Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Social Networks

Twitter Offline Due To DDoS 398

The elusive Precision dropped a submission in my lap about a DDoS taking down Twitter running on CNet. It's been down for several hours, no doubt wreaking havoc on the latest hawtness in social networking. Won't someone please think of the tweeters? Word is that both Facebook & LiveJournal have been having problems this AM as well.
Google

New Chrome Beta Adds Themes, Speed, & HTML 5 Video 207

adeelarshad82 writes "Google developers are always working on and updating Chrome in three channels — Stable, Beta, and Developer — in increasing positions on the bleeding-edge scale. Today the company thought changes to the Beta channel warranted a post on the main Google Blog. The advances range from the superficial addition of themes for customizing the browser's window borders to even faster speed under the hood to internal support for HTML 5 tags such as <video> and 'web workers,' which allows the browser to divvy processing work among sub-threads."
Books

xkcd To Be Released In Book Form 198

History's Coming To writes "xkcd creator Randall Munroe has revealed on his blag that the acclaimed stick-figure comic will be produced in real dead-tree book form. Fantastic news for all fans of comedy, maths, science, and relationship screw-ups — especially given that the book will be sold in aid of the charity 'Room To Read.' Rumors that the book contains a joke in the ISBN remain unconfirmed." The NY Times article that Munroe links (registration may be required) is from April of this year, and I am amazed that this community didn't note the story at that time. The book will be published by breadpig, which was created by Alexis Ohanian, one of the founders of reddit.

Comment Re:What about other keyboard manufacturers? (Score 1) 275

the aluminum apple keyboard is absolutely horrific to type on. it is the single worst keyboard i have ever used, and nothing else even comes close. it is too low to the desk, it has crappy rubber mush switches, and the keycaps are rounded at the edges so your fingers get lost. my fingers start to hurt after about 20 minutes of typing on one of these nasty little keyboards. they're just awful.

now, the apple extended keyboard ii, that's a good keyboard.

Comment Re:YOU BEST BE TROLLIN' (Score 1) 275

most keyboards don't have microprocessors and memory. he didn't pick an apple keyboard for attention out of a field of identically vulnerable keyboards. he picked it because it was a special example with odd specifications that enable this attack.

there are a few logictech keyboards he could have picked (the programmable ones with the LCD and all that), but no, this is not some widespread problem. this is an apple keyboard issue.

RadioShack To Rebrand As "The Shack"? 629

Harry writes "Rumor has it that RadioShack is planning to re-brand itself as The Shack later this year, after eighty-eight years under the old name (most of them with a space in between 'Radio' and 'Shack'). I hope it's not true, because I don't think the move would do a thing to make the retailer a better, more successful business." Where will we go to buy soldering irons and those RCA to headphone jack adapters now?
Security

Apple Keyboard Firmware Hack Demonstrated 275

Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."

Comment Re:Should I? (Score 3, Interesting) 909

Once we camped out near a river, in known bear territory somewhere in central California. We hadn't seen any bear tracks, but put our food up in a nearby tree anyway (because that's just what you do in bear territory).

At around 2 AM that night, we awoke to hear the sound of large animals moving in our campsite, accompanied by the rustling of what sounded very much like our bear bag. Getting a fire going as quickly as possible (meaning, a liter of white gas poured onto the nearest thing that looked like wood and then set ablaze), we didn't find a bear. We found a team of TWO bears attacking our bear bag.

The big one climbed up the trunk of the tree, just under the branch from which we'd hung the bag. The little one, presumably a cub of the big one, had climbed out on the branch, and in a series of small steps, had pulled the bag along the branch with one arm toward the larger bear, who could now reach it from her spot on the trunk, and who was shredding the bag to bits as all our food dropped out. The fire, of course, chased the thieving duo away after a couple of minutes, and they thankfully only got away with some sausages and most of a bottle of pancake syrup.

Of course, what we hadn't noticed was that this tree had basically no leaves or branches or bark on it anywhere. Based on the number of large scratches and claw marks all over the tree, we surmised that we weren't the first ones to try to hang our food from this tree, which was essentially a food collection station operated by the bears to tax any humans foolish enough to camp there.

The damn bears are smarter than you'd think.

Image

Tetraktys Screenshot-sm 216

brothke writes "Imagine for a moment what his novels would read like if Dan Brown got his facts correct. The challenge Brown and similar authors face is to write a novel that is both compelling and faithful to the facts. In Tetraktys, author Ari Juels is able to weave an interesting and readable story, and stay faithful to the facts. While Brown seemingly lacks the scientific and academic background needed to write such fiction, Juels has a Ph.D. in computer science from Berkeley and is currently the Chief Scientist and director at RSA Laboratories, the research division of RSA Security." Read below for the rest of Ben's review.
GNU is Not Unix

Stallman Says Pirate Party Hurts Free Software 546

bonch writes "Richard Stallman has written an article on the GNU Web site describing the effect the Swedish Pirate Party's platform would have on the free software movement. While he supports general changes to copyright law, he makes a point that many anti-copyright proponents don't realize — the GPL itself is a copyright license that relies on copyright law to protect access to source code. According to Stallman, the Pirate Party's proposal of a five-year limit on copyright would remove the freedom users have to gain access to source code by eventually allowing its inclusion in proprietary products. Stallman suggests requiring proprietary software to also release its code within five years to even the balance of power."
Government

NSA To Use Cloud Model For Intelligence Analysis 41

Hugh Pickens writes "Information Week reports that the National Security Agency is taking a cloud computing approach in developing a new collaborative intelligence gathering system that will link disparate intelligence databases geographically distributed in data centers around the country. The system will house streaming data, unstructured text, large files, and other forms of intelligence data, and analysts will be able to add metadata and tags that, among other things, designate how securely information is to be handled and how widely it gets disseminated. For end users, the system will come with search, discovery, collaboration, correlation, and analysis tools. The intelligence agency is using the Hadoop file system, an implementation of Google's MapReduce parallel processing system, to make it easier to 'rapidly reconfigure data' and for Hadoop's ability to scale. The NSA's decision to use cloud computing technologies isn't about cutting costs or seeking innovation for innovation's sake; rather, cloud computing is seen as a way to enable new scenarios and unprecedented scalability. 'The object is to do things that were essentially impossible before,' says Randy Garrett, director of technology for NSA's integrated intelligence program."
Earth

Alaskan Blob Is an Algae Bloom 130

Bryan Gividen writes "Time.com is running a story on the previously unidentified blob floating off of the coast of Alaska. The article states that the blob is an algae bloom — far less sinister (or exciting) than any The Thing or The Blob comparison that was jokingly made. From the article: '"It's sort of like a swimming pool that hasn't been cleaned in a while." The blob, Konar said, is a microalgae made up of 'billions and billions of individuals.'"

Slashdot Top Deals

HOST SYSTEM NOT RESPONDING, PROBABLY DOWN. DO YOU WANT TO WAIT? (Y/N)

Working...