Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
News

Large Hadron Collider Scientist Arrested For al-Qaeda Ties 245

mindbrane writes "A scientist working as a subcontractor on a peripheral LHC project has been arrested as a terrorist. The CBC is running a story outlining the arrest of a man on Thursday in south-east France for suspected al-Qaeda links: 'CERN officials said the man, whose name has not been revealed, was working under contract with an outside institute and said he had no contact with anything that could have been used for terrorism. He had been at CERN since 2003, officials said. ... The news that someone with terrorist connections might have worked at the facility is likely to cause concern because of both the high profile of the giant physics experiment and also the technology in use, which has made some members of the public nervous.'"
Science

Computer-Aided ESP Transmits Binary Numbers, Slowly 148

High-C writes "Dr. Christopher James of the University of Southampton has demonstrated what is being termed 'Brain to Brain' communication. In binary, no less. In essence, one person imagined a binary number, which was picked up by an EEG and transmitted via the net to another PC. The received signal was displayed on LEDs flashing at two different frequencies. The receiver's EEG correctly deciphered the string, resulting in a 1:1 transmission of binary data via thought. The throughput isn't great so far, at .14 bits per second, but it's an incredibly geeky proof-of-concept all the same."

Comment Re:For being the opposite of Bush (Score 1) 1721

their routine mistakes (such as Yasser Arafat, awarded a "Peace Prize" and then proceeding to go on to lead over 20 more years of terrorist attacks).

Huh? Arafat was awarded the prize in 1994. It is now 2009. 2009 - 1994 = 15. Arafat died in 2004. 2004 - 1994 = 10. Get your facts right. When you resort to this kind of hyperbole it really cheapens the rest of your argument.

Submission + - Skills, Not Tools Are the Key to IT Security (internetnews.com)

darthcamaro writes: There are a lot of decent automated web security tools now available, that make it seem as though all you need to do is point a tool at your web app and then presto you're secured. Reality is somewhat different. HP had a hacking challenge event and it proved that researchers actually need to know what they're doing as the tools themselves aren't good enough to entirely automate the hacking process.

"Most of our log-in challenges were designed to subvert tools," Matt Wood, senior security research at HP web security research group, told InternetNews.com. "The way they were designed, HP WebInspect or any other Web application scanning tool would not have been able to identify every single one of the hacks automatically."


Microsoft

Submission + - Admin's Look at Deploying Windows 7 (infoworld.com)

snydeq writes: InfoWorld's J. Peter Bruzzese looks at the key decisions and options admins will need to address to ensure a successful migration to Windows 7. The guide — which includes a hands-on video tour of Windows 7 and an in-depth report including Windows 7 benchmarks — examines hardware and software compatibility issues, addresses the licensing question, and lends insight for those Windows shops considering the virtualized desktop route.
Privacy

Submission + - Canadian Minister Lies On Net Surveillance Claims

An anonymous reader writes: The Canadian government has introduced Internet surveillance legislation that requires ISPs to disclose customer information without a warrant. Peter Van Loan, the Minister in charge, claims that a Vancouver kidnapping earlier this year shows the need for these powers. I did some digging and shows this to be a lie — the Vancouver police acknowledge that the case did not involve an ISP request and the suspect is now in custody.

Submission + - In trouble for security tools at work?

An anonymous reader writes: I just asked a friend of mine to help me see if my passwords can easily be cracked, so I sent him the password files. My friend loaded some security software on his machine at work to try to crack the password, and he apparently was just contacted by a network "consulting company" and he was accused of trying to sniff network passwords. He is concerned, as he doesn't want to loose his job. I personally have been an admin for many years and it was always expected of me to know and use all the security tools available — so I was surprised when I heard that. Anyone ever have something like this happen to them? Any advice?

Submission + - Canadian ISP's fight back (again)

jenningsthecat writes: "With the recent CRTC decision giving Canadian telcos such as Bell and Telus the legal right to deny third-party ISP's access to their infrastructure, smaller Canadian internet providers are again fighting for their lives, and are asking their customers for help. The ISP's are sending out e-mails asking people to go to http://www.competitivebroadband.com/ to send either a form letter or a personalized message to the Industry Minister, the Prime Minister, the Opposition Leader, and optionally the respondent's local Minister of Parliament.

If the CRTC's decision is not overturned, approximately 30 ISP's will likely be forced out of business. Competition in the ADSL market will be totally eliminated, and Canadians will have only two choices for wired Internet access: the local Cableco or the local Telco. Given that Canadian taxpayers have heavily subsidized the telcos in multiple ways for several decades, this decision to hand over exclusive control of the keys to the cookie jar hardly seems fair.

To all Canadian Slashdotters: If you are in favour of net neutrality and believe competition is a good thing, please click on the link above and make your views known to the powers-that-be."
Security

Submission + - First online hacking conference: SecurityTubeCon (net-security.org)

An anonymous reader writes: SecurityTubeCon is the first hacker conference to be held completely online, 6-8 November, 2009. The event is aimed at democratizing hacker conferences by allowing any researcher, regardless of his physical location, to share his work with the community. The speaker approval process also differs a lot from that of other events. Unlike other cons, the organizers will not approve or reject speakers — if you have something interesting to share, you will be heard.
Censorship

Submission + - Yahoo Threatens To Call Police on User (thomashawk.com)

An anonymous reader writes: Earlier this year, Flickr user Shepherd Johnson made headlines in the media after posting comments critical of President Obama on the President's official Flickr photostream. Johnson had his account deleted at the time by Flickr. In addition to losing his Flickr account, Johnson also lost politically sensitive photos that he had not backed up elsewhere. At the time Flickr offered Johnson a $24.99 gift card as consolation for his account deletion. Now, however, it would seem that things have taken a turn for the worst. After trying to address his account deletion again with a now unresponsive Yahoo/Flickr staff, Johnson had his account locked out of their help forum Tuesday after posting on it there. Johnson said he next placed a few polite phone calls to Yahoo and received a call back from one of their security officers (who also claims to be a former FBI special agent) threatening him that if he calls Yahoo again that they will report him to the Sunnyvale police. Talk about your poor customer service.

Slashdot Top Deals

The next person to mention spaghetti stacks to me is going to have his head knocked off. -- Bill Conrad

Working...