Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Internet

Submission + - What If They Turned Off the Internet?

theodp writes: It's the not-to-distant future. They've turned off the Internet. After the riots have settled down and the withdrawal symptoms have faded, how would you cope? Cracked.com asked readers to Photoshop what life would be like in an Internet-addicted society learning to cope without it. Better hope it never happens, or be prepared for dry-erase message boards, carrier pigeon-powered Twitter, block-long lines to get into adult video shops, door-to-door Rickrolling, Lolcats on Broadway, and $199.99 CDs.

Comment Age/Goal? (Score 2, Informative) 145

Looking at the summary as well as at the webpage it does not become clear how old the mentioned kids are and if the goal is really understanding science and engineering. For a younger age things like http://www.crazymachinesgame.com/ which give a more playful introduction to physics might be better. Programming for kids has been addressed multiple times on Slashdot.
The Courts

Submission + - Blogger's Case Tests Limits of Free Speech

Hugh Pickens writes: "The Washington Post has a report on the pending trial of internet "shock jock" and white supremacist Hal Turner charged with threatening the lives of three judges on the US Court of Appeals for the 7th Circuit after he posted photographs on his blog of the appellate judges and a map showing the Chicago courthouse where they work, noting the placement of "anti-truck bomb barriers" and wrote "Let me be the first to say this plainly: These Judges deserve to be killed." Turner's case is likely to test the limits of political speech at a time when incendiary talk is proliferating on broadcast outlets and the Internet, from the microphones of well-known commentators to the keyboards of anonymous netizens. "He gave an opinion. He did not say go out and kill," says Turner's defense attorney Michael Orozco after unsuccessfully seeking bail. "This is political hyperbole, nothing more." Joseph Persichini Jr., chief of the FBI's Washington field office, says that "law enforcement's challenge every day is to balance the civil liberties of the United States citizen against the need to investigate activities that might lead to criminal conduct. No matter how offensive to some, we are keenly aware expressing views is not a crime and the protection afforded under the Constitution cannot be compromised." First Amendment scholar Martin H. Redish adds that much of what Turner wrote is protected by the Constitution, including his declarations that the judges should be eliminated but says that Turner probably crossed a line when he printed information about the judges, their office locations and the courthouse. "I would give very strong odds on a thousand bucks that once he said that stuff, it takes it out of any kind of hyperbole range.""
Power

Cats "Exploit" Humans By Purring 503

An anonymous reader notes a BBC report on research recently published in the journal Current Biology, indicating that cats manipulate humans by adding a baby-like cry to their purring. "Cat owners may have suspected as much, but it seems our feline friends have found a way to manipulate us humans. Researchers at the University of Sussex have discovered that cats use a 'soliciting purr' to overpower their owners and garner attention and food. Unlike regular purring, this sound incorporates a 'cry,' with a similar frequency to a human baby's. The team said cats have 'tapped into' a human bias — producing a sound that humans find very difficult to ignore."
Announcements

Slashdot.org Self-Slashdotted 388

Slashdot.org was unreachable for about 75 minutes this evening. Here is the post-mortem from Sourceforge's chief network engineer Uriah Welcome. "What we had was indeed a DoS, however it was not externally originating. At 8:55 PM EST I received a call saying things were horked, at the same time I had also noticed things were not happy. After fighting with our external management servers to login I finally was able to get in and start looking at traffic. What I saw was a massive amount of traffic going across the core switches; by massive I mean 40 Gbit/sec. After further investigation, I was able to eliminate anything outside our network as the cause, as the incoming ports from Savvis showed very little traffic. So I started poking around on the internal switch ports. While I was doing that I kept having timeouts and problems with the core switches. After looking at the logs on each of the core switches they were complaining about being out of CPU, the error message was actually something to do with multicast. As a precautionary measure I rebooted each core just to make sure it wasn't anything silly. After the cores came back online they instantly went back to 100% fabric CPU usage and started shedding connections again. So slowly I started going through all the switch ports on the cores, trying to isolate where the traffic was originating. The problem was all the cabinet switches were showing 10 Gbit/sec of traffic, making it very hard to isolate. Through the process of elimination I was finally able to isolate the problem down to a pair of switches... After shutting the downlink ports to those switches off, the network recovered and everything came back. I fully believe the switches in that cabinet are still sitting there attempting to send 20Gbit/sec of traffic out trying to do something — I just don't know what yet. Luckily we don't have any machines deployed on [that row in that cabinet] yet so no machines are offline. The network came back up around 10:10 PM EST."
Security

