Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:/etc/inittab (Score 1) 314

It's still possible in daemontools to run a shell script wrapper from /etc/service/foo/run around some real server in Java/Erlang/whatever. Stopping the service with "svc -d /etc/service/foo" will then entirely fail to kill the server process. I would imagine that the systemd's cgroup suport would avoid this happening.
The Internet

Britain Gets National .uk Web Address 111

hypnosec (2231454) writes 'Starting today businesses and individuals in the UK will be able to register a new national web address (".uk") and drop their existing ".co.uk" or ".com" suffix in favour of a shorter and snappier domain name. The entire process along with the transition is being overseen by private yet not-for-profit organisation Nominet, which has already started notifying existing customers with a ".co.uk" domain of their chance to adopt a ".uk" domain. Nominet will reserve all ".uk" domain names, which already have a ".co.uk" counterparts, for the next five years offering registrants the chance to adopt the new domain and to keep cyber squatters at bay.'

Comment Re:"There's zero benefit a consumer gets from that (Score 1) 47

There's a reasonable argument for moving to 64-bit on security grounds too. The increase in virtual address space makes ASLR far more effective since there are many more options for positioning compared to 32-bit code. On top of that, any attacks are more likely to hit a unallocated page as opposed to anything useful (with some limitations of course).

Submission + - Over +36 exploits in latest Java with +140 for all Oracle products discovered (zdnet.com)

An anonymous reader writes: More bad press can't seem to escape Oracle.

Oracle is posting patches for all its products next Tuesday which include +36 exploits for Java alone and over 140 for all Oracle products currently supported included over 80 that require no authentication to execute.These patches look to be critical for any administrator. Java 6 users who use equipment or programs that rely on older versions are SOL unless you sign up for a very expensive support contract as these patches are for Java 7 only.

Submission + - Target Admits 110 Million Victims in Data Breach, Not 40 Million (slashdot.org)

Nerval's Lobster writes: Retail giant Target continues to drastically downplay the impact of the massive data breach it suffered during December, even while admitting the number of customers affected is nearly twice as large as it had previously estimated. Target admitted today the massive data breach it suffered during the Christmas shopping season was more than twice as large and far more serious than previously disclosed. A Jan. 10 press release admits the number of customers affected by the second-largest corporate data breach in history had increased from 40 million to 70 million, and that the data stolen included emails, phone numbers, street addresses and other information absent from the stolen transactional data that netted thieves 40 million debit- and credit-card numbers and PINs. “As part of Target’s ongoing forensic investigation, it has been determined that certain guest information — separate from the payment card data previously disclosed — was taken during the data breach” according to Target’s statement. “This theft is not a new breach, but was uncovered as part of the ongoing investigation.” The new revalation does represent a new breach, however, or at least the breach of an unrelated system during the period covered during the same attack, according to the few details Target has released. Most analysts and news outlets have blamed the breach on either the security of Target’s Windows-based Point-of-Sale systems or the company’s failure to fulfill its security obligations under the Payment Card Industry Data Security Standard (PCI DSS).

Submission + - How Chris Christie Could Use the NSA Playbook to Defend Himself over Bridgegate

Hugh Pickens DOT Com writes: Conor Friedersdorf has written a tongue-in-cheek article in The Atlantic advising New Jersey Governor Chris Christie how he can use the NSA playbook to successfully defend himself of the charges that a senior member of his staff was involved in shutting down George Washington Bridge traffic, a stunt meant to punish the mayor of an affected town for opposing his reelection. Christie's NSA-inspired explanation would include the following points: There are almost 9 million people in New Jersey, and only one was targeted for retribution, an impressively tiny error rate lower than .001 percent; The bridge closure was vital to national security because [redacted]; Since the George Washington Bridge is a potential terrorist target, everything that may or may not have happened near it is a state secret; Going after a political rival is wrong but it's important to put this event in context; Fort Lee Mayor Mark Sokolich was the only target of non-compliant behavior. No other Fort Lee resident was ever targeted for retribution, and any delays that any Fort Lee resident experienced were totally inadvertent and incidental; Finally a panel will be formed to figure out how to restore the public's faith in Chris Christie. "To some readers, these talking points may seem absurd or deliberately misleading," concludes Friedersdorf, "but there isn't any denying that so far they're working okay for the NSA."

Submission + - Mars One studying how to maintain communications with Mars 24/7 (satellitetoday.com)

braindrainbahrain writes: Mars One, the low credibility effort to colonize Mars, is at least funding some interesting concept studies for their alleged plan to colonize the red planet. One of the most interesting is the effort to maintain uninterrupted communications with Mars. This is not as trivial as it may sound, as any satellite in Martian orbit will still have to deal with occultations between Mars and Earth due to the Sun. Surrey Satellite Technology will be performing the study.

