Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Data Storage

Submission + - SATA 3.0 Released Paves The Way To 6Gb/sec Devices

An anonymous reader writes: The Serial ATA International Organization (SATA-IO) has just released the new Serial ATA Revision 3.0 specification. With the new 3.0 specification, the path has been paved to enable future devices to transfer up to 6Gb/sec as well has provide enhancements to support multimedia applications. Like other SATA specifications, the 3.0 specification is backward compatible with earlier SATA products and devices. This makes it easy for motherboard manufactures to go ahead and upgrade to the new specification without having to worry about its customers legacy SATA devices. This should make adoption to the new specification fast, like previous adoptions to SATA 2.0 (or 3Gb/sec) technology.
Privacy

Submission + - Data Breach Exposes RAF Staff to Blackmail (wired.com)

Yehuda writes:

Yet another breach of sensitive, unencrypted data is making news in the United Kingdom. This time the breach puts Royal Air Force staff at serious risk of being targeted for blackmail by foreign intelligence services or others.
The breach involves audio recordings with high-ranking air force officers who were being interviewed in-depth for a security clearance. In the interviews, the officers disclosed information about extra-marital affairs, drug abuse, visits to prostitutes, medical conditions, criminal convictions and debt histories — information the military needed to determine their security risk.
The recordings were stored on three unencrypted hard drives that disappeared last year.


Security

Submission + - Twitter Hit Again By Worm-like Phishing Attack (computerworld.com)

CWmike writes: "Twitter users have been tricked into divulging their login and password details to a Web site that then spammed their contacts. The culprit is a Web site called TwitterCut. Some Twitter users began getting a message that appeared to be from one of their friends and included a link promising more Twitter contacts that leads to the TwitterCut Web site, which at one time looked quite similar to the real Twitter login page, said Mikko Hypponen, chief research offer for F-Secure. Most URLs posted in Twitter have been shortened to fit in the 140-character message length that Twitter imposes, obscuring the real destination and making users dependent on the trustworthiness of their friends when clicking links. Twitter acknowledged the phishing problem late Tuesday night. 'We are currently pushing a password reset on accounts we believe may have been caught in a phishing scam,' the company said. 'Please exercise your best judgment when thinking about releasing your username and password to third parties.' Hypponen said Twitter could screen the shortened URLs to make sure they're not already blacklisted for security issues."
Censorship

Submission + - > 32% of Blacklist related to Child porn (wikileaks.org)

Combat Wombat writes: "WIKILEAKS EDITORIAL The Australian government told a Senate estimates hearing this week that less than 32% of the country's secret internet censorship list is related to underage images. During the hearing, the government also stated that the WikiLeaks publication of the list in March has now been officially referred to the Australian Federal Police (AFP). The Australian Communications and Media Authority (ACMA) "blacklist" is slated to form the backbone of a national, mandatory, internet censorship system. Australia is also in talks with the US and the UK internet watch foundation to expand the blacklists via a sharing arrangement. God I hate censorship.."
Security

Submission + - The Most Dangerous and Safest Web Searches (net-security.org)

An anonymous reader writes: Some of the riskiest searches on the Internet today are associated either with finding items for free, such as music or screensavers, or looking for work that can be done from home, according McAfee. Search categories like these are used to lure unsuspecting consumers to their Web sites. Cybercriminals are often able to persuade searchers to download files carrying malicious software that can cause consumers to expose their personal and financial data.
Bug

Submission + - BSA Admits Canadian Software Piracy Rates A Guess (michaelgeist.ca)

psema4 writes: "Following yesterdays story ("Canada's Conference Board Found Plagiarizing Copyright Report") Michael Geist reports following up with Canadian arm of the Business Software Alliance:

Yet what the BSA did not disclose is that the 2009 report on Canada were guesses since Canadian firms and users were not surveyed. While the study makes seemingly authoritative claims about the state of Canadian piracy, the reality is that IDC, which conducts the study for BSA, did not bother to survey in Canada. After learning that Sweden was also not surveyed, I asked the Canadian BSA media contact about the approach in Canada.

"

Earth

Submission + - Q-Sound: Solar-Powered, Bluetooth-Enabled Headphon (inhabitat.com)

Jason Sahler writes: "Music becomes a sustainable experience with Shepeleff Stephen's solar-powered, bluetooth-connected Q-Sound (quantum sound) headphones. The Romanian engineering student's sleek design combines flexible, hexagonal solar panels, wireless technology, and rotating earpieces for a futuristic yet practical product that powers itself on the go."
Censorship

Submission + - Hotmail is blocking gmail mails as spam (nuzakelijk.nl)

An anonymous reader writes: Hotmail / live.com is blocking mails from Gmail. After blocking every single ISP for spamming http://www.nuzakelijk.nl/20090428/e-biz-nu/microsoft-weigert-telfort-mails (in dutch) and blacklisting their IP adresses / ip ranges now some of the Gmail ip adresses have made it to the blacklist.

