Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment john draper is infamous for his perverted ways (Score 2) 346

I started going to cons in the early 1990's and John Draper "Captain Crunch" was always notorious for trying to invite newbie hackers to his hotel room for "meditation" sessions which included massaging and touching and whatever else happened if you allowed it go any further. The guy was always known to be a pervert. Everyone joked about it. He would literally go person-to-person through the crowd and invite whoever he could upstairs for a little one-on-one if you know what i'm sayin. Every con he would show up and do this. The best was at summercon 98 he showed up and did a talk about how everyone owes him thousands of dollars because he is so old school and how he invented the hacker scene. The guy was a fixture at every con. pumpcon, defcon, summercon.
AI

Hacker George Hotz Unveils $999 Self-Driving Add-On (pcmag.com) 80

An anonymous reader quotes a report from PC Magazine: Hacker George Hotz is gearing up to launch his automotive AI start-up's first official product. In December, the 26-year-old -- known for infiltrating Apple's iPhone and Sony's PlayStation 3J -- moved on to bigger things: turning a 2016 Acura ILX into an autonomous vehicle. According to Bloomberg, Hotz outfitted the car with a laser-based radar (lidar) system, a camera, a 21.5-inch screen, a "tangle of electronics," and a joystick attached to a wooden board. Nine months later, the famed hacker this week unveiled the Comma One. As described by TechCrunch, the $999 add-on comes with a $24 monthly subscription fee for software that can pilot a car for miles without a driver touching the wheel, brake, or gas. But unlike systems currently under development by Google, Tesla, and nearly every major vehicle manufacturer, Comma.ai's "shippable" Comma One does not require users to buy a new car. "It's fully functional. It's about on par with Tesla Autopilot," Hotz said during this week's TechCrunch Disrupt in San Francisco.
Piracy

Anti-Piracy Group BREIN Demands Torrents Time Cease and Desist 91

An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."

Comment Is this supposed to be a joke? (Score 2) 414

I guess we're not talking about working with Java Struts. When you do, turn on mysql logging, and then tail -f mysqld.log, you'll see garbage like this: select column_623 from table_943 where column_142='xxx'; ---- is that readable to you? Is that supposed to improve readability by abstracting so far away from the database that no one can understand what is going. I basically have to grep for values inserted or updated or selected from tables in order to figure out what table stuff is being written to. It's not ugly, its an abomination. Who ever thought up the idea doesnt know what they are doing. Easy to read..... YEAH RIGHT -- its a joke. It takes 5 times longer to reverse engineer this spaghetti mess than any other languages. Straight Java code is easy to read, if you don't intrude abstraction layers on top of the language, like Struts.
United States

Officials Say Russian Hackers Read Obama's Unclassified Emails 109

An anonymous reader points out that Russian hackers reportedly obtained some of President Obama’s emails when the White House’s unclassified computer system was hacked last year. Some of President Obama's email correspondence was swept up by Russian hackers last year in a breach of the White House's unclassified computer system that was far more intrusive and worrisome than has been publicly acknowledged, according to senior American officials briefed on the investigation. The hackers, who also got deeply into the State Department's unclassified system, do not appear to have penetrated closely guarded servers that control the message traffic from Mr. Obama's BlackBerry, which he or an aide carries constantly. But they obtained access to the email archives of people inside the White House, and perhaps some outside, with whom Mr. Obama regularly communicated. From those accounts, they reached emails that the president had sent and received, according to officials briefed on the investigation.

