Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Frequent duplication is NOT the answer (Score 1) 611

Along these same lines I have been hoping to see that some Java wizard will create an applet for Azureus/Vuze that will run an MD5 checksum against the completed data and leave an MD5 file in the directory. That way I don't have to manually run MD5s manually since I include them with *everything*.

Something like this:

Torrent DL ==> Check Pieces ==> Completed ==> Run MD5 ==> Leave MD5 File

Another idea is a workable MD5 (+SHA1/*) checksum generator for X that supports drag and drop, queueing, etc. along the lines of the Win32 app hkSFV or md5summer. md5summer is not bad, but it needs drag and drop and context menus.

XBox (Games)

Submission + - Dutch TV program claims Xbox 360 scratches discs

leomekenkamp writes: According to the Dutch TV consumer program 'Kassa' (cash register) Microsofts Xbox scratches discs. Microsoft claims the problem is caused by the customers themselves, because they do not put the gamecomputer on a stable place. The way MSFT handles these complains differs: some complainer get a new Xbox, others are told that 'it is not Microsoft's policy to have the Xbox make scratches'.

Original article in dutch is here, and you can also laugh about the engrish generated by babelfish/
Security

Tor Open To Attack 109

An anonymous reader writes "A group of researchers have written a paper that lays out an attack against Tor (PDF) in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential avenue of attack is that Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network."
Security

Submission + - Know Your Enemy: Web Application Threats

An anonymous reader writes: From Honeynet.org:

The Honeynet Project & Research Alliance is pleased to announce the release of a new paper Know Your Enemy: Web Application Threats. This technical white paper provides behind the scenes information on various HTTP-based attacks against web applications, including remote file inclusion and exploitation of the PHPShell application. The paper is based on the research and data collected from the Chicago Honeynet Project, the New Zealand Honeynet Project and the German Honeynet Project during multiple honeypot compromises.

Along with the release of this paper, comes new functionality to the Google Hack Honeypot (GHH), used extensively in the paper. GHH now includes an automated malware collection function, as well as remote XML-RPC logging for SSL support.
Space

Submission + - Amazing New Pictures of Spacecraft Above Mars

sighted writes: "The European Space Agency's Rosetta probe, en route to a distant encounter with a comet, buzzed by Barsoom yesterday and took some striking and unusual pictures, including one that shows its own solar panel with Mars in the background. As it passed by the planet, Rosetta briefly took back up to six the number of active robotic missions exploring Mars, four in space and two on the ground."
Television

TV Delays Driving AU Viewers To Piracy 394

Astat1ne writes in with a story in The Register about the delays Australian TV viewers are experiencing getting overseas-produced series and how this is driving many of them to download the shows via BitTorrent and other peer-to-peer networks. The problem is compounded by the fact that Australian viewers are unable to download legal copies of the episodes from the US iTunes website. Quoting: "According to a survey based on a sample of 119 current or recent free-to-air TV series, Australian viewers are waiting an average of almost 17 months for the first-run series first seen overseas. Over the past two years, average Australian broadcast delays for free-to-air television viewers have more than doubled from 7.9 to 16.7 months."
User Journal

Journal Journal: Linux for the masses

I have a thought/question/idea:
Has anyone made a survey to determain who uses and runs with Linux LiveCD's. It seems that Ubuntu is the most popular but there seem to be tens if not hundreds of LiveCD desktops for Linux and even a few for (gasp) MS Windows. I have tried since S.u.S.E. Linux 5.2 to find a Linux distribution I was comfortable with using and one which I could feel competant using in place of Windows. It seemed to me that all Linux distrobution wanted me to learn the system

Introduction to Linden Scripting Language 139

prostoalex writes "Dr. Dobb's Journal runs a lengthy introduction to Linden Scripting Language, the language behind avatars and their interaction in Second Life: "LSL is a scripting language that runs server-side, on a piece of software called the simulator. The simulator does just what it's name implies — it simulates the virtual world of Second Life. Each simulator runs everything for 16 acres of virtual land — buildings, physics, and of course, scripts. While you manipulate the script text in a form that is somewhat easy to read, the actual code that runs on the simulator is compiled. A compiler is a piece of software that takes the text version of the script and converts it into something that can actually run. In the case of LSL, the compiler exists within the Second Life viewer itself. In the future, it is likely that the compiler will move from the viewer into the Second Life simulators, but where the code is compiled isn't very important. What matters is that the text is converted into a form that can run on the simulators.""
The Internet

