Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Child-Suitable Alternatives To Passwords? 895

An anonymous reader writes "Two months ago I donated my old PC to my little sister, who is 7 — I had promised she would get her own computer as soon as she can read and write properly. I then proceeded to answer her questions about how it works, as far as she inquired, and tried to let her make some choices when installing Debian (she can already use GNOME). As I explained password protection and encryption to her, I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent. The significant problem is that she cannot permanently memorize abstract passwords, even if they are her own creation. I talked with a teacher who assured me that this is common at her age. My parents would probably be able to guess non-abstract passwords. What mechanism of identifying herself does the Slashdot crowd suggest?"
Security

Antivirus Inventor Says Security Pros Are Wasting Time 282

talkinsecurity writes "Earlier this week Peter Tippett, chief scientist at the ICSA and the inventor of the progam that became Norton Antivirus, had some interesting things to say about the state of the security industry. In a nutshell, Tippett warned that about a third of the work that security departments do today is a waste of time. Tippett goes on to systematically blow holes in a lot of security's current best practices, including vulnerability research/patching, strong passwords, and the product evaluation process. 'If a hacker breaks into the password files of a corporation with 10,000 machines, he only needs to guess one password to penetrate the network, Tippett notes. "In that case, the long passwords might mean that he can only crack 2,000 of the passwords instead of 5,000," he said. "But what did you really gain by implementing them? He only needed one."' Some of his arguments are definitely debatable, but there is a lot of truth to what he's saying as well."
GUI

Command Line Life Partner Wanted 503

emj writes "Craiglist offers an interesting approach to finding a life partner , summmary: "There is a sad truth to the world today. I am part of a dying breed of people known as "shell users." ... Because there are fewer and fewer of us, I must help keep our lineage alive. I am looking for someone to help me do this. I need a woman (obviously) who is willing to raise a child with me in the method of Unix."."
Math

44 Conjectures of Stephen Wolfram Disproved 158

Richard Pritches writes in to let us know that MIT errata expert Evangelos Georgiadis has disproved 44 conjectures set by Dr. Stephen Wolfram (founder of Mathematica) in A New Kind of Science. The paper was published in the latest issue of the Journal of Cellular Automata and can be read in PDF form at Prof Edwin Clark's collection of reviews of Wolfram's ANKS. "The formulas provided by Wolfram for these [44] rules are not minimal. Moreover for 8 of these cannot be minimal even by simple inspection since minimal formula sizes for 3-input Boolean functions over this basis never exceeds 5."
Censorship

Apple Lawyering Up On "Fake Steve Jobs" 346

An anonymous reader sends us to The Secret Diary of Steve Jobs for a developing situation. Daniel Lyons, a.k.a. Fake Steve Jobs, made a post earlier today revealing that Apple was offering him some money (in the wake of the ThinkSecret shutdown) to close down his blog. He said he was interested in taking it. A few hours later, Lyons posted again revealing that Apple's lawyers had contacted him angrily, saying the details of the deal were supposed to remain private. Fake Steve replied 'we either deal out in the open, completely transparently, or we don't deal.' A third post gives details of Apple's lawyers' next response, going totally medieval on him. Since then the situation has calmed down a bit.
United States

FEMA Sorry for Faking News Briefing 403

theodp writes "The Federal Emergency Management Agency's No. 2 official apologized Friday for leading a staged news conference Tuesday in which FEMA employees posed as reporters. All the while, real reporters listened on a telephone conference line and were barred from asking questions. In the briefing, Vice Adm. Harvey E. Johnson Jr., FEMA's deputy administrator, called on questioners who did not disclose that they were FEMA employees, and gave replies emphasizing that his agency's response to this week's California wildfires was far better than its response to Hurricane Katrina in August 2005."
Games

Churches Use Halo To Spread the Word, Raise Eyebrows 474

The New York Times has a lengthy look at an unorthodox way to spread the religious word: Halo 3 multiplayer matches. Churches across the country have adopted 'Halo Nights' as a way to get kids together in religious centers and church basements. "The alliance of popular culture and evangelism is challenging churches much as bingo games did in the 1960s. And the question fits into a rich debate about how far churches should go to reach young people. Far from being defensive, church leaders who support Halo -- despite its "thou shalt kill" credo -- celebrate it as a modern and sometimes singularly effective tool. It is crucial, they say, to reach the elusive audience of boys and young men." Just the same, the use of the game is raising concerns among some onlookers. GamePolitics reports that many faith communities are heavily debating the issue.

