Forgot your password?
typodupeerror
Linux

+ - 178 Nmap 6 Released! ->

Submitted by
Chankey Pathak
Chankey Pathak writes "The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 6.00 from http://nmap.org/. It is the product of almost three years of work, 3,924 code commits, and more than a dozen point releases since the big Nmap 5 release in July 2009. Nmap 6 includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more!"
Link to Original Source
Hardware

+ - 93 NASA Vacuum Tube On-A-Chip Resurrects By-Gone Era->

Submitted by Anonymous Coward
An anonymous reader writes "NASA has succeeded in putting a vacuum tube on-a-chip that measures just 100 nanometers long. Today NASA has to heat the compartments with transistors in them, just to keep them working. Plus elaborate shock proofing is needed to keep circuit boards from cracking. But vacuum tubes supply their own heat for operation, are exceptionally rugged, don't require circuit boards and greatly simplify circuitry since they are ultra-accurate and don't need a bunch of compensation like transistor circuits. Vacuum tubes became obsolete because they were big and could not be scaled, but by putting them on-a-chip they can now be scaled down to smaller sizes just like other semiconductors. NASA says they are still a few years away from commercializaiton, but it looks like the vacuum tube is back!"
Link to Original Source
Security

+ - 212 Researchers Can Generate RSA SecurID Random Numbers Flawlessly->

Submitted by
Fluffeh
Fluffeh writes "A researcher has found and published a way to tune into a RSA SecurID Token. Once a few easy steps are followed anyone can generate the exact numbers shown on the token. The method relies on finding the seed that is used to generate the numbers seemingly randomly, but once known can be used to generate the exact numbers displayed on the targetted Token. The technique, described on Thursday by a senior security analyst at a firm called SensePost, has important implications for the safekeeping of the tokens. An estimated 40 million people use these to access confidential data belonging to government agencies, military contractors, and corporations. Scrutiny of the widely used two-factor authentication system has grown since last year, when RSA revealed that intruders on its networks stole sensitive SecurID information that could be used to reduce its security. Defense contractor Lockheed Martin later confirmed that a separate attack on its systems was aided by the theft of the RSA data."
Link to Original Source

+ - 93 Anonymous Operation Quebec-> 1

Submitted by Anonymous Coward
An anonymous reader writes "A few months ago, students protested against a raise in school fees which led to a major strike. Governement wanted to bring peace by voting a brutal law which controls the right of people to gather in the streets. Now, Anonymous took part in the conflict and claims attacks on Quebec governement websites,"
Link to Original Source
BSD

+ - 122 Ask Slashdot: FOSS Upgrade Paths

Submitted by
rtobyr
rtobyr writes "I've got about 50 servers to manage. I do very much appreciate the technology that has come from FOSS operating systems projects, yet it seems to me that most *free* operating systems do not fully support an upgrade path. Ubuntu is the only exception that I'm aware of. I cannot seamlessly upgrade from Free/PC-BSD 8.x to 9.x. Instead I must re-install from scrach. The same goes for CentOS/RHEL 5.x to 6.x, and for every version of Mint Linux.

The two major commercial operating systems (considered to be evil by the FOSS community) easily upgrade from one version to the next. That's important in a real-life production environment. In 2001, I upgraded 200 workstations and 7 servers from Windows NT 4.0 to Windows 2000 without incident. I've had similar experience with all subsequent MicroEvil systems. I do hate MicroEvil, but I can make only limited conclusions regarding the upgrade paths of other operating systems:

1) The distributions exist only for the sake of doing the project, and for the technologies that it produces (such as OpenBSD's OpenSSH).

2) Folks are expected to install a version of FOSS operating systems, but not upgrade because there's no reason to fix something that isn't broken.

3) FOSS operating systems are only for organizations who have so few servers or so many IT folks that re-installing everything from scratch is not inviably cumbersome.

4) I am oblivious to some upgrade path technique for FOSS operating systems.

5) I am a lame poser too unskilled to understand how to properly manage FOSS servers.

