Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Feds Have a High-Speed Backdoor Into Wireless Carrier 229

An anonymous reader writes "An unnamed U.S. wireless carrier maintains an unfiltered, unmonitored DS-3 line from its internal network to a facility in Quantico, Virginia, according to Babak Pasdar, a computer security consultant who did work for the company in 2003. Customer voice calls, billing records, location information and data traffic are all allegedly exposed. A similar claim was leveled against Verizon Wireless in a 2006 lawsuit."
Security

'Friendly' Worms Could Spread Software Fixes 306

An anonymous reader writes "Microsoft researchers are working out the perfect strategies for worms to spread through networks. Their goal is to distribute software patches and other friendly information via virus, reducing load on servers. This raises the prospect of worm races — deploying a whitehat worm to spread a fix faster than a new attacking worm can reach vulnerable machines."
Power

Yet Another Perpetual Motion Device 563

The Star reports on this inventor breaking all the laws of physics as far as free energy goes. It even provoked interest from "esteemed Massachusetts Institute of Technology professor Markus Zahn". I would like to know how this seemingly backyard enthusiast's experimental set up has not been tried a million times over the years. It seems so simple and too good to be true. The article has links to a multi-part video demo of the device accelerating an electric motor under load for free!
Google

Google Goes Green 374

foobsr writes "Google today announced its RE<C project to make renewable energy cheaper than coal in the near future. The company, and its charitable arm google.org, plan to invest hundreds of millions of dollars in the initiative. Larry Page stated: 'With talented technologists, great partners and significant investments, we hope to rapidly push forward. Our goal is to produce one gigawatt of renewable energy capacity that is cheaper than coal. We are optimistic this can be done in years, not decades.'"

TB-Sized Solid State Drives Announced 130

prostoalex writes "Several companies have announced solid state hard drives in excess of one terrabyte in size. ComputerWorld describes one from BitMicro that's just 3.5". Their flash drive will support up to 4 Gbps data transfer rate. From the article: 'SSDs access data in microseconds, instead of the millliseconds that traditional hard drives use to retrieve data. The BitMicro E-Disk Altima 4Gb FC delivers more than 55,000 I/O operations per second (IOPS) and has a sustained data transfer rate over 230MB/sec. By comparison, a fast hard drive for example will run at around 300 IOPS.'" Ah, the speed of tech. Seems like only last month we were talking about 500GB drives.
Cellphones

Google Plans to Bid 4.6 Billion on 700MHz Band 148

NickCatal writes "The Wall Street Journal is reporting that Google plans to bid $4.6 Billion on the 700 MHz radio spectrum being auctioned off by the FCC. What is most interesting is that they are not planning on partnering with other companies to raise the cash, they are going to spend their own cash and possibly borrow some. With partners such as Sprint Nextel and T-Mobile in their 'Open Handset Alliance' is this a sign that they are willing to directly compete with the people they courted to join?"
The Courts

RIAA College Litigations Getting A Bumpy Ride 270

NewYorkCountryLawyer writes "The RIAA's juggernaut against colleges, started in February of this year, seems to be having a bumpier and bumpier ride. The normal game is to call for a subpoena, to get the name and address of the students or staff who might have used a certain IP address. The normal game seems to be getting disrupted here and there. A Virginia judge threw the RIAA's motion out the window, saying that it was not entitled to such discovery, in a case against students at the College of William & Mary. A New Mexico judge denied the application on the ground that there was no reason for it to be so secretive, in a case involving University of New Mexico students. He ultimately required the RIAA to serve a full set of all of the underlying papers, for each 'John Doe' named, and to give the students 40 days in which to review the papers with counsel, and make a motion to quash if they chose to do so. In a stunning development, the Attorney General of the State of Oregon made a motion to quash the RIAA's subpoena on behalf of the University of Oregon, on grounds which are fully applicable to every case the RIAA has brought to date: the lack of scientific validity to the RIAA's "identification" evidence. The motion is pending as of this writing. Students have themselves made motions to vacate the RIAA's ex parte orders and/or quash subpoenas in over half a dozen cases. Much combat remains, but the RIAA's campaign is no longer a hot knife cutting through butter on the nation's campuses."
Google

Google's Open Source Mobile Platform 199

As expected, today Google took the wraps off of the gPhone (as the media have for months been referring to the rumored project). Google is "leading a broad industry alliance to transform mobile phones into powerful mobile computers," and will be licensing its software to all comers on an open source basis under the Apache license. (The Wall Street Journal's Ben Worthen demonstrates a miserable grasp of what "open source" means.) Google's US partners include Nextel and Sprint, but not AT&T nor Verizon. Phones will be available in the second half of 2008 — not the spring as earlier reports had speculated. News.com's analysis warns that Google won't take over the mobile market overnight, though they quote Forrester in the opinion that Google may be one of the three biggest mobile players after several years of shakeout.
Google

