Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Puzzle Games (Games)

Submission + - Casual gaming with serious undertones (chainfactor.com)

SixSided writes: Addictive online puzzle game Chain Factor is going into it's endgame, with just under six hours left until it either destroys the stock market, or well, doesn't. The game itself appears to be your average web based puzzle game, albeit a very enjoyable and addicting one. But in playing and discovering 'error messages' that pop up at random on a game ending, players have uncovered an underlying sinister story behind the game. As the story played out, it revealed that the game data fed to the players is coming from stock market feeds and by playing the game the players are essentially acting as a human compiler. They are unwittingly working out large biding chains that with enough build up, are supposed to have a harmonic resonance like effect, sending the markets into chaos and destroying them. Sure, this isn't entirely plausible in all reality, but it's a nice idea.

Of course none of that is actually real, and the game is in fact a tie in to a Numb3rs episode that aired a month ago on the 9th of November. The episode in question involved Alternate Reality Games and this is just an ARG type tie in to it. As promotional tie ins go however, it has done very well in being a game of it's own and not just a promotional tool to shove advertising in your face. Bar a small reference in the 'Terms of Use' on the main site, there have been no real pointers to CBS, even with the Chain Factor ads, which ranged from billboards to TV spots, each with hidden puzzles to unlock more features of the online game. One of the people believed to be behind the game is Ian Bogost from Persuasive Games, who make 'electronic games for persuasion, instruction, and activism', as this game very much fits the types of games with underlying messages that they have created in the past.

The game is nearing the end with the accumulative points between 2 different modes, 'survival' and 'power', working as either the execute or abort of the final sequence, depending on which has a larger total when the countdown ends. If 'Survival' is greater it is stopped, if 'Power' is greater it goes ahead and the bad guy wins. As of writing this survival is trailing by just under 250 million points, so it'll take a serious last minute push on Survival Mode to save the day. All in all it is a rather interesting spin on the simple concept of the power of using the human brain to solve complex problems and the use of something such as an addictive online game to do so. Oh, and a great puzzle game to boot.

So go get playing Survival Mode and help save the world!

Businesses

Submission + - Dyslexia is Rampant Among Entrepreneurs

Hugh Pickens writes: "Five years ago Fortune magazine published a story about dyslexic business leaders including Craig McCaw, who pioneered the cellular industry; Richard Branson, founder of Virgin Atlantic Airways; Charles Schwab, founder of the discount brokerage firm; and Paul Orfalea, founder of the Kinko's copy chain. Now a study of entrepreneurs in the United States by Julie Logan, professor of entrepreneurship at the Cass Business School in London, has found that 35 percent of the entrepreneurs she surveyed identified themselves as dyslexic. "We found that dyslexics who succeed had overcome an awful lot in their lives by developing compensatory skills," Logan says. "If you tell your friends and acquaintances that you plan to start a business, you'll hear over and over, 'It won't work. It can't be done.' But dyslexics are extraordinarily creative about maneuvering their way around problems." Mr. Orfalea, who left Kinko's seven years ago, and who now dabbles in a hodgepodge of business undertakings, is almost proud of having dyslexia and attention deficit hyperactivity disorder. "I get bored easily, and that is a great motivator," he said. "I think everybody should have dyslexia and A.D.D.""
Biotech

Submission + - New antibiotics for pathogenic attacks of bacteria (heraldbiz.com)

allengineering writes: "A team of research directed by the pr. KIM Kyung-Gyu of the Faculty of Medicine of the University of Sungkyunkwan discovered the structure of the protein Rse B playing an essential part in the transmission of the signals of stresses resulting from the pathogenic attacks of bacteria. The article is been published in the edition of May of the Proceedings of the National Academy of Sciences of the the USA (PNAS). This projection should make it possible to develop new antibiotics."
Security

Submission + - Book review of PCI Compliance

Ben Rothke writes: "Ben Rothke Ben Rothke 2 0 2007-08-02T20:09:00Z 2007-08-02T20:18:00Z 2007-08-02T20:18:00Z 3 752 4290 INS 35 10 5032 12.00 Clean Clean false false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Calibri","sans-serif";}


It has long been rumored that manufacturers of items such as razors and batteries specifically produce their products an inferior level in order to ensure repeat business. A similar paradox is occurring in the information security space where many are complaining that the PCI Data Security Standard (PCI DSS) is too complex and costly. What is most troubling is that such opinions are being written in periodicals and by people that should know better.

