Monday, 3 October 2016

Advances in Internal Combustion Engines

Latest Advances in Internal Combustion Engines

Automakers continue to look to the internal combustion engine (ICE) and its decades of reliable and resilient service when it comes to offering improved fuel economy and longer engine life.

by Stephane Babcock
Photo courtesy of Ford.
Photo courtesy of Ford.
Even with all the buzz that surrounds hybrids, hydrogen fuel cells, and the numerous gaseous alternatives, OEMs are still betting on the benefits of the constantly improving internal combustion engine (ICE). From its humble beginnings in the early 1800s to its evolved cousins of today and beyond, the ICE has made improvements in not only how quickly you can get from point A to point B, but also how efficiently that journey can be made.
The need for fuel efficiency took a giant leap forward in the mid-1970s during the first and second Arab Oil Embargoes, which saw a sharp increase in gasoline prices due to the price of oil increasing 400 percent from $3 to $12 a barrel. Since then, the Detroit Three have worked to improve on an engine that continues to see improvements in fuel economy during the ever-evolving race to go green.
"People tend to forget that even though it might be hybrid or plug-in hybrid, these vehicles all still need an internal combustion engine," said Paul Seredynski, manager, global powertrain technology communications for Ford Motor Co. "It's one of the main reasons why Ford is so bullish and why the research continues to focus so heavily on internal combustion."
The most recent evolution of this research, the OEM's 2.7L EcoBoost engine, will see its first application in the next-generation aluminum-bodied Ford F-150. The vehicle will see improved mpg due not only to the new powerplant, but also from the 700-pound lightweighting that comes with switching to aluminum, a strategy that Seredynski related to meeting the fuel-efficiency needs of the customer in a completely different way.
The combination of different vehicle technologies is a strategy most OEMs are leaning toward when it comes to improving mpg. At General Motors, engineers are integrating vehicle and powertrain strategies together to optimize and minimize unnecessary parts, according to Roger Clark, senior manager, energy center for GM.
"Great examples of technologies that improve vehicle efficiency include added transmission gears (e.g., 6-speed versus 4-speed) lowering engine operation speed, enabling lower numerical axle ratios, and, in many cases, increasing performance and capability," Clark said. He added variable cam phasing, direct fuel injection, reducing engine accessory loading, electric power steering, improved vehicle aerodynamics, increased cooling airflow sealing, and reduced tire rolling resistance to the list.
GM is also increasing its attention to what it calls "opportunity-type" controls. For example, using start/stop technology to stop the engine at idle and seamlessly restart it when the brake is released, and advanced battery charging that helps to charge the battery from regenerated vehicle kinetic energy.
For Chris Cowland, director, advance and SRT powertrain engineering at Chrysler, optimization of existing combustion, thermodynamic, and gasoline exchange technologies, as well as improving mechanical processes, will increase the overall efficiency of the ICE.
"From a combustion perspective, we are adding technologies that allow us to operate as close to the stoichiometric air/fuel ratio as possible without the need for fuel enrichment to manage exhaust temperatures," Cowland said. "An example of such technology is the integrated exhaust manifolds used on the Pentastar engine."
The variable displacement oil pumps, according to Cowland, also enable the oil output of the pump to be tailored to the demand of the engine rather than pressurizing and then recirculating excess fluid.
Designing with Green in Mind
While brake power regeneration is something most drivers relate to certain types of hybrid vehicles, some OEMs are adding it to ICE-powered vehicles as well, including BMW. As part of the automaker's EfficientDynamics technology platform, the use of brake energy regeneration has been added to both gasoline- and diesel-powered BMWs.
"The vehicle's battery is charged when the vehicle is coasting or decelerating. The state of charge of the battery is constantly monitored and the alternator is disconnected at any time when the battery has sufficient charge and the vehicle is accelerating," explained Julian Arguelles, BMW product and technology spokesperson for BMW North America.
But, as far as BMW is concerned, hybrids and electrics, such as gasoline and diesel, have specific applications that they benefit most from.
"No single technology is the best solution for all users. As much as an urban user will benefit from regenerative braking and electric only driving, an advanced gasoline or diesel ICE is the best option for suburban and extra urban use," Arguelles said. "A good fleet manager should choose the best vehicle for each application, fuel costs or, rather, energy costs need to be analyzed carefully."
