Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Programming

Switching Game Engines Halfway Through Development 127

An anonymous reader writes: Third-party game engines are wonderful creations, allowing developers to skip a lengthy and complicated part of the development process and spend more time on content creation. But each engine has its own strengths and weaknesses, and they may not be apparent at the beginning of a project. If you realize halfway through that your game doesn't work well on the engine you picked, what do you do? Jeff LaMarche describes how he and his team made the difficult decision to throw out all their work with Unity and start over with Unreal. He describes some technical limitations, like Unity's 32-bit nature, and some economic ones, like needing to pay $500 per person for effective version control. He notes that Unreal Engine 4 has its problems, too, but the biggest reason to switch was this: "Our team just wasn't finding it easy to collaborate. We weren't gelling as a cohesive team and we often felt like the tools were working against us."
Microsoft

Microsoft Surface Drowning? 337

hcs_$reboot (1536101) writes Again, not much good news for the MS Surface. Computerworld reports a Microsoft's losses on the tablet device at $US1.7 billion so far. But, still, Microsoft is serene: "It's been exciting to see the response to the Surface Pro 3 from individuals and businesses alike. In fact, Surface Pro 3 sales are already outpacing prior versions of Surface Pro. The Surface business generated more than $2B in revenue for the fiscal year 2014 and $409 million in revenue during Q4 FY14 alone, the latter of which included just ten days of Intel Core i5 Surface Pro 3 sales in Canada and the US." Should Microsoft pull the plug on the tablet? Or maybe it's just a matter of users getting used to the Surface? Even if they're losing money on the Pro 3, Microsoft has seemingly little to be ashamed of when it comes to reviews of the hardware.
Botnet

Alleged Massive Account and Password Seizure By Russian Group 126

New submitter Rigodi (1000552) writes "The New York Times reported on August 5th that a massive collection of stolen email passwords and website accounts have been accumulated by an alleged Russian "crime ring". Over 1.2 billion accounts were compromised ... the attack scheme is essentially the old and well known SQL injection tactic using a botnet. The Information has been made public to coincide with the Blackhat conference to cause a debate about the classic security account and password system weaknesses, urging the industry to find new ways to perform authentication. What do Black Hat security conference participants have to say about that in Vegas?
Data Storage

Synolocker 0-Day Ransomware Puts NAS Files At Risk 150

Deathlizard (115856) writes "Have a Synology NAS? Is it accessible to the internet? If it is, You might want to take it offline for a while. Synolocker is a 0-day ransomware that once installed, will encrypt all of the NAS's files and hold them for ransom just like Cryptolocker does for windows PC's. The Virus is currently exploiting an unknown vulnerability to spread. Synology is investigating the issue."

Submission + - Google Releases "Pigeon" Update to Local Search Algorithm (atomicdesign.net)

Atomic_Design writes: Late last week Google rolled out an update to their local search algorithm. Search Engine Land broke the story, dubbing this algorithm change the “Pigeon” update.

The update includes factors from the web search, incorporating more traditional signals into the local search and Google Places algorithms.

Perceptive users will feel the effects of this update; the updated search features include a knowledge graph, and spelling amendments. Google’s local search results and Google Places searches will return more accurate and relevant results to users.

Search rankings have been significantly affected, but none of the reports indicate any spam changes to the algorithm. Google did not release the percentage of queries this update has affected.

Submission + - Why TiVo's founders crashed and burned with Qplay (digitaltrends.com)

Velcroman1 writes: Michael Ramsay and Jim Barton created a revolution with TiVo, a device that challenged the notion that we had to watch TV shows when they aired. And they hoped to do it again with Qplay, a device that challenged the notion that short-form videos had to be consumed one at a time, like snacks instead of meals. Qplay streamed curated queues of short-form Internet video to your TV using a small, simple box controlled by an iPad app. So what went wrong? Unlike TiVo, the Qplay box was difficult to justify owning, and thevalue of the service itself is questionable. And as of last week, Qplay is closed.

Submission + - Ask Slashdot: When is It Better to Modify the ERP vs. Interfacing It?

yeshuawatso writes: I work for one of the largest HVAC manufacturers in the world. We've currently spent millions of dollars investing in an ERP system from Oracle (via a third-party implementor and distributor) that handles most of our global operations, but it's been a great ordeal getting the thing to work for us across SBUs and even departments without having to constantly go back to the third-party, whom have their hands out asking for more money. What we've also discovered is that the ERP system is being used for inputting and retrieving data but not for managing the data. Managing the data is being handled by systems of spreadsheets and access databases wrought with macros to turn them into functional applications. I'm asking you wise and experienced readers on your take if it's a better idea to continue to hire our third-party to convert these applications into the ERP system or hire internal developers to convert these applications to more scalable and practical applications that interface with the ERP (via API of choice)? We have a ton of spare capacity in data centers that formerly housed mainframes and local servers that now mostly run local Exchange and domain servers. We've consolidated these data centers into our co-location in Atlanta but the old data centers are still running, just empty. We definitely have the space to run commodity servers for an OpenStack, Eucalyptus, or some other private/hybrid cloud solution, but would this be counter productive to the goal of standardizing processes. Our CIO wants to dump everything into the ERP (creating a single point of failure to me) but our accountants are having a tough time chewing the additional costs of re-doing every departmental application. What are your experiences with such implementations?

