Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Education

College Police Think Using Linux Is Suspicious Behavior 1079

FutureDomain writes "The Boston College Campus Police have seized the electronics of a computer science student for allegedly sending an email outing another student. The probable cause? The search warrant application states that he is 'a computer science major' and he uses 'two different operating systems for hiding his illegal activity. One is the regular B.C. operating system and the other is a black screen with white font which he uses prompt commands on.' The EFF is currently representing him."
Robotics

Submission + - Tweenbots Test NYC Pedestrian-Robot Relations (tweenbots.com)

MBCook writes: "Kacie Kinzer seems to have come up with the idea to see if people in New York City would help a cute little robot get where it's going, and thus created tweenbots.

Tweenbots are human-dependent robots that navigate the city with the help of pedestrians they encounter. Rolling at a constant speed, in a straight line, Tweenbots have a destination displayed on a flag, and rely on people they meet to read this flag and to aim them in the right direction to reach their goal.

"

Image

The Art of The Farewell Email Screenshot-sm 703

With so many people losing their jobs, the farewell email, letting colleagues and contacts know where you are moving and how you can be reached, has become common. Writing a really good one, whether it be funny, sad or just plain mad is an art form. Chris Kula, a receptionist at a New York engineering firm, wrote: "For nearly as long as I've worked here, I've hoped that I might one day leave this company. And now that this dream has become a reality, please know that I could not have reached this goal without your unending lack of support." In May, lawyer Shinyung Oh was let go from the San Francisco branch of the Paul Hastings law firm six days after losing a baby. "If this response seems particularly emotional," she wrote to the partners, "perhaps an associate's emotional vulnerability after a recent miscarriage is a factor you should consider the next time you fire or lay someone off. It shows startlingly poor judgment and management skills — and cowardice — on your parts." Let's hear the best and worst goodbye emails you've seen.
Movies

Submission + - Fraudulent Netflix Ratings

Nom du Keyboard writes: For not the first time I notice a new film that hasn't yet even reached the theaters with hundreds of positive votes and/or reviews recorded on Netflix. This time the move is Inkheart. For a movie that doesn't even hit the theaters until January 23 it already has 428 votes and a rating of 4.3 (out of five) on Netflix. Seems more than a bit fraudulent to me. Also it has a review that doesn't even review the movie, but instead says the books are great therefore the movie should be too. Does the word "shills" come to mind? With millions spent just to promote a movie are a few hundred of that going to phony voters, or have that many people actually seen the film and just can't wait to rush home and log onto Netflix to vote? Just what is the responsibility here to provide honest ratings?
Security

Solution Against Cold Boot Attack In the Making 260

Bubba writes "I just discovered this blog: Frozen Cache. It describes a concept for preventing cold boot attacks by saving the encryption key in the CPU cache. It is claimed that by disabling the CPU cache the key will remain in cache and won't be written to memory. The blog says they're working on a proof-of-concept implementation for Linux. Could this really turn out to be a working solution?" Update: 01/19 20:26 GMT by KD : Jacob Appelbaum, one of the authors of the cold boot attack paper, wrote in with this comment: "It's not a solution. It simply seeks to make it more obscure but an attacker would certainly still be able to pull off the attack. From what is on that blog, there's still a full keyschedule in memory at this time. This is how we reconstruct the key, the redundant information in memory; it's not just the 128/256 bit key itself. For older methods, they needed the actual specific key bits but we don't need them because we recreate them. Basically, the CPU is acting as a ghetto crypto co-processer. Emphasis on ghetto. It's a nice suggestion but the devil is in the details and sadly the details in this case aren't really up to snuff. It's a bogus solution."
United States

Submission + - Top 10 IT priorities for Obama (pcauthority.com.au)

Slatterz writes: Tuesday's swearing-in will be a landmark not only for its cultural and social implications, but also for its impact on technology. Obama has promised to be more in touch with the cutting edge of the internet and tech world than any previous President. He's already said that the nation will get its first chief technology officer and has started making appointments that put people with technological knowledge in the driving seat rather than politically reliable hacks. As the nation gets ready for the end of the Bush era and the beginning of the Obama one we thought it right to suggest a few IT priorities that the new president might like to address. From webcasting to the DMCA to net neutrality — a list of top ten IT priorities for the new president.
Image

