Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug

Database Error Costs Social Security Victims $500M 299

Hugh Pickens writes "The Washington Posts reports that the Social Security Administration has agreed to pay more than $500 million in back benefits to more than 80,000 recipients whose benefits were unfairly denied after they were flagged by a federal computer program designed to catch serious criminals. At issue is a 1996 law, which contained language later nicknamed the 'fleeing felon' provision, that said fugitives were ineligible to receive federal benefits. As part of its enforcement, the administration began searching computer databases to weed out people who were collecting benefits and had outstanding warrants. The searches captured dozens of criminals, including some wanted for homicide, but they also ensnared countless elderly and disabled people accused of relatively minor offenses such as shoplifting or writing bad checks and in some cases, the victims simply shared a name and a birth date with an offender." (Read more, below.)

Comment Re:Legend of the Seeker (Score 1) 298

Raimi also produces the Legend of the Seeker tv series. Make of THAT what you will!

Two things:

1. 'Produces' (actually, co-produces) != has a strong hand in the art direction, storyline, acting, etc. thereof
2. I actually like this show. It's reminiscent of the old Hercules and Xena shows, though not quite as quirky. For a TV fantasy show it has a few things going for it: very accessible plot, attractive females, and respectable fight choreography to name a few.

Security

Hackers Find Remote iPhone Crack 114

Al writes "Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas." The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.

Comment Re:nice (Score 1) 665

http://www.conservapedia.com/Evolution Wow ... I first thought this was joke site, but, just wow ...

I disagree, it must be a joke site. This has to be about the funniest goddamn thing I've ever read:

In addition to the evolutionary position lacking evidential support and being counterevidence, the great intellectuals in history such as Archimedes, Aristotle, St. Augustine, Francis Bacon, Isaac Newton, and Lord Kelvin did not propose an evolutionary process for a species to transform into a more complex version.

Communications

45-Year-Old Modem Used To Surf the Web 622

EdIII writes with this awesome snippet from Hack a Day: "'[phreakmonkey] got his hands on a great piece of old tech. It's a 1964 Livermore Data Systems Model A Acoustic Coupler Modem. He recieved it in 1989 and recently decided to see if it would actually work. It took some digging to find a proper D25 adapter and even then the original serial adapter wasn't working because the oscillator depends on the serial voltage. He dials in and connects at 300baud. Then logs into a remote system and fires up lynx to load Wikipedia. Lucky for [phreakmonkey] they managed to decide on a modulation standard in 1962. It's still amazing to see this machine working 45 years later.' Although impractical for surfing the Internet today, there is something truly cool about getting a 45-year old modem to work with modern technology. The question I have, is what is the oldest working piece of equipment fellow Slashdotters have out there? I'm afraid as far back as I can go is a Number Nine Imagine 128 Series 2 Graphics card on a server still in use at my house which only puts me at about 14 years."
Security

A Cyber-Attack On an American City 461

Bruce Perens writes "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes in the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. So I decided to change that."

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...