Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam

Submission + - Verizon wins injunction against TXT spammer

bulled writes: "cnet.com is running a story about a suit Verizon Wireless recently won against a company that was delivering spam text messages. Specialized Programming and Marketing and Henderson was ordered to pay more than $200,000 in damages to Verizon Wireless."
Math

Ramanujian's Deathbed Problem Cracked 205

Jake's Mom sends word of the serendipitous solution to a decades-old mathematical mystery. Researchers from the University of Wisconsin have unraveled a major number theory puzzle left at the death of one of the twentieth century's greatest mathematicians, Srinivasa Ramanujan. From the press release: "Mathematicians have finally laid to rest the legendary mystery surrounding an elusive group of numerical expressions known as the 'mock theta functions.' Number theorists have struggled to understand the functions ever since... Ramanujan first alluded to them in a letter written [to G. H. Hardy] on his deathbed, in 1920. Now, using mathematical techniques that emerged well after Ramanujan's death, two number theorists at the University of Wisconsin-Madison have pieced together an explanatory framework that for the first time illustrates what mock theta functions are, and exactly how to derive them."
Bug

Submission + - Vanishing Honeybees will affect future crops

daninbusiness writes: "Across the US, beekeepers are finding that their bees are disappearing — not returning while searching for nectar and pollen. This could have a major impact on the food industry in the United States, where as much as 14 billion dollars' worth of agriculture business depends on bees for crop pollination. Reasons for this problem, dubbed "colony collapse disorder" are still unknown. Theories include viruses, some type of fungus, poor bee nutrition, and pesticides. TFA is in the New York Times (login may be required)."
Security

Submission + - New Controversy over Black Hat presentation

uniquebydegrees writes: "InfoWorld is reporting about a new controversy swirling around a planned presentation at Black Hat Federal in Washington D.C. this week. Security researcher Chris Paget of IOActive will demo an RFID hacking tool that can crack HID brand door access cards. HID Corp., which makes the cards, is miffed and is accusing IOActive of patent infringement over the presentation, recalling the legal wrangling over Michael Lynn's presentation of a Cisco IOS hole at Black Hat in 2005. Black Hat's Jeff Moss says they're standing by their speaker. A news conference is scheduled for tomorrow AM. Read it here: http://www.infoworld.com/article/07/02/26/HNblackh atrfid_1.html"
Biotech

Submission + - Honeybees Vanishing from Beekeepers' Orchards

azakem writes: An article at the NYT describes how honeybees nationwide are failing to return from their winter break, raising concerns about the ability of commercial beekeepers to meet the pollination needs of farmers. As always, ridiculously painful registration required.
It's funny.  Laugh.

Submission + - 12 Games from the Year 2010

Mike Michelson writes: "Or at least, the ones a bunch of gamers got together and dreamed up screenshots for. This article really begs the question of just what developers will be getting out of our consoles three years from now. And whether these games are hopeless wishful thinking or not, it sure is fun to think about."
Software

Submission + - UK government rejects software patents

LingNoi writes: The governments new epetition system has received a response from the prime minister with regard to their current stand on software patents in the UK....

"The Government remains committed to its policy that no patents should exist for inventions which make advances lying solely in the field of software."

Another response on a petition of open source software use in the government was also released which explains the governments stance on open standards.
Security

Submission + - Trojan that Harnesses Webmail

An anonymous reader writes: A new trojan pretending to be a video postcard is able to inject messages directly into your outgoing email as you send it if you use webmail from Tiscali, Earthlink, Comcast, Bellsouth, Gmail, Rambler, FastMail, Care2, mail.com, Hotmail, Yahoo, Lycos, AOL, or mail.ru. In addition, it is able to inject text into postings posted to bulletin boards like vBulletin and phpBB and also IM messages.
Security

Submission + - Note to new Linux users: No antivirus

Cope57 writes: "Linux.com | Note to new Linux users: No antivirus
By: Joe Barr"


Savvy Windows users have to watch their virus checkers as closely as the head nurse in the ICU keeps an eye on patient monitors. Often, the buzz in the Windows security world is about which protection-for-profit firm was the first to discover and offer protection for the malware du jour — or should I say malware de l'heure? The only thing better than having backed the winning Super Bowl team come Monday morning at the office coffeepot is having the virus checker you use be the one winning the malware sweepstakes that weekend.

If a rogue program finds a crack in your Windows armor, paying $200 per infection to have your machine scrubbed and sanitized by the local goon^H^H^H^H geek squad not only helps to reinforce the notion that you have to have malware protection, but that it has to be the right protection, too. The malware firms are aware of this, and all of their advertising plays upon the insecurity fears of Windows users and the paranoia that results. Chronic exposure and vulnerability to malware has conditioned Windows users to accept this security tax.

It's no wonder, then, that when Windows users are finally able to break their chains and experience freedom on a Linux desktop, they stare at me in disbelief when I tell them to lay that burden down. They are reluctant to stop totin' that load. They have come to expect to pay a toll for a modicum of security.

I try to explain that permissions on Linux make such tribute unnecessary. Without quibbling over the definitions of viruses and trojans, I tell them that neither can execute on your machine unless you explicitly give them permission to do so.