Please enlighten me."
Linux

+ - 116 Linux 3.4 released->

Submitted by
angry tapir
angry tapir writes "Just over two months after its last major release, Linus Torvalds has posted the newest version of the Linux kernel, which supports new graphics processors from Nvidia and Intel, improves file system functionality and comes with a new security module. "I think the 3.4 release cycle as a whole has been fairly calm. Sure, I always wish for the [release candidates] to calm down more quickly than they ever seem to do, but I think on the whole we didn't have any big disruptive events, which is just how I like it," he wrote, in an email announcing the release. "Let's hope the 3.5 merge window is a calm one too.""
Link to Original Source

+ - 97 SAP VP Arrested in LEGO Bar Code Scam->

Submitted by Anonymous Coward
An anonymous reader writes "You're a Vice President of a large company, probably taking home a quarter million dollars a year. But for some reason, you need to switch bar codes on LEGO boxes at Target. The kicker? It's "tomsbrickyard" from ebay. To be fair, the authorities aren't sure how much of what they found was actually paid for in full versus only partially paid for by using bar codes he made up himself."
Link to Original Source
First Person Shooters (Games)

+ - 127 Bungie's Next Huge Game is an Xbox-First "Sci-Fantasy, Action Shooter," Court Re->

Submitted by
TheGift73
TheGift73 writes "The court case between Activision and developers Jason West and Vincent Zampella has brought all kinds of ugliness to light. But filings for the case have also made the details of the April, 2010 contract between Bungie, developers of Halo, and Activision a matter of public record, revealing Bungie's upcoming game development plans.

The L.A. Times reports that the 27-page contract outlines Bungie's agreement to develop four "sci-fantasy," action shooter games to be released every other year starting in 2013, under code name "Destiny." The agreement also includes DLC plans, with four expansion packs code-named "Comet" due in the alternating years, beginning in 2014.

The contract also specifies that the first game is a timed Xbox exclusive, created for the Xbox 360 as well as potentially for its still-unnamed successor, called the "Xbox 720" in the documentation. It could then later be released for PlayStation in 2014. In addition to the Xbox, later games could also be released for the PS3 or its successor console, as well as for PC.

In 2011, word leaked that Bungie was working on Destiny. The developer then confirmed at GDC 2011 that they were developing a MMO title.

The contract also specifies that Bungie is working on a Marathon title, based on its 1994 Mac sci-fi first-person shooter.

We have reached out to Activision to find out how much of the 2010 agreement is still planned, and will update if we hear back."

Link to Original Source
Blackberry

+ - 107 Cal Tech: your BlackBerry isn't a nuke.->

Submitted by WindyWonka
WindyWonka (663714) writes "According to Justia, Cal Tech's lawyers told the ITC that RIM’s mobile devices violate the school's CMOS image patents, and shouldn't be imported or sold in the U.S. because they "are not essential to the public’s health and welfare and are hardly comparable to nuclear devices or burn beds.”

Maybe, but don't POTUS and Congress rely on BlackBerry mobiles?"

Link to Original Source
Advertising

+ - 176 EU offers Google Chance to Settle Prior to Anti-Trust Enquiry-> 1

Submitted by
Fluffeh
Fluffeh writes "The EU has accused Google of abusing its dominant position in advertising to benefit its own advertising services at the expense of competitors. In a twist however, rather than initiating formal proceedings, the EU has given Google a chance to settle the whole matter without much fuss. They outlined four changes that Google can make that will put it firmly back in the good graces of the EU. Google has been given "a matter of weeks" to propose remedies to the four issues — which all tie in with how search results are displayed, their format and their portability to other platforms. This matter has come before the EU based on complaints by a few small companies and Microsoft."
Link to Original Source

+ - 132 Ask Slashdot: When Will Our (US) Own Needs be More Important than Afghanistan's?->

Submitted by
ourlovecanlastforeve
ourlovecanlastforeve writes "AP reports that NATO's big players have settled on a leisurely date of 2014 to stop killing our children, "affirming they will close the largely stalemated conflict at the end of 2014 but keep their troops fighting and dying there for two more years in the meantime." So my question is, at what point does it become important to stop throwing human lives and trillions of dollars at Afghanistan's problems when we can't afford to pay our own bills? Where is the altruism in this proceeding; why are we really wasting all these resources, when there are plenty of other nations that would be grateful for our aide that we could easily throw just as much money we don't have at?"
Link to Original Source
Android

+ - 97 Backdoor in ZTE smartphone found->

Submitted by Anonymous Coward
An anonymous reader writes "Recently, a certain pastebin.com publication revealed that several Android smartphones manufactured by Chinese company ZTE have some kind of a backdoor as an interesting addition to their functions. There is a sync_agent application in the system directory /system/bin/ that provides root access to the system shell to those who know a specific password (in this case, ztex1609523):

The application’s presence is confirmed on smartphone Score M that is distributed through North American carrier MetroPCS. However, some sources reveal that there are also other models, including those sold worldwide, that contain this application. The application itself cannot be treated as malicious since it does not perform any destructive operations, but its presence could pose a threat to users if cybercriminals were ever to turn this vulnerability into a real weapon.

