Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Fifth edition has a lot to prove following the highly-controversial fourth edition, the rise of competing roleplaying game Pathfinder, and two years of public playtesting. Initial reviews posted on Amazon appear overwhelmingly positive at the time of writing, but more skeptical gamers may wish to take a look at the free "Basic Rules" posted on the official D&D website. The basic rules contain all the bare essentials needed to create a character or run your own adventure, and will serve both as a free introduction for new players and as a holdover for long time players until the remaining two rulebooks are released.
We've run a few two-part videos, but this is the first time we've split one video into six parts -- with two running today, two tomorrow, and two Thursday. But then, how many people do we interview who have had as much of an effect on the nature of information transmission -- as opposed to just publishing -- as Tim O'Reilly? We don't know for sure, but there's a good chance that O'Reilly books are owned by more Slashdot readers than books from any other publisher. That alone makes Tim O'Reilly worth listening to for nearly an hour, total. (Alternate Video Links: Video 1 ~ Video 2; transcript below covers both videos.)
Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
Given how bare-knuckled Fark can be, is it time? Overdue?