Braille Playboy Screenshot-sm 11

You really do read it for the articles in this case.
Image

Slashdot's Disagree Mail Screenshot-sm 354

There is an old Japanese proverb that goes, "Better than a thousand days of diligent study is one day with a great teacher." This week's mail is all about teaching. Whether it is about the seriousness of psychic ability, a short history of trolls or explaining how much free time and malice your dad's attorney has, these people just want to impart information. If what they sent me is any indication, they had a lot of sick days. Click on the link below to become enlightened.
Privacy

Dragonfly-Sized Insect Spies Spotted, Denied 433

SRA8 sends in a Washington Post piece about work at various academic, government, and military labs on insect-sized flying spies. A number of people reported what appeared to be flying mechanical insects, larger than dragonflies, over an antiwar rally in Washington DC last month. The reporter got mostly no-comments from the agencies he called trying to pin down what it was they saw. Only the FBI said through a spokesman: "We don't have anything like that." The article describes work on insect cyborgs as well as purely mechanical flying spies, but quotes vice admiral Joe Dyer, former commander of the Naval Air Systems Command now at iRobot in Burlington, Mass., as follows: "I'll be seriously dead before that program deploys." The article also mentions an International Symposium on Flying Insects and Robots, held in Switzerland in August, at which Japanese researchers demonstrated radio-controlled fliers with four-inch wingspans that resemble hawk moths.

Comment Re:I'm sure this is actionable! (Score 1) 605

You should feel happy that Apple creates software designed to destroy *YOUR* property? Are you forgetting its YOUR phone?

Who said the software was designed to destroy property? Isn't it possible that the unlocking tools do something they shouldn't (maybe erase a bit of currently-unused firmware that is needed in 1.1? I dunno), and Apple is just saying that they won't fix someone else's bug?

And hey, at least they warned you. If they wanted to brick phones, why announce it ahead of time? You still have the option to not update.
Slashdot.org

Submission + - What should I ask Slashdot?

TodMinuit writes: "Dearest Slashdot: Recently, I've wanted to ask Slashdot something. Unable to come up with a question myself, I thought who better to ask what I should ask Slashdot than Slashdot itself? Surely the very people answering the question are quite capable of coming up with one. So, Slashdot, what should I ask Slashdot?"
Mozilla

Submission + - Firefox No Longer Alternative Enough

Kelson writes: "The Alternative Browser Alliance, which promotes the use of alternative browsers over Internet Explorer, has stopped promoting Firefox after nearly two years. According to the announcement, Firefox has sold out, gone mainstream, and "is no longer an alternative web browser."

Reportedly the site will throw its weight behind iCab, as it is guaranteed to remain alternative since it will never run on Windows Vista.""
Slashdot.org

Submission + - Slashdot Announces Early End To April Fools

forkazoo writes: "A number of you have posted expressing concern about Slashdot's enthusiasm for April Fools jokes. Since Slashdot has always striven to be perceived as a legitimate news source, we have had an internal discussion, and decided to immediately end all our articles which are not fully verified for today. This site was never about just personal amusement. The point has always been to provide absolutely articulate, well edited articles to inform the IT community about new events which could effect their jobs. Because the April Fools jokes make this site look like some sort of personal blog for CmdrTaco, I am happy to announce that we declare that we will never violate the trust that you have in us ever again. For the rest of the day, you will be able to enjoy the carfully edited, duplicate-pruned, always relevant articles which you have come to know and explectr."
OS X

Submission + - OSX on AppleTV

An anonymous reader writes: As AppleTVhacks.net reports, hacker semthex, who already made AppleTV OS run on mac, now did it again and made AppleTV run OSX. The special kernel is powered with a processor emulation and allows to run full blown GUI and even iTunes. Does this turn the little TV settop box into a third world mac-mini now?

Slashdot Top Deals

Work continues in this area. -- DEC's SPR-Answering-Automaton

Working...