Submission + - Woman arrested after posting photo of George Osborne at Dominatrix's flat (wordpress.com)

An anonymous reader writes: A woman was arrested today after posting a photograph on Twitter of chancellor George Osborne at her flat when she worked as a madame at an escort agency.

Then today Natalie was arrested by the police for “abusive behaviour”:

Natalie’s home was also searched last year by police after she tried to publish her memoirs in which she mentions Osborne took cocaine and used her services as a dominatrix called Miss Whiplash.

IT

Ask Slashdot: What Would You Do With Half a Rack of Server Space? 208

New submitter Christian Gainsbrugh (3766717) writes I work at a company that is currently transitioning all our servers into the cloud. In the interim we have half a rack of server space in a great datacenter that will soon be sitting completely idle for the next few months until our lease runs out. Right now the space is occupied by around 8 HP g series servers, a watchguard xtm firewall, Cisco switch and some various other equipment. All in all there are probably around 20 or so physical XEON processors, and probably close to 10 tb of storage among all the machines. We have a dedicated 10 mbs connection that is burstable to 100mbs.

I'm curious what Slashdot readers would do if they were in a similar situation. Is there anything productive that could be done with these resources? Obviously something revenue generating is great, but even if there is something novel that could be done with these servers we would be interested in putting them to good use.

Comment Re:Why do you want pieces of plastic (Score 1) 354

You mean because of the torrent option? Can't speak for others but personally I don't fall into the hyperactive content consumer category. With a little priming of the queue, it's easy to plan to ahead and just get the disk instead of messing with a seedbox or other vpn option. And if I mess up and don't get a disk for Friday night, there always seems to be something worth watching via streaming for an hour or two.

So for less than $20 a month including the streaming option it's a pretty good deal for access just about every movie or series out there. Especially for cord cutters (raises hand).

Comment Re:For those that don't know: (Score 3, Informative) 113

I doubt a registrar would sell their internal customer billing database to an entity whose sole purpose is to take their business away. If you want to speculate, try this. When DROA scraped whois for targets, they filtered by Godaddy customers instead of Fabulous or Moniker. The thought being that more average Joes use GD and therefore easier to fool.

On the other hand it doesn't mean they didn't target the lesser known registrars. I've gotten plenty of DROA scam letters targeted toward my domains in the small registrars.

IOW, I don't think you can draw a conclusion that they filtered by registrar. If they did target, it would make sense to blanket those whois records with an organization name (i.e. formal businesses). And the bigger the better so it has a chance of hitting AP in accounting. Getting a $500 renewal on 5 years is much more likely to happen in that scenario.

Security

Critroni Crypto Ransomware Seen Using Tor for Command and Control 122

Trailrunner7 writes There's a new kid on the crypto ransomware block, known as Critroni, that's been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it's the first crypto ransomware seen using the Tor network for command and control.

The Critroni ransomware is selling for around $3,000 and researchers say it is now being used by a range of attackers, some of whom are using the Angler exploit kit to drop a spambot on victims' machines. The spambot then downloads a couple of other payloads, including Critroni. Once on a victim's PC, Critroni encrypts a variety of files, including photos and documents, and then displays a dialogue box that informs the user of the infection and demands a payment in Bitcoins in order to decrypt the files.

"It uses C2 hidden in the Tor network. Previously we haven't seen cryptomalware having C2 in Tor. Only banking trojans," said Fedor Sinitsyn, senior malware analyst at Kaspersky Lab, who has been researching this threat. "Executable code for establishing Tor connection is embedded in the malware's body. Previously the malware of this type, this was usually accomplished with a Tor.exe file. Embedding Tor functions in the malware's body is a more difficult task from the programming point of view, but it has some profits, because it helps to avoid detection, and it is more efficient in general."

Comment Re:Really? (Score 2) 125

Heh, you're more devious than me. No, there's no limit but I suspect there will be some blowback if you start doing that. I just wanted a simple way of breaching their defenses, winning a battle vs. the war so to speak. Like the last act of defiance. Most people see the fake caller id, put a post on 800notes, and figure there's nothing they can do.

And it should be noted that this really only works against business services like merchant processing and SEO, getting past Rachel's defenses is probably different. That scam has a simple goal of getting the credit card number at all costs. Once they've got it they've succeeded; I suspect there's little need to field incoming calls.

But a crowdsourced project towards gathering target numbers/info about Rachel would be interesting. Like what anonymous does, with the sole purpose of exposing her inner sanctum.

Slashdot Top Deals

Quantity is no substitute for quality, but its the only one we've got.

Working...