (other than the black box) their unapproved higher 43 000 feet flight level. This is the only logical way you get the ACARS not being damaged, but turned off without damaging the FMC and keeping engine management going.

99% BAD HARDWARE WEEK: Then at 43 000 feet operating ceiling explosive decompression happened. Airplane turned back south and continued. That is a clear sign of problem on board.  The plunged to 12 000 feet to get some oxygen.  But why they didn't switch ON radio and immediately declared EMERGENCY landing ? Well, after decompression  all comms were possible damaged, except satellite pings. The airplane went south with all dead on airplane. That's all we will ever know. Except that Malaysia airlines intentioanally killed the people looking for fuel profits. Or one engine failed and decompression after that engine stroke and the airplane turned right.

Friday, March 28, 2014

What was carefully censored in articles on flight MH 370

The test plane had been flying north of Seattle at 43,000 feet—the upper limit of its flight envelope—when it suffered a rapid decompression. The pilot had to make an extremely fast dive to get down to 10,000 feet, where the pressure of air in the cabin begins to become equalized with the pressure outside. Deprived of oxygen by the decompression, the flight test crew had to grab for oxygen masks. Four were not able to do so in time and were rushed to hospital for hyperbaric chamber treatment—as are divers who suffer the “bends” for decompression sickness.
The cause of both failures was traced to air conditioning packs in the belly of the 777. Hot compressed air “bled” from the engines goes through these packs to cool it before it flows on into the cabin. A relatively simple valve in the packs, supposed to stop leaks, had broken open and released pressurized air from the cabin into the outer atmosphere in an explosive surge.
99% BAD HARDWARE WEEK: Boeing 777 is tween engine that fly over wast ocean ! Maleysian 777 hit too upper flight limit of 43 000 feet and had fast dive to 12 000 feet. That means only one: EXPLOSIVE decompression that already happened !

Wednesday, March 26, 2014

US national security based on help of russian rockets !

Recent tensions over Russia's move to annex Crimea have prompted some to question the reliability of U.S. access to the Russian-made RD-180 engine, which is used to power one of two rockets that loft national security payloads into orbit. 
The RD-180 sourcing plan was established over years of regulatory review once Lockheed Martin, which developed the Atlas V in the late 1990s, selected the engine as its propulsion system.
99% BAD HARDWARE WEEK: The US President is right. Russians are only regional force ! Though SPACE FORCE :)

Monday, March 24, 2014

Fire have crashed Boeing flight MH 370 !

 Fire on pilot's oxygen mask ! In pilot cabin ! That is why the pilot turned back sharply toward the Langkawi airport for emergency landing. AND WHY airplane communications went down. ANd why someone reprogrammed flight to run airplane without anyone in cabin. And why it went from 35 000 down to 12 000 feet. An why nobody was saved from explosive decompression !
Examination of the aircraft determined that the cockpit was extensively damaged, and two holes were burned through the aircraft external skin just below the First Officer’s window. In addition, smoke damage occurred throughout the aircraft, and heat damage was found on overhead structures well aft of the cockpit. 

99% BAD HARDWARE WEEK: The same case as in Cairo cabin fire on the same 777 model.
 This horror never happened in human history and victims deserve this shocking EXPLANATION.
 Not to be repeated ever again!

Boeing is working (since October 2012) to finalize a Service Bulletin that is designed to inspect for and eliminate potential electrical faults around the crew oxygen system lines and hoses.

Alas, seems too late for flight MH 370. 
In addition, raw data from another radar site indicated that the 777 may have climbed to an altitude above the airplane's certified ceiling and then quickly descended and climbed again. And now the most recent assertion has the airplane descending to 12,000 feet. If in fact the airplane descended to 12,000 feet, its fuel consumption would have been almost double that at the higher altitudes. In that regard, how did the airplane fly so far south into the Indian Ocean, as has now been announced emphatically by the Malaysian Prime Minister?As you can see above wreckage simply can't be at south where the search is because airplane simply hadn't enough fuel to reach there. Beside the fact that IT WAS INVINCIBLE FOR INDIONESIA MILITARY RADARS. And why should anyone including hijacker, drive the airplane so long to nowhere ? Relatives have right to know. They have right to know about possible fatal fire in airplane cargo department because flight 370 carried Li Ion  batteries, kind of transport that is forbidden in the US since 2004. That batteries can cause fire not to be extinquished with  current  airplane halon systems but only with anti flame boxes !! That is why we possibly will never find the wreckage.

