Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Hardware Hacking

Jail-Breaking iPhones at the Apple Store 162

An anonymous reader writes "According to an article in Xconomy, iPhone hacker and author Jonathan Zdziarski was invited to speak at an Apple Store in Cambridge, MA last week where he talked about the history of iPhone hacking, jail-breaking, and limitations of the official SDK. From the article, "Zdziarski was one of the first software engineers to figure out how to hack the iPhone, and he's the author of a forthcoming O'Reilly Media book called iPhone Open Application Development, which gives readers explicit instructions on jail-breaking iPhones. So for Apple to give Zdziarski the podium at an Apple retail location is a little like Steve Ballmer inviting Linus Torvalds to speak at a Windows product launch." Zdziarski reports in his own blog how the open source community was on the iPhone developer scene as early as 2007, long before enterprises got there, and estimates that nearly 40% of all iPhones have been jail-broken to run the third-party community software installer. Finally, this story from Top Tech News suggests that open source software might actually create competition for Apple's "official" developers, because applications using the open source iPhone compiler are not subject to the same limitations as official Apple SDK programs are."
Math

Happy Pi Day 351

Jonathan writes "Today, the 14th of March, is Pi Day 2008. Pi Day is internationally celebrated in honor of the mathematical constant "Pi," who's actual value will — now and forever — remain unknown. NeoSmart Technologies has a run-down on the history of Pi, Pi Day, and the significance of Pi and other such "magical numbers" to science and technology. 'Pi isn't just a number that you can use to calculate circle-related mathematics, it's a symbol of something by far greater. Pi is one of many "magic" numbers that are found everywhere — if you know where to look. These magic numbers can't be explained, they just are. And if you use them right, they make it a lot easier to do a lot of really complicated things... In a way, they're a testimony to technology and computers (or vice-versa, depending on how you look at it).'"
Supercomputing

Half-Petaflop Supercomputer Deployed In Austin 130

SethJohnson writes "Thanks to a $59 million National Science Foundation grant, there's likely to be a new king of the High Performance Computing Top 500 list. The contender is Ranger, a 15,744 Quad-Core AMD Opteron behemoth built by Sun and hosted at the University of Texas. Its peak processing power of 504 teraflops will be shared among over 500 researchers working across the even larger TeraGrid system. Although its expected lifespan is just four years, Ranger will provide 500 million processor hours to projects attempting to address societal grand challenges such as global climate change, water resource management, new energy sources, natural disasters, new materials and manufacturing processes, tissue and organ engineering, patient-specific medical therapies, and drug design."
Yahoo!

Yahoo Sued for Spurning Microsoft 284

tuxgeek writes "In the continuing saga of Yahoo resisting a Microsoft buy out, Yahoo is now being sued by its shareholders. 'Two Detroit pension funds have sued Yahoo Inc. and its board of directors, saying they breached their duties to shareholders in trying to thwart a takeover by Microsoft Corp. The lawsuit was filed in Delaware Chancery Court on Thursday by lawyers representing Detroit's police and fire retirement system and general retirement system, as well as 'all other similarly situated public shareholders.'"
Microsoft

Microsoft's New Leaf On Interoperability 371

A large number of readers are submitting the news that Microsoft has made a major announcement about interoperating with others including specifically the FOSS world. The impetus is the ongoing EU antitrust case against Microsoft. The announcement comes in the context of the release of 30,000 pages of API documentation for Microsoft Vista, Windows Server 2008, SQL Server 2008, Office 2007, Exchange Server 2007 and Office SharePoint Server 2007 — and a listing of patents that apply to these technologies, and a pledge not to sue open source developers who use the APIs. InfoWorld summarizes by saying that Microsoft "promised greater transparency in its development and business practices." Fortune is blunter, saying "Microsoft declares truce in open source war." Here's Microsoft's FAQ on the open source interop initiative.
United States

What Would You Do As President? 1455

With the elections continually in the news there is constant discourse on what each candidate has done or will do. However, rarely do people get the chance to say what they would do. Here is your chance, you have been elected President of the US (god help us all), what items go to the head of the class and how would you handle them?
Television

Penetration Testing TV Series Coming 209

ChazeFroy writes "CourtTV (TruTV) has a new series starting Dec. 25 at 11 pm called 'Tiger Team.' It follows a group of elite penetration testers hired to test organizations' security using social engineering, wired/wireless penetration testing, and physically defeating security mechanisms (lock picking, dumpster diving, going through air vents/windows). They do all of this while avoiding the organizations' various security defenses as well as law enforcement. The stars of the show also did a radio spot this morning in Denver." Wonder how they socially engineer away the presence of a camera team in the air vents.
Software

Major Australian ISP Pulls OpenOffice 336

thefickler writes "Australia's largest Internet service provider Telstra BigPond has removed OpenOffice from its unmetered file download area following the launch of its own, free, hosted, office application, BigPond Office. The removal of OpenOffice was brought to TECH.BLORGE's attention by a reader, who complained to Telstra BigPond's support department about no longer being able to download OpenOffice updates. The support people were quite open about why OpenOffice was no longer available, i.e. because it was perceived to be competitive with BigPond Office."
PC Games (Games)

