Skip navigation

Monthly Archives: January 2014

DLNA is an industry-wide standard for sharing data over a home network. Stream films from your laptop to your TV, for example, play an MP3 track from your mobile on your hi-fi system or print a photo from your tablet on your home printer. 

If you have a router in your home then you have a network and can use DLNA products on it, and if you have wi-fi then you can do it all wirelessly too.

You can find the best products with DLNA features by reading our Which? reviews of TVslaptopstablets,camerasdigital radiosprinters and mobile phones.

DLNA stands for ‘Digital Living Network Alliance’ – a group of organisations, including many consumer electronic manufacturers, that has created the standard enabling all DLNA devices to share media over a home network. The alliance was established in 2003 and now has around 250 members all working towards the goal of seamless interoperability of products.

Advertisements

NSA leak alleges that the US intelligence agency worked with its counterpart in Canada (CSEC) to test a system that tracked travelers who passed through one of Canada’s “major” airports, CBC News reports.Information presented to the news agency shows that visitors who logged into the free WiFi service provided at an undisclosed Canadian airport could be tracked “for days” after they moved on. CBC News reports that the CSEC/NSA could pick up travelers when their devices were logged into other WiFi networks across Canada and at US airports.

The U.S. uses its digital surveillance capabilities to commit industrial espionage, Edward Snowden has claimed in an interview with German network NDR. The NSA whistleblower suggested German industrial giant Siemens was a target, with information being taken by the intelligence agency even when it had nothing to do with national security. When the agency was previously shown to have spied on Brazil’s Petrobras, U.S. Director of National Intelligence James Clapper insisted it never used that information to give U.S. firms an unfair advantage. Australia’s intelligence agency, an NSA partner, has reportedly spied on Japanese firms for the benefit of Australian companies, and France is generally seen as a world leader in that regard.

Your home computer is the perfect machine. It’s customized to your exact needs, runs all your must-have apps, and holds every important file you’d ever need to access. The catch: It’s not exactly practical to lug a computer with you everywhere you go. That’s where remote access comes in. Here are three dead-simple ways to control your home computer from anywhere—your laptop, phone, or even a friend’s computer—as though you were sitting directly in front of it.

The latest surgeon general’s reporton the health effects of smoking — issued at the 50th anniversary of the pathbreaking 1964 report — offers astonishing new evidence of just how much harm tobacco is causing. Despite the many gains in reducing risks over the past half-century, researchers keep finding new and insidious ways in which smoking is harming the smokers themselves and nonsmokers who breathe in toxic fumes.The report, issued last Friday, finds that cigarette smoking kills even more Americans than previously estimated (about 480,000 a year, up from 443,000), and is a cause, though not necessarily the major cause, of even more diseases than previously recognized, including liver and colorectal cancers. These add to the long list of other cancers caused by smoking, as well as rheumatoid arthritis and other ailments. The report newly identifies exposure to secondhand smoke as a cause of strokes.The report estimates that smoking costs the United States between $289 billion and $333 billion a year for medical care and lost productivity, well above the previous estimate of $193 billion.Most shocking, the report finds that today’s smokers have a much higher risk for lung cancer and chronic obstructive pulmonary disease than smokers in 1964, despite smoking fewer cigarettes.It reports that the risk of developing adenocarcinoma of the lung, the most common type of lung cancer, has increased substantially over the past several decades because of changes in the design and composition of cigarettes. These include ventilated filters that lead to more puffing of noxious materials and blended tobaccos that contain carcinogenic nitrosamines.There is no doubt who is to blame for this mess, the report says. It is the tobacco industry, which “aggressively markets and promotes lethal and addictive products,” continues to recruit youth and young adults as new customers, and has “deliberately misled the public on the risks of smoking cigarettes.”

Google’s come a long way from web search and email, but every now and again the company still manages to announce a product or service that will take us totally by surprise. The company last night announced that its latest endeavor is a smart contact lens aimed at those suffering with diabetes. This contact lens will help diabetes patients by removing the need to constantly check blood sugar via a prick of the finger. Google hopes to use miniature chips and an antenna thinner than human hair to measure tear glucose. 

As simple as a Brita pitcher is to use for filtering water, who has time to wait for gravity to do its work when you’re not at home? With a little downward force on your end, the Grayl cup will purify 16 ounces of water in just 15 seconds, making it better-tasting and safer to drink. It’s basically a french press that cleans your water, instead of turning it into brown sludge.

Using the Grayl is as simple as filling the outer container with water, and then slowly inserting the inner chamber which pushes the water through replaceable filters as it slides down. The $20 everyday filter is good for about three months or 300 uses and removes 99.99 percent of bacteria. But if you’re planning to fill up somewhere a little more risky, a $40 purifier is also available that removes 99.999 percent of bacteria, protozoa, and viruses.

As two-dimensional graphene has become one of the most lusted-after materials in science, many have wondered if there might be a 3D counterpart that we could actually build things with. A team of scientists at the Berkeley Lab just offered an affirmative answer. Well, almost.

A team lead by Oxford’s Yulin Chen just confirmed that a sodium-bismuth compound, Na3Bi, holds many of the same properties of graphene with the luxury of being thicker. This three-dimensional quantum matter was tested at Berkeley Lab’s Advanced Light Source and was shown to conduct electricity as well if not better than graphene. On top of that, the scientists also believe that it will work as a topological insulator, a material that’s conductive on the surface but insulates in bulk.

The Volatility memory forensics project has developed plugins that can automatically find instances of Truecrypt within RAM dumps and extract the associated keys and parameters. Previous research in this area has focused specifically on AES keys and led to the development of tools such as aeskeyfind. The Volatility plugin takes a different approach by finding and analyzing the same data structures in memory that Truecrypt uses to manage encryption and decryption of data that is being read from and written to disk. With the creation of these plugins a wide range of investigators can now decrypt Truecrypt volumes regardless of the algorithm used (AES, Seperent, combinations of algos, etc.). Users of Truecrypt should be extra careful of physical security of their systems to prevent investigators from gaining access to the contents of physical memory.

On Tuesday afternoon, the New York Timesreported that the National Security Agency has placed malware on nearly 100,000 computers around the world for offensive and defensive purposes.Based on information found in NSA documents and gathered from “computer experts and American officials,” the Times confirmed information that came to light towards the end of December regarding several of the technologies that were available to the NSA as of 2008. The NSA’s arsenal, the Times wrote, includes technology that, “relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.”