Sunday, March 23, 2014

Why should EUV and 450mm wafers start together ?

99% BAD HARDWARE WEEK: Huge introduction costs that only mass production can justify.

SPYegel: NSA Stole Huawei's Source Code

According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies.
“Many of our targets communicate over Huawei-produced products,’’ the NSA document said. “We want to make sure that we know how to exploit these products,” it added, togain access to networks of interest” around the world.
The agency pried its way into the servers in Huawei’s sealed headquarters in Shenzhen, China’s industrial heart, according to NSA documents provided by former contractor Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect one-third of the world’s population .
One of the goals of the operation, code-named “Shotgiant,” was to find any links between Huawai and the People’s Liberation Army, one 2010 document made clear. But the plans went further: to exploit Huawai’s technology so that when the company sells equipment to other countries — including both allies and nations that avoid buying US products — the NSA can roam their computer and phone networks to conduct surveillance and, if ordered by the president, offensive cyberoperations.
99% BAD HARDWARE WEEK: What to do with Huawei's telecom backbone control code ? He, he, to identyfy their weaks and SIGINT holes. Huawei is this year one of the world's 5 top telecom equipment manufacturers.

Friday, March 21, 2014

NSA’s Secret Efforts to Hunt and Hack System Administrators

The agency NSA tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.
An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.
Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.
Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.


Thursday, March 20, 2014

BEOL scaling is the foremost issue for 10nm/7nm nodes

99% BAD HARDWARE WEEK: As you can se at 16nm there is no rise in interconnect RC time delay but no drop in transistor delay too. And delay is BEOL dominant since 180nm. At 7nm difference should be close to 100 000 times. Say in  year 2019.

Intel to announce 14nm Broadwell processor on June 3rd !

99% BAD HARDWARE WEEK: With integrated Iris graphics core. Moore's Law  will live ! Hmmm, NO. Moore's law  ended with 28 nm bulk, just as BAD HARDWARE WEEK announced. 
It will live in 14nm SOI, but it is not Intel's manufactuirng process. So Intel will offer better performance/power parameter BUT AT THE SAME PRICE AS 22 nm process. YOu will never get from Intel any cheaper processor than it is currently !! AMD will answer with GPU in 20nm SOI.
And 14nm node only for low power low leakage devices.

Wednesday, March 19, 2014

Operation Windigo: 500 000 web suckers each day !

This malware is a clever OpenSSH backdoor and credential stealer
99% BAD HARDWARE WEEK: Web , as you know, is a place where each day a new sucker is born.

Apple's iOS 7 random number generator DETERMINISTIC and trivial to brake

Mandt says the early_random() PRNG (pseudo-random number generator), shipped in the latest iOS 7 update, is “alarmingly weak”. According to ThreatPost, he told the conference the PRNG is “deterministic and trivial to brute force”.

Monday, March 17, 2014

NSA easily hacked all your data ever have been transferred at long distance.

99% BAD HARDWARE WEEK: Well, well, naive we. :) Thus, if you can't remember some phone call detail a month ago , check at NSA, please. :)

Saturday, March 15, 2014

CERN on petabyte errors

All of these errors will corrupt user data. When they checked 8.7 TB of user data for corruption – 33,700 files – they found 22 corrupted files, or 1 in every 1500 files.

Honda recalls Odyssey 2010 !

