Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Nobody plays fair (Score 1) 178

Yep, it's not difficult in Chrome exactly. It's just easier in Firefox, where the process is: visit page, click drop-down in search box select new search engine, which automatically becomes the default until a different engine is selected. This doesn't really seem so much anti-competitive as simply different in terms of browser design. The simpler process is really made reasonable by Firefox's search box, the inclusion of which seems very much against Chrome's design principles.

Comment Re:Simple (Score 1) 625

As a case example of how it may occasionally be better in Europe: in England, you can go from Manchester to London in 2h5m, whereas the same drive would take you roughly 3h30m (being generous and assuming that there is no trouble with traffic anywhere along the way). True, the rail travel time needs to have time to/from respective stations added, but there appears to be plenty of spare time for that (1h25m). Maybe certain routes in England are a special cases, due to the density of the population and level of demand, but that said trains in North America have been really disappointing to me, even in the populated bits.

Another point you may be neglecting is that travel time is 'lost' time if you're driving, while you can actually use the time to do any of a multitude of things if you're on a train/flight etc.

Submission + - Instant messaging with neutrinos (scienceblog.com) 2

An anonymous reader writes: A group of scientists has for the first time sent a message using a beam of neutrinos – nearly massless particles that travel at almost the speed of light. The message was sent through 240 meters of stone and said simply, "Neutrino." "Using neutrinos, it would be possible to communicate between any two points on Earth without using satellites or cables," said lead researcher Dan Stancil. "Neutrino communication systems would be much more complicated than today's systems, but may have important strategic uses."
Iphone

Submission + - Apple replaces broken iPhones – even if they're stolen Read more: Apple r (pcpro.co.uk)

nk497 writes: "Apple has again been criticised for blindly replacing stolen phones. One Londoner's handset was stolen three months ago, but she's been unable to get her insurer to payout, because the IMEI is showing up as "replaced". Two days after she reported it stolen to the police and directly to Apple, someone — presumably the thief — walked into the Covent Garden Apple Store, complaining the handset was broken. It was in fact blocked, but Apple replaced it, no questions asked. While the policy stems from Apple's good customer service, it isn't helpful in this case. "Is anyone surprised that iPhone theft is so rampant when you are guaranteed to get a new one just by walking into an Apple store with your stolen, IMEI-blocked phone?" the victim's father wonders."
Security

Submission + - Major Phishing Contributors and Enablers (net-security.org)

Orome1 writes: By analyzing millions of successful phishing schemes that made it into the inboxes of unsuspecting banking customers, Agari revealed core vulnerabilities that apply worldwide and across industries. While traditional email security technologies thwart the majority of spam and phishing schemes, this latest data shows that criminals are changing tactics and devising new and creative ways to get around these systems. Nearly 100 % of the top successful phish against banks involved infrastructure hijacking. Phishing criminals are using legitimate infrastructure — servers and software — owned by reputable institutions to conduct successful phishing campaigns against banks. Using compromised, legitimate servers allows the criminals to bypass a battalion of email security defenses and deliver phish to the inbox. In fact, of the top 300 successful phishing attacks to U.S. banks, all used compromised servers from legitimate companies.
Security

Submission + - Gary McGraw interviews Ross Anderson, who debunks Trusted Computing (cigital.com)

FormOfActionBanana writes: "Security expert Dr. Gary McGraw interviews security expert Dr. Ross Anderson of Cambridge University in a great podcast. Dr. Anderson opens with a debunking of UEFI and Trusted Boot; he makes multiple references to the balance of power in the Middle Ages and compares that to the modern struggle of power inherent in the establishment of Certification Authority infrastructures."

Slashdot Top Deals

"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard

Working...