Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

SSL Renegotiation Attack Becomes Real 97

rastos1 and several other readers noted that the SSL vulnerability we discussed a couple of weeks back, which some researchers had claimed was too theoretical to worry about, has now been demonstrated by exploit. The attack description is available on securegoose.org. "A Turkish grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the SSL protocol. The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. All in all, a man in the middle is able to steal the credentials of a user authenticating himself through HTTPS to a trusted website."
The Internet

Transpacific Unity Fiber Optic Cable Leaves Japan 136

JoshuaInNippon writes "The 10,000 km (6,200 mile) long Unity fiber optic cable, funded by Google and five East Asian communication companies, left Japanese shores on November 1st to be laid along the northern Pacific Ocean floor. The Japanese end of the cable is expected to be fused to the American end sometime around November 11th. The cable, which was announced in February of 2008 at a cost of around $300 million USD, has the theoretical capacity of 7.68 Tbps, but will be set at a capacity of about 4.8 Tbps (supposedly equivalent to about 75 million simultaneous phone calls) during its initial use. When Unity begins full operation sometime early next year, it is projected to increase internet traffic capacity between the two regions by over 20%, a wonderful boost to transpacific relations!"
Microsoft

Microsoft Leaks Details of 128-bit Windows 8 581

Barence writes "Microsoft is planning to make Windows 8 a 128-bit operating system, according to details leaked from the software giant's Research department. The discovery came to light after Microsoft Research employee Robert Morgan carelessly left details of his work on the social-networking site LinkedIn. His page read: 'Working in high-security department for research and development involving strategic planning for medium and long-term projects. Research & Development projects including 128-bit architecture compatibility with the Windows 8 kernel and Windows 9 project plan. Forming relationships with major partners: Intel, AMD, HP and IBM.' It has since been removed."

Comment Re:To Mac or Not (Score 1, Offtopic) 672

I work for a company that does .NET development (with a product that doesn't even work outside IE), and yet about 1/4 of the developers use a MacBook (including myself).

They're pricey, but I figure that the cost is really very low considering I use it all day every day. Even if you're just going to run Windows in a VM or Boot Camp most of the time, MacBooks are very high quality machines.

If you don't *have* to run Windows, MacBook wins hands down if you can afford it.

Cellphones

Why AT&T Killed iPhone Google Voice 304

ZuchinniOne writes "The Wall Street Journal has a very interesting article about the likely reasons that AT&T and Apple killed the Google Voice application. 'With Google Voice, you have one Google phone number that callers use to reach you, and you pick up whichever phone — office, home or cellular — rings. You can screen calls, listen in before answering, record calls, read transcripts of your voicemails, and do free conference calls. Domestic calls and texting are free, and international calls to Europe are two cents a minute. In other words, a unified voice system, something a real phone company should have offered years ago.'"

Comment Re:Evil? No. Annoying? Yes! (Score 1) 535

Oddly enough, this is something many Linux distros already do automatically. On Ubuntu, I have one program that updates everything I have installed. And it doesn't even surprise me with an automatic reboot like Windows Update.

I guess Microsoft just doesn't have the manpower to put useful things like this in its 7th/8th generation Windows OS.

Microsoft's lack of innovation in its core OS function is the reason why other companies are building mini-OS functions on top of it.

Transportation

Amtrak Photo Contestant Arrested By Amtrak Police 675

Photographer Duane Kerzic was standing on the public platform in New York's Penn Station, taking pictures of trains in hopes of winning the annual photo contest that Amtrak had been running since 2003. Amtrak police arrested him for refusing to delete the photos when asked, though they later charged him with trespassing. "Obviously, there is a lack of communication between Amtrak's marketing department, which promotes the annual contest, called Picture Our Trains, and its police department, which has a history of harassing photographers for photographing these same trains. Not much different than the JetBlue incident from earlier this year where JetBlue flight attendants had a woman arrested for refusing to delete a video she filmed in flight while the JetBlue marketing department hosted a contest encouraging passengers to take photos in flight." Kerzic's blog has an account of the arrest on Dec. 21 and the aftermath.
Cellphones

What Carriers Don't Want You To Know About Texting 570

An anonymous reader writes "Randall Stross has just published a sobering article in The New York Times about how the four major US wireless carriers don't want anyone to know the actual cost structure of text message services to avoid public outrage over the doubling of a-la-carte per-message fees over the last three years. The truth is that text messages are 'stowaways' inside the control channel — bandwidth that is there whether it is used for texting or not — and 160 bytes per message is a tiny amount of data to store-and-forward over tower-to-tower landlines. In essence it costs carriers practically nothing to transmit even trillions of text messages. When text usage goes up, the carriers don't even have to install new infrastructure as long as it is proportional to voice usage. This makes me dream of the day when there is real competition in the wireless industry, not this gang-of-four oligopoly."
Medicine

Saving 28,000 Lives a Year 263

The New Yorker is running a piece by Atul Gawande that starts by describing the everyday miracles that can be achieved in a modern medical intensive care unit, and ends by making a case for a simple and inexpensive way to save 28,000 lives per year in US ICUs, at a one-time cost of a few million dollars. This medical miracle is the checklist. Gawande details how modern medicine has spiraled into complexity beyond any person's ability to track — and nowhere more so than in the ICU. "A decade ago, Israeli scientists published a study in which engineers observed patient care in ICUs for twenty-four-hour stretches. They found that the average patient required a hundred and seventy-eight individual actions per day, ranging from administering a drug to suctioning the lungs, and every one of them posed risks. Remarkably, the nurses and doctors were observed to make an error in just one per cent of these actions — but that still amounted to an average of two errors a day with every patient. Intensive care succeeds only when we hold the odds of doing harm low enough for the odds of doing good to prevail. This is hard." The article goes on to profile a doctor named Peter Pronovost, who has extensively studied the ability of the simplest of complexity tamers — the checklist — to save lives in the ICU setting. Pronovost oversaw the introduction of checklists in the ICUs in hospitals across Michigan, and the result was a thousand lives saved in a year. That would translate to 28,000 per year if scaled nationwide, and Pronovost estimates the cost of doing that at $3 million.
Privacy

Replacing Metal Detectors With Brain Scans 327

Zordak writes "CNN has up a story about several Israeli firms that want to replace metal detectors at airports with biometric readings. For example, with funding from TSA and DHS, 'WeCU ([creepily] pronounced "We See You") Technologies, employs a combination of infra-red technology, remote sensors and imagers, and flashing of subliminal images, such as a photo of Osama bin Laden. Developers say the combination of these technologies can detect a person's reaction to certain stimuli by reading body temperature, heart rate and respiration — signals a terrorist unwittingly emits before he plans to commit an attack.' Sensors may be embedded in the carpet, seats, and check-in screens. The stated goal is to read a passenger's 'intention' in a manner that is 'more fair, more effective and less expensive' than traditional profiling. But not to worry! WeCU's CEO says, 'We don't want you to feel that you are being interrogated.' And you may get through security in 20 to 30 seconds."

Slashdot Top Deals

On the eighth day, God created FORTRAN.

Working...