Permissions on Linux are universal. They cover three things you can do with files: read, write, and execute. Not only that, they come in three levels: for the root user, for the individual user who is signed in, and for the rest of the world. Typically, software that can impact the system as a whole requires root privileges to run.

Microsoft designed Windows to enable outsiders to execute software on your system. The company justifies that design by saying it enriches the user experience if a Web site can do "cool" things on your desktop. It should be clear by now that the only people being enriched by that design decision are those who make a buck providing additional security or repairing the damage to systems caused by it.

Malware in Windows Land is usually spread by email clients, browser bits, or IM clients, which graciously accept the poisoned fruit from others, then neatly deposit it on their masters' systems, where malware authors know it will likely be executed and do their bidding — without ever asking permission.

Some malware programs require that you open an attachment. Others don't even require that user error. By hook or by crook, malware on Windows often gets executed, infecting the local system first, then spreading itself to others. What a terrible neighborhood. I'm glad I don't live there.

On Linux, there is built-in protection against such craft. Newly deposited files from your email client or Web browser are not given execute privileges. Cleverly renaming executable files as something else doesn't matter, because Linux and its applications don't depend on file extensions to identify the properties of a file, so they won't mistakenly execute malware as they interact with it.

Whether newcomers grok permissions or not, I try to explain the bottom line to them: that because they have chosen Linux, they are now free of having to pay either a security tax up front to protect themselves from malware, or one after the fact to have their systems sterilized after having been infected.

So Linux is bulletproof? No. Bulletproof is one of the last stages of drunkenness, not a state of security. Linux users, like users on every operating system, must always be aware of security issues. They must act intelligently to keep their systems safe and secure. They should not run programs with root privileges when they are not required, and they should apply security patches regularly.

Misleading claims and false advertising by virus protection rackets to the contrary, you simply don't need antivirus products to keep your Linux box free of malware.

"Original post at Linux.com"
Wireless Networking

Submission + - Using free wireless at library described as theft

Robert Carter writes: "According to the Anchorage Daily News (http://www.adn.com/news/alaska/story/8667098p-855 9268c.html) a Man's laptop was taken for using free wireless outside of a library in Palmer. What does this say about the liability of free or municipal hotspots for informing that unauthorized use is prohibited?"
Emulation (Games)

Submission + - State of the Homebrew Scene 2007

Croakyvoice writes: DCEmu have posted an article detailing the Homebrew scenes of all the consoles released at this time, it discusses the future of each console and what should be expected once consoles like the Wii, Xbox 360 and PS3 are fully open to amateur coders.
Programming

Visual Basic on GNU/Linux 383

jeevesbond writes "The Mono Project announced that it has developed a Visual Basic compiler that will enable software developers who use Microsoft Visual Basic to run their applications on any platform that supports Mono, such as Linux, without any code modifications."
The Almighty Buck

Submission + - New eBay scam, without violating ebay policy

Bert64 writes: "It seems that eBay allows you to say one thing about the location of an item in the auction description, but then if the item turns out to be defective to supply a completely different address, in another country, where the item can be returned at buyer's expense. No mention of this was in the original auction listing, in the hope of fooling those who would normally not buy from a foreign seller. Details on http://www.ev4.org/ of how i was stung by this, and how it can so easily be abused by anyone to profit by ripping off unsuspecting buyers while ebay sits back and does nothing about it. So anyone can ship defective items, and then make the returns process expensive enough that people won't bother."
United States

Submission + - More States Challenging National Driver's Licenses

berberine writes: A revolt against a national driver's license, begun in Maine last month, is quickly spreading to other states. The Maine Legislature on Jan. 26 overwhelmingly passed a resolution objecting to the Real ID Act of 2005. The federal law sets a national standard for driver's licenses and requires states to link their record-keeping systems to national databases.

Within a week of Maine's action, lawmakers in Georgia, Wyoming, Montana, New Mexico, Vermont and Washington state also balked at Real ID. They are expected soon to pass laws or adopt resolutions declining to participate in the federal identification network.

Maine's rejection was recently discussed on slashdot.
It's funny.  Laugh.

Submission + - And the winner is...

thebjorn writes: "I don't always read the EULA before installing something, but I happened to skim the one at http://gridcast.superbowl-ads.com/2007/ where I went in the hope to watch the Super Bowl XLI commercials (I'm so, very, far, away...) Anyways, I especially enjoyed section 10.0:

10.0 CHANGES TO SERVICE OR EULA. GridNetworks reserves the right, at its sole discretion, to update, change, modify, add or remove any portion of the services or this agreement, in whole or in part, at any time. Changes to this agreement will be effective when posted on our website You agree to review this agreement periodically to be aware of any changes. By continuing to use the services after any changes, you agree to be bound by subsequent revisions to this agreement.
This is after the language about allowing 3rd parties to install and run "DRM" software with free access to my machine and network :-) Needless to say, I'm looking for my commercials elsewhere, but these guys really ought to get a prize..."

Slashdot Top Deals

"Sometimes insanity is the only alternative" -- button at a Science Fiction convention.

Working...