Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Piracy

Submission + - Graduated Response targets English Countries

bs0d3 writes: Of all the countries where graduated response measures for copyright infringement are used, there seems to be a bias for english speaking countries. Ireland, New Zealand, the United States, France and the UK are the only countries where you should be concerned with receiving regular copyright warning letters. Not to be confused with "notice of litigation letters" sent to large scale pirates who are being sued, copyright warning letters have for the most part been nothing more than scare messages that began in 2003. Out of the 5 countries where these letters may lead to some consequence, 4 of them speak english as a first language. One has to wonder if Australia and Canada are next.
Space

Does Famous Exoplanet 'Fomalhaut b' Really Exist? 40

astroengine writes "The first exoplanet ever to be directly imaged by the Hubble space telescope may not exist. In 2008, the world was in awe of the famous 'Eye of Sauron' image of the star Fomalhaut's dusty ring — plus a slowly moving object that was identified as Fomalhaut b, a gas giant world approximately three times the mass of Jupiter. However, due to a strange orbital misstep detected between 2008 and 2009 photographs, the validity of Fomalhaut b's detection is being questioned, generating some controversy in the exoplanet community."
Bug

SCADA Problems Too Big To Call 'Bugs,' Says DHS 92

chicksdaddy writes "With the one year anniversary of Stuxnet upon us, a senior cybersecurity official at the Department of Homeland Security says the agency is reevaluating whether it makes sense to warn the public about all of the security failings of industrial control system (ICS) and SCADA software used to control the U.S.'s critical infrastructure. DHS says it is rethinking the conditions under which it will use security advisories from ICS-CERT to warn the public about security issues in ICS products. The changes could recast certain kinds of vulnerabilities as 'design issues' rather than a security holes. No surprise: independent ICS experts like Ralph Langner worry that DHS is ducking responsibility for forcing changes that will secure the software used to run the nation's critical infrastructure. 'This radically cuts the amount of vulnerabilities in the ICS space by roughly 90%, since the vast majority of security "issues" we have are not bugs, but design flaws,' Langner writes on his blog. 'So today everybody has gotten much more secure because so many vulnerabilities just disappeared.'"
Security

Submission + - Microsoft Flips 'Kill Switch' On DigiNotar Certs (computerworld.com)

CWmike writes: "Microsoft today updated Windows to permanently block all digital certificates issued by a Dutch company that was hacked months ago. The update moves all DigiNotar SSL certificates to Windows' block list, dubbed the Untrusted Certificate Store. IE uses that list to bar the browser from reaching sites secured with dubious certificates. The Windows update will be automatically downloaded and installed to machines that have Windows Update's Automatic Update enabled, Microsoft said in a security advisory. Microsoft's Dutch customers, however, won't see the update for another week. 'At the explicit request of the Dutch government, Microsoft will delay deployment of this update in the Netherlands for one week to give the government time to replace certificates,' Microsoft's Dave Forstrom said in a blog post on Tuesday. Dutch users can get the update here."
Wireless Networking

Submission + - Full Duplex Wireless Tech Could Double Bandwidth (computerworld.com)

CWmike writes: "Rice University researchers announced on Tuesday that they have successfully demonstrated full-duplex wireless tech that would allow a doubling of network traffic without the need for more cell towers. Professor Ahutosh Sabharwal said the innovative technology requires a minimal amount of new hardware for both mobile devices and networks. However, it does require new standards, meaning it might not be available for several years as carriers move to 5G networks, he added. By allowing a cell phone or other wireless device to transmit data and receive data on the same frequency, unlike with today's tech, the new standard could double a network's capacity. Rice has created a Wireless Open-Access Research Platform (WARP) with open source software that provides a space for researches from other organizations to innovate freely and examine full-duplex innovations."
Programming

Submission + - Tool for automating registry forensics is released (blogspot.com)

An anonymous reader writes: A new open source tool named Registry Decoder has just been released that automates the task of forensics analysis of registry hives. After receiving initial funding from the National Institute of Justice, the tool has had continued development from a private firm. The tool utilizes a number of commonly seen open source forensics libraries such as the Sleuthkit and reglookup.

