Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Toys

Lego Secret Vault Contains All Sets In History 266

An anonymous reader writes "Gizmodo has an exclusive video and feature of one of the most heavily guarded secrets in Lego: the security vault where they store all the Lego sets ever created, new in their boxes. 4,720 sets from 1953 to 2008. Really amazing stuff and a trip down memory lane to every person who has played with the magic bricks. All combined, the collection must be worth millions, not only because of the collector value, but also because Lego uses it as a safeguard in copyright and patent cases."
NASA

Groundbreaking Solar Mission Faces Chilly Death 134

iamlucky13 writes "Over 17 years ago, the Ulysses spacecraft was launched aboard the space shuttle Discovery for a unique NASA/ESA mission. While nearly all other probes travel along our solar system's ecliptic plane, Ulysses used a Jupiter gravity assist to swing 80 degrees out of plane, carrying it over the sun's poles for an unprecedented view. During a mission that lasted four times longer than planned, it has flown through the tails of several comets, helped pinpoint distant gamma-ray bursts, and provided data on the sun and its heliosphere from the better part of two solar cycles. Unfortunately, the natural reduction of power from its radioisotope thermal generator means it is now unable to even keep its attitude control fuel from freezing, and NASA has decided to formally conclude the mission on July 1."
Security

Gaining System-Level Access To Vista 412

An anonymous reader writes "This video shows a method by which a user can use a Linux distro called BackTrack to gain system access to Windows Vista without logging into Windows or knowing the username or password for any accounts. To accomplish this, the user renames cmd.exe to Utilman.exe — this is the program that brings up the Accessibility options for users without sight or with limited vision. The attack takes advantage of the fact that the Utility Manager can be invoked before the user logs into the system. The user gains System access, which is a level higher than Administrator. The person who discovered this security hole claims that XP, 2000, 2003 and NT are not vulnerable to it; only Windows Vista is."
Networking

Use BitTorrent To Verify, Clean Up Files 212

jweatherley writes "I found a new (for me at least) use for BitTorrent. I had been trying to download beta 4 of the iPhone SDK for the last few days. First I downloaded the 1.5GB file from Apple's site. The download completed, but the disk image would not verify. I tried to install it anyway, but it fell over on the gcc4.2 package. Many things are cheap in India, but bandwidth is not one of them. I can't just download files > 1GB without worrying about reaching my monthly cap, and there are Doctor Who episodes to be watched. Fortunately we have uncapped hours in the night, so I downloaded it again. md5sum confirmed that the disk image differed from the previous one, but it still wouldn't verify, and fell over on gcc4.2 once more. Damn." That's not the end of the story, though — read on for a quick description of how BitTorrent saved the day in jweatherley's case.
Microsoft

Groklaw Examines Microsoft's Promises 125

I Don't Believe in Imaginary Property writes "Groklaw has examined that 'new leaf' Microsoft turned the other day. PJ has a lengthy analysis of Microsoft's latest promises. To make a long story short, the promises are more of the same stuff and don't help anyone but Microsoft. They only protect 'noncommercial' development and are set up to create a patented standards toll road so that Microsoft can charge competitors to compete. As PJ puts it, 'This is a promise to remain incompatible with the GPL, as far as I can make out.'"

Optimus Keyboard Starts Shipping 309

Tom's Hardware is reporting that the Optimus keyboard that everyone was so anxious for (although maybe less so when they saw the price tag) started shipping this week. "According to an announcement made on the Optimus project blog, keyboards are now shipping to customers who pre-ordered the $1564 keyboard nine months ago. Keyboards with passive keys are delayed and will be shipping in about a month, the manufacturer said. [...] Earlier this month, one of the first Optimus Maximus keyboards was sold for $2750 on Ebay." Engadget even got the chance to test one of these expensive toys out.
Google

Google Funds Work for Photoshop on Linux 678

S point 2 writes "Google has announced that they have hired Codeweavers, maker of the popular Wine software to make Photoshop run better on Linux. 'Photoshop is one of those applications that desktop Linux users are constantly clamoring for, and we're happy to say they work pretty well now...We look forward to further improvements in this area.' It is unknown whether or not the entire Creative Suite will be funded for support, but for the time being it seems Photoshop-on-Linux development is getting a new priority under Google."
Security

