Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - New Titi Monkey, At Last. (sciencenews.org)

Doctor Morbius writes: Scientists have discovered a new species of Titi Monkey in the forests of Columbia after having been kept out of the region by 30 years of rebel activity

Submission + - Injecting Errors for Fun and Profit 1

ChelleChelle writes: Errors, whether transient or permanent, are unfortunately a fact of life. In order to make sure that a system can properly handle them, it is absolutely essential to test the error-detection and correction circuitry by injecting errors. This is the main topic of a recent article from acmqueue in which Steve Chessin of Oracle talks about injecting various types of errors (e-cache errors, memory errors) on the Ultrasparc-II.
Google

Submission + - Google Responds to Net Neutrality Reviews (blogspot.com) 1

I Don't Believe in Imaginary Property writes: "Google has written a defense of their joint Net Neutrality proposal with Verizon, responding to criticism like the EFF's recent review. Google presents its arguments as a list of myths and facts, but too many of them look like this one: 'MYTH: This proposal would eliminate network neutrality over wireless. FACT: It's true that Google previously has advocated for certain openness safeguards to be applied in a similar fashion to what would be applied to wireline services. However, in the spirit of compromise, [...]'. The silver lining here is that Google doesn't seem to employ any skilled liars."
Red Hat Software

Submission + - User space memory access from the Linux kernel

IndioMan writes: As the kernel and user space exist in different virtual address spaces, there are special considerations for moving data between them. Explore the ideas behind virtual address spaces and the kernel APIs for data movement to and from user space, and learn some of the other mapping techniques used to map memory.

Submission + - anonymous web browsing (anonymizer.com)

An anonymous reader writes: In light of the story just posed about the ISP owner that fought the FBI, I think it makes sense to ask the /. crown what is the best method/service to use to anonymize your web browsing.

Submission + - Google Warns The Pirate Bay is a Malicious Site

An anonymous reader writes: Slyck news is reporting that Google is warning users that The Pirate Bay is a malicious site. If you do a search on The Pirate Bay, it gives you the following warning:

Of the 1136 pages we tested on the site over the past 90 days, 2 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2010-08-12, and the last time suspicious content was found on this site was on 2010-08-12.
Games

Submission + - In game behavior a small subset of possibilities (blogspot.com) 1

derek_farn writes: "A group of physics grad students at Cornell have found that some players of a game with over 10^100 combinations can successfully predict the behavior of other players well enough to beat the majority of them. With such a huge number of possibilities it is surprising that people use such a small number of playing strategies.

Colonel Blotto is a game in which players assign soldiers to fields. In this implementation there are 10 fields and 100 soldiers. You must specify how many soldiers to send to each of the 10 fields. You don't know what the opposing general will do. Then, in each field, the soldiers face off: whoever has more soldiers wins the battle. Whoever wins more battles wins the war.

For example, a one strategy is "10 10 10 10 10 10 10 10 10 10" and another is "1 11 11 11 11 11 11 11 11 11". The second strategy will lose in the first field, but win the other 9, and therefore win the war."

Submission + - Wikileaks to publish remaining Afghan documents (google.com) 1

Albanach writes: WikiLeaks spokesman Julian Assange has been quoted by the Associated Press as stating "the organization is preparing to release the remaining secret Afghan war documents". According to Assange, they are halfway through processing the remaining 15,000 files as they 'comb through' the files to ensure lives are not placed at risk.

Submission + - Poll

lirel writes: Have you ever tried an SQL-Injection?

No

Yes, bit with no success

Yeah! with little success '-)

alert("just some XSS") lately

%20barAnswer=-1'/**/UNioN/**/Select/**/1,2,3,ConCat(db.auth.login,0x3A,db.auth.password),5%20--

cowboyn:832cae184c7b7c14436c0515adbaed75:xy
Science

Submission + - First discovery by an @Home project (sciencemag.org)

pq writes: In a paper published today in Science, astronomers are reporting the discovery of a radio pulsar in data acquired at the world's largest radio telescope and analyzed by hundreds of thousands of volunteers in 192 countries for the Einstein@Home project. This is the first scientific discovery by a distributed computing project, and specific credit is being given to Chris and Helen Colvin of Ames, Iowa, and Daniel Gebhardt of Germany. More at MSNBC etc.
Microsoft

Submission + - New Hotmail clashes with fellow Microsoft products (infoworld.com)

tsamsoniw writes: Hotmail users have inundated the Microsoft support forums with complaints about the new version of Hotmail, and Microsoft has created a summary page of fixes to the most commonly reported issues. A theme among these fixes: Turn off a particular Microsoft product or feature, be it Internet Explorer, Web-based Messenger, or the High Contrast display in Windows 7. Oh — and the Microsoft Live Team is working on all these issues.
Privacy

Submission + - Android Market, Breeding Ground for Mobile Malware (securityweek.com)

wiredmikey writes: Mobile Virus Authors Expected to see Android Systems as a Growing Target

Google's Android mobile OS has been declared the fastest growing mobile platform according to recent reports, with over 160,000 Android devices being activated every day. This astronomical growth is credited to a friendly user interface and openness of the platform. Approximately 18,600 Android-based applications were created in July 2010 alone.

However, Android's openness has turned its online app store, Android Market, into a breeding ground for malicious applications capable of stealing sensitive user information from the mobile phones.

Slashdot Top Deals

Always look over your shoulder because everyone is watching and plotting against you.

Working...