Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Hardware Hacking

Raspberry Pi-Compatible Development Board Released 47

kodiaktau writes: Hardkernel has released a new Raspberry Pi-compatible development board based on the Samsung Exynos SoC. The board is smaller than a typical Pi, keeping basic HDMI, USB and CSI interfaces. It also has a 26-pin expansion board with more GPIO available, though it lacks an Ethernet jack. Initial prices as estimated around $30. The article makes the interesting point that this and other devices are marketed as "Raspberry Pi-compatible." The Raspberry Pi Foundation may run into name retention issues (similar to the ones Arduino had) as related hardware piggybacks on its success.
Hardware

Quiet Cooling With a Copper Foam Heatsink 171

Zothecula writes: The Silent Power PC is claimed to be the first high-end PC able to ditch noisy electric fans in favor of fully passive cooling. In place of a conventional fan, the unit uses an open-air metal foam heatsink that boasts an enormous surface area thanks to the open-weave copper filaments of which it's composed. The Silent Power creators claim that the circulation of air through the foam is so efficient in dissipating heat that the exterior surface temperature never rises above 50 C (122 F) in normal use.
Transportation

UK To Allow Driverless Cars By January 190

rtoz sends this news from the BBC: The UK government has announced that driverless cars will be allowed on public roads starting in January next year. It also invited cities to compete to host one of three trials of the tech, which would start at the same time. In addition, ministers ordered a review of the UK's road regulations to provide appropriate guidelines. ... The debate now is whether to allow cars, like the prototype unveiled by Google in May, to abandon controls including a steering wheel and pedals and rely on the vehicle's computer. Or whether, instead, to allow the machine to drive, but insist a passenger be ready to wrest back control at a moment's notice.
Communications

Black Hat Researchers Actively Trying To Deanonymize Tor Users 82

An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.
Networking

Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common? 348

An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me.

So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.
Wikipedia

An Accidental Wikipedia Hoax 189

Andreas Kolbe writes: The Daily Dot's EJ Dickson reports how she accidentally discovered that a hoax factoid she added over five years ago as a stoned sophomore to the Wikipedia article on "Amelia Bedelia, the protagonist of the eponymous children's book series about a 'literal-minded housekeeper' who misunderstands her employer's orders," had not just remained on Wikipedia all this time, but come to be cited by a Taiwanese English professor, in "innumerable blog posts and book reports", as well as a book on Jews and Jesus. It's a cautionary tale about the fundamental unreliability of Wikipedia. And as Wikipedia ages, more and more such stories are coming to light.
The Military

Nuclear Missile Command Drops Grades From Tests To Discourage Cheating 122

An anonymous reader writes: Earlier this year, just over half of the military officers put in charge of U.S. nuclear launch facilities were implicated in an exam cheating scandal. The Air Force conducted regular exams to keep officers current on the protocols and skills required to operate some of the world's most dangerous weapons. But the way they graded the test caused problems. Anything below a 90% score was a fail, but the remaining 10% often dictated how a launch officer's career progressed. There might not be much functional difference between a 93% and a 95%, but the person scoring higher will get promoted disproportionately quicker. This inspired a ring of officers to cheat in order to meet the unrealistic expectations of the Air Force. Now, in an effort to clean up that Missile Wing, the Air Force is making the exams pass/fail. The officers still need to score 90% or higher (since it's important work with severe consequences for failure), but scores won't be recorded and used to compete for promotions anymore. The Air Force is also making an effort to replace or refurbish the aging equipment that runs these facilities.
The Courts

Ford, GM Sued Over Vehicles' Ability To Rip CD Music To Hard Drive 317

Lucas123 writes: The Alliance of Artists and Recording Companies is suing Ford and General Motors for millions of dollars over alleged copyrights infringement violations because their vehicles' CD players can rip music to infotainment center hard drives. The AARC claims in its filing (PDF) that the CD player's ability to copy music violates the Audio Home Recording Act of 1992. The Act protects against distributing digital audio recording devices whose primary purpose is to rip copyrighted material. For example, Ford's owner's manual explains, "Your mobile media navigation system has a Jukebox which allows you to save desired tracks or CDs to the hard drive for later access. The hard drive can store up to 10GB (164 hours; approximately 2,472 tracks) of music." The AARC wants $2,500 for each digital audio recording device installed in a vehicle, the amount it says should have been paid in royalties.

