Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Role Playing (Games)

Fable III Announced For 2010 52

Flea of Pain writes "Fable III is finally in the works! 'Peter Molyneux revealed that his team is working on Fable III, which will arrive in late 2010, two years after the release of Fable II. The game will give you the primary task of becoming Albion's king and leading the people to happiness and the kingdom to glory. Fable III will be something bold and different, Molyneux promises, stating that story and drama will play a major part in it. New things will be done with the dog and the bread-crumb-trails mechanic, which were present in the second game, and you will be offered complete control of your actions and your people's actions, as you will be the king of Albion. ... [Y]ou will need to balance many things, including poverty and greed, tyranny and compassion or progress and tradition, all in order to keep your subjects happy. Furthermore, you will be able to set taxes and decide how you will rule your subjects. Your spouse, be it a king or a queen, will also point you into various directions over the course of the game. It seems that you will start as a son or daughter of the hero from Fable II and then progress until the halfway point of the game when you will be named king or queen of Albion. This means that you need to keep your save data from Fable II in order for a higher degree of customization.'"

Comment Better housing/living conditions instead? (Score 1) 178

I might be wrong, but I believe that the spread of malaria is largely due to badly constructed houses into which the fly is able to enter through cracks during night. If the money went into establishing better living conditions in the affected areas, the threat of malaria in those areas would be lesser, as well as having obvious additional benefits for the people living there.

Just my 2p.

Security

Security Threat In the New Wiretapping Law 167

The NSA wants automatic surveillance capabilities in telephone switches. But once such capabilities are built in, others could use them to intercept communications. Within 10 years this could render the US vulnerable to attacks from terrorist groups across the globe, as well as from the military establishments of other nations. "Such threats are not theoretical: In April 2004, phones belonging to members of the Greek government, including the prime minister, were spied on with wiretapping software that was misused."
Data Storage

Backing Up Laptops In a Small Business? 293

Bithmus writes "I have been tasked with finding a way for our company to handle our laptop backups. We currently have nightly backups of our servers, but no backups of laptops. In our business we develop, implement, and sell another company's software; I guess that makes us a Valued Added Reseller. During development our consultants will create copies of a customer's database on MSDE on their laptops. If a hard drive crashes, all of the work done on that laptop is lost. There are other files that need to be saved, but the databases are really the important items. Ideally these databases would be stored on the SQL servers and the other files stored on the file server, but this is not happening. What do Slashdot readers do to protect data on laptops or computers outside of a local network?"

The Shock That Almost Wasn't 57

According to a senior designer on the 2K Boston (formerly Irrational) game Bioshock a number of publishers turned them down when the company brought the title to their doorstep. "Ken (Levine) spent years pitching the game to publishers but no one was interested, incredible as that seems now. I joined Irrational in December 2004 and my first job was to get a publishing deal for the game (I worked as the Business Development Director for the first six months). I remember pitching the game to one publisher who later told a friend of mine that it was 'just another f-ing PC FPS that's going to sell 250,000 units." Just in case you didn't catch it over the weekend, there's a demo for the game up on Xbox Live. PC owners hold tight: a PC demo is coming, and hopefully before the game launches on the 21st.
Portables (Games)

PSP Wi-Fi Impairs Processor Speed 57

GameDaily reports that the PlayStation Portable has an interesting restriction: its full processor power cannot be utilized at the same time as its WiFi functionality. Therefore, games that are played online cannot make use of the chip's 333mhz processor speed. The original finding from Beyond 3D was confirmed to GameDaily by Sony. Dave Karraker, Sr. Director, Corporate Communications: "The recent firmware upgrade (3.50) that removed the restriction on the PSP's CPU speed enables developers to utilize speeds either lower or higher than the default 222MHz, up to the full 333MHz clock speed. The article is correct that increased CPU speed cannot be used with the PSP's wireless feature." Though speculation is that this is a power-saving decision, there has been no official announcement as to the root cause.
Linux Business