Submission + - Dreamlab cracks wireless keyboard encryption (heise-security.co.uk)

Felix writes: "Wireless keyboards and mice are becoming an increasingly common sight on desks. However, wireless hardware carries large hidden risks. Dreamlab Technologies has shown that it is possible to capture and decrypt keystrokes, meaning that user names, passwords, bank details or confidential correspondence can be very easily eavesdropped. Checkout http://www.dreamlab.net/ for further information."
Security

Submission + - US Botmaster admits infecting 250,000 computers

Stony Stevenson writes: A Los Angeles man on Friday admitted infecting 250,000 computers and stealing the identities of thousands of people by wiretapping their communications and accessing their bank accounts. John Schiefer, 26, agreed to plead guilty to four counts of fraud and wiretap charges that could lead to a US$1.75 million fine and send him to prison for up to 60 years, the Los Angeles U.S. Attorney's office said. Prosecutors said Schiefer and an unspecified number of conspirators installed malicious computer codes that acted as a wiretap on compromised computers and intercepted messages to www.paypal.com and similar Web sites. He retrieved usernames and passwords and used them to access an unknown number of bank accounts. Prosecutors said they were still investigating how much money was stolen and the number of victims.
It's funny.  Laugh.

Submission + - I hope the GetTheFacts add pops up! 1

An anonymous reader writes: from MicroSofts site "The Infolect® application, which went into production in September 20"......."In the past six years, there have been no production outages at the London Stock Exchange, and the new systems running on Microsoft technologies are critical to maintaining this 100 per cent reliability record."
http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=200042

and a 2 years later
"London Stock Exchange blames outage on Infolect"

http://www.cio.co.uk/concern/security/news/index.cfm?articleid=2248&pagtype=allchantopdate
Wireless Networking

Submission + - Tracking people using bluetooth. (bluetoothtracking.org)

damdam writes: "A Dutch guy seems to have set up a small network of bluetooth scanners in his town of Apeldoorn scanning for bluetooth devices. He has all the information logged to a central database and you can search it over the web. On his website it says "Some of these matches were only minutes apart. Therefore I could even calculate the approximate speed of someone moving from one location to another.". There are also some interesting statistics on his site showing traffic volume in his hometown (based on bluetooth signals) and he even lists popularity of certain Nokia phones. It's interesting to see how much information an individual can gather using old equipment. I just noticed this guy is the same guy as the one running the wired house on Icepick.com. Seems like tracking people is his thing."
NASA

Submission + - NASA throws a hell of as party!

AlHunt writes: "From The Article:

Everyone knows exploring space is dangerous, and the costs are astronomical. Which is why, just last month, NASA was able to squeeze $1 billion extra from the Senate.

That very same day, NASA also posted an online notice few people saw — seeking four-star hotel bids for its December awards,


So NASA is urinating away 4 million of your tax dollars this year, throwing luxurious parties and patting themselves on the back. In December they'll dump $400,000 to $500,000 in Orlando, according to CBS News.

I love space exploration as much as anyone. If they wanted billions to go to Pluto, I'd probably never say a word. But high dollar shindigs? Give me a break. I work with an organization helping to feed the hungry. We get a $30 to $1 return on our transportation budget (and we buy our own gas, use up our own office supplies and take no pay so almost every penny donated goes to transportation) — in other words, Decembers Awards budget (a paltry $28K) would let me put $840,000 worth of food in the warehouse.

