Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Advertising

The Apple Broadcast Network 190

Hodejo1 writes "In 1959 5,749,000 television sets were sold in the US, bringing the cumulative total of sets sold since 1950 to 63,542,128 units. This number supported, through advertising, three national television networks, ABC, NBC, and CBS (a fourth, Dumont, folded in 1956) and numerous local independent stations. Now here are another set of numbers. As of April this year Apple sold 75 million iPhone and iPod touch units, devices capable of delivering video via Wi-Fi and 3G connectivity. Add to that figure 2 million iPads and counting. By the end of the year Apple should have about 90 million smart mobile devices in the wild. That makes a proprietary amalgam greater than what the TV networks had in 1959 and one that easily serves as a foundation for a pending broadcast network that will be delivered not through tall radio towers, but through small wireless hubs and the Internet. Call it the Apple Broadcast Network. iAd is how Apple plans to pay for it."
Crime

Submission + - SEC charges Diebold with fraud (sec.gov) 1

An anonymous reader writes: Yesterday the SEC charged Diebold, Inc. and three former execs with accounting fraud spanning most of the last decade. The CEO was not formally charged, but agreed to reimburse the company for certain compensation granted during the time frame of the fraud.

Comment maybe the people who (Score 2, Insightful) 861

Maybe the people who are in the real thing should sue him for not allowing fair access to the truth. they should be happy that it might shed some light on what actually happens in iraq and afgan for the families. if more people would watch it than they would understand what vets have seen and experienced/
The Internet

Submission + - Internet to run out of IP addresses in 18 months 3

thefickler writes: According to Daniel Karrenberg the chief scientist at RIPE NCC, the organization that issues IP addresses in Europe, the web will run out of IP addressees in 18 months — making harder to add new devices to the Internet. The problem appears to be that companies are being slow to adopt the latest Internet Protocol Addressing Scheme (version 6 (IPv6), which can provide trillions of IP addresses, rather than a measly few billion(iPv4) One wag has implored the IT world to take action on this issue: "Come on, get off the fence and let's get on the Ipv6 bandwagon so that my refrigerator can have its own address!" Glad someone out there really understands just how serious this issue is.

Submission + - Zone .DE plagued by problems (heise.de) 4

mseeger writes: The zone .DE has been plagued by problems today. Four of six root servers were declaring any .DE domain as non-existent. Heise has some news about it and recommends to enter their IP into the hosts-file for the duration of the crisis. The .de zone is the second largest of the world, only beaten by .com.

Comment Re:QuikClot (Score 1) 92

QuikClot is used as a last resort after a tourniquet and direct pressure. The medical team has to literary cut out the chemical. Because of the clots potentially getting in the blood stream is why its the last line of defense in a combat zone. Ref: AF Combat Lifesavers Training
The Almighty Buck

Submission + - Treasury Goes High Tech with Redesigned $100 Bills

Hugh Pickens writes: "AP reports that as part of an effort to stay ahead of counterfeiters, the Department of the Treasury has designed a high-tech makeover of the $100 bill with a disappearing Liberty Bell in an inkwell and a bright blue security ribbon composed of thousands of tiny lenses that magnify objects in mysterious ways. The new blue security ribbon will give a 3-D effect to the micro-images that the thousands of lenses will be magnifying. Tilt the note back and forth and you will see tiny bells on the ribbon change to 100s as they move. Tilt the note side to side and the images will move up and down. "We wanted the changes to be very obvious, visible and easy to see," says Larry Felix, director of the Bureau of Engraving and Printing. The $100 bill is a favorite of foreign counterfeiters says US Secret Service spokesperson Edwin Donovan. “It’s in the most exotic, far away and non-domestic locales abroad where this activity goes on most." While the added security features should thwart counterfeits of the new note for the time being, the old note will remain in circulation and can still be counterfeited, “While the old notes get retired, counterfeiting becomes more difficult," says Scott J. Dressler. Assistant professor of economics at Villanova University’s School of Business. "Therefore, you can think of this as the beginning of the end for counterfeiters — until they can successfully pass off a counterfeit of the new bill.”"
Government

Submission + - Mock Cyber Attack Shows US Unpreparedness (net-security.org)

An anonymous reader writes: During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an extent that would not affect considerably the everyday life of its citizens. The ballroom of the Washington's Mandarin Oriental Hotel was for this event transformed into the the White House Situation Room, complete with three video screens displaying maps of the country, simulated updates and broadcasts by "GNN", an imaginary television network "covering" the crisis.
Games

Submission + - Blizzard temporarily bans WoW's top guild (mmo-champion.com) 1

RogueyWon writes: "MMO Champion is reporting that Blizzard have temporarily banned the world's top World of Warcraft guild, for what appears to be the accidental exploitation of a bug that Blizzard themselves have introduced into the final encounter of the Wrath of the Lich King expansion. Details are somewhat sparse, and those that are available have mostly come from the guild involved, but it appears that a bug in the fight meant that normal tactics caused some of the boss's mechanics to fail to trigger, resulting in the boss being easier to defeat than intended. Blizzard's draconian response seems likely to raise eyebrows, given that their own testing cycle clearly shares at least part of the blame."
Networking

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Submission + - Prevent my hosting provider from rooting my server (gnu-designs.com) 3

hacker writes: "I have a heavily-hit public server (web, mail, cvs/svn/git, dns, etc.) that runs a few dozen OSS project websites, as well as my own personal sites (gallery, blog, etc.). From time to time, the server has "unexpected" outages, which I've determined to be the result of hardware, network and other issues on behalf of the provider. I run a lot of monitoring and logging on the server-side, so I see and graph every single bit and byte in and out of the server and applications, so I know it's not the OS itself.

When I file "WTF?" style support tickets to the provider through their web-based ticketing system, I often get the response of "Please provide us with the root password to your server so we can analyze your logs for the cause of the outage." Moments ago, there were 3 simultaneous outages, while I was logged into the server working on some projects. Server-side, everything was fine. They asked me for the root password, which I flatly denied (as I always do), and then they rooted the server anyway, bringing it down and poking around through my logs anyway. This is at least the third time they've done this without my approval or consent.

Is it possible to create a minimal Linux boot that will allow me to reboot the server remotely, come back up with basic networking and ssh, and then from there, allow me to log in and mount the other application and data partitions under dm-crypt/loop-aes and friends?

With sufficient memory and CPU, I could install VMware and run my entire system within a VM, and encrypt that. I could also use UML, and try to bury my data in there, but that's not encrypted. Ultimately, I'd like to have an encrypted system end-to-end, but if I do that, I can't reboot it remotely without entering the password at boot time. Since I'll be remote, that's a blocker for me.

What does the Slashdot community have for ideas in this regard? What other technologies and options are at my disposal to try here (beyond litigation and jumping providers, both of which are on the short horizon ahead)."

Slashdot Top Deals

As far as the laws of mathematics refer to reality, they are not certain, and as far as they are certain, they do not refer to reality. -- Albert Einstein

Working...