1

Fujitsu General Mini-Split Systems Qualify for Energy Star 2019 Most Efficient Listing

Many of Fujitsu General America’s Halcyon mini-split system products now qualify for Energy Star Most Efficient certification.




1

Letters From Our Readers: December 2, 2019

I’ve heard a lot about power bills, even with new a/c units. New units show increased savings, but it’s nothing like the mini splits of today.




1

Project Files: Episode 61 — All-Electric, Zero-Carbon Michigan Home

This Michigan home is proof that even when achieving high-level green building standards, more can be done to improve sustainability.




1

10 Things to Know Before Your First Mini-Split Call

The first time a technician has to tackle a ductless mini-split can be nerve-racking, but by following these 10 tips, the job can be done without all the anxiety.




1

Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

Posted by Xen . org security team on Nov 12

Xen Security Advisory CVE-2024-45819 / XSA-464
version 2

libxl leaks data to PVH guests via ACPI tables

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

PVH guests have their ACPI tables constructed by the toolstack. The
construction involves building the tables in local memory, which are
then copied into guest memory. While actually used...




1

Xen Security Advisory 463 v2 (CVE-2024-45818) - Deadlock in x86 HVM standard VGA handling

Posted by Xen . org security team on Nov 12

Xen Security Advisory CVE-2024-45818 / XSA-463
version 2

Deadlock in x86 HVM standard VGA handling

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

The hypervisor contains code to accelerate VGA memory accesses for HVM
guests, when the (virtual) VGA is in "standard" mode. Locking involved
there has an unusual discipline, leaving...




1

Re: Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

Posted by Andrew Cooper on Nov 12

Data are leaked into the PVShim guest, but it is the shim Xen
(exclusively) which has access to the ACPI tables.

The guest which has been shim'd can't architecturally access the leaked
data.

~Andrew




1

Re: Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

Posted by Demi Marie Obenour on Nov 12

Is this unconditional (perhaps because the relevant data gets zeroed out
by the shim), or does it only apply when the PV guest can't extract data
from the shim's memory? For instance, 32-bit PV guests aren't security
supported anymore, but the PV shim isn't supposed to rely on the
security of the shim itself, only of the rest of the system.




1

CVE-2024-52533: Buffer overflow in socks proxy code in glib < 2.82.1

Posted by Alan Coopersmith on Nov 12

Another CVE was issued by Mitre yesterday for another bug listed on
https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home

https://gitlab.gnome.org/GNOME/glib/-/issues/3461 reports that:
"set_connect_msg() receives a buffer of size SOCKS4_CONN_MSG_LEN but it writes
up to SOCKS4_CONN_MSG_LEN + 1 bytes to it. This is because SOCKS4_CONN_MSG_LEN
doesn't account for the trailing nul character that set_connect_msg() appends...




1

2019 Dealer Design Awards: Commercial Controls

Intuitive usability helped the CS7500 win a Gold award in The NEWS’ 2019 Dealer Design Awards in the realm of Commercial Controls.




1

Residential Cooling Showcase 2016: Systems Designed to Keep Customers Cool

Every year, The NEWS introduces the latest cooling equipment available for the upcoming summer season in order to help contractors prepare for this busy period by doing the research that will help them to distinguish between brands. The coverage features specific information about each individual product as submitted by the manufacturers.




1

Commercial Cooling Showcase 2016: Summer Heat No Match for HVAC Cooling Equipment

The manufacturers provided all of the data included in the product grid as well as the photo feature. Therefore, any questions should be directed to them via the contact information provided in the photo feature section.




1

Residential Heating Showcase 2016: New Products Help Homeowners Feel the Heat

This heating showcase provides in-depth information on the features of each individual unit and also includes technical support information from the manufacturer. The manufacturers provided all of the data included in the product grid as well as in the photo feature; therefore, any questions should be directed to them via the contact information provided in the photo feature section.




1

Luxaire® Unitary Products: Package Equipment

This series of residential package equipment features energy-saving performance as well as cost-effective installation and maintenance.




1

Commercial Heating Showcase 2016: New HVAC Systems Help Keep the Commercial Market Warm

Each year, The NEWS spotlights the industry’s latest commercial heating products. The manufacturers provided us with a brief description of features included with each product.




1

Snort Subscriber Rules Update 2024-10-10

Posted by Research via Snort-sigs on Oct 10

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the malware-cnc and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-15

Posted by Research via Snort-sigs on Oct 15

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-image,
malware-cnc, malware-other, os-windows and server-mail rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-17

Posted by Research via Snort-sigs on Oct 17

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the policy-other and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-22

Posted by Research via Snort-sigs on Oct 22

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the and server-webapp
rule sets to provide coverage for emerging threats from these
technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-24

Posted by Research via Snort-sigs on Oct 24

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-multimedia,
malware-cnc, protocol-snmp and server-webapp rule sets to provide
coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-29

Posted by Research via Snort-sigs on Oct 29

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-firefox,
malware-cnc, malware-other, os-linux and server-webapp rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-10-31

Posted by Research via Snort-sigs on Oct 31

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the malware-cnc,
malware-other and server-other rule sets to provide coverage for
emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-11-04

Posted by Research via Snort-sigs on Nov 04

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the and server-webapp
rule sets to provide coverage for emerging threats from these
technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-11-07

Posted by Research via Snort-sigs on Nov 07

Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-plugins and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories




1

Snort Subscriber Rules Update 2024-11-12

Posted by Research via Snort-sigs on Nov 12

Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2024-43451:
A coding deficiency exists in Microsoft Windows SmartScreen that may
lead to spoofing.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62022 through 62023,
Snort 3: GID 1, SID 300612....