Comment job search / response (Score 2) 55

I wrote a machine learning program that did when dice.com came online around 1990. I still use it today and it searches jobs (or any posting) on craigslist, monster, dice.com, hotjobs. It looks for keyword pattern matches in the job title, job description, etc, to give a score to a job posting, then if the job scores past a threshold, it will send a cover letter and email to the job. some of the most advanced features is that it will auto-generate sentences in the cover letter and/or job description depending on what it says in the job posting.
Cloud

Department of Defense May Give Private Cloud Vendors Access To Top Secret Data 60

An anonymous reader sends news that the U.S. Department of Defense is pondering methods to store its most sensitive data in the cloud. The DoD issued an information request (PDF) to see whether the commercial marketplace can provide remote computing services for Level 5 and Level 6 workloads, which include restricted military data. "The DoD anticipates that the infrastructure will range from configurations featuring between 10,000 and 200,000 virtual machines. Any vendors selected to the scheme would be subject to an accreditation process and to security screening, and the DoD is employing the Federal Risk and Authorization Management Program to establish screening procedures for authorized cloud vendors, and to generate procedures for continuous monitoring and auditing."
Security

Tinba Trojan Targets Major US Banks 61

An anonymous reader writes Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit."
Sci-Fi

Sci-Fi Authors and Scientists Predict an Optimistic Future 191

An anonymous reader writes: A few years ago, author Neal Stephenson argued that sci-fi had forgotten how to inspire people to do great things. Indeed, much of recent science fiction has been pessimistic and skeptical, focusing on all the ways our inventions could go wrong, and how hostile the universe is to humankind. Now, a group of scientists, engineers, and authors (including Stephenson himself) is trying to change that. Arizona State University recently launched Project Hieroglyph, a hub for ideas that will influence science fiction to be more optimistic and accurate, and to focus on the great things humanity is capable of doing.

For example, in the development of a short story, Stephenson wanted to know if it's possible to build a tower that's 20 kilometers tall. Keith Hjelmsad, an expert in structural stability and computational mechanics, wrote a detailed response about the challenge involved in building such a tower. Other authors are contributing questions as well, and researchers are chiming in with fascinating, science-based replies. Roboticist Srikanth Saripalli makes this interesting point: "If the government has to decide what to fund and what not to fund, they are going to get their ideas and decisions mostly from science fiction rather than what's being published in technical papers."
Government

Court: Car Dealers Can't Stop Tesla From Selling In Massachusetts 155

curtwoodward writes: Many states have laws that prevent car manufacturers from operating their own dealerships, a throwback to the days when Detroit tried to undercut its franchise dealers by opening company-owned shops. But dealers have taken those laws to the extreme as they battle new competition from Tesla, which is selling its cars direct to the public. In some states, dealers have succeeded in limiting Tesla's direct-sales model. But not in Massachusetts (PDF): the state's Supreme Court says the dealers don't have any right to sue Tesla for unfair competition, since they're not Tesla dealers. No harm, no foul.

Comment the only thing net neutrality will ruin is profit (Score 1) 85

AT&T and others stand to profit billions of dollars by creating slow lanes and fast lanes on the internet. The real issue here is that customer already paid for an internet connection at a certain speed, so its some level of fraud or deception (false advertising, bait-and-switch) to be selling a service at a certain speed and then not delivering the service that the customer is paying for.

Comment Preventing Stingray from working (Score 5, Interesting) 272

So, I've been thinking of how could we prevent such a rogue device from operating on the cellular network? The way it is done is pretty easy actually:
* First you have to create a database of longitude / latitude coordinates of where we find cell tower sites at 100% signal strength.
* Next we allow Android's baseband processor to issue handoffs to cell towers that are within range of the GeoIP coordinate database
* So when a Stingray device pretends to be a cell tower, and it is not within range of the geoIP coordinates database, it will be rejected

This could be easily implemented in Android... and you could also add notifications when a cell tower was rejected due to being too far away from the known cell tower real location.
GNU is Not Unix

Interview: Ask Richard Stallman What You Will 480

Richard Stallman (RMS) founded the GNU Project in 1984, the Free Software Foundation in 1985, and remains one of the most important and outspoken advocates for software freedom. He now spends much of his time fighting excessive extension of copyright laws, digital restrictions management, and software patents. RMS has agreed to answer your questions about GNU/Linux, how GNU relates to Linux the kernel, free software, why he disagrees with the idea of open source, and other issues of public concern. As usual, ask as many as you'd like, but please, one question per post.

Slashdot Top Deals

The speed of anything depends on the flow of everything.

Working...