Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:law enforcement back door (Score 2, Interesting) 685

People are claiming this is a analysis of PIFTS.exe. I have no way to verify that this really is the norton PIFTS.exe so keep that in mind.

Changes security settings of Internet Explorer: This system alteration could seriously affect safety surfing the World Wide Web.

medium

Performs File Modification and Destruction: The executable modifies and destructs files which are not temporary.

high

Performs Registry Activities: The executable reads and modifies register values. It also creates and monitors register keys.

low

Data Storage

Can SSDs Be Used For Software Development? 480

hackingbear writes "I'm considering buying a current-generation SSD to replace my external hard disk drive for use in my day-to-day software development, especially to boost the IDE's performance. Size is not a great concern: 120GB is enough for me. Price is not much of a concern either, as my boss will pay. I do have concerns on the limitations of write cycles as well as write speeds. As I understand, the current SSDs overcome it by heuristically placing the writes randomly. That would be good enough for regular users, but in software development, one may have to update 10-30% of the source files from Subversion and recompile the whole project, several times a day. I wonder how SSDs will do in this usage pattern. What's your experience developing on SSDs?"
Power

A New Way To Produce Hydrogen 204

Iddo Genuth writes "Scientists at Pennsylvania State University and Virginia Commonwealth University are producing hydrogen by exposing clusters of aluminum atoms to water. Rather than relying on the electronic properties of the aluminum, this new process depends on the geometric distribution of atoms within the clusters. It requires the presence of 'Lewis acids' and 'Lewis bases' in those atoms (water can act as either). Unlike most hydrogen production processes, this method can be used at room temperature and doesn't require the application of heat or electricity to work. The researchers experimented with a variety of different aluminum cluster patterns, discovering three that result in hydrogen production."
Programming

Submission + - Benchmarking CSS Selectors

Kickboy writes: These days in the JavaScript world, everything is about accessing and manipulating the DOM (Document Object Model). The most powerful tool available to modern JS developers are CSS Selectors. Today, every popular JavaScript Library and modern browser has it's own implimentation of accessing elements on a page using advanced CSS3 selectors, but which is most efficient? With that question in mind, I have developed an advanced CSS Selector benchmarking tool. This tool uses the latest versions of all the popular JavaScript Libraries; including jQuery, ProtoType, mooTools, Dojo, and YUI. Users who run a test on this site can submit their results to be included in the website's overall stats. By tracking the different results for libraries on many different browsers and computer configurations, we can produce an accurate map of the most efficient JavaScript Libraries and Browsers. Try the test yourself...
Networking

OpenDNS To Block and Monitor Conficker Worm 175

Linker3000 writes "According to The Register, OpenDNS plans to introduce an new service that will prevent PCs infected with the Conficker (aka Downadup) malware from contacting its control servers, and will also make it easy for admins to know if even a single machine under their control has been infected by Conficker: 'Starting Monday, any networks with PCs that try to connect to the Conficker addresses will be flagged on an admin's private statistics page. The service is available for free to both businesses and home users.' With the amount of trouble this worm has caused, perhaps this is a good time to take a look at OpenDNS if you haven't done so already."

Comment Re:Simpsons? (Score 2, Funny) 293

I'm pretty sure the goggles tag is a reference to the simpsons. I'm wondering if that episode is famous enough to warrant a meme or if its just because it was the one they showed last night.

The googles, they do nothing! = 239,000 results.
The goggles do nothing = 325,000 results.

I think that it qualifies to be called a internet meme.

Comment Re:I enjoy at least 1 Belkin product (Score 2, Interesting) 137

When I got mine, I thought the LCD would be useless, but it turns out to be the best part in practice.

Same thing here.

When I broke my G15 I figured I might as well satisfy my do-it-myself itch it and build a detachable miniature lcd display with some basic winamp/media controls.

Just being able to see my mail inbox count or the last lines from PuTTy (perfect during long scripts) while having a fullscreen app running is wonderful.

It's funny.  Laugh.

Submission + - Eric Raymond gets the clue stick from uber-hacker 11

An anonymous reader writes: Eric Raymond recently wrote to defend open-source innovation against the vicious attacks of some rabid proprietary software zealot. The guy later complains that ESR quoted him out of context, and that he exaggerates the role hackers played in the development of the web, drawing a parallel with his own role in 3D games. ESR, apparently very unimpressed, misses the clue entirely and goes all nuclear on him: "You are articulating the assumptions of someone who is merely talented. I, on the other hand, have known geniuses [...] I may actually be one myself." End of story? Not quite, here is the kicker. The guy responds: "To the best of my knowledge, there are less than 30 people on this planet who can claim having designed a successful operating system entirely from scratch[...]. I'm one of them." It turns out that ESR's "victim", not content with having written one of the earliest 3D game, is also behind HP's Itanium virtualization technology...
Hardware Hacking

Inventor Open Sources "TV-B-Gone," and Why 340

ptorrone writes "Inventor Mitch Altman explains why he open-sourced his TV-B-Gone kit, the original stealth keychain fob for defeating TVs in public places. The title of the article is 'Patent-B-Gone' and perhaps the most interesting fact is that Mitch's brother is a patent attorney, but he still decided to release an open source hardware version of the TV-B-Gone, with pretty impressive results."
Image

Programming .NET 3.5 Screenshot-sm 224

lamaditx writes "The world of the .NET framework is taken to the next level by the release of .NET 3.5. The intended audience of this book are experienced .NET programmers. There are no sections that tell you details about C#, SQL servers or anything like that. I don't recommend this book if you never worked on a .NET project and don't know how to set up a SQL database. You should be aware that the code is written in C#. You might use one of the software code converters if you prefer Visual Basic instead. I think the code is still readable even if you do not know C#. I appreciate the fact that the authors decided to use one language only because it keeps the book smaller. The authors assume you are using Visual Studio 2008. You don't necessarily need to update to 2008 if you are working with an older edition because you can use the free Express Edition to get started." Keep reading for the rest of Adrian's review.

Comment Re:This Just In (Score 1) 767

If the general public were half as smart as we give them credit for the world would have never seen Napoleian, Cesar (well actually the Romans solved that problem on their own), Castro, Hugo Chavez and more.

The others are fair enough, but what's dog food got to do with it?

Dog food? Didnt his whispering work?

Networking

ICANN Loses Control of Its Own Domain Names 61

NotNormallyNormal writes "CBC picked up an AP story about ICANN recently losing control over two of their domain names on Thursday, June 26. A domain registrar run by the group transferred the domains to someone else. ICANN's press release had this to say: 'As has been widely reported, a number of domain names, including icann.com and iana.com were recently redirected to different DNS servers, allowing a group to provide visitors to those domains with their own website. It would appear the attack was sophisticated, combining both social and technological techniques, but was also limited and focused.' Comcast has had similar troubles lately as well."

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...