Microsoft Working On Health Information 'Vault' System 314

josmar52789 wrote with an article from the New York Times, discussing Microsoft's new push into the consumer health care market. The plan is to offer personal health care records online via a system called HealthVault. Numerous big names in the medical field have signed up for the service, including the 'American Heart Association, Johnson & Johnson LifeScan, NewYork-Presbyterian Hospital, the Mayo Clinic and MedStar Health'. The ultimate purpose of the service is to provide an online accessible but highly secure service to patients and medical facilities: "The personal information, Microsoft said, will be stored in a secure, encrypted database. Its privacy controls are set entirely by the individual, including what information goes in and who gets to see it. The HealthVault searches are conducted anonymously and will not be linked to any personal information in a HealthVault personal health record. Microsoft does not expect most individuals to type in much of their own health information into the Web-based record. Instead, the company hopes that individuals will give doctors, clinics and hospitals permission to directly send into their HealthVault record information like medicines prescribed or, say, test results showing blood pressure and cholesterol levels. "
Businesses

12 Year Old Gets $6.5M for Gaming Company 180

Bayscribe writes "A Silicon Valley company co-founded by a 12-year-old has just raised $6.5 million in venture capital. PlaySpan, based in Santa Clara, Calif. says it offers game publishers a technology that lets users make payments and shop for other items. It calls itself the first "publisher-sponsored in-game commerce network." Arjun Mehta, a 6th grader, says on his Web site that he is passionate about software that can make the game experience more "rewarding," and that he started the company last year in his garage. He paid for it from earnings made from selling online game items he won."
Censorship

Highway Safety Agency Silences Engineers 284

nbauman writes "Nichole R. Nason, administrator of the National Highway Traffic Safety Administration, put a new rule into effect that NHTSA officials, including scientists and engineers, are no longer allowed to be quoted by reporters, according to the New York Times. If the officials want to say anything it has to be off the record. The only one they can quote is Nason herself. However, she refused to be interviewed about the no-attribution policy."
Space

Interstellar Dust Could Be "Alive" 332

reezle writes "An international team has discovered that, under the right conditions, particles of inorganic dust can become organized into helical structures. These structures can interact with one another in ways that are usually associated with organic compounds and with life. Not only do these helical strands interact in a counterintuitive way in which like can attract like, but they also undergo changes that are normally associated with biological molecules, such as DNA and proteins, say the researchers. For example, they can divide to form two copies of the original structure. These new structures can also interact to induce changes in their neighbors. And they can even evolve into yet more structures as less stable ones break down, leaving behind only the fittest structures in the plasma. 'These complex, self-organized plasma structures exhibit all the necessary properties to qualify them as candidates for inorganic living matter,' said the lead researcher. 'They are autonomous, they reproduce and they evolve.'" The research, published in the New Journal of Physics, was carried out using a computer model of molecular dynamics.
Science

Scientists Offer 'Overwhelming' Evidence Terran Life Began in Space 556

An anonymous reader writes "Using data from recent comet-probing space missions, British scientists are reporting today that the odds of life starting on Earth rather than inside a comet are one trillion trillion (10 to the power of 24) to one against. That is, we're not originally from around here. Radiation in comets could keep water in liquid form for millions of years, they say, which along with the clay and organic molecules found on-board would provide an ideal incubator. 'Professor Wickramasinghe said: "The findings of the comet missions, which surprised many, strengthen the argument for panspermia. We now have a mechanism for how it could have happened. All the necessary elements - clay, organic molecules and water - are there. The longer time scale and the greater mass of comets make it overwhelmingly more likely that life began in space than on earth."'" jamie points out that the author of this paper has many 'fringe' theories. Your mileage may vary.
Republicans

Karl Rove Resigning Aug 31 739

tetrahedrassface writes "According to CNN current Bush Administration political advisor Karl Rove will be resigning his post as senior political advisor at the end of August to spend more time with his family. Few if any prior senior political advisors to presidents have been the lightning rods for controversy that Mr. Rove has. Accused of running smear campaigns and celebrated for pioneering district level up campaigns that rely heavily on databases and fake grassroots origins, Mr Rove is one of the chief architects of the Republican Revolution."
Caldera

SCO Loses 643

An anonymous reader writes "The one summary judgement that puts a stick into SCO's spokes has just come down. The judge in the epic SCO case has ruled that SCO doesn't own the Unix copyrights. With that one decision, a whole bunch of other decisions will fall like dominoes. As PJ says, 'That's Aaaaall, Folks! ... All right, all you Doubting Thomases. I double dog dare you to complain about the US court system now. I told you if you would just be patient, I had confidence in the system's ability to sort this out in the end. But we must say thank you to Novell and especially to its legal team for the incredible work they have done. I know it's not technically over and there will be more to slog through, but they won what matters most, and it's been a plum pleasin' pleasure watching you work. The entire FOSS community thanks you for your skill and all the hard work and thanks go to Novell for being willing to see this through."
Privacy

Police Data-Mining Done Right 321

enharmonix writes "Courtesy of Bruce Schneier, it's nice to hear something good about data mining for a change: predicting and stopping crime. For example, police in Redmond, VA, 'started overlaying crime reports with other data, such as weather, traffic, sports events and paydays for large employers. The data was analyzed three times a day and something interesting emerged: Robberies spiked on paydays near cheque cashing storefronts in specific neighbourhoods. Other clusters also became apparent, and pretty soon police were deploying resources in advance and predicting where crime was most likely to occur.'"

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...