Archive for September, 2009

With a transmitting satellite located at 22,000 miles above the earth in a Geostationary Earth Orbit, a Direct-to-Home Satellite all digital TV offers many advantages as compared to the conventional terrestrial Cable TV. The first one being its large earth coverage, the whole continental US can be served easily and installed quickly at relatively lower costs. The second advantage, it provides more all digital High Definition TV channels, 130 plus channels as compared to only 60 terrestrial cable TV channels, which may not all in High Definition format.

Third advantage point, Direct-to-Home Satellite TV as provided by the DIRECTV Satellite TV gives the customers more TV Programs than programs provided by its terrestrial cable TV competitors.

The forth advantage point is when a customer is moving his/her home from one state to another state, then the same DIRECT TV Satellite TV operator is available in view of its large coverage area. There will be no need to change to another TV Operator as may be the case of a terrestrial Cable TV operator.

Information on the Direct-to-Home Satellite TV provided by DIRECTV Satellite TV is available for the following States:

Many customers had chosen the Direct TV Satellite TV operator as their Direct-to-Home Satellite TV provider for many years because of their proven good and reliable operation, quick and prompt response to any complain that they may have. Others may had tried different Home TV providers, but at the end they finally decided that their best choice is the Direct-to-Home Satellite TV as provided by the DIRECTV Satellite TV operator.

In addition, Direct TV Satellite TV operator offers a 5 months free for its Premier Package of 265+ Channels Free, including 31 Premium movie channels.

Advertisements

Wi-Fi just got a little less secure – though not by as much as some headlines might lead you to believe.

Two computer scientists in Japan say they’ve figured out a way to crack the WPA (Wi-Fi Protected Access) encryption system in wireless routers in under a minute.

Details are scarce, but the attack, developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, builds off a theoretical attack against WPA revealed in November 2008.

That attack turned out to be … well, not as huge a deal as it may have sounded. Ars Technica has a good explanation here, but in essence the attack was of limited use and didn’t crack the Temporal Key Integrity Protocol (TKIP), which means it didn’t allow the hacker to recover the keys used to encrypt the keystream. So while the attack could be used for something like DNS poisoning or spoofing, it didn’t let hackers take over a router or intercept the traffic running through it.

The November 2008 attack also took about 15 minutes. The new hack claims to be a more practical approach that shortens the attack to less than one minute by adding a physical element – namely, a relay between the client and the AP. Otherwise, it’s essentially the same hack, but faster.

Should you worry? Not as far as I can tell. Sysadmins can render both attacks useless by either using really long network keys or by simply upgrading their router encryption – if they haven’t already – from WPA (which uses TKIP) to WPA2 (which supports AES-CCMP).

Not that people aren’t working on theoretical attacks on AES. We’ve seen several papers already this year proposing theoretical AES attacks. But switching to AES should keep your Wi-Fi network safe. For now. (source: telecomasia.net)