Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment maybe the people who (Score 2, Insightful) 861

Maybe the people who are in the real thing should sue him for not allowing fair access to the truth. they should be happy that it might shed some light on what actually happens in iraq and afgan for the families. if more people would watch it than they would understand what vets have seen and experienced/
The Internet

Submission + - Internet to run out of IP addresses in 18 months 3

thefickler writes: According to Daniel Karrenberg the chief scientist at RIPE NCC, the organization that issues IP addresses in Europe, the web will run out of IP addressees in 18 months — making harder to add new devices to the Internet. The problem appears to be that companies are being slow to adopt the latest Internet Protocol Addressing Scheme (version 6 (IPv6), which can provide trillions of IP addresses, rather than a measly few billion(iPv4) One wag has implored the IT world to take action on this issue: "Come on, get off the fence and let's get on the Ipv6 bandwagon so that my refrigerator can have its own address!" Glad someone out there really understands just how serious this issue is.

Submission + - Zone .DE plagued by problems (heise.de) 4

mseeger writes: The zone .DE has been plagued by problems today. Four of six root servers were declaring any .DE domain as non-existent. Heise has some news about it and recommends to enter their IP into the hosts-file for the duration of the crisis. The .de zone is the second largest of the world, only beaten by .com.

Comment Re:QuikClot (Score 1) 92

QuikClot is used as a last resort after a tourniquet and direct pressure. The medical team has to literary cut out the chemical. Because of the clots potentially getting in the blood stream is why its the last line of defense in a combat zone. Ref: AF Combat Lifesavers Training
The Almighty Buck

Submission + - Treasury Goes High Tech with Redesigned $100 Bills

Hugh Pickens writes: "AP reports that as part of an effort to stay ahead of counterfeiters, the Department of the Treasury has designed a high-tech makeover of the $100 bill with a disappearing Liberty Bell in an inkwell and a bright blue security ribbon composed of thousands of tiny lenses that magnify objects in mysterious ways. The new blue security ribbon will give a 3-D effect to the micro-images that the thousands of lenses will be magnifying. Tilt the note back and forth and you will see tiny bells on the ribbon change to 100s as they move. Tilt the note side to side and the images will move up and down. "We wanted the changes to be very obvious, visible and easy to see," says Larry Felix, director of the Bureau of Engraving and Printing. The $100 bill is a favorite of foreign counterfeiters says US Secret Service spokesperson Edwin Donovan. “It’s in the most exotic, far away and non-domestic locales abroad where this activity goes on most." While the added security features should thwart counterfeits of the new note for the time being, the old note will remain in circulation and can still be counterfeited, “While the old notes get retired, counterfeiting becomes more difficult," says Scott J. Dressler. Assistant professor of economics at Villanova University’s School of Business. "Therefore, you can think of this as the beginning of the end for counterfeiters — until they can successfully pass off a counterfeit of the new bill.”"
Government

Submission + - Mock Cyber Attack Shows US Unpreparedness (net-security.org)

An anonymous reader writes: During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an extent that would not affect considerably the everyday life of its citizens. The ballroom of the Washington's Mandarin Oriental Hotel was for this event transformed into the the White House Situation Room, complete with three video screens displaying maps of the country, simulated updates and broadcasts by "GNN", an imaginary television network "covering" the crisis.
Games

Submission + - Blizzard temporarily bans WoW's top guild (mmo-champion.com) 1

RogueyWon writes: "MMO Champion is reporting that Blizzard have temporarily banned the world's top World of Warcraft guild, for what appears to be the accidental exploitation of a bug that Blizzard themselves have introduced into the final encounter of the Wrath of the Lich King expansion. Details are somewhat sparse, and those that are available have mostly come from the guild involved, but it appears that a bug in the fight meant that normal tactics caused some of the boss's mechanics to fail to trigger, resulting in the boss being easier to defeat than intended. Blizzard's draconian response seems likely to raise eyebrows, given that their own testing cycle clearly shares at least part of the blame."
Networking

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Submission + - Prevent my hosting provider from rooting my server (gnu-designs.com) 3

hacker writes: "I have a heavily-hit public server (web, mail, cvs/svn/git, dns, etc.) that runs a few dozen OSS project websites, as well as my own personal sites (gallery, blog, etc.). From time to time, the server has "unexpected" outages, which I've determined to be the result of hardware, network and other issues on behalf of the provider. I run a lot of monitoring and logging on the server-side, so I see and graph every single bit and byte in and out of the server and applications, so I know it's not the OS itself.

When I file "WTF?" style support tickets to the provider through their web-based ticketing system, I often get the response of "Please provide us with the root password to your server so we can analyze your logs for the cause of the outage." Moments ago, there were 3 simultaneous outages, while I was logged into the server working on some projects. Server-side, everything was fine. They asked me for the root password, which I flatly denied (as I always do), and then they rooted the server anyway, bringing it down and poking around through my logs anyway. This is at least the third time they've done this without my approval or consent.

Is it possible to create a minimal Linux boot that will allow me to reboot the server remotely, come back up with basic networking and ssh, and then from there, allow me to log in and mount the other application and data partitions under dm-crypt/loop-aes and friends?

With sufficient memory and CPU, I could install VMware and run my entire system within a VM, and encrypt that. I could also use UML, and try to bury my data in there, but that's not encrypted. Ultimately, I'd like to have an encrypted system end-to-end, but if I do that, I can't reboot it remotely without entering the password at boot time. Since I'll be remote, that's a blocker for me.

What does the Slashdot community have for ideas in this regard? What other technologies and options are at my disposal to try here (beyond litigation and jumping providers, both of which are on the short horizon ahead)."

Submission + - Linux Media Center Apps?

Bryan Gividen writes: I am looking to turn my quickly-aging Dell Laptop into a Linux Media Center that I will hook up to a flatscreen TV. As a Linux novice, I use Ubuntu and am looking for good applications to make it a complete Media Center. Thing is, I don't know how complete, complete can be. I turn to Slashdot to guide me on everything I should install and any additional hardware I ought to look into.
Privacy

Submission + - TSA, Airlines launch pre-travel permission system (abc2news.com) 1

drDugan writes: ABC news is reporting that the US Transportation Security Administration is rolling out new security guidelines called the 'Secure Flight Program'. When buying a ticket, travelers provide the full name, gender, and date of birth that matches the government-issued photo ID used at the time of travel. The collected data will be used to screen against state-run watch lists before travel begins, effectively creating a permission based system for US flights. The TSA press release asserts, "Secure Flight will make travel safer and easier for passengers." The goal is for the government agency to pre-approve travel for 100% of all domestic and international flights by the end of next year. EPIC also has details.

Submission + - StephenConroy.com.au vs auDA – the stoush co (itwire.com)

Grimo writes: Both sides are holding their ground; unfortunately the ground currently held by auDA includes the confiscated domain name. Late yesterday, Chris Dispain of auDA responded to Monday's open letter in defence of the 'takedown' against stephenconroy.com.au. The response; After some consideration, website administrators responded with this:
It is again with great disappointment that we note you have failed to acknowledge para 3 (point 2) of our previous communication. We feel that your initial handling of this issue is of particular relevance and again contest that your office acted politically in it's motivation to shut down our site. We request that control of the 'stephenconroy.com.au' related domain names be returned to us within three business hours of this communication, the same time you granted us to make representations on Friday 18 December. Please note that this is an open letter which we intend to publish and release to the media immediately.

Slashdot Top Deals

Let the machine do the dirty work. -- "Elements of Programming Style", Kernighan and Ritchie

Working...