So, here's my challenge, Rocket Scientists — Take a pass on the coconut shrimp and send the savings our way. I'm sure we can feed a few thousand families for your sacrifice."
Bug

Submission + - Virus that came Pre-Installed on Maxtor HD 1

kirouac writes: "Security mavens from Kaspersky say they have discovered a nasty virus that came pre-installed on Maxtor external hard drives sold in the Netherlands. The virus, dubbed Virus.Win32.AutoRun.ah, was found on the Maxtor 3200 Personal Storage, according to this press release from Kaspersky (translated from Dutch to English courtesy of FreeTranslation.com). The company said the virus roots around a computer in search of gaming passwords. The malicious code also rifles through a computer's contents and deletes mp3 files, according to a separate description of the virus, also from Kaspersky. A spokesman for Seagate, which recently acquired Maxtor, said the company was investigating Kaspersky's findings. "This scenario seems unlikely because the 3200 does not have any software preloaded on the drive so there is not an opportunity for a virus to be loaded," he said. Yes the drive is formatted but I have never heard of a virus that lives in the master boot record.""
Caldera

Submission + - Half of SCO's Accountants Quit (groklaw.net)

Groklaw Reader writes: "Apparently, SCO's lawyers were working overtime last Sunday, because they wrote a quick plea to the bankruptcy court for permission to hire accounting temps. Why? Approximately half of SCO's finance department has resigned or been fired. Two who resigned had over ten years of experience each. One can only assume that they know what's about to happen to SCO."
Programming

Submission + - C#, C++, Delphi and Java compilers tested

An anonymous reader writes: Developer named Master Alex, took LZMA SDK and compiled a set of benchmark using SDK as an algorithm base. Here he put an archive with source and compiled in Delphi, C#, C++ and Java binaries. Results are put here and retested here. See, Java runtime code speed in decompressing under Windows x64 is only 15% slower then that of C++.

So, the question is can you provide an optimized code in Delphi 7 so it achieve the same (+-10%) speed as C++ compiled code? Or is it impossible? It presumed that Delphi binaries are very fast, almost of C++ speed.
Intel

Submission + - Intel's Israelis Make Chip to Rescue Company From

MarvinTM writes: "Ian King — Bloomberg Five hundred employees and guests crowded under a white tent half the length of a football field at Intel Corp.'s Santa Clara, California, headquarters as Chief Executive Officer Paul Otellini put his company's newest line of computer chips through their paces. "These are the best microprocessors we've ever designed, the best microprocessors we've ever built,'' Otellini told the audience. "This is not just incremental change; it's a revolutionary leap.'' Otellini's pronouncement relegated to obsolescence Intel's Pentium chip, which once powered more than 80 percent of the world's personal computers. That wasn't the only surprise last July. A camera zoomed in on engineers in lab coats in Haifa, Israel. The video revealed that the chip Intel is counting on to recover from a battering by Advanced Micro Devices Inc. wasn't invented in Silicon Valley. Instead, Intel is betting on a group of Israeli mavericks and a design bureau 7,400 miles away. Shmuel Eden, former head of the Israel Development Center where the new Core 2 Duo was created, says he's fed up with the perception that Intel's prowess is fading. "They (the Israelis) saved the company,'' Doug Freedman, an analyst in San Francisco for Greenwich, Connecticut-based brokerage American Technology Research, says. "Without those new products, Intel would be in a lot more trouble.'' Otellini's bet on the Israelis required a shift in thinking about how processors work -and how Intel markets them. Intel had always promoted the mantra that faster clock speed, the rate at which a chip executes instructions, was the key to measuring how well a computer performs. FULL ARTICLE: http://www.bloomberg.com/apps/news?pid=newsarchive &sid=a2mgYutwVFnM"

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...