900,000 vans may face fire risk
99% BAD HARDWARE WEEK: I didn't imagine Space Odyssey 2010 that way. No HAL, no plot. Though fire itself is enough dramatic :)

Google's watch 512MB DRAM, 4GB storage + 128 GB optional

Well, seems that mine previous PC with 512 MB DRAM and 128 GB HD wasn't any faster, thought many times bigger ?

Thursday, March 13, 2014

Mark Zuckerberg calls Obama to complain about NSA

The US government should be the champion for the internet, not a threat. They need to be much more transparent about what they're doing, or otherwise people will believe the worst.
"I've been so confused and frustrated by the repeated reports of the behavior of the US government," he said. "When our engineers work tirelessly to improve security, we imagine we're protecting you against criminals, not our own government." 
99% BAD HARDWARE WEEK: We still don't know did Obama his call LIKED or DISLIKED on Zuckerberg's FB status ! :) 
Ooooooops. Facebook to Begin Posting 15-Second Video Ads 
"This is very positive for the stock"

Wednesday, March 12, 2014

25 things you probably didn’t know about the Web

  1.  Berners-Lee is the son of British mathematicians and computer scientists Mary Lee Woods and Conway Berners-Lee, who worked on the first commercially-built electronic computer, the Ferranti Mark 1.
  2. In college, Berners-Lee built a computer out of an old television set.
  3. The Web was not Berners-Lee’s first design for a system to link information.  In 1980 he wrote ENQUIRE, whose name came from a Victorian era how-to book called “Enquire Within Upon Everything” owned by Berners-Lee’s parents while he was growing up.  The ENQUIRE code has been lost to history.
  4. Before settling on “the Web,” Berners-Lee thought of the names “Information Mesh”, “The Information Mine”, and “Mine of Information”.
  5. The Web was first described in a March 1989 proposal from Berners-Lee while at CERN. In it he wrote, “In providing a system for manipulating this sort of information, the hope would be to allow a pool of information to develop which could grow and evolve with the organisation and the projects it describes. For this to be possible, the method of storage must not place its own restraints on the information. This is why a “web” of notes with links (like references) between them is far more useful than a fixed hierarchical system.” For even more about the people who inspired and built the Web, see Berners-Lee’s 2004 presentation How it all Started.
  6. Mike Sendall, Berners-Lee’s manager at the time, commented on the original proposal “Vague, but exciting.” Fortunately, Sendall thought enough of the proposal to allow Berners-Lee to work on it on the side.
  7. In 1990, Berners-Lee wrote the first browser and editor, called “,”  which ran on a NeXT computer. Steve Jobs had left Apple to create NeXT Inc., and later returned to Apple.
  8., which took 2 months to write, was also an editor, so the earliest vision of the Web was one where anyone could contribute.
  9. The first Web site was, hosted by CERN, on Tim’s desktop computer.
  10. The early Web pages from 1992 were preserved by Berners-Lee and W3C, but CERN did not serve them at theoriginal address until in April 2013.
  11. A few simple ideas have played a key role in making the Web a success:
    • it is universal: it can be made to work with any form of data, on any device, with any software, in any language. You can link to any piece of information
    • it is decentralized: anybody can create a site. This enabled the Web to grow quickly.
    • the core technology is royalty-free: because people can implement Web technology royalty-free, this spurs innovation.
    • it is the result of global collaboration.
  12. The Web is not the same thing as the Internet. The Internet protocols describe how to send packets of information between pieces of software. The first Internet protocols were defined in 1969. Since then, many applications have used them in different ways, including Email, FTP, and the Web. The Web is any information that is identified with a URL (Universal Resource Locator). That makes the URL the most fundamental piece of Web technology.
  13. The double slash “//” in URLs was an idea Berners-Lee copied from the Apollo workstation’s ‘domain’ file system. Microsoft later adopted double backslash ‘\\’ under the same influence.
  14. Although many Web site addresses start with “www” there is no requirement they begin this way; it was just an early convention to help people recognize that someone was running a Web server.
  15. The WorldWideWeb browser was made available on on the public Internet by FTP, and promoted on network news messages in August 1991. Other browsers soon followed, including ViolaWWW, Midas, Erwise, and Samba. Mosaic, which later became Netscape, was released in 1993. You can experience the early ‘line mode’ browser that was released in 1992 with a line mode browser emulator made available in 2013.
  16. On 30 April 1993, CERN put WorldWideWeb in the public domain, a critical milestone in enabling broad adoption of the Web.
  17. In October 1994, Berners-Lee launched the World Wide Web Consortium (W3C) to develop common standards for core Web technology. The goal of the organization is to ensure the Web is available to all, and not fragmented into proprietary silos. Today four neutral academic organizations host the activities of the Consortium: MIT, ERCIM, Keio University, and Beihang University.
  18. In 2004, W3C adopted an industry-leading Royalty-Free patent policy to further Berners-Lee’s vision of the Web as an open platform for innovation.
  19. Berners-Lee was knighted by Queen Elizabeth II in 2004. While some call him “Sir Tim”, he most often goes by “timbl”.
  20. In 2008, Berners-Lee launched the World Web Foundation.  Its mission? To establish the open Web as a global public good and a basic right, ensuring that everyone can access and use it freely.
  21. Today it is estimated that just under 40% of the world’s population has Internet access. On average, a fixed broadband connection costs over a third of income in the developing world. (Source: ITU)
  22. The languages most used in online communications are, in order: English, Chinese, Spanish, Japanese, and Portuguese.
  23. Estimates of the number of Web pages vary greatly, but it is surely in the tens of billions. Many estimates depend on what search engines access, but it is expected that many times more public pages exist that are not indexed by search engines.
  24. Internet live stats estimates that the number of Web sites will reach 1 billion by the end of 2014, this anniversary year. 