EVE-Online Patch Makes XP Unbootable 572

Nobo writes "CCP's latest major patch to the EVE-Online client, Trinity, comes with an optional DX9-enhanced graphics patch that dramatically improves the visual quality of the in-game graphics through remade models, textures, and HDR. It also has an unfortunate bug: the incredibly stupid choice of boot.ini as a game configuration file, coupled with an errant extra backslash in the installer configuration. The result is that anyone who installs the enhanced graphics patch overwrites the windows XP c:\boot.ini file with the EVE client configuration file, bricking the machine on the next boot. Discussion in a couple of forums threads is becoming understandably heated."
Security

Hackers Use Banner Ads on Major Sites to Hijack Your PC 268

The worst-case scenario used to be that online ads are pesky, memory-draining distractions. But a new batch of banner ads is much more sinister: They hijack personal computers and bully users until they agree to buy antivirus software. And the ads do their dirty work even if you don't click on them.The malware-spiked ads have been spotted on various legitimate websites, ranging from the British magazine The Economist to baseball's MLB.com to the Canada.com news portal. Hackers are using deceptive practices and tricky Flash programming to get their ads onto legitimate sites by way of DoubleClick's DART program. Web publishers use the DoubleClick-hosted platform to manage advertising inventory." CT: Link updated to original source instead of plagerizer.
The Media

Journalists Can't Hide News From the Internet 377

Hugh Pickens writes "Robert Niles at the Online Journalism Review discusses the issues surrounding the recent tragedy involving a MySpace user. A newspaper reporting on the story didn't name the woman, citing concerns for her teen daughter. Bloggers went nuts, and soon uncovered the woman's personal information. Niles writes: 'The lessons for journalists? First, we can't restrict access to information anymore. The crowd will work together to find whatever we withhold ... Second, I wonder if that the decision to withhold the other mother's name didn't help enflame the audience, by frustrating it and provoking it to do the work of discovering her identity.'"
Privacy

First RIAA Case Victim Finally Speaks Out 204

An anonymous reader writes with a link to an article at P2P Net about the very first victim of the RIAA's file-sharing litigation sweep. The site gave Jammie Thomas the chance to explain in her own words what the last two years have been like. She recounts her experiances with subpoenas, Best Buy, and most of all, stress. Even after all this time, her case is still in legal limbo: "As for what's next, my attorney filed a motion to have the verdict thrown out or to have the judgment reduced based on the constitutionality of the judgment. This is not an appeal, this is a post trial motion. We are currently waiting for the plaintiffs to file their response to our motion. The judge will not make a decision on that motion until after the plaintiffs have filed. The timeline for appeals is we have 30 days after the judge decides all post trial motions before we file any appeals ... I do know personally I cannot allow my case to end this way, with this judgment. My case will be used as a sledgehammer by the RIAA to force other people caught in the RIAA's driftnets to settle, even if they are or are not guilty of illegally sharing music online."
Games

ECA Plans Games-Related DMCA Showdown 64

Gamespot is reporting that the Electronic Consumers Association (ECA) has picked its first legal fight since vowing to step up lobbying efforts. The organization is going head-to-head with the Electronic Software Association (ESA), a long-time backer of the Digital Millennium Copyright Act (DMCA), by coming out in favor of H.R. 1201 (also known as the Fair Use Act of 2007). "If it became law, the Fair Use Act would create a variety of exemptions to the DMCA's prohibitions on circumventing anti-piracy measures. The Fair Use Act would make it legal to bypass anti-piracy measures in a handful of situations, for personal archiving; for researching, critiquing, or reporting on works of substantial public interest (if that is the sole reason for the circumvention); or to skip commercial or personally objectionable content. It would also create an exemption in copyright law for people who make and distribute equipment used to bypass copyright protection (like modchips), provided the device 'is capable of substantial, commercially significant non-infringing use.'"
Toys

High-Tech Vest Lets Gamers Take a Hit 117

mytrip passed on a link to a PC World post about a unique accessory for FPS gamers. Called the 3rdSpace Gaming Vest, its goal is to translate in-game impacts into physical sensations. "Designed by a surgeon, the vest was originally created for use in the medical field to poke and prod patients in order to get a sense for what they were feeling. Since then, the vest has been adapted for the game industry, capable of delivering hits and shots exactly where you would feel them. Utilizing air pouches — four on front, four in back — the vest nudges and jabs gamers at eight different contact points."
Security

RealPlayer Zero-Day Flaw Under Attack 150

openOption writes "ZDNet is reporting that hackers are actively exploiting a zero-day hole in RealNetworks' RealPlayer media player, a software program installed on tens of millions of Windows computers worldwide. The in-the-wild attacks targets a previously unknown and unpatched ActiveX vulnerability in the way RealPlayer interacts with Microsoft's Internet Explorer browser. The flaw is causing drive-by malware downloads when an IE user simply browsers to a maliciously rigged Web page."

Slashdot Top Deals

Gee, Toto, I don't think we're in Kansas anymore.

Working...