Opinions on the matter vary between both users and security experts. While some consider that the manufacturer has left the backdoor intentionally in order to control devices for unknown purpose or blame the U.S. and Chinese governments and mobile carriers who sell these smartphones, others think that it is no big deal and probably results from an engineering fault at ZTE.

Though no response has been provided by ZTE yet, some unofficial sources claim that the company will fix this problem shortly. For now, the conspiracy theory enthusiasts have one more topic to discuss."

Link to Original Source

+ - 106 Malaysia launches "green" Islam initiative->

Submitted by
moebin
moebin writes "Confirming the importance of ecological protection in Islam, a new book will be launched in Malaysia on conserving the environment with an Islamic perspective. Realizing the threats towards the environment and wildlife species, the new book, prepared by World Wide Fund for Nature (WWF) Malaysia and Ikim, will be launched next July."
Link to Original Source
Verizon

+ - 139 Judge orders Verizon subscriber identities sealed ->

Submitted by
NewYorkCountryLawyer
NewYorkCountryLawyer writes "In one of the mass "John Doe" cases based on single BitTorrent downloads of films, Malibu Media v. Does 1-13, a pro se litigant made a motion to quash the subpoena. The Court granted a stay of the subpoena, pending its decision on the motion to quash. Unfortunately for John Doe, Verizon had turned over its subscribers' identities 5 days BEFORE the response was due, thus possibly mooting both the stay and the motion to quash. Fortunately for John Doe, the Judge wasn't too happy about this, ordered the information sealed, directed plaintiff's lawyers to destroy any copies, and ruled that they can't use the information unless and until the Court denies the motion to quash."
Link to Original Source
Security

+ - 147 Nmap 6.0 Released->

Submitted by Gerald
Gerald (9696) writes "After 3 years of work Fyodor and company have released version 6.00 of the Nmap Security Scanner! The new release includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more! We recommend that all current users upgrade. More info in the release notes."
Link to Original Source
Perl

+ - 237 Perl 5.16.0 Released->

Submitted by Anonymous Coward
An anonymous reader writes "Perl 5.16.0 is now available with plenty of improvements all around. You can view a summary at http://www.h-online.com/open/news/item/Perl-5-16-0-now-available-1580138.html and all the change details at http://search.cpan.org/~rjbs/perl-5.16.0/pod/perldelta.pod. With Perl on an annual release schedule, and projects like Mojolicious, Dancer, perlbrew, Plack, and Moose continuing to gain in popularity, are we in the middle of a Perl renaissance?"
Link to Original Source
Piracy

+ - 136 Half Of PC Users Are Pirates-> 1

Submitted by
judgecorp
judgecorp writes "Despite continued pressure on business users to buy legitimate software, the Business Software Alliance (BSA) reports that the campaign seems to be failing. Well over half (57%) of users surveyed in a global survey admit to using pirated software. That's a big increase from the same survey last year — when 43% admitted to using pirated software. The BSA surveyed 15,000 people in 33 countries."
Link to Original Source
Intel

+ - 114 Can probabilistic computing save Moore's law?->

Submitted by Anonymous Coward
An anonymous reader writes "Researchers have unveiled a microprocessor that’s designed to get the answer wrong — at least, some of the time. The idea of building microprocessors that deliberately allow for incorrect results has been kicking around for years; the prototype silicon demonstrated last week is the first time anyone has demonstrated the idea in native hardware. Why do it? Because perfection takes a lot of power so if less-than-perfect calculations can be used part of the time it could lead to dramatic power savings. Intel is even behind the idea and it currently researching the variable precision floating point unit."
Link to Original Source
Medicine

+ - 105 Not just for your phone: Bluetooth in health monitoring->

Submitted by
ericjones12398
ericjones12398 writes "Recently, researchers at the LMN Institute of Infotech and at the Indian Institute of Technology showed that fetal phonocardiography could be adapted for use with Bluetooth. Fetal phonocardiography is the modern equivalent of the stethoscope in fetal heart monitoring. This technique is non-invasive and does not send out ultrasound or other energy. The adaptation of this technology with Bluetooth provides numerous advantages for home monitoring including the ability to collect data for analysis on home computers without a lot of intervention or cables. Accuracy tests comparing these results with ultrasound-based Doppler shifts showed 98 percent accuracy.
Other researchers have also applied Bluetooth to health monitoring. Researchers at Manukau Institute of Technology created an app that uses Bluetooth to connect units measuring a variety of physiological measures including body temperature, heart rate, blood pressure and movement to mobile devices. This could be used for personal health monitoring or could be a way to send patient information to remote locations."

Link to Original Source

nohup rm -fr /&

Working...