Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Bicycling is my magic bullet... (Score 1) 1137

If there are cars lined up along the side of the road parked, or otherwise so that you could be doored, take the lane (ride in the middle of the right-most traffic lane). You're legally entitled to, and safety dictates that you should. Sorry to hear you got hit; I hope you got the jerk to pay for the repairs at least.

Comment Bicycling is my magic bullet... (Score 4, Insightful) 1137

As a college student in Tampa, I've found that bicycling is the best way to go. It's faster (I zoom by stopped cars on the roads during rush hour), it's cheaper (no gas, insurance, very low up-front cost), it's cleaner (the only greenhouse gases are my own breathing), and it's healthier (instead of gaining the "freshman 15," I gained the "freshman -50"). It wouldn't be ideal if you have to commute more than 20 miles, but for anything less than that, especially in town, it's perfect.
Input Devices

A Touch Screen With Morphing Buttons 160

Al writes "Researchers at Carnegie Mellon University have created a touch screen that can also produce physical buttons. Graduate student Chris Harrison and professor Scott Hudson use a projector and infrared sensor below the screen to illuminate it and make it touch-sensitive, and the physical buttons are created using air pumps below the surface. They say this type of screen could be particularly useful when a simple, flat touch-screen is too distracting, for example in a vehicle dashboard."
Security

Intel Cache Poisoning Is Dangerously Easy On Linux 393

Julie188 writes "A researcher recently released proof-of-concept code for an exploit that allows a hacker to overrun an Intel CPU cache and plant a rootkit. A second, independent researcher has examined the exploit and noted that it is so simple and so stealthy that it is likely out in the wild now, unbeknownst to its victims. The attack works best on a Linux system with an Intel DQ35 motherboard with 2GB of memory. It turns out that Linux allows the root user to access MTR registers incredibly easily. With Windows this exploit can be used, but requires much more work and skill and so while the Linux exploit code is readily available now, no Windows exploit code has, so far, been released or seen. This attack is hardware specific, but unfortunately, it is specific to Intel's popular DQ35 motherboards."
Security

New Nokia Smartphones Leak E-mail Passwords 94

Noksu writes "Despite of the recent plunge in Nokia's profits, the company is doing well in the surveillance business. The infamous 'Lex Nokia' got ratified in Finland and the company has launched a massive Nokoscope research project for data gathering. In the meantime Nokia's new smartphones forward e-mail account credentials to a remote server. Surprisingly enough, this is done in HTTP request headers. The company has been informed, but there has not been an official statement yet. Time for class action suit in the US?"
Microsoft

Microsoft Family Safety Filter Blocks Google 332

mike.rimov writes "I saw that part of the brand new Windows Live package is the Family Safety Filter, so I decided to give it a spin. Turned it on, set it to 'basic filtering' (their lowest level), and went to Google ... oops, it blocks Google! So I logged into the settings and added Google as an exception. Google still wouldn't come up. Just in case, I turned off the family filter: voila, Google. As we all know, 'Don't be evil' is not part of Microsoft's motto! Oh yeah — and with the filter on, Microsoft's own search engine, live.com comes up." Anomaly?
Security

Researcher's Death Hampers TCP Flaw Fix 147

linuxwrangler writes "Security researcher Jack Louis, who had discovered several serious security flaws in TCP software was killed in a fire on the ides of March, dealing a blow to efforts to repair the problem. Although he kept good notes and had communicated with a number of vendors, he died before fixes could be created and prior to completing research on a number of additional vulnerabilities. Much of the work has been taken over by Louis' friend and long-time colleague Robert E. Lee. The flaws have been around for a long time and would allow a low-bandwidth 'sockstress' attack to knock large machines off the net."
Privacy

Obama Administration Defends Warrantless Wiretapping 788

a whoabot writes "The San Francisco Chronicle reports that the Obama administration has stepped in to defend AT&T in the case over their participation in the warrantless wiretapping program started by Bush. The Obama administration argues that that continuation of the case will lead to the disclosure of important 'state secrets.' The Electronic Frontier Foundation has described the action as an 'embrace' of the Bush policy." Update: 04/07 15:18 GMT by T : Glenn Greenwald of Salon has up an analysis of this move, including excerpts from the actual brief filed. Excerpt: "This brief and this case are exclusively the Obama DOJ's, and the ample time that elapsed — almost three full months — makes clear that it was fully considered by Obama officials."

Slashdot Top Deals

God doesn't play dice. -- Albert Einstein

Working...