1

METUS Participates in the New American Home 2018

From the start, the home’s development team at Legacy Custom Built Homes had big goals for the 6,600-square-foot, three-level home in terms of both efficiency and design aesthetic.




1

Npcap Celebrates its 10th Anniversary In Space!

Posted by Gordon Fyodor Lyon on Oct 05

Dear Nmap community,

Last month we celebrated Nmap's 26th birthday and today I'm happy to share
another big milestone: Our Npcap driver for capturing and sending raw
packets on Windows turned 10 this year! From humble beginnings as a
security and modernization patch for the discontinued WinPcap project,
Npcap has become an indispensable component for both Nmap and Wireshark.
And it's used by hundreds of other software products and...




1

HVAC Q&A Episode 1: Common Heat Pump Installation Mistakes

What are the most common mistakes in heat pump installs, and how do you avoid them? Here’s what experts had to say about heat pump installation — a must-watch as electrification continues to gain momentum.




1

Residential Heating Showcase 2021

Every year, The ACHR NEWS introduces the latest heating equipment that is available for the upcoming winter season.




1

Facts + Figures: AHRI Shipment Data for July 2021

Industry figures are estimates that are derived from the best available figures supplied by a sample of AHRI member companies.




1

Facts + Figures: AHRI Shipment Data for November 2021

Industry figures are estimates that are derived from the best available figures supplied by a sample of AHRI member companies.




1

BlocPower Announces $150M in Financing for Building Decarbonization in Low-Income Communities

BlocPower, a climate technology company focused on greening America's buildings, announced a fundraising round of $150 million, including more than $24 million of Series B corporate equity led by VoLo Earth Ventures and $130 million of debt financing led by Goldman Sachs.





1

Risks Digest 34.41

Posted by RISKS List Owner on Aug 24

RISKS-LIST: Risks-Forum Digest Saturday 24 Aug 2024 Volume 34 : Issue 41

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
(comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats,
etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.41>
The current issue can also be found at
<...




1

[PATCH 0/1] Updated ALPN IDs (Mon, 26 Aug 2024 17:55:25 GMT)

Posted by Ariel Otilibili on Sep 15

Hello,

Herewith the PR containing this patch: https://github.com/nmap/nmap/pull/2939

Have a good week,
Ariel

Ariel Otilibili (1):
Updated ALPN IDs

scripts/tls-alpn.nse | 2 ++
1 file changed, 2 insertions(+)




1

[PATCH 1/1] Updated ALPN IDs

Posted by Ariel Otilibili on Sep 15

```
$ URL=https://www.iana.org/assignments/tls-extensiontype-values/alpn-protocol-ids.csv
$ curl -sL ${URL} |
perl -nE 'say $& if /(?<="").*(?="")/' |
sort > iana;
< scripts/tls-alpn.nse perl -nE 'say $& if m!(?<=")[w/.-]+(?=",)!' |
sort > nmap.alpn;
diff iana nmap.alpn | grep '<'

< co
< postgresql

$ curl --silent ${URL} --output...




1

[PATCH 0/1] Improved the legibility of Makefile

Posted by Ariel Otilibili on Sep 17

Hello committers,

The same patch is on this PR: https://github.com/nmap/nmap/pull/2938

Have a good weekend,
Ariel

Ariel Otilibili (1):
Improved the legibility of `Makefile`

Makefile.in | 14 +++-----------
1 file changed, 3 insertions(+), 11 deletions(-)




1

[PATCH 1/1] Improved the legibility of `Makefile`

Posted by Ariel Otilibili on Sep 17

* source files obtained by a wildcard
* headers and objects generated by differences.

```
$ grep -P '(SRCS|HDRS|OBJS) =' Makefile.in |
sed -e 's/^export.*= //g; s/$.*//g; s/OBJS = //' |
sed -ne '2p' |
tr ' ' ' ' |
sed -e 's/.h//' |
sort -d |
grep -vP '^$' > headers

$ grep -P '(SRCS|HDRS|OBJS) =' Makefile.in |
sed -e...




1

NPCAP 1.60 high CPU usage with pcap filter that does not pass anything (Win10)

Posted by Vladimir Soldatov on Sep 17

Hi guys,

I've a setup (Win10, Intel X520, NPCAP 1.60) with relatively high traffic
around 700 Mbit/s and I am trying to test the following cases:
1. Capture everything with empty pcap filter and just print stats with some
period calculating captured data size
2. Capture nothing with an intentionally created filter that does not match
the received traffic at all.
3. Capture some subset of traffic like 10%.

In all the cases, CPU usage...




