Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Books

Steve Jobs: the Comic Book 119

An anonymous reader writes "Steve Jobs' life and career is to be imortalised in a comic book biography. "Steve Jobs: Co-Founder of Apple" appears to describe his life from birth to the current day. Jobs notoriously hates biographies, so it'll be interesting to see how he responds to this one."
Government

Why the US Govt Should Be Happy About Wikileaks 232

angry tapir writes "WikiLeaks' leaking of classified information should be considered a blessing for the US government, and other governments should take heed of the lessons when it comes to information sharing, according to Computer Sciences Corporation (CSC) research associate, Professor Mike Nelson, who spent four years as Senator Al Gore's science adviser and served as the White House director for technology policy on IT, and was also a member of Barack Obama presidential campaign."
Power

Swiss To End Use of Nuclear Power 470

mdsolar writes "Energy minister Doris Leuthard is set to propose Switzerland gradually exits nuclear power, two Swiss newspapers reported on Sunday, citing sources close to the government. The multi-party Swiss government was expected to make an announcement on nuclear policy on Wednesday and may recommend an exit. Switzerland's five nuclear reactors generate about 40 percent of the country's electricity."
Google

An IP Address For Every Light Bulb 457

An anonymous reader writes "Yesterday NXP and Green Wave Reality announced to the world that they plan to give every lightbulb an IPV6 address. Hot on the heels of Google's 900 mhz announcement, Green Wave Reality already has iPhone / Android / and Web-based support. Looks like the lighting wars have started."
Government

DHS Wants Mozilla To Disable Mafiaafire Plugin, Mozilla Resists 360

Davis Freeberg writes "The Department of Homeland Security is hard at work again, protecting the industry from websites that the big studios don't want you to see. This time they're targeting the Mafiaafire plugin by asking Mozilla to disable the addon at the root level. Instead of blindly complying with the government's request, Mozilla has decided to ask some tough questions instead. Unsurprisingly, when faced with legitimate concerns about the legality of their domain seizure program, the DHS has decided to clam up."
Privacy

White House Releases Trusted Internet ID Plan 229

angry tapir writes "From the Computerworld article: 'the U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration.'"
Security

Dropbox Authentication: Insecure By Design 168

An anonymous reader writes "Dropbox can be very useful, but you might be a little surprised to learn that by copying one file from a computer running the application, an attacker can access and download all of your files without any obvious signs of compromise. Normal remediation steps after a compromise such as password rotation, system re-image, etc will not prevent continued access to the compromised Dropbox. Derek Newton, a security researcher that published this finding yesterday, discusses the security implications of this by-design security authentication method on his blog."
Privacy

Pandora App Sends Private Data To Advertisers 198

Trailrunner7 writes "An analysis of the popular free mobile application from online music service Pandora.com that is the subject of a grand jury investigation into loose data privacy practices in the mobile application market confirms that the application silently sends reams of sensitive data to advertisers. The analysis was conducted by application security firm Veracode and found that Pandora's free mobile application for Android phones tracked and submitted a range of data, including the user's gender, geographic location and the unique ID of their phone, according to an entry on Veracode's blog."
Privacy

BP Loses Laptop With Oil-Spill Claimants' Personal Info 137

Oxford_Comma_Lover writes "CNN Reports that BP lost a laptop with the name, address, DOB, and SSNs of everyone who filed claims related to the big oil spill last year. In other words, everyone asking for money from them based on the spill just got their private info misplaced. There has been no allegation of bad faith."
Privacy

Twitter's Lawyers Seek To Block WikiLeaks Data Handover 81

jhernik writes "Lawyers on Friday asked a judge to overturn a ruling from earlier this month, forcing Twitter to hand over account details to the Department of Justice, in a case related to the federal government's ongoing investigation of WikiLeaks. The appeal (PDF) seeks to overturn a ruling that would give the government access to Twitter account details for three users who had contact with WikiLeaks. The government also wants Twitter to provide information on WikiLeaks founder Julian Assange and on Bradley Manning, a US Army private charged with providing data to WikiLeaks."
The Courts

Federal Prosecutors Tempt the Streisand Effect 100

decora writes "As the case of NSA IT guru Thomas Andrews Drake nears trial, the fur has been flying between the defense and prosecution lawyers. Earlier this week the judge ordered the sealing of a defense motion because the government claimed it contained classified information. The problem? The document had been sitting on the Federation of American Scientists website for several days. Another problem: the document is marked 'Unclassified' in big bold letters at the top of the page."
Iphone

IPhone 4 Survives 1,000 Foot Fall From Plane 222

tekgoblin writes "From the article: 'US Air Force Combat controller Ron Walker had lost his iPhone 4 from his aircraft during flight. He works as a Jump Master, which is where he would ensure the airplane was in the correct position when he sends parachute jumpers out. The plane was moving at 150 mph and while looking out the door of the plane to find necessary ground landmarks his pocket opened and his iPhone flew out. When he noticed his phone fell, he thought all was lost. Upon landing and sharing the story with friends he installed the Find My iPhone app on one of their phones and went looking for his phone. He expected it to be battered from the fall but found the phone to be 100% un-damaged from the fall. The phone was protected by a Griffin Motif TPU iPhone case but it isn't clear whether the case protected the phone from the fall or the fact that it was cushioned by the brush that it hit.'"
Image

Book Review: Social Engineering: The Art of Human Hacking Screenshot-sm 114

brothke writes "One can sum up all of Social Engineering: The Art of Human Hacking in two sentences from page 297, where author Christopher Hadnagy writes 'tools are an important aspect of social engineering, but they do not make the social engineer. A tool alone is useless; but the knowledge of how to leverage and utilize that tool is invaluable.' Far too many people think that information security and data protection is simply about running tools, without understanding how to use them. In this tremendous book, Hadnagy shows how crucial the human element is within information security." Keep reading for the rest of Ben's review.
Democrats

Contents of Leaked HBGary Emails Reveal Wrongdoing 369

chargersfan420 writes "Ars Technica has sifted through the contents of the HBGary emails leaked last week in the attack by Anonymous and posted an interesting story about some of the things they were up to (which include rootkit development, selling rootkits to the private sector, and an entire list of 0-day exploits in a variety of OSes and other software, among a variety of other devious plans). Today they are reporting a democratic push for a congressional investigation of HBGary Federal."
GUI

Ask Slashdot: Is the Recycle Bin a Good GUI Metaphor? 465

dsginter writes "During a recent Windows 7 upgrade, I disabled the 'Recycle Bin' from appearing on the user desktop. Why? Because this allows the users to retrieve errant deletions. While this was the goal of the 'Recycle Bin' in the first place, most people (including myself) are in the good habit of keeping a tidy workspace and 'taking out the trash' when they see that it is full. For some people, their OCD meant that deleting a file was a two step process: delete the file and then empty the recycle bin. By disabling it from view, I have found that the original function is restored for the smattering of times that it is actually needed. Why are we wasting pixels on such a poor metaphor?" Going further, is there some combination of metaphor and method of use that you'd find more useful or natural?

Slashdot Top Deals

Old programmers never die, they just become managers.

Working...