Submission + - Samsung, Apple Agree to try Mediation in Patent Disputes (LA Times) (latimes.com)

An anonymous reader writes: The smartphone and tablet rivals will work with a mediator in an effort to settle their patent disputes in advance of a second trial on the issues scheduled for this spring, according to Bloomberg News. The agreement, filed in federal court in San Jose today, was in response to U.S. District Judge Lucy Koh’s request in November that both sides submit a settlement discussion proposal before trial. Senior legal executives at the companies met Jan. 6 to discuss “settlement opportunities,” according to the proposal. The companies agreed to retain a mediator “who has experience mediating high profile disputes,” according to the filing, which doesn’t name the person. The chief executive officers and three to four company lawyers, but no outside lawyers, will attend the mediation before Feb. 19, according to the filing.

http://www.bloomberg.com/news/2014-01-09/apple-samsung-agree-to-mediator-in-attempt-to-settle-suit.html

Submission + - New class of "hypervelocity stars" discovered escaping the galaxy (vanderbilt.edu)

Science_afficionado writes: Astronomers have discovered a surprising new class of “hypervelocity stars” that are moving at more than a million miles per hour, fast enough to escape the gravitational grasp of the Milky Way galaxy. The 20 hyper stars are about the same size as the sun and, other than their extreme speed, have the same composition as the stars in the galactic disk. The big surprise is that they don't seem to come from the galaxy's center. The generally accepted mechanism for producing hypervelocity stars relies on the extreme gravitational field of the supermassive black hole that resides in the galaxy's core. So the discovery means that astrophysicists must come up with an entirely new method for speeding stars to hypervelocities.

Submission + - IBM patents encryption technique to run unencyrpted VMs and programs (infoworld.com) 1

WillAffleckUW writes: Infoworld reports IBM has a patent on an encryption method that, if implemented, allows you to process encrypted data without having to decrypt it first.

Called "fully homomorphic encryption," this encryption method patent may result in software products in the near future.

Normally, encrypted data must be decrypted entirely before any math or programming operations can be run. Homomorphic encryption (HE), however, lets you perform math directly on the encrypted data and have the results show in the underlying data.

From a security viewpoint, there is no need to decrypt any data and expose it to attack.Supposedly, programs (or entire VMs) could run while encrypted and exchange encrypted data between themselves while running.

Bruce Schneier in 2009 pointed out this is not a new technique: "Visions of a fully homomorphic cryptosystem have been dancing in cryptographers' heads for thirty years."

Schneier pointed out this technique could take longer to tun, but IBM claims that Victor Shoup and Shai Halevi of tT. J. Watson Research Center, claim to have taken Gentry's original breakthroughs and implemented them practically, with a released open source, GPL-licensed C++ library to perform HE, mostly meant for researchers working on HE.

"Hopefully in time we will be able to provide higher-level routines," writes Halevi.

Bob Gourley of CTOvision.com writes, "I have seen nothing in any of the research that makes me think a solution can be put in place that cannot be defeated by bad guys. And if that can’t be done then the solution will not solve any problems, it will just add processing overhead."

Since the implemented may not be that efficient, IBM has public challenges for its HE schemes, allowing successful attacks on the Gentry-Halevi implementation of HE to be examined in detail.

Submission + - Quantum Mechanics Forbids the Expansion of Spacetime at Scales Smaller than 60m (medium.com)

KentuckyFC writes: In the late 1990s, astronomers discovered that not only is the universe expanding but the rate of expansion is increasing. In other words, every galaxy in the cosmos is accelerating away from us. Since then, cosmologists have been intensely interested in studying the effect in more detail. Now one astrophysicist has calculated that quantum mechanics places important limits on how the expansion can be observed. The conclusion comes from a simple thought experiment. Imagine two quantum particles in an accelerating universe like the one we live in. As the universe expands, the separation between these particles increases, an effect that is measurable by their redshift (which is how astronomers measure the movement of distant galaxies). However, quantum mechanics naturally introduces some uncertainty into the position of both particles which can swamp any distance changes caused by cosmic acceleration. And the critical distance at which this uncertainty becomes important is 60 metres. That means there is no measurement, even in principle, that could unambiguously reveal cosmic expansion on scales smaller than 60 metres or so. And there is no sense in which a region of space can be said to expand on these smaller scales. That's interesting because it is the first theory to predict a natural boundary between the quantum and cosmic scales and also predict the scale at which this happens.

Submission + - A Beautiful Mind and Broken Body for Silicon Valley (businessweek.com)

pacopico writes: About 30 years ago, a young Marine and math savant named Ramona Pierson was out for a run when she got hit by a drunk driver and had her body shattered. As Businessweek reports, Pierson ended up in coma for 18 months, came out blind and emaciated and was sent to live in an old folks home. Her remarkable story takes off from there to include bike racing through Russia, a PhD in neuroscience, a stint fixing Seattle's public schools and now Declara, a social network run by Pierson and funded by billioniare Peter Thiel, who put the original money into Facebook. One of the more original start-up tales to have ever come out of Silicon Valley or really anywhere.

Submission + - Undiscovered Country of HFT: FPGA JIT Ethernet packet assembly

michaelmalak writes: In a technique that reminds me of the just-in-time torpedo engineering of Star Trek VI: The Undiscovered Country, a company called Argon Design has "developed a high performance trading system" that puts an FPGA — and FPGA-based trading algorithms — right in the Ethernet switch. And it isn't just to cut down on switch/computer latency — they actually start assembling and sending out the start of an Ethernet packet simultaneously with receiving and decoding incoming price quotation Ethernet packets, and decide on the fly what to put in the outgoing buy/sell Ethernet packet. They call these techniques "inline parsing" and "pre-emption."

Submission + - 'Lightsaber Molecules' Discovered (phys.org)

An anonymous reader writes: Harvard and MIT Scientists have reportedly discovered a new form of matter termed 'photonic molecules.' By passing lasers through a chamber with pumped-in rubidium molecules, the researchers have coerced photons into behaving like mass-y particles, including interacting with each other.

"It's not an in-apt analogy to compare this to light sabers", Lukin, one of the researchers states, "When these photons interact with each other they're pushing against and deflect each other. The physics of what's happening in these molecules is similar to what we see in the movies."

Sensationalism or really breakthrough science?

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...