Submission + - WSJ spreads FUD on open source and Google Phone (wsj.com) 2

An anonymous reader writes: Ben Worthen at the Wall Street Journal shows a laughable grasp of what "open source" means: 'Here's the first thing that will happen when a phone with Google's operating system hits the market: Information-technology departments will ban employees from connecting phones that run Google's operating system to their computers or the corporate network. The reason is that Google's operating system is open, meaning anyone can write software for it. That includes bad guys, who will doubtlessly develop viruses and other malicious code for these phones, which unsuspecting Google phones owners will download. Employees could spread the malicious code to the rest of the company when they synch their phones to their computers or use it to check email. The way to combat this is to develop anti-virus and anti-malware software for phones and to develop security procedures similar to those that have evolved for PCs over the last several years. But that's going to take time and money — neither of which the average IT department has. So until then, expect Google phones to be persona non grata at companies.'
Data Storage

Seagate Offers Refunds on 6.2 Million Hard Drives 780

An anonymous reader writes "Seagate has agreed to settle a lawsuit that alleges that the company mislead customers by selling them hard disk drives with less capacity than the company advertised. The suit states that Seagate's use of the decimal definition of the storage capacity term "gigabyte" was misleading and inaccurate: whereby 1GB = 1 billion bytes. In actuality, 1GB = 1,073,741,824 bytes — a difference of approximately 7% from Seagate's figures. Seagate is saying it will offer a cash refund or free backup and recovery software."
Security

Despite AOL's Claim, AIM Worm Hole Still Wide Open 75

Clown of the month writes "There's a nasty worm hole in America Online's standalone AIM (instant messaging) software that won't be patched until the middle of October. This vulnerability, first reported to AOL by researchers at Core Security more than a month ago, is caused by the way AIM supports the rendering of HTML content via an embedded Internet Explorer server control. AOL coordinated with Core on the release of an advisory, on the understanding that the flaw was patched in the latest beta version. As security researcher Aviv Raff discovered, the underlying vulnerability was never fixed. In the demonstration, Raff simply sent an IM to trigger the launch of the calculator application. The attack scenario works without the target clicking on a link and only requires that the AIM user is logged on and accepting incoming messages."
Security

Big Brother Really Is Watching Us All 405

siddesu writes "The BBC has a nice high-level overview of some technologies for surveillance developed in the US and the UK. 'The US and UK governments are developing increasingly sophisticated gadgets to keep individuals under their surveillance. When it comes to technology, the US is determined to stay ahead of the game ... But it [a through-the wall sensing device in development] will also show whether someone inside a house is looking to harm you, because if they are, their heart rate will be raised. And 10 years from now, the technology will be much smarter. We'll scan a person with one of these things and tell what they're actually thinking.'"
United States

Pirate Banned From Using Linux 698

dsinc writes "A guy who uploaded the latest Star Wars movie got arrested, pleaded guilty to 'conspiracy to commit copyright infringement' and 'criminal copyright infringement' and got jail and home confinement. As part of his home confinement, he agreed to install some tracking software on his computer. The problem is He's an Ubuntu Linux user and the gov't doesn't have any tracking software for Linux. So he's been told that he must use Windows for the term of his confinement. Looks like a case of cruel and unusual punishment to me"
Privacy

DHS To Share Spy Satellite Data Over the US 161

An anonymous reader sends us to the Wall Street Journal for the news that later this year the US Department of Homeland Security will begin sharing US spy satallite data with law enforcement and other customers. From the article: "...one of [DHS]'s first objectives will be to use the network to enhance border security, determine how best to secure critical infrastructure and help emergency responders after natural disasters. Sometime next year, officials will examine how the satellites can aid federal and local law-enforcement agencies, covering both criminal and civil law... DHS officials say the program has been granted a budget by Congress and has the approval of the relevant committees in both chambers... Unlike electronic eavesdropping, which is subject to legislative and some judicial control, this use of spy satellites is largely uncharted territory... [A CDT spokesman said] 'Not only is the surveillance they are contemplating intrusive and omnipresent, it's also invisible. And that's what makes this so dangerous.'"

Slashdot Top Deals

One good reason why computers can do more work than people is that they never have to stop and answer the phone.

Working...