Submission + - Earliest Music Synth reenacted in the Uk (eastlondonlines.co.uk)

ptresset writes: pioneering musician and composer who founded the BBC radiophonics workshop and invented the Oramics machine.
The machine, designed and built in the 1950s was the precursor to the synthesizer later taken up by The Beatles and Pink Floyd. The machine turns lines drawn on clear strips of film by musicians, into music.
Now the machine is to be restored at Goldsmiths under the supervision of Dr Mick Grierson who initially found it, then in a very poor condition, and persuaded Goldsmiths to buy it.
An interesting side effect is that a reproduction iphone app now exists... http://www.synthtopia.com/content/2011/08/09/oramics-app-recreates-pioneering-synth-of-daphne-oram-for-ios/

Virtualization

Submission + - Why VMware Should Worry More About Red Hat (informationweek.com)

gManZboy writes: "KVM? Isn’t that horse number four in a three-way hypervisor race between VMware, Microsoft and Citrix? Look closely: For several reasons, Red Hat Enterprise Virtualization 3.0, just over the horizon, poses a larger threat to VMware than Microsoft virtualization technology, long-term. One advantage is speed: "The KVM or kernel virtual machine, unlike other hypervisors, is part of the Linux kernel and uses the Linux scheduler and memory manager. That means it can do its work as an extension of kernel operations," as Charles Babcock notes."
News

Submission + - Novell wins over SCO again (uscourts.gov)

duh P3rf3ss3r writes: The Tenth Circuit Court of Appeal has just affirmed the District Courts ruling in SCO v Novell in its entirety. The decision is quite a good read and lays out the reasons why the court has rejected, in toto, SCO's attempt to re-argue the case before the Court of Appeals. Is this the last gasp for SCO or will they try to appeal this to the Supreme Court? The betting lines open at 11...
Windows

Microsoft 'Ribbonizes' Windows 8 File Manager 951

CWmike writes "Microsoft said today it will 'ribbonize' the file manager in next year's Windows 8, adding Explorer to the short list of integrated applications that already sport the interface in Windows 7. Microsoft's Alex Simons, director of program management, released screenshots of the new ribbon interface planned for Explorer (scroll way down). 'We evaluated several different UI command affordances including expanded versions of the Vista/Windows 7 command bar, Windows 95/Windows XP style toolbars and menus, several entirely new UI approaches, and the Office style ribbon,' explained Simons. 'Of these, the ribbon approach offered benefits in line with our goals.' Plans by Microsoft and others to ribbonize applications have often met resistance. 'We knew that using a ribbon for Explorer would likely be met with skepticism by a set of power users, but there are clear benefits,' Simons said."
Security

Submission + - Former TSA Agent Admits to Aiding Drug Dealer (foxnews.com)

mrquagmire writes: A former federal security officer has admitted helping a man accused of running a drug ring evade security and smuggle money through the Buffalo Niagara Airport.
Minnetta Walker was arrested in March. She admitted Friday in federal court helping the man get around airport security scanners, The Buffalo News reported.
As a behavioral detection officer, Walker was trained to observe and analyze human behavior and had unrestricted access to the airport and its security stations. Sometimes, she'd direct travelers she appeared to know, including Frank, away from security lines where body image scanners or pat-downs might detect large sums of cash, and escort them to their gates so they wouldn't be pulled aside for random inspections, authorities said. She'd also alert travelers to the presence of undercover law enforcement officers, authorities said.

Bug

Mac OS X Lion LDAP Vulnerability Emerges 97

hypnosec tips a bit of Apple news from late last week that got overshadowed by the headlines about Steve Jobs. According to El Reg, "People logging in to Macs running OS X 10.7, aka Lion, can access restricted resources using any password they want when the machines use a popular technology known as LDAP for authentication. Short for Lightweight Directory Access Protocol, LDAP servers frequently contain repositories of highly sensitive enterprise data, making them a goldmine to attackers trying to burrow their way into sensitive networks." Initial reports about this bug cropped up less than a week after Lion was released.
Iphone

Submission + - Gizmodo off the hook in iPhone 4 investigation (edibleapple.com)

An anonymous reader writes: When Gizmodo ran photos of Apple’s iPhone 4 months before Apple even officially acknowledged it existed, the blogosphere exploded with excitement.

But when details leaked explaining how Gizmodo came to find itself in possession of a pre-release iPhone 4, that excitement quickly turned into indignation, and for some, anger.

Now, Gimzodo and Gizmodo editor Jason Chen have been let off the hook by the San Mateo DA's office.

Input Devices

Breaking Motion Capture Out of the Studio 39

Fnord666 writes with a CMU press release. From the article: "Traditional motion capture techniques use cameras to meticulously record the movements of actors inside studios, enabling those movements to be translated into digital models. But by turning the cameras around — mounting almost two dozen, outward-facing cameras on the actors themselves — scientists at Disney Research Pittsburgh, and Carnegie Mellon University have shown that motion capture can occur almost anywhere — in natural environments, over large areas, and outdoors."

Slashdot Top Deals

Receiving a million dollars tax free will make you feel better than being flat broke and having a stomach ache. -- Dolph Sharp, "I'm O.K., You're Not So Hot"

Working...