SUMMARY / RELATED TOPICS

Trusted Computing

Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term has a specialized meaning. With Trusted Computing, the computer will behave in expected ways, those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key inaccessible to the rest of the system. TC is controversial as the hardware is not only secured for its owner, but secured against its owner; such controversy has led opponents of trusted computing, such as free software activist Richard Stallman, to refer to it instead as treacherous computing to the point where some scholarly articles have begun to place scare quotes around "trusted computing". Trusted Computing proponents such as International Data Corporation, the Enterprise Strategy Group and Endpoint Technologies Associates claim the technology will make computers safer, less prone to viruses and malware, thus more reliable from an end-user perspective.

They claim that Trusted Computing will allow computers and servers to offer improved computer security over that, available. Opponents claim this technology will be used to enforce digital rights management policies and not to increase computer security. Chip manufacturers Intel and AMD, hardware manufacturers such as HP and Dell, operating system providers such as Microsoft include Trusted Computing in their products if enabled; the U. S. Army requires; as of July 3, 2007, so does the entire United States Department of Defense. Trusted Computing encompasses six key technology concepts, of which all are required for a Trusted system, that is, a system compliant to the TCG specifications: Endorsement key Secure input and output Memory curtaining / protected execution Sealed storage Remote attestation Trusted Third Party The endorsement key is a 2048-bit RSA public and private key pair, created randomly on the chip at manufacture time and cannot be changed; the private key never leaves the chip, while the public key is used for attestation and for encryption of sensitive data sent to the chip, as occurs during the TPM_TakeOwnership command.

This key is used to allow the execution of secure transactions: every Trusted Platform Module is required to be able to sign a random number, using a particular protocol created by the Trusted Computing Group in order to ensure its compliance of the TCG standard and to prove its identity. The TPM should be designed to make the extraction of this key by hardware analysis hard, but tamper resistance is not a strong requirement. Memory curtaining extends common memory protection techniques to provide full isolation of sensitive areas of memory—for example, locations containing cryptographic keys; the operating system does not have full access to curtained memory. The exact implementation details are vendor specific. Sealed storage protects private information by binding it to platform configuration information including the software and hardware being used; this means the data can be released only to a particular combination of hardware. Sealed storage can be used for DRM enforcing. For example, users who keep a song on their computer that has not been licensed to be listened will not be able to play it.

A user can locate the song, listen to it, send it to someone else, play it in the software of their choice, or back it up. Alternatively, the user may use software to modify the operating system's DRM routines to have it leak the song data once, say, a temporary license was acquired. Using sealed storage, the song is securely encrypted using a key bound to the trusted platform module so that only the unmodified and untampered music player on his or her computer can play it. In this DRM architecture, this might prevent people from listening to the song after buying a new computer, or upgrading parts of their current one, except after explicit permission of the vendor of the song. Remote attestation allows changes to the user's computer to be detected by authorized parties. For example, software companies can identify unauthorized changes to software, including users tampering with their software to circumvent technological protection measures, it works by having the hardware generate a certificate stating what software is running.

The computer can present this certificate to a remote party to show that unaltered software is executing. Remote attestation is combined with public-key encryption so that the information sent can only be read by the programs that presented and requested the attestation, not by an eavesdropper. To take the song example again, the user's music player software could send the song to other machines, but only if they could attest that they were running a secure copy of the music player software. Combined with the other technologies, this provides a more secured path for the music: secure I/O prevents the user from recording it as it is transmitted to the audio subsystem, memory locking prevents it from being dumped to regular disk files as it is being worked on, sealed storage curtails unauthorized access to it when saved to the hard drive, remote attestation protects it from unauthorized software when it is used on other computers. Sending remote attestation data to a truste

S.C.I.F.I. World

S. C. I. F. I. World was a daytime programming schedule for the Sci Fi Channel that started on July 17, 2000 and ended on December 21, 2001, it was. Divided into five different segments in accordance with the days of the week, each day centred on a particular science fiction theme, which the marathons followed, airing from 10 AM to 4 PM; these themes were named in such a way that, when assembled, they formed an acronym of the channel's name. Superhero Land, which, on Mondays focused on superheroes featuring marathons of such shows as Batman, The Bionic Woman, Wonder Woman, The Incredible Hulk; the first marathon aired. Creature Land, which, on Tuesdays focused on monsters, nonhumanoid or otherwise, that included marathons of such shows as Land of the Giants, Hercules: The Legendary Journeys, Earth 2, SeaQuest DSV; the first marathon aired. Intergalactic Land, which centred attention towards space-driven shows as Space: Above and Beyond, Star Trek, Lost in Space; the first marathon aired. These shows were seen on Wednesdays.

Fantastic Land, which deviated from the usual science-fiction focus unto more fantasy-based shows like Night Gallery and Darkroom. The first marathon aired; these shows could be seen on Thursdays. Inhuman Land, akin to Creatureland's theme, every Friday focused on monsters but more along the lines of a conspiratorial scope and concerned the humanoid kind as was depicted in an animation of Carl Kolchak trying to evade a werewolf in the shadowy alleys of Inhumanland. Shows aired included Dark Skies, Alien Nation, Something is Out There; the first marathon aired. To reinforce this novelty, the programming schedule was advertised by way of animations depicting it as a theme-park which various science-fiction characters such as James T. Kirk, Duncan MacLeod, RoboCop inhabited. Aside from this, graphic teasers, on-air questions were aired to amuse and inform the viewer and promote the SciFi.com website. Despite criticisms made by viewers in favour of reverting to a more varied programming schedule, this format of airing marathons five times a week continues to this day although, since S.

C. I. F. I. World has ceased to be. Cartoon Quest The Animation Station Sci-Fi Channel Cancels Daily Star Trek Showings

Mark Holub

Mark Holub is an American drummer and composer, born in New Jersey, lived for many years in London, UK and is now based in Vienna, Austria. He is most well known as the bandleader for Led Bib, award-winning and Mercury Prize nominated jazz/rock quintet, he plays with other bands including Blueblut, a trio with Pamelia Kurstin - theremin and Chris Janka - guitar,'The Quartet' with Wang Chung front man Jack Hues, he plays free improv with various collections of players including a number of releases in duo with sax player Colin Webster. He released the sixth and seventh albums by Led Bib on Cuneiform Records, The People in Your Neighbourhood and The Good Egg. In June 2015, Holub collaborated with modular synthesist James guitarist Marcus Hamblett; the project was recorded at Maida Vale Studios for BBC Radio 3's Late Junction. Official page on Tumblr