 99% BAD HARDWARE WEEK: 75% of those are now empty.  The first funding for Google was an August 1998 contribution of US$100,000 from Andy Bechtolsheim

1998, when Google was born NSA's Expresses Desire to "Live on the Network"


Tuesday, March 11, 2014

AMD Could Still Double in 2014, at Intel’s Expense

Nine Stocks That Could Double in 2014.
99% BAD HARDWARE WEEK: Well, hmmm, lets wait and see.

Monday, March 10, 2014

American NSA Stal(lio)n : Hurray, no more leaks !

Russian Stalin: No rogue men, no more problems !
American Stallion : No leaks, no more rogue men !

Intelligence officials have long wanted a computerized system that could continuously monitor employees, in part to prevent cases similar to former National Security Agency analyst Edward Snowden.
99% BAD HARDWARE WEEK: Thanks to high tech, there is a now so big difference between Russia and the USA :) It took 10 long years for this super quiet BREAKTHROUGH ! No more moral mixed with duty.

Saturday, March 08, 2014

Mea Culpa: NSA the Confessor

 An NSA official, writing under the pen name “Zelda,” has actually served at the agency as a Dear Abby for spies. Her “Ask Zelda!” columns, distributed on the agency’s intranet and accessible only to those with the proper security clearance, are among the documents leaked by NSA whistleblower Edward Snowden. 
99% BAD HARDWARE WEEK: Well, this is too much. I would like Snowden's style escape to some more open place. As KaPutin's Russia now is. :) RSA was even payed by NSA (see below) for its confessions !

Thursday, March 06, 2014

Intel Designs a Safe Meeting Place for Private Data

Its researchers are testing a super-secure data locker where a company could combine its sensitive data with that from another party without either side risking that raw information being seen or stolen.
 99% BAD HARDWARE WEEK: Any super-secure system is secure only as much as its weakest part it is. In this case, famous random number generator STANDARD inside and recently acquired McAfee antivirus software attached :)

Sunday, March 02, 2014

Smile, you are on FAcebook web camera

And NSA !
99% BAD HARDWARE WEEK: But, after NSA breaking webcam at Yahoo not any more. !

This page is powered by Blogger. Isn't yours?