Maybe this is the time to abandon live.com and hotmail for good?

I could not find any comment from gmail yet

Java

Submission + - JPA 2.0 - Java's Answer to LINQ.

An anonymous reader writes: Java is set to get a decent equivalent to Microsoft's LINQ via the Java Persistence API 2.0 (JPA). The spec is at the final draft stage. JPA 2.0 takes a very different approach to that taken by Microsoft exploiting the annotation code generator built in to Java as an alternative to adding method and type literals (commonly referred to as "DSL support") to the Java language itself. Whilst driven out of necessity the resulting API has greater type safety than would be obtainable via the language level changes without adding further complexity to the Java language itself. The technique has wider applications for programmers wishing to use their Java knowledge to explore Domain Specific Languages. InfoQ has a good summary of the approach.
Space

Submission + - Pulsar Signals Could Be Used For Interstellar GPS (technologyreview.com)

KentuckyFC writes: "We're all familiar with GPS. It consists of a network of satellites that each broadcast a time signal. A receiver on Earth can then work out its position in three-dimensional space by comparing the arrival times of the signals from at least three satellites. That's handy but it only works on Earth. Now astronomers say that the millisecond signals from a network of pulsars could allow GPS-style navigation on a galactic scale. They propose using four pulsars that form a rough tetrahedron with the Solar System at its centre, and a co-ordinate system with its origin at 00:00 on 1 January 2001 at the focal point of the Interplanetary Scintillation Array, the radio telescope near Cambridge in the UK that first observed pulsars. The additional complexity of sending signals over these distances is that relativity has to be taken into account (which is why the origin is defined as a point in space-time rather than just space). The pulsar GPS system should allow users to determine their position in space-time anywhere in the galaxy to within a few nanoseconds, which corresponds to an accuracy of about a metre."
Security

Submission + - Gumblar Virus Mutation Makes Google-Search Toxic (startupearth.com)

An anonymous reader writes: A massive number of popular websites are being infected with a virus which uses vulnerabilities in Adobe's PDF Reader and Flash Player to inject malware into otherwise trusted links, which infect visitors silently, and re-direct Google searches to malware sites.

http://startupearth.com/2009/05/27/gumblar-virus-mutation-makes-google-search-toxic/

Government

Submission + - Inflammatory document posted - Police Corruption (cultureghost.org)

IndianaKim writes: I posted last week asking if I should host a highly inflammatory document that is incriminating toward a police department. I did not end up hosting the document and although I advised, as you all suggested, using wikileaks, they found a host on their own.

I will let their posts and their description provide you the rest of the information.

http://cultureghost.org/viewtopic.php?f=17&t=2271

thank you for all your suggestions.

Government

Submission + - Federal CIO Kundra says IT is path to transparency (nextgov.com)

GovTechGuy writes: Since his appointment in March as federal chief information officer, Vivek Kundra has had a full plate. Also the e-government administrator at the Office of Management and Budget, Kundra has taken on the formidable task of increasing the transparency of government data and oversight of information technology investments. In addition, he's faced personal scrutiny when the FBI launched an investigation into bribery charges at his former office with the District of Columbia government, where he was chief technology officer. Nextgov spoke with Kundra on Wednesday about the challenges of his new position and what he hopes to accomplish in this administration's era of open government. Edited excerpts from the interview follow.
The Media

Submission + - AGW 'skeptic' produces hard data; nobody notices

MyFirstNameIsPaul writes: "Anthony Watts, a meteorologist from Chico, California founded a volunteer project, surfacestations.org, in 2007 with the goal of surveying all of the 1221 United States Historical Climatology Network (USHCN) weather stations to see how well they meet the National Weather Service's (NWS) own siting requirements. These are the stations that report the official record of temperatures here in the U.S. The project uses a network of volunteers armed with basic tools such as cameras, tape measures, GPS units, and a printout of the project's instructions to report the results of the surveys to the project.

In May, the project completed its first report with 70% of the USHCN stations having been surveyed. This report found, among other things, that 89% of the stations fail to meet the NWS requirements. Of note is that they failed in such a way that the stations would likely indicate higher temperatures. The report also discusses the poor recording processes of many stations and how the data is 'adjusted' by the National Oceanic and Atmospheric Administration (NOAA) and NASA.

But most disappointing is the complete lack of coverage by virtually all media. This simple and provocative investigation into the data which is at the very heart of the entire AGW theory doesn't seem to register anywhere when, at the very least, it should warrant a demand for a solid rebuttal from the theory's proponents by the media. There are some out there who are warning of the new 'Climate-Industrial Complex', of which perhaps the media is a beneficiary."

Slashdot Top Deals

He who steps on others to reach the top has good balance.

Working...