Other European automakers are also utilizing a "green-ish" option when updating their take on the ICE. Mercedes-Benz is convinced that there is no single solution for the drivetrain of the future, but that it will include a mix of different technologies, including alternative fuels such as ethanol blends.
"All our gasoline engines are able to run on E-25 fuel, and in selected markets where the demand is already there we support E-85 or E-100," said Bernhard Heil, vice president product group powertrain passenger cars for Mercedes-Benz Cars Development, Daimler AG. "Our diesel engines support biodiesel with a maximum of 5 percent per volume blend rate. We support advanced biofuels of the second generation like hydrotreated vegetable oils and BTL (fuel made by gasification of biomass and synthesis) which could be used to increase the blend rate up to 25 percent."
There are other, more mechanical, technologies that are also improving fuel economy in the OEM's vehicle line, including friction reduction of all components (core engine, gearbox, and drivetrain), a higher gear ratio spread, downsizing in combination with efficiency-improved turbocharging, and combustion system improvements. Heil also sees the continued potential of the diesel engine.
"In 2013, the National Research Council (NRC) asked Daimler what fuel economy potentials could be identified with the usage of diesel engines in a standard car and a light-duty truck. Based on the comparison cars provided by the NRC, a fuel economy advantage of approximately 20 percent for the standard car and approximately 25 percent for the light-duty truck could be identified," Heil added.
Approaching It from a Fleet Perspective
For fleet managers, improvements to the ICE can be their best friend, especially when it comes to keeping costs down and improving resale, for many their highest two priorities.
"A fleet manager has to look at the big picture of not only real-world fuel economy, but also driving range, maintenance costs, and depreciation," said Dave Coleman, manager, vehicle engineer for Mazda. "You have to match your vehicle choice to the realities of your fleet. This is why continuing to improve our mastery of the internal combustion engine is clearly the smart move for the foreseeable future."
When Mazda looked to reinvent its version of the ICE, it looked at two basic areas: capturing more of the energy released when the fuel is burned and ensuring all that power got to the wheels.
"The most direct way we can do this is through higher compression ratios and battling parasitic losses in every part of the car," Coleman said.
While Toyota plans to offer fleet managers a multifaceted vehicle offering that then can be utilized in their local areas to take best advantage of the local energy sources and vehicle operating requirements, the OEM also sees the benefits of continuing to develop the ICE.
"Fleet managers can take advantage of the latest ICE technologies with a later model fleet," said David Lee, senior product education and development administrator for Toyota. "These vehicles are more efficient than their predecessors, which may help offset the cost premium of converting to hybrid, electric vehicle, or compressed natural gas fleets."
Clark of GM advises fleet managers to consider their typical-use profiles when trying to get the most benefit from new ICE technologies.
"If their use includes significant city traffic driving with lots of stops, then an ICE with start/stop may be a good solution," Clark said. "If they tow heavy loads often especially at highway speeds then a diesel engine option would be a great choice."
Still Leading the Pack
Although alternative-fuel options such as compressed natural gas, propane autogas, and pure battery-electric are steadily making more and more headway into the vehicle market, most OEMs continue to bank on the reliability and efficiencies that go along with the ICE's 100-plus-year technology.
"The ICE is still the most efficient form of generating motive power for a passenger vehicle in ratios, such as efficiency to production cost, efficiency to mass, and efficiency to package volume," said Chrysler's Cowland. "In addition, today's modern engines require minimal routine maintenance for lifetimes well in excess of 150,000 miles and operate on widely available fuel sources."
Lee of Toyota agreed, citing that there is currently "no consensus on a single driveline being the panacea to the challenge."
But, according to Ford's Seredynski, the job of continuing to increase fuel efficiency falls on more than just the OEMs' shoulders.
"The burden has been on the manufacturer for the last 30 years to improve the powertrain, but we see it as a systems approach. It can't just be the manufacturer; it's got to be the regulation and the fuels that are involved to boost octane," he said.

