Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Earth

Earthquake In China 595

Several readers sent in links on the earthquake that hit 10 hours ago near the Sichuan city of Chengdu in China. The Telegraph focuses on the citizen journalism that got word on the quake out on the Net instantly (the first report was via Twitter). Science magazine speculates that deaths from this event could exceed the 240,000 killed in the Tangshan quake in 1976, though the estimated death toll is below 10,000 at this writing. Hundreds of videos are up on YouTube, including this footage from a security camera — keep your eye on the goldfish.
Data Storage

A Walk Through the Hard Drive Recovery Process 238

Fields writes "It's well known that failed hard drives can be recovered, but few people actually use a recovery service because they're expensive and not always successful. Even fewer people ever get any insights into the process, as recovery companies are secretive about their methods and rarely reveal any more information that is necessary for billing. Geek.com has an article walking through a drive recovery handled by DriveSavers. The recovery team did not give away many secrets, but they did reveal a number of insights into the process. From the article, "'[M]y drive failed in about every way you can imagine. It had electro-mechanical failure resulting in severe media damage. Seagate considered it dead, but I didn't give up. It's actually pretty amazing that they were able to recover nearly all of the data. Of course, they had to do some rebuilding, but that's what you expect when you send it to the ER for hard drives.'" Be sure to visit the Museum of Disk-asters, too.
Windows

Microsoft Helps Police Crack Your Computer 558

IGnatius T Foobar writes "Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that "may have been used in crimes." It basically bypasses all of the Windows security (decrypting passwords, etc.) in order to eliminate all that pesky privacy when the police have physical access to your computer. Just one more reason not to run Windows on your computer."
Printer

How Aftermarket Inkjet Ink Holds Up After a Year 152

An anonymous reader writes "About a year ago I found a link on here for a test of inkjet printer inks. The article compared original manufacturer inks against much cheaper third party stuff and the results were surprisingly in favour of third party products. They've now published the final part of this study, examining the prints produced a year ago. This time the printer manufacturers have come out far better, with some third party prints having disappeared completely! Cartridge World ink still seems worth a try though, if you don't want to pay manufacturers' inflated prices."
Privacy

Lawyers Would Rather Fly Than Download PGP 426

An anonymous reader writes "The NYTimes is running a front-page story about lawyers for suspects in terrorism-related cases fearing government monitoring of privileged conversations. But instead of talking about the technological solutions, the lawyers fly halfway across the world to meet with their clients. In fact, nowhere in the article is encryption even mentioned. Is it possible that lawyers don't even know about PGP?" The New Yorker has a detailed piece centering on the Oregon terrorism case discussed by the Times.
Privacy

FBI Lied To Support Need For PATRIOT Act Expansion 396

I Don't Believe in Imaginary Property writes "It probably won't surprise you, but in 2005, the FBI manufactured evidence to get the power to issue National Security Letters under the PATRIOT Act. Unlike normal subpoenas, NSLs do not require probable cause and you're never allowed to talk about having received one, leading to a lack of accountability that caused them to be widely abused. The EFF has discovered via FOIA requests that an FBI field agent was forced by superiors to return papers he got via a lawful subpoena, then demand them again via an NSL (which was rejected for being unlawful at the time), and re-file the original subpoena to get them back. This delay in a supposedly critical anti-terror investigation then became a talking point used by FBI Director Robert Mueller when the FBI wanted to justify their need for the power to issue National Security Letters."
Security

What Should We Do About Security Ethics? 244

An anonymous reader writes "I am a senior security xxx in a Fortune 300 company and I am very frustrated at what I see. I see our customers turn a blind eye to blatant security issues, in the name of the application or business requirements. I see our own senior officers reduce the risk ratings of internal findings, and even strong-arm 3rd party auditors/testers to reduce their risk ratings on the threat of losing our business. It's truly sad that the fear of losing our jobs and the necessity of supporting our families comes first before the security of highly confidential information. All so executives can look good and make their bonuses? How should people start blowing the whistle on companies like this?"
GNOME

Identify and Verify Users Based on How They Type 196

LinucksGirl writes to share an IBM DeveloperWorks article that shows how to support user verification through keystroke-dynamics processing by modifying the GNOME Display Manager (GDM). You can create and store a one-way encrypted hash of your keystroke patterns when entering your user name. The article shows how to add code to GDM to read current keystroke patterns and permit a user to log in when the characteristics are a match. An interesting idea to be sure but I know I certainly am not that consistent when I type, so I'm skeptical of how well this may work.
Businesses

Creative Backs Down on Vista Driver Debacle 228

In the wake of last week's driver debacle, Creative has finally decided to back down for PR purposes. Modder Daniel_K, author of the offending Vista drivers, has had his posts on the Creative forums reinstated. According to Creative the move was to avoid infringing on other company's IP. "Daniel_K is incensed by Creative. 'They publicly threatened me, just to show their arrogance,' he told El Reg by email. He told us that Creative contacted him on a chat session. 'They were sarcastic, ironic and asked me if I wanted something from them, as if I were expecting something,' he wrote. 'It was my protest against them and would like to see how far it would go.'"
Windows

How Microsoft Plans To Get Its Groove Back With Win7 612

shawnz tips a blog post up at thebetaguy that details Windows 7's huge departure from the past, and the bold strategy Microsoft will be employing to maintain backward compatibility. Hint: Apple did it seven years back. There are interesting anti-trust implications too. "Windows 7 takes a different approach to the componentization and backwards compatibility issues; in short, it doesn't think about them at all. Windows 7 will be a from-the-ground-up packaging of the Windows codebase; partially source, but not binary compatible with previous versions of Windows."
The Military

US Cyber Command Wants Greater Attack Mentality 257

superglaze writes "Lieutenant General Robert J Elder, Jr, a senior figure in US Air Force Cyber Command (AFCYBER), has told ZDNet UK that communication issues are hampering the division's co-ordination. 'IT people set up traditional IT networks with the idea of making them secure to operate and defend,' said Elder. 'The traditional security approach is to put up barriers, like firewalls — it's a defense thing — but everyone in an operations network is also part of the [attack] force. We're trying to move away from clandestine operations. We're looking for real physics — a bigger bang resulting in collateral damage.'"

Will Twitter Join Podcasting on the 'Net Sidelines'? 221

Ian Lamont writes "Twitter has established itself in some quarters as a must-have communications tool, and its power to connect and even incite people is hard to deny. But does Twitter have long-term, mainstream potential? Or does a poor revenue model and strong competition mean that it's destined to be a sideline Internet technology, much like podcasting has failed to live up to early hype?"
Patents

Open Source Patent Donations? 185

patspam writes "As a software engineer I come up with patentable ideas every now and then, ideas which I'm not interested in pursuing myself but which I'd like to keep out of the hands of private entities/patent trolls in my own personal effort to defeat software patents. Should I patent the ideas and donate them to some sort of open source foundation? Or just blog about the ideas so that the 'prior art' exists in the public domain? What's your strategy for fighting against restrictive software patents?"

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...