1

Episode 1: Patterns

In this episode Michael and Markus talk about patterns. Starting with some of their "most used" patterns, they go into some detail about the history of patterns. They then discuss the various pattern forms as well as some misconceptions about patterns. Other topics include the domains that are covered by patterns as well as pattern languages.




1

Episode 5: Model-Driven Software Development Pt. 1

In this Episode, Eberhard and Markus provide an introduction to Model-Driven Software Development. Since the discussion turned out to be too long, we separated things into two episodes, thus Episode 6 will be the second part of this discussion. In this first part we disucsss core concepts of MDSD, the relationship to MDA, and hint at a couple of tools.




1

Episode 9: Remoting Pt.1 and Listener Feedback

This Episode as well as the next one take a look at remoting infrastructures such as CORBA, .NET Remoting or Webservices. In this first part we will take a look at why remote communication is necessary in the first place, what remoting middleware can do for you as well as which other middleware technologies exist in addition to OO-RPC systems, such as messaging middleware. Finally, we conclude with a brief overview of what the broker pattern can do for us in the context of remoting middleware.




1

Episode 10: Remoting Pt. 2

This is the second part of the remoting infrastructures discussion started in Episode 9. We take a look at how remoting infrastructures such as CORBA, .NET Remoting or Web Services work internally. This includes the low level details of the transport layer, marshalling, client proxies as well as interceptors and asynchronous communication. At the end, Michael will explain how all this relates to CORBA and Markus will map the concepts to .NET remoting. We don't have additional links in these show notes since all the relevant links had been posted for Episode 9 already.




1

Episode 11: Interview Gregor Kiczales

In this Episode we have the pleasure of talking with Gregor Kiczales. Gregor is one of the fathers of aspect-oriented programming (AOP). Today he is a professor of computer science at the University of British Columbia. Back in his days at Xerox Parc, he and a number of other people worked on the early forms of AOP as well as on some of its forerunners, such as meta object protocols. In this interview, we talk about a number of interesting topics, such as the history of AOP, the relationship of AO to interceptors, the industry acceptance of AOP, early aspects (i.e. using AO in development phased before implementation) as well as adoption strategies for AOP.




1

Episode 12: Concurrency Pt. 1

This is the first part of a series of Concurrency episodes. In this part Alex and Michael motivate and introduce the topic. We explain fundamental terms, such as thread, process, or mutex and dicuss typical challenges, such as deadlocks and race conditions.




1

Episode 13: Ruby in Practice

Ruby has been getting more and more attention by the developer community over the last couple of years. Nevertheless Ruby as language and as a plattform is not too widespread. Most developers don't know people who have actually done commercial Ruby projects. Therefore it is sometimes hard to judge if Ruby is just a hype topic or if Ruby can be used for serious projects today. In this episode Alexander speaks with Thomas Quas about a commercial Ruby project Thomas finished a while ago. Thomas shares his insights and practical experiences with Ruby doing a project under strong time pressure. As Thomas has many years experience doing Java projects we also do some high level comparisons between both platforms.




1

Episode 14: Interview Ted Neward

In this Episode we talk to Ted Neward. Since Ted is active in the .NET and Java universes, we started out by discussing some of the differences between the two platforms. The main discussion, however, focussed on new features in the C# 3.0 language. These include LINQ (language-integrated query). A very interesting discussion about extension methods, lamda expression, typing (dynamic, duck, compiler) and other language "tricks" follows. We also visited the topic of language development on the .NET and Java platforms in general, also looking at topics such as concurrency and the Scala language.




1

Episode 15: The Future of Enterprise Java

A very important area for Java are Enterprise Systems. With the advent of new technologies like Ruby on Rails, Java EE 5 or EJB 3 the landscape for Enterprise Systems appears to be changing a lot at the moment. In this episode Markus talks with Eberhard about what Enterprise Java actually is, why and where it is used. Based on that they discuss what the future might look like and how to make Enterprise Java shine in the future.




1

Episode 16: MDSD Pt. 3, Hands-On

This episode provides a hands-on guided tour through a simple model-driven software project. It is based on an actual code sample (see link below) and takes a look at the typical steps of real-life code generation: prototypical implementation, defining the metamodel, reading a model into a metamodel instance, writing templates and validating the model. The example for the episode uses openArchitectureWare as a generator environment, but the overall approach is tool independent. This episode is the first in a new category "code/technology" that discusses technical concepts based on actual code. Please give feedback whether you find this format useful or not.




1

Episode 17: Feedback and Roadmap

This is a short episode that outlines the upcoming episodes and interviews, as well as reports on some listener feedback.




1

Episode 18: Resource Management

In this episode Michael and our guest Prashant Jain talk about patterns for resource management. Efficient management of resources is critical in the execution of any kind of software. Ranging from embedded software in a mobile device to software in a large enterprise server, it is important that the resources, such as memory, threads, file handles, or network connections, are managed efficiently to allow the systems to function properly and effectively. Michael and Prashant discuss various patterns, such as Lazy Acquisition, Caching, Leasing and Evictor and explain when, why, and how to apply them for effective resource management.