Hacker Tools

Hacker Tools Top Ten Our recommended tools for 2016

Welcome to our Hacker Tools list of 2016…
Since 2014 we’ve listed the web’s favorite hacking/ pentesting tools as used by hackers, geeks and security engineers. This list sprung to life when we organized an online poll that was very well received and the below recommended tools are a result of what our community voted as the ‘Top Ten List of Hacking Tools’. We’ve organized this list by including information and links to training courses for each of these tools as well as books, training course and additional information that we think will help you learn!
Update! (June 2016)
By popular demand we’ve replaced Burp Suite with Wireshark. If you think that we are missing a tool then please let us know! Also, our more extensive list of hacking tools is located here that include tools from the following hacking/ pentesting categories: Application Specific Scanners, Debuggers, Encryption Tools, Firewalls, Forensics, Fuzzers, Intrusion Detection Systems, Multi Purpose Tools, Packet Crafting Tools, Packet Sniffers, Password Crackers, Port Scanners, Linux Hacking Distros, Rootkit Detectors, Traffic Monitoring Tools, Vulnerability Exploitation Tools, Vulnerability Scanners, Web Browser Related Tools, Web Proxies, Web Vulnerability Scanners and Wireless Hacking Tools.
Also….remember!All these tools come bundled in pentesting Linux distro’s such as Kali Linux or BackBox, so we’d certainly recommend that you install an appropriate Linux hacking box to make your life easier – not least because repositories are (automatically) updated.

Nmap (Network Mapper) | Free

Used to Scan Ports and Map Networks - and a whole bunch more!

Nmap is an abbreviation of 'Network Mapper', and it's very well known free open source hackers tool. Nmap is mainly used for network discovery and security auditing. Literally, thousands of system admins all around the world will use nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime. Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target. There are dozens of benefits of using nmap, one of which is that fact that the admin user is able to determine whether the network (and associated nodes) need patching. Nmap's been featured in literally every hacker movie out there, not least the recent Mr. Robot series. It's also worth mentioning that there's a GUI version of Nmap called 'Zenmap'. We'd advise you to learn using Nmap (i.e. the 'command line') then rotate into Zenmap when you are feeling all confident.

Metasploit Penetration Testing Software | Free & Paid

Vulnerability Exploitation Tool

The Metasploit Project is a hugely popular pentesting or hacking framework. If you are new to Metasploit think of it as a 'collection of hacking tools and frameworks' that can be used to execute various tasks. Widely used by cybersecurity professionals and ethical hackers this is a tool that you have to learn. Metasploit is essentially a computer security project (framework) that provides the user with vital information regarding known security vulnerabilities and helps to formulate penetration testing and IDS testing plans, strategies and methodologies for exploitation. There's a ton of incredibly useful Metasploit information out there and we hope that the books that we've chosen go someway to help you on your journey, not least if you are a beginner just starting out and looking for beginners tutorials in how to use Metasploit.

John The Ripper | Free

Password Cracking Tool

John the Ripper (often you'll see abbreviated as 'JTR') wins the award for having the coolest name. John the Ripper, mostly just referred to as simply, 'John' is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a 'wordlist', containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks. If you are somewhat confused between John the Ripper and THC Hydra then think of John the Ripper as an 'offline' password cracker whilst THC Hydra is an "online" cracker.

THC Hydra | Free

Password Cracking Tool

We've purposely placed THC Hydra underneath John The Ripper because they often go 'hand-in'hand'. THC Hydra (we've abbreviated to simply 'Hydra' throughout our site) is a hugely popular password cracker and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH. Take a look at John the Ripper as well.

