Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Google

Google Latitude Arrives For the iPhone — As a Web App 195

An anonymous reader writes "After months of waiting, the Google Latitude social maps service finally arrived for the iPhone ... but thanks to an Apple rejection of the natively developed app, it's a web app. Says Google on their blog, 'We worked closely with Apple to bring Latitude to the iPhone in a way Apple thought would be best for iPhone users. After we developed a Latitude application for the iPhone, Apple requested we release Latitude as a web application in order to avoid confusion with Maps on the iPhone.' But it gets worse for iPhone users: 'Unfortunately, since there is no mechanism for applications to run in the background on iPhone (which applies to browser-based web apps as well), we're not able to provide continuous background location updates in the same way that we can for Latitude users on Android, BlackBerry, Symbian and Windows Mobile.' Latitude has been sprouting new features lately and is an interesting take on social networking, but it looks like Apple is determined to ensure its users only get a seriously crippled implementation compared to the Android and WinMo versions. PC World put it less politely than Google did, saying, 'Google's new Latitude Web app for iPhone is so hamstrung that Apple customers may be wishing they had a BlackBerry or Android handset instead.'"

Comment Re:News at 11 (Score 1) 553

Um, hire intelligent users? We know that isn't going to happen though. So take your password, keep it in your wallet. You don't leave that laying around, do you?

Or, have one master password (use that for your machine password), and PasswordSafe to store all your other passwords. You can remember one password, right? Even if it's slightly complex?

Security requires all parties to work together, or it's useless and easy to circumvent.

Security

iPhone Vulnerability Yields Root Access Via SMS 186

snydeq writes "Pwn2Own winner Charlie Miller has revealed an SMS vulnerability that could provide hackers with root access to the iPhone. Malicious code sent by SMS to run on the phone could include commands to monitor location using GPS, turn on the phone's microphone to eavesdrop on conversations, or make the phone join a DDoS attack or botnet, Miller said. Miller did not provide detailed description of the SMS vulnerability, citing an agreement with Apple, which is working to fix the vulnerability in advance of Black Hat, where Miller plans to discuss the attack in greater detail. 'SMS is a great vector to attack the iPhone,' Miller said, as SMS can send binary code that the iPhone processes without user interaction. Sequences can be sent to the phone as multiple messages that are automatically reassembled, thereby surpassing individual SMS message limits of 140 bytes."
Censorship

Man Attacked In Ohio For Providing Iran Proxies 467

David Hume writes "electronicmaji is reporting on the Daily Kos that the individual known as ProtesterHelp (also to be found on twitter) was attacked in Ohio for providing network security for Twitterers in Iran, setting up private networks to provide secure proxies, calling for media networks to remove the Iranians Twitterers' information from their broadcast, and providing counter-intelligence services (including Basiji and Army Locations) within the Twitter community. ProtesterHelp was allegedly attacked by a group of men while walking to class in Ohio. The men, who appeared to ProtesterHelp to be either Iranian or Lebanese, drove up beside him and threw rocks at him while shouting, 'Mousavi Fraud.' ProtesterHelp further reported that his personal information has been leaked, and is currently being spread both online and inside of Iran amongst the government." Relatedly, Wired is also reporting that Google and Facebook have rushed out support for Persian. This move has allowed many pro-democracy groups to connect and translate their message to a broader audience.
Hardware Hacking

Making a Child Locating System 1092

celtic_hackr writes "Well, I never thought I'd be an advocate for placing GPS devices on people. However, since it took less than three days for my local school district to misplace my daughter, I have decided that something needs to be done. By the school district's own admission it has a recurring problem of placing children on the wrong buses. Fortunately, my daughter was located, with no thanks to the local school district. Therefore, I would like input on a way to be able to keep track of my child. I know there are personal tracking devices out there. I have nothing against these systems. But I want more than this. My specification are: 1) a small unobtrusive device I can place on my daughter, 2) an application to pull up on any computer, a map with a dot indicating the real-time position of my child, 3) a handheld device with the equivalent information, 4) [optional] a secure web application/plug-in I can install on my own domain allowing me to track her from anyplace in the world, 5) a means of turning it all off, 6) a Linux based solution of the above. I believe all the pieces for making such a system are out there. Has anyone built anything like this? Is there an open source solution? How would I go about building my own? Has anyone hacked any of these personal trackers before, to serve their own purposes? How does a tinfoil hat wearer engineer such a device to make sure Big-Brother isn't watching too? Can these devices be locked down so only certain devices can pick up the GPS location of an individual locator? What other recommendations do you have?"
Robotics

Robot Soldiers Are Already Being Deployed 258

destinyland writes "As a Rutgers philosopher discusses robot war scenarios, one science magazine counts the ways robots are already being used in warfare, including YouTube videos of six military robots in action. There are up to 12,000 'robotic units' on the ground in Iraq, some dismantling landmines and roadside bombs, but 'a new generation of bots are designed to be fighting machines.' One bot can operate an M-16 rifle, a machine gun, and a rocket launcher — and 250 people have already been killed by unmanned drones in Pakistan. He also tells the story of a berserk robot explosives gun that killed nine people in South Africa due to a 'software glitch.'"
The Internet

Dealing With ISPs That Use NXDomain Redirection? 264

Vrtigo1 writes "I work for a small company that has about 50 staff on the road relying on VPN back to our office at any given time. Many ISPs have implemented NXDomain redirection services that hijack DNS traffic to show you sponsored links and other related ads when you mistype a domain name. These services are incompatible with most VPN software, since they prevent the computer from resolving internal hostnames. Large ISPs typically provide an opt-out on their sponsored links page that immediately opts you out of the DNS redirection, but I've noticed that some smaller ISPs and CLECs have opt-out links that don't actually appear to do anything. I don't have a good solution for employees using these ISPs, and our employees are getting frustrated because the problem is becoming more prevalent and we can't fix it for them. I've tried calling a few of these smaller ISPs for help, but it's been like talking to a wall. Manually changing DNS servers works temporarily, but the user can't resolve internal hostnames when they connect to the office LAN again. Have you had to deal with ISPs using non-standard DNS servers? What is your solution?"
The Media

Can the New Digital Readers Save the Newspapers? 289

Hugh Pickens writes "The NY Times reports that several companies plan to introduce digital newspaper readers by the end of the year with screens roughly the size of a standard sheet of paper to present much of the editorial and advertising content of traditional periodicals in generally the same format as they appear in print. Publishers hope the new readers may be a way to get consumers to pay for those periodicals — something they have been reluctant to do on the Web — while allowing publishers to save millions on the cost of printing and distributing their publications, at precisely a time when their businesses are under historic levels of pressure from the loss of readers and advertising. 'We are looking at this with a great deal of interest,' said John Ridding, the chief executive of the 121-year-old British newspaper The Financial Times. 'The severe double whammy of the recession and the structural shift to the Internet has created an urgency that has rightly focused attention on these devices.' The new tablets will start with some serious shortcomings: the screens, which are currently in the Kindle and Sony Reader, display no color or video and update images at a slower rate than traditional computer screens. But many think the E-ink readers are simply too little, too late and have not appeared in time to save the troubled realm of print media. 'If these devices had been ready for the general consumer market five years ago, we probably could have taken advantage of them quickly,' said Roger Fidler, the program director for digital publishing at the University of Missouri, Columbia. 'Now the earliest we might see large-scale consumer adoption is next year, and unlike the iPod it's going to be a slower process migrating people from print to the device.'"

Slashdot Top Deals

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...