Serious Vulnerability In Firefox 2.0.0.12 355

Oh, Not Now writes "Mozilla Firefox 2.0.0.12, mere hours old, is vulnerable by default to a directory traversal trick, via the view-source mechanism. Although mitigated by the NoScript plug-in, this is quite a serious bug — the default installation is vulnerable from the get-go."
Science

A Torrid Tale of Plagiarizing Paleontologists 160

its hard to think of writes "There's an interesting story up at Nature News about scientific ethics. It seems that while one group of scientists is figuring out details about aetosaurs (ancient crocodiles), another group in New Mexico is repeatedly taking credit for their work and naming the new animals they 'discover'. It also looks like the state government, which has been asked to intervene, is trying to sidestep the issue. 'The New Mexico cultural-affairs department, which oversees the museum, conducted a review of two of the instances last October and concluded that the allegations were groundless. But some experts call that review a whitewash, claiming that it failed to follow accepted practices of US academic institutions faced with claims of misconduct. Now all three cases are before the Ethics Education Committee of the Society of Vertebrate Paleontology, a professional organization based in Northbrook, Illinois, which is awaiting responses from the New Mexico team before making a ruling.' How widespread is this kind of thing?"
Social Networks

Facebook Photos Land Eden Prairie Kids in Trouble 626

slim-t writes "The Star Tribune is reporting that students have been disciplined for photos of them on Facebook. 'Eden Prairie High School administrators have reprimanded more than 100 students and suspended some from sports and other extracurricular activities after obtaining Facebook photos of students partying, several students said Tuesday.' Is the school right to do this? My opinion is that the students should know not to post pictures of yourself breaking the law." I'd just like to know what all those administrators are doing cruising Facebook pages looking at the students in their school.
Government

Army Buys Macs to Beef Up Security 342

agent_blue writes "The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. 'Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army's Apple program, created [in 2005], is working to change that.'"
It's funny.  Laugh.

Student Given Detention For Using Firefox [UPDATED] 818

An anonymous reader writes "Several sites are reporting that a student has been given detention for using Firefox to do his classwork. No, really. The student was in class, working on an assignment that necessitated using a browser. The teacher instructed him to stop using Firefox and to do his classwork, to which the student responded that he was doing his classwork using a 'better' browser (it is unclear whether the computer was the student's own computer or not). The clueless teacher (who called the rogue program 'Firefox.exe') ordered him to detention." Update: 12/17 20:09 by SM One of the school officials was nice enough to contact us and let us know this is a hoax. If you are planning on calling the school please refrain from doing so, I'm sure they have had enough excitement for one day.
Science

Arecibo Observatory Loses Funding 185

An anonymous reader noted that "The Arecibo Observatory funding was slashed. Cut to $8 million from $10.5 million, which will decrease the amount of time that the telescope is operational. "A quarter of its staff was laid off last year," and Arecibo, which is located in Puerto Rico, could possibly be completely closed in four years, according to the "National Science Foundation (NSF), which pays for the operation of the telescope." This comes after "a review panel for the foundation's astronomy division two years ago" suggested cutting Arecibo's financing by 25 percent as a way to pay for new facilities. There has been "[a]n outcry" in response to the "decision, particularly from planetary scientists" who argued that the panel "overlooked Arecibo's role in cataloging potential dangers from asteroids." The Times notes that in Arecibo's favor is the fact that it "may be much cheaper to keep...open" than dismantle, which "could cost hundreds of millions of dollars."" I've been considering a vacation to PR for a few years, and seeing this thing is on my list of awesome things to try to see. Guess I should hurry ;)
Security

Using Google To Crack MD5 Passwords 232

stern writes "A security researcher at Cambridge was trying to figure out the password used by somebody who had hacked his Web site. He tried running a dictionary through the encryption hash function; no dice. Then he pasted the hacker's encrypted password into Google, and voila — there was his answer. Conclusion? Use no password that any other human being has ever used, or is ever likely to use, for any purpose. I think."
Movies

Star Trek XI Plot Details Revealed 220

HotChk101 writes to tell us that the plot for Star Trek XI has been revealed over at IESB. This information has not yet been confirmed by the studio so take with the requisite grain of salt. Be warned link contains potential spoiler information.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...