PCI came to life when Visa, MasterCard, American Express, Diner's Club, Discover, and JCB collaborated to create a new set of standards to deal with credit card fraud. PCI requires that all merchants and service providers that handle, transmit, store or process information concerning any of these cards, or related card data, be required to be compliant with the PCI DSS. If they are not compliant, they can face monetary penalties and/or have their card processing privileges terminated by the credit card issuers.

The primary purpose of PCI is to force organizations to embrace common security controls to protect credit card data and reduce fraud and theft. The following are the six primary control areas and 12 specific requirements of the PCI DSS:

Build and maintain a secure network

1. Install and maintain firewall configurations

2. Do not use vendor-supplied or default passwords

Protect cardholder data

3. Protect stored data

4. Encrypt transmissions of cardholder data across public networks

Maintain a vulnerability management program

5. Use and regularly update anti-virus software

6. Develop and maintain secure systems and applications

Implement Strong Access Control Measures

7. Restrict access to need-to-know

8. Assign unique IDs to each person with computer access

9. Restrict physical access to cardholder data

Regularly monitor and test networks

10. Monitor and track all access to network resources and cardholder data

11. Regularly test security systems and processes

Maintain an information security policy

12. Maintain a policy that addresses information security

A quick review of these 12 items shows that PCI is a textbook example of the fundamentals of information security. With that, PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance is an excellent resource that provides the reader with all of the fundamental information needed to understand and implement PCI DSS.

The books 13 chapters provide the reader with a comprehensive overview of all of the details and requirements of PCI. The first three chapters provide an overview of the basics about PCI and the basic requirements of the standard. The following six chapters go into detail about each of the primary control areas.

In particular, chapter 6 provides a good overview of the PCI logging requirements. This requirement can be time-consuming to put into place. The author notes that a commonly overlooked but essential requirement, namely that of accurate and synchronized time on network devices. Enterprise information network and security infrastructure devices are highly dependent on synchronized time and PCI recognizes that correct time is critical for transactions across a network.

In a further discussion about synchronized time in chapter 9, the author unfortunately makes an error when he states that local hardware is considered a stratum 1 time source since it gets its time from its own CMOS. From an NTP perspective, only a device that is directly linked to a stratum-0 device is called a stratum-1. CMOS clocks are notoriously inaccurate and can't be relied upon.

The title of chapter 12 is both amusing and accurate 'Planning to fail your first Audit'. The irony is that so many organizations lack a CISO or formal business security program in place designed to protect corporate information assets. They don't focus on information security as a process, rather as a set of products or regulatory items to be checked-off. Yet, these same organizations are surprised when they fail an audit.

The book concludes in chapter 13 with the well-known observation that security is a process, not an event. The book astutely notes that it is impossible to be PCI compliant without approaching security as a process. Trying to achieve compliance without integrating the various aspects in an integrated fashion is bound to fail.

Overall, PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance is a great book for one of the most sensible security standards ever. Anyone who has PCI responsibilities or wants to gain a quick understanding of the PCI DSS requirements will find the book to be quite valuable.





Ben Rothke is a security consultant with BT INS and the author of Computer Security: 20 Things Every Employee Should Know
"
Networking

Submission + - SuprNova.org Transferred to The Pirate Bay (slyck.com)

An anonymous reader writes: Andrej Preston, ex-administrator of legendary BitTorrent SuprNova.org, has turned over the keys to The Pirate Bay.

