Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:The Doom Of Android (Score 2) 117

I'm calling non-event because everytime the Media reports these "Emerging Critical Threats" like the sky is falling, a month down the track nothing happens.
Maybe, at most 1000 people in china infect their device by manually enabling side-loading for pirated apps and the rest of the world gets on with life.

I'm suggesting its not sophisticated or unknown because it just asks for permission through the intended API, i.e Not A Bug. I didn't mention anything about how the user perceives the question, that completely out of scope. If I come to your house and ask to steal all of your stuff and you say "Yes" because you didn't understand the question, that still doesn't make it a sophisticated robbery, thats just a normal robbery. We'll call it a user misunderstanding shall then we?

Comment Most Sophisticated Yet? (Score 2) 117

The method of obtaining install permissions and privilege escalation don't look particularly "unknown".
It seems as though the app just asks for it and waits for the user to say yes.

Did I miss something or does this look like every other non-event Android malware except with a new crypto scheme?
http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan
Robotics

Telepresence Robot Rundown 51

DeviceGuru writes "A handful of innovative high-tech startups have recently emerged to create a new market: remote telepresence robots. With one of these robotic Avatars, you can wander around in the remote environment, chatting with coworkers and managers, attending meetings, and solving problems encountered through those interactions. InformationWeek's Telepresence Robot Smackdown compares five such bots — the MantaroBot TeleMe, VGo Communications VGo, Anybots QB, Suitable Technologies Beam, and Revolve Robotics Kubi — and includes short videos demonstrating each. As the article concludes, 'bear in mind that what we're witnessing here is the emergence of a new industry; and if Moore's Law applies here as it does to so many IT spheres, it won't be long before these gadgets are inexpensive, commonplace, and far more flexible and intelligent."

Comment Why do this direct from the Phone? (Score 2) 197

Rather than using the Phone to do the monitoring and polling, I'd consider using a service on the network at work and then make your phone a client of this service.
An example would be to use Nagios to do the monitoring and then use one of the countless Nagios Clients available to read the monitoring state from the service. You'll get the added bonus of knowing what happens if your Network coverage goes away to fill in the blanks after the event and be able to escalate to someone else if you're not available.

Comment Re:Lock-down time... (Score 1) 64

for what its worth, solve it from the command line in bash with the following.
wget -qO - http://pro.sony.com/bbsc/jsp/forms/generateCaptcha.jsp |grep "</b></span></td>" |sed -e s/\<b\>//g |sed s/\</" "/g |awk '{print $1}'
(Yes its a bit messy but what do you want for 5 mins work.)

Anyone else want to have a go? (in perl maybe?)
Facebook

Making Facebook Self Healing 74

New submitter djeps writes "I used to achieve some degree of automated problem resolution with Nagios Event Handler scripts and RabbitMQ, but Facebook has done it on a far larger scale than my old days of sysadmin. Quoting: 'When your infrastructure is the size of Facebook's, there are always broken servers and pieces of software that have gone down or are generally misbehaving. In most cases, our systems are engineered such that these issues cause little or no impact to people using the site. But sometimes small outages can become bigger outages, causing errors or poor performance on the site. If a piece of broken software or hardware does impact the site, then it's important that we fix it or replace it as quickly as possible. ... We had to find an automated way to handle these sorts of issues so that the human engineers could focus on solving and preventing the larger, more complex outages. So, I started writing scripts when I had time to automate the fixes for various types of broken servers and pieces of software.'"
ISS

Robotic Refueling Experiment Set Up On Space Station 36

coondoggie writes "The idea that the International Space Station could be used as a port-of-call for passing satellites that need fuel or repairs took one step closer to reality as NASA astronauts set up the robotic experiment in orbit today. The Robotic Refueling Mission structure will ultimately be attached to the ISS' infrastructure. Once up and running, it will show that remote-controlled robots can perform refueling tasks in orbit, using commands sent from controllers on Earth."
Privacy

Law Enforcement Still Wants Mandatory ISP Log Retention 226

schwit1 writes with this snippet from CNet: "Law enforcement representatives are planning to endorse a proposed federal law that would require Internet service providers to store logs about their customers for 18 months. ... Michael Brown, sheriff in Bedford County, Va., and a board member and executive committee member of the National Sheriffs' Association, is planning to argue that a new law is necessary because Internet providers do not store customer records long enough. 'The limited data retention time and lack of uniformity among retention from company to company significantly hinders law enforcement's ability to identify predators when they come across child pornography,' according to a copy of Brown's remarks. Any stored logs could, however, be used to prosecute any type of crime."

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...