Submission + - The RegisterFly battle continues: Kevin in control

kimvette writes: from http://story.malaysiasun.com/index.php/ct/9/cid/d8 05653303cbbba8/id/230159/cs/1/

The two principal shareholders John Naruszewicz and Kevin Medina at the weeks-end were still trading verbal blows, while ICANN stepped in to the fray after nearly three years of complaints. Whilst most focus has been on the failure of the company's support systems, allegations of fraud and corruption were flowing freely Friday, not only from the principals involved, but from ICANN.

Meantime the control of RegisterFly.com, seized by Naruszewicz on Tuesday, was back in the hands of Medina late Friday. Both parties are accusing the other of hijacking the company's Web site and administration, which has been effectively dysfunctional for weeks. Medina has also replicated the current site at www.registerfly-inc.com so if he loses control again, or the original site is brought down, he can continue to trade on.


What does this mean for the 90,000 domain holders? Many of us have domains in redemption or pendingDelete status because of this internal RegisterFly battle. We finally got ahold of Kevin Medina by getting him to come to RegisterFlies, and all he did was attack the partners who ousted him; he had nothing to say about rescuing customers' domains nor did he seem to care in the slightest. He seems intent only on maintaining control of the company, the database, and of course his investment, and forget about customer service issues.

Whereas John Naruszewicz and Glenn Stansbury raise customers' losses as their first concern, and saving their investment second. On the surface they appear sincere in their claim that they want to make things right.

Rumors are flying about Kevin, about back-room deals with other registrars, reasons why domains have disappeared from customer accounts, why domains have been allowed to remain in redemption status until they move to pendingDelete and are lost.

The coming week will be very telling. If the authorities step in Monday and arrest Mr. Medina, we will know that Mr. Naruszewicz and Mr. Stansbury are likely legitimate in their claims.

But, what happens for small businesses who have lost their domain names due to Mr. Medina's alleged misconduct? Who will ensure that we get our domains back?
Biotech

Submission + - Bacteria to protect against quakes

Roland Piquepaille writes: "If you live near the sea, chances are high that your home is built over sandy soil. And if an earthquake strikes, deep and sandy soils can turn to liquid, with some disastrous consequences for the buildings sitting on them. But now, U.S. researchers have found a way to use bacteria to steady buildings against earthquakes by turning these sandy soils into rocks. Today, it is possible to inject chemicals in the ground to reinforce it, but this can have toxic effects on soil and water. On the contrary, this use of common bacteria to 'cement' sands has no harmful effects on the environment. But so far, this method is limited to labs and the researchers are working on scaling their technique. Here are more references and a picture showing how unstable ground can aggravate the consequences of an earthquake."
Google

Submission + - Google aims for desktop plartform with Apps

InfoWorldMike writes: "Ephraim Schwartz takes a bigger pic, day-after look at the Google Apps news this last week, with which it added key business applications — a word processor and spreadsheet — to Google Apps. The company is now offering the kind of support corporate IT would expect: IT management tools, technical support, and service level agreements for uptime. Even all that, however, does not tell the entire story or give the scope of Google's plans, Schwartz writes in his news analysis. In its press announcement and in an interview with a Google executive, Dave Giroud, vice president and general manager of the Enterprise Unit, Google made it clear that it will offer APIs forhttp://weblog.infoworld.com/daily/archives/2007 /02/interview_googl.html business integration, thus creating a business platform not unlike what Salesforce.com offers with AppExchange. An InfoWorld podcast interview with Google's Rajen Sheth, product manager for Apps, also makes it pretty clear. Is this a play on Google's part to go head to head against a player in its own backyard, Salesforce.com and its AppExchange? Despit some roadblocks, sources say Google is buying up a great deal of dark fiber all around the country and at the same time hiring telecommunications engineers and delivering during the past year or two thousands of server blades to what are called Peering Centers, datacenters where networks converge to optimize connectivity."

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...