OWASP Zed | Free

Web Vulnerability Scanner

The Zed Attack Proxy (ZAP) is now one of the most popular OWASP projects. The fact that you've reached this page means that you are likely already a relatively seasoned cybersecurity professional so it's highly likely that you are very familiar with OWASP, not least the OWASP Top Ten Threats listing which is considered as being the 'guide-book' of web application security. This hacking and pentesting tool is a very efficient as well as being an 'easy to use' program that finds vulnerabilities in web applications. ZAP is a popular tool because it does have a lot of support and the OWASP community is really an excellent resource for those that work within Cyber Security. ZAP provides automated scanners as well as various tools that allow you the cyber pro to discover security vulnerabilities manually. Understanding and being able to master this tool would also be advantageous to your career as a penetration tester. If you are a developer then you have it's obviously highly recommended that you learn how to become very proficient with this 'hacker tool!'

Wireshark | Free

Web Vulnerability Scanners

Wireshark is a very popular pentesting tool and for over a year it was not included on our list, however, by popular demand we added it in late June 2016. Wireshark essentially captures data packets in a network in real time and then displays the data in human-readable format (verbose). The tool (platform) has been highly developed and it includes filters, color-coding and other features that lets the user dig deep into network traffic and inspect individual packets. If you'd like to become a penetration tester or work as a Cyber Security practioner, then learning how to use Wireshark is a must. There are a ton of resources out there to learn Wireshark, and, of particular interest, there's also a Wireshark Certification which you can achieve and place on your LinkedIn profile.

Aircrack-ng | Free

Password Cracking Tool

The Aircrack suite of Wifi (Wireless) hacking tools are legendary because they are very effectively when used in the right hands. For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode). For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend. It's useful to know that Aircrack-ng implements standard FMS attacks along with some optimizations like KoreK attacks, as well as the PTW attacks to make their attacks more potent. If you are a mediocre hacker then youll be able to crack WEP in a few minutes and you ought to be pretty proficient at being able to crack WPA/ WPA2. For those interested in Wireless Hacking we'd also highly recommend taking a look at the very awesome Reaver, another very popular hacking tool that alas we couldn't add to our list.

Maltego | Free & Paid

Digital Forensics

Maltego is different in that it works within a digital forensics sphere. Maltego is a platform that was designed to deliver an overall cyber threat picture to the enterprise or local environment in which an organization operates. One of the awesome things about Maltego which likely makes it so popular (and included in the Kali Linux Top Ten) is its's unique perspective in offering both network and resource based entities is the aggregation of information sourced throughout the web - whether it's the current configuration of a vulnerable router within a network or the current whereabouts of your staff members on their international visits, Maltego can locate, aggregate and visualize this data! For those interested in learning how to use Maltego we'd also recommend learning about OSINT cybersecurity data procurement.

Cain and Abel Hacking Tool | Free

Password Cracker/ Password Hacking

Cain and Abel (often simply abbreviated to Cain) is a hugely popular hacking tool and one that is very often mentioned online in a variety of 'hacking tutorials'. At its' heart, Cain and Abel is a password recovery tool for Microsoft Windows but it can be used off-label in a variety of uses, for example, white and black hat hackers use Cain to recover (i.e. 'crack') many types of passwords using methods such as network packet sniffing and by using the tool to crack password hashes. Cain, for example, when used to crack password hashes would use methods such as dictionary attacks, brute force, rainbow table attacks and cryptanalysis attacks.

Nikto Website Vulnerability Scanner | Free

Website Vulnerability Scanner Hacking Tool

Nikto is another classic 'Hacking Tool' that a lot of pentesters like to use. Worth mentioning that Nickto is sponsored by Netsparker (which is yet another Hacking Tool that we have also listed in our directory). Nikto is an Open Source (GPL) web server scanner which is able to scan and detect web servers for vulnerabilities. The system searches against a database of over 6800 potentially dangerous files/ programs when scanning software stacks. Nikto, like other scanners out there, also scans for outdated (unpatched) versions of over 1300 servers, and version specific problems on over 275 servers. Interestingly, Nikto can also check server configuration items such as the presence of multiple index files, HTTP server options, and the platform will also try to identify installed web servers and web applications. Nikto will get picked up by any semi-decent IDS tool so its' really useful when conducting a white-hat/ white-box pentest. Certainly a great tool to learn your skills on when attacking an open box for training.