Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Transportation

China To Connect Its High-Speed Rail To Europe 691

MikeChino sends in this excerpt from Inhabitat: "China already has the most advanced and extensive high-speed rail lines in the world, and soon that network will be connected all the way to Europe and the UK. With initial negotiations and surveys already complete, China is now making plans to connect its HSR line through 17 other countries in Asia and Eastern Europe in order to connect to the existing infrastructure in the EU. Additional rail lines will also be built into South East Asia as well as Russia, in what will likely become the largest infrastructure project in history." They hope to get it done within 10 years, with China providing the financing in exchange for raw materials, in some cases.
Android

HTC Android Phones Found With Malware Pre-Installed 158

Trailrunner7 writes "Security researchers have found that Vodafone, one of the world's larger wireless providers, is distributing some HTC phones with malware pre-installed on them. The phone, HTC's Magic, runs the Google Android mobile operating system, and is one of the more popular handsets right now. A researcher at Panda Software received one of the handsets recently, and upon attaching it to her PC, found that the phone was pre-loaded with the Mariposa bot client. Mariposa has been in the news of late thanks to some arrests connected to the operation of the botnet."
Microsoft

Does Microsoft Finally Have a Phone Worth Buying? 427

An anonymous reader writes "Microsoft has finally shown 'Windows Phone 7 Series' and it's supposed to be a completely new smartphone OS. A phone from Microsoft to get excited about that is going to work properly and take on the iPhone's world domination? "
Apple

Psystar Activation Servers Down? 245

An anonymous reader writes "I purchased Rebel EFI in support of Psystar's crusade back in October. Just 3 short months later, I have no support. I found this out when I upgraded my hard drive and installed Snow Leopard using Rebel EFI. The program can no longer 'phone home' to activate or download/install drivers. This is a direct contradiction to Psystar's promise posted on their website: 'Psystar will continue to support all of its existing customers of hardware and software through this transitional period. Warranties on hardware will continue to be honored as long the customer has a valid warranty. Rebel EFI support for existing customers, as always, will remain exclusively available through email and the built-in ticket interface.' Has anyone else run into this issue? It has been 9 days with no response from Psystar by e-mail or phone."
Education

Best Tablet PC For Classroom Instruction? 176

dostert writes "With all of the recent hype of multitouch notebooks, the Apple Tablet, the Microsoft Courier, and the CrunchPad, I've been a bit curious about what happened to the good old pen and slate tablet PCs. I'm a mathematics professor at a small college and have been searching for a good cheap tablet (under $1000) which I can use to lecture, record the lecture notes along with my voice, and post up video lectures for the class. I have seen some suggestions, but many are large scale implementations at state universities, something my small private college clearly cannot afford. All I have been able to find is either tiny netbooks (like the new Asus T91), expensive full featured tablets (like the Dell XT), or multitouch tablets, that really wouldn't allow for the type of precision mathematics needs. I know a Sympodium device would work great, but we really can't afford to put one of those in each room, so something portable would be ideal. All I've been left with is considering an HP tx series. It seems nobody has created a new tablet like this in quite sometime, and HP, Fujitsu, and Dell are just doing incremental updates to their old designs. Does anyone have experience with this?"
Businesses

Why Should I Trust My Network Administrator? 730

Andrew writes "I'm a manager at a startup, and decided recently to outsource to an outside IT firm to set up a network domain and file server. Trouble is, they (and all other IT companies we could find) insist on administering it all remotely. They now obviously have full access to all our data and PCs, and I'm concerned they could steal all our intellectual property, source code and customers. Am I being overly paranoid and resistant to change? Should we just trust our administrator because they have a reputation to uphold? Or should we lock them out and make them administer the network in person so we can stand behind and watch them?"
Programming

Stroustrup Says New C++ Standard Delayed Until 2010 Or Later 501

wandazulu writes "At the end of an article written by the creator of C++, where he talks about removing a feature from the new C++ standard, he drops a bombshell: The new C++ standard (typically referred to as C++0x) has been delayed until 2010 or later. What does this mean? No new C++ features like threads, proper enum classes, or hash tables. C++0x is dead, long live C++1x!"
Sun Microsystems

Sun Kills Rock CPU, Says NYT Report 190

BBCWatcher writes "Despite Oracle CEO Larry Ellison's recent statement that his company will continue Sun's hardware business, it won't be with Sun processors (and associated engineering jobs). The New York Times reports that Sun has canceled its long-delayed Rock processor, the next generation SPARC CPU. Instead, the Times says Sun/Oracle will have to rely on Fujitsu for SPARCs (and Intel otherwise). Unfortunately Fujitsu is decreasing its R&D budget and is unprofitable at present. Sun's cancellation of Rock comes just after Intel announced yet another delay for Tukwila, the next generation Itanium, now pushed to 2010. HP is the sole major Itanium vendor. Primary beneficiaries of this CPU turmoil: IBM and Intel's Nehalem X86 CPU business."
Security