Open Source Community's Double Standard 336

AlexGr writes to point out a really good point Matt Asay raises in his CNET News Blog: Why do we praise closed source companies who open up a little bit, but damn open source companies who close down a little bit? "Deja vu. Remember 2002? That's when Red Hat decided to split its code into Red Hat Advanced Server (now Red Hat Enterprise Linux) and Fedora. Howls of protest and endless hand-wringing ensued: How dare Red Hat not give everything away for free? Enter 2007. MySQL decides to comply with the GNU General Public License and only give its tested, certified Enterprise code to those who pay for the service underlying that code (gasp!). Immediately cries of protest are raised, How dare MySQL not give everything away for free?"
Programming

Submission + - The future of C++ as seen by its creator

holden writes: "In a rare public talk, C++ creator Dr. Bjarne Stroustrup discusses his ideal in programming languages, as well how he sees the next version (and beyond) of C++ developing. He explains the general selection criteria used for adding new features, some of the legacy of C++, and many other interesting topics. Especially interesting is during the Q&A he explains his views of the embrace and extend mentality some implementations, such as VC++, have taken. The talk is available as an xvid avi, mpg, and other formats."
Windows

High-Quality HD Content Can't Easily Be Played by Vista 434

DaMan1970 writes "Content protection features in Windows Vista from Microsoft are preventing customers from playing high-quality HD audio/video & harming system performance. Vista requires premium content like HD movies to be degraded in quality when it is sent to high-quality outputs, like DVI. Users will see status codes that say 'graphics OPM resolution too high'. There are ways to bypass the Windows Vista protection by encoding the movies using alternative codecs like X264, or DiVX, which are in fact more effective sometimes then Windows own WMV codec. These codecs are quite common on HD video Bittorrent sites, or Newsgroups."
Privacy

Police Data-Mining Done Right 321

enharmonix writes "Courtesy of Bruce Schneier, it's nice to hear something good about data mining for a change: predicting and stopping crime. For example, police in Redmond, VA, 'started overlaying crime reports with other data, such as weather, traffic, sports events and paydays for large employers. The data was analyzed three times a day and something interesting emerged: Robberies spiked on paydays near cheque cashing storefronts in specific neighbourhoods. Other clusters also became apparent, and pretty soon police were deploying resources in advance and predicting where crime was most likely to occur.'"
Security

Submission + - OpenBSD's Systrace broken by Cambridge researcher (lightbluetouchpaper.org)

An anonymous reader writes: University of Cambridge researcher Robert Watson has published a paper at the First USENIX Workshop On Offensive Technology (WOOT07) in which he describes serious vulnerabilities in OpenBSD's Systrace, Sudo, Sysjail, the TIS GSWTK framework, and CerbNG, and that the technique is also effective against many commercially available anti-virus systems. His slides include sample exploit code that bypasses access control, virtualization, and intrusion detection in under 20 lines of C code consisting solely of memcpy() and fork(). Sysjail has now withdrawn their software recommending against any use, and NetBSD has disabled Systrace by default in their upcoming release.
Privacy

Submission + - Keylogger Hardware Embedded in New Dell Laptop (virus.org.ua)

kendbluze writes: "Here's an EE who was doing a simple repair to a nearly-new Dell 600m laptop when he noticed something a bit curious. Turns out he found a hardware keylogger sitting between the keyboard and ethernet controllers! See what Homeland Security didn't have to say about it."
Republicans

White House E-mail Scandal Widens 839

Spamicles alerts us to a report just issued (PDF) by the House Committee on Oversight and Government Reform. At least 88 White House officials used Republican National Committee email accounts for government business. The RNC has destroyed at least some of the emails from 51 of those officials. Law requires emails sent by officials to be stored or recorded. There is evidence that White House lawyers and the (current) Attorney General knew of this but did not act to stop it. From the article: "These e-mail accounts were used by White House officials for official purposes, such as communicating with federal agencies about federal appointments and policies... Given the heavy reliance by White House officials on RNC e-mail accounts, the high rank of the White House officials involved, and the large quantity of missing e-mails, the potential violation of the Presidential Records Act may be extensive."

Slashdot Top Deals

"Can you program?" "Well, I'm literate, if that's what you mean!"

Working...