Submission + - Black Hat Researchers Actively Trying to Deanonymize Tor Users (torproject.org)

An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.
Businesses

Comcast Confessions 234

An anonymous reader writes: We heard a couple weeks ago about an incredibly pushy Comcast customer service representative who turned a quick cancellation into an ordeal you wouldn't wish on your enemies. To try and find out what could cause such behavior, The Verge reached out to Comcast employees, hoping a few of them would explain training practices and management directives. They got more than they bargained for — over 100 employees responded, and they painted a picture of a corporation overrun by the neverending quest for greater profit. From the article: 'These employees told us the same stories over and over again: customer service has been replaced by an obsession with sales, technicians are understaffed and tech support is poorly trained, and the massive company is hobbled by internal fragmentation. ... Brian Van Horn, a billing specialist who worked at Comcast for 10 years, says the sales pitch gradually got more aggressive. "They were starting off with, 'just ask," he says. "Then instead of 'just ask,' it was 'just ask again,' then 'engage the customer in a conversation,' then 'overcome their objections.'" He was even pressured to pitch new services to a customer who was 55 days late on her bill, he says.'
Education

Reglue: Opening Up the World To Deserving Kids With Linux Computers 91

jrepin writes: Today, a child without access to a computer (and the Internet) at home is at a disadvantage before he or she ever sets foot in a classroom. The unfortunate reality is that in an age where computer skills are no longer optional, far too many families don't possess the resources to have a computer at home. Linux Journal recently had the opportunity to talk with Ken Starks about his organization, Reglue (Recycled Electronics and Gnu/Linux Used for Education) and its efforts to bridge this digital divide.
Communications

Airbnb Partners With Cities For Disaster Preparedness 55

An anonymous reader writes: Every time a city- or state-wide disaster strikes, services to help the victims slowly crop up over the following days and weeks. Sometimes they work well, sometimes they don't. Today, city officials in San Francisco and Portland announced a partnership with peer-to-peer lodging service Airbnb to work out some disaster-preparedness plans ahead of time. Airbnb will locate hosts in these cities who will commit to providing a place to stay for people who are displaced in a disaster, and then set up alerts and notifications to help people find these hosts during a crisis. The idea is that if wildfires or an earthquake forces thousands of people to evacuate their homes, they can easily be absorbed into an organized, distributed group of willing hosts, rather than being shunted to one area and forced to live in a school gymnasium or something similar.

Submission + - The Terrifying Truth About How The Drugs You Take Get Tested (medium.com)

gallifreyan99 writes: Every drug you take will have been tested on people before it—but that testing process is meant to be tightly controlled, for the safety of everyone involved. Two chilling investigations document the horrifying extent—and that lack of oversight the FDA seems to have over the process. First, drugs are increasingly being tested on homeless, destitute and mentally ill people. Second, it turns out many human trials are being run by doctors who have had their licenses revoked for drug addiction, malpractice and worse.
The Military

Hackers Plundered Israeli Defense Firms That Built 'Iron Dome' Missile Defense 184

An anonymous reader writes: Brian Krebs reports on information from Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. that attackers thought to be operating out of China hacked into the corporate networks of three top Israeli defense technology companies. The attackers were seeking technical documents related to Iron Dome, Israel's air defense system. "IAI was initially breached on April 16, 2012 by a series of specially crafted email phishing attacks. ... Once inside the IAI’s network, [the attackers] spent the next four months in 2012 using their access to install various tools and trojan horse programs on systems throughout company’s network and expanding their access to sensitive files, CyberESI said. The actors compromised privileged credentials, dumped password hashes, and gathered system, file, and network information for several systems. The actors also successfully used tools to dump Active Directory data from domain controllers on at least two different domains on the IAI’s network. All told, CyberESI was able to identify and acquire more than 700 files — totaling 762 MB total size — that were exfiltrated from IAI’s network during the compromise. The security firm said most of the data acquired was intellectual property and likely represented only a small portion of the entire data loss by IAI." Most of the stolen material pertained to Arrow III missiles, UAVs, and ballistic rockets.

Submission + - Ford, GM Sued Over Vehicles' CD-R Ability To Rip Music To Hard Drive (computerworld.com)

Lucas123 writes: The Alliance of Artists and Recording Companies is suing Ford and General Motors for millions of dollars over alleged copyrights infringement violations because their vehicles' CD-Rs can rip music to infotainment center hard drives. The AARC claims in its filing that the CD-R's ability to copy music violates the Audio Home Recording Act of 1992. The Act protects against distributing digital audio recording devices whose primary purpose is to rip copyrighted material. For example, Ford's owner's manual explains, "Your mobile media navigation system has a Jukebox which allows you to save desired tracks or CDs to the hard drive for later access. The hard drive can store up to 10GB (164 hours; approximately 2,472 tracks) of music." The AARC wants $2,500 for each digital audio recording device installed in a vehicle, the amount it says should have been paid in royalties.

Slashdot Top Deals

Work continues in this area. -- DEC's SPR-Answering-Automaton

Working...