Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Graphics

Kinect Hack Builds 3D Maps of the Real World 70

Lanxon writes "Noted Kinect-tinkerer Martin Szarski has used a car, a laptop, an Android smartphone and the aforementioned Xbox 360 peripheral to make a DIY-equivalent of Google Street View. The Kinect's multi-camera layout can be used to capture some fuzzy, but astonishingly effortless 3D maps of real world locations and objects. As we saw in Oliver Kreylos' early hack, you can take the data from Kinect's depth-sensitive camera to map out a 3D point-cloud, with real distances. Then use the colour camera's image to see which RGB pixel corresponds to each depth point, and eventually arrive at a coloured, textured model."
Mozilla

Mozilla Proposes 'Do Not Track' HTTP Header 244

MozTrack writes "The emergence of data mining by third party advertisers has caused a national debate from privacy experts, lawmakers and browser supporters. Mozilla's Firefox, a popular browser company, has proposed a new feature that will prevent people's personal information from getting mined and sold for advertising. The feature would allow users to set a browser preference that will broadcast their desire to opt-out of third party, advertising-based tracking. It would do this via a 'Do Not Track' HTTP header with every click or page view in Firefox."
Science

Submission + - Scientists Create 52 Artificial Rain Storms (time.com)

EW87 writes: CNN and TIME report that Scientists in Abu Dhabi have created artificial rainstorms. "As part of a secret program to control the weather in the Middle East, scientists working for the United Arab Emirates government artificially created rain where rain is generally nowhere to be found. The $11 million project, which began in July, put steel lampshade-looking ionizers in the desert to produce charged particles. The negatively charged ions rose with the hot air, attracting dust. Moisture then condensed around the dust and eventually produced a rain cloud. A bunch of rain clouds.
The Military

Submission + - China's New Carrier Killer (digestreport.com)

healeyb writes: China has recently announced the finalization of a new missile, the Dong-Feng 21D. The DF 21 series has shown itself capable and adaptable up to this point, the other variants being able to target everything from land bases to satellites. The United States carrier force is the base unit of its power projection, not just in the pacific, but around the world. A third of the active cruisers and destroyers in the fleet are designed for the sole purpose of protecting the carrier group once it is at sea...

Submission + - Man Arrested for Exploiting Error in Slot Machines (post-gazette.com)

An anonymous reader writes: Exploiting a software "glitch" within slot machines, a Pennsylvania man has been accused of obtaining "false" jackpots world-wide, possibly to the tune of a million dollars or more. Naturally, the slot machine company has chosen not to comment on their apparent error.

Comment Well according TO wikileaks... (Score 0) 973

According to Julian Assange from Wikileaks...as reported on CNN...(http://www.cnn.com/video/#/video/international/2010/04/07/bs.julian.assange.wikileaks.int.cnn?hpt=T2), they had volunteers donate computer time for the past 3 months.
Security

Tigger.A Trojan Quietly Steals Stock Traders' Data 212

**$tarDu$t** recommends a Washington Post Security Fix blog post dissecting the Tigger.A trojan, which has been keeping a low profile while exploiting the MS08-66 vulnerability to steal data quietly from online stock brokerages and their customers. An estimated quarter million victims have been infected. The trojan uses a key code to extract its rootkit on host systems that is almost identical to the key used by the Srizbi botnet. The rootkit loads even in Safe Mode. "Among the unusually short list of institutions specifically targeted by Tigger are E-Trade, ING Direct ShareBuilder, Vanguard, Options XPress, TD Ameritrade, and Scottrade. ... Tigger removes a long list of other malicious software titles, including the malware most commonly associated with Antivirus 2009 and other rogue security software titles ... this is most likely done because the in-your-face 'hey, your-computer-is-infected-go-buy-our-software!' type alerts generated by such programs just might ... lead to all invaders getting booted from the host PC."

Slashdot Top Deals

Money is the root of all evil, and man needs roots.

Working...