Malware Found On Brand-New Windows Netbook 250

An anonymous reader alerts us to an interesting development that Kaspersky Labs stumbled across. They purchased a new M&A Companion Touch netbook in order to test a new anti-virus product targeted at the netbook segment, and discovered three pieces of malware on the factory-sealed netbook. A little sleuthing turned up the likely infection scenario — at the factory, someone was updating Intel drivers using a USB flash drive that was infected with a variant of the AutoRun worm. "Installed along with the worm was a rootkit and a password stealer that harvests log-in credentials for online games such as World of Warcraft. ... To ensure that a new PC is malware-free, [Kaspersky] recommended that before users connect the machine to the Internet, they install security software, update it by retrieving the latest definition file on another computer, and transferring that update to the new system, then running a full antivirus scan."
Security

Hacker Destroys Avsim.com, Along With Its Backups 780

el americano writes "Flight Simulator community website Avsim has experienced a total data loss after both of their online servers were hacked. The site's founder, Tom Allensworth, explained why 13 years of community developed terrains, skins, and mods will not be restored from backups: 'Some have asked whether or not we had back ups. Yes, we dutifully backed up our servers every day. Unfortunately, we backed up the servers between our two servers. The hacker took out both servers, destroying our ability to use one or the other back up to remedy the situation.'"
Games

The Best Achievements 107

Like them or not, achievements have become a staple of modern gaming, giving players goals to strive for and a measuring stick with which they can compare themselves to random strangers on the internet. Eurogamer discusses why they've become so popular, and takes a look at some of the most entertaining examples. Quoting: "... we mock Achievement points because they spell out in large numbers what is so pathetic about video games. But we also celebrate them, because, when used in funny, creative or interesting ways, they also spell out what is so compelling and wonderful about video games. Because for every Achievement in which you have to do nothing more than play through a tutorial there's another that subverts convention, rewarding you for skipping it instead. For every fetch quest that has you collecting dogtags for the millionth time, there's another that makes you fight the baddy with your arms tied behind your back. And for every Achievement you earn in jest for pressing the start button, there's another that only rewards the single best player in the world."
Portables

Alienware Refusing Customers As Thieves 665

ChrisPaget writes "Thinking about buying Alienware (now owned by Dell)? Think again. After buying an almost-new Alienware laptop on eBay, I've spent the last week trying to get hold of a Smart Bay caddy to connect a second hard drive (about $150 for $5 of bent metal). Four different Alienware teams have refused to even give me a price on this accessory, instead accusing me of stealing the machine since I didn't buy it directly from their eBay store. They want me to persuade the eBay seller I did buy it from to add me as an authorized user of his Alienware account — they have no concept of 'ownership transfer' and instead assume that if you're not in their system, you must be a thief."
Microsoft

Office 2007SP2 ODF Interoperability Very Bad 627

David Gerard writes "Microsoft Office 2007 SP2 claims support for ODF 1.1. With hard work and careful thinking, they have successfully achieved technical compliance but zero interoperability! MSO 2007sp2 won't read ODF 1.1 from any other existing application, and its ODF is only readable by the CleverAge plugin. The post goes into detail as to how it manages this so thoroughly."
Security

Adobe Confirms PDF Zero-Day, Says Kill JavaScript 211

CWmike writes "Adobe Systems has acknowledged that all versions of its Adobe Reader, including editions for Windows, the Mac and Linux, contain at least one, and possibly two, critical vulnerabilities. 'All currently supported shipping versions of Adobe Reader and Acrobat, [Versions] 9.1, 8.1.4 and 7.1.1 and earlier, are vulnerable to this issue,' said Adobe's David Lenoe said in a blog entry yesterday. He was referring to a bug in Adobe's implementation of JavaScript that went public early Tuesday. A "Bugtraq ID," or BID number has been assigned to a second JavaScript vulnerability in Adobe's Reader. Proof-of-concept attack code for both bugs has already been published on the Web. Adobe said it will patch Reader and Acrobat, but Lenoe offered no timetable for the fixes. In lieu of a patch, Lenoe recommended that users disable JavaScript in the apps. Andrew Storms, director of security operations at nCircle Network Security, said of the suggestion in lieu of patches, 'Unfortunately, for Adobe, disabling JavaScript is a broken record, [and] similar to what we've seen in the past with Microsoft on ActiveX bugs.'"

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...