"My deal with [The Pirate Bay] was that the role of SuprNova can't change much," he tells Slyck.com. "It needs to be community orientated, but I hope they make some updates the SuprNova was sooo missing. But what they will do, it's not my thing to decide anymore. But I know they will do [well] and will try to keep the community spirit running."

Music

Submission + - Multiformat Listening Test at 64kbps

Anonymous writes: The Hydrogenaudio community is conducting a "Public, Multiformat Listening Test" (http://www.listening-tests.info/mf-64-1/) to see which codecs (AAC, WMA Pro and Vorbis) provide the best sound quality when compressing samples at 64kbps.

This test is open until the 5th of August and seems to be much, much harder than what one would expect, even for experienced developers of sound codecs, at bitrates that the public would find "too little", as the comments on the thread at the discussion forums (see: http://www.hydrogenaudio.org/forums/index.php?show topic=56397).

Do you think that you have good ears? That 64kbps is "too little"? Then try it for yourself and participate. Your participation will help us improve the codecs so that they are even closer to being "transparent" at such "low" bitrates.
Security

Submission + - New Tool Automates Webmail Account Hijacks (washingtonpost.com)

An anonymous reader writes: A pair of software tools demonstrated at the Black Hat security conference today automate the interception of cookie files transmitted over a wireless network that allow attackers to hijack accounts for Gmail, Hotmail, Facebook and a number of other Web 2.0 services, washingtonpost.com's Security Fix reports. From the story: "the attack works even if victims subsequently change their passwords, or actively sign out of their accounts. However, attackers would be unable to change the victim's password, as all of the above-named services force the user to reenter the current password before changing it to a new one."
Privacy

Submission + - Unencrypted passwords at "secure" sites 1

linear a writes: I've noticed that quite a few web sites do *not* encrypt user passwords. I've gotten into the habit of hitting the "email me my password" from them to see what happens. So far I've found maybe 6 that must store passwords in clear since they were able to return the original password back to me. Clearly this is Bad Security Practice. Also, I've had notably bad progress when I ask them to fix this practice. Some of these are sites one would clearly expect to have better security (e.g., a software vendor and an online bank). Do you have thoughts on how to better encourage better password practice at these places? Also, is this is really as common as it seems to be for me?
Music

Safeguards For RIAA Hard Drive Inspection 276

NewYorkCountryLawyer writes "In SONY v. Arellanes, an RIAA case in Sherman, Texas, the Court entered a protective order (PDF) that spells out the following procedure for the RIAA's examination of the defendant's hard drive: (1) RIAA imaging specialist makes mirror image of hard drive; (2) mutually acceptable computer forensics expert makes make two verified bit images, and creates an MD5 or equivalent hash code; (3) one mirror image is held in escrow by the expert, the other given to defendant's lawyer for a 'privilege review'; (4) defendant's lawyer provides plaintiffs' lawyer with a 'privilege log' (list of privileged files); (5) after privilege questions are resolved, the escrowed image — with privileged files deleted — will be turned over to RIAA lawyers, to be held for 'lawyers' eyes only.' The order differs from the earlier order (PDF) entered in the case, in that it (a) permits the RIAA's own imaging person to make the initial mirror image and (b) spells out the details of the method for safeguarding privilege and privacy."
Caldera

Submission + - Novell Bombards SCO with Summary Judgment Motions

rm69990 writes: Novell has filed 4 motions for Summary Judgment against SCO, which essentially ask the court to toss the remainder of SCO's case that isn't already being arbitrated between SUSE and SCO. One seeks a ruling from the court that Novell transfered none of the copyrights in Unix to SCO, which is backed up by many exhibits and declarations from people who negotiated the deal. Another, along the same lines, asks the court to toss the portions of SCO's Unfair Competition and Breach of Contract claims pertaining to the Unix copyrights. The third asks the court to rule that Novell did not violate the Technology License Agreement between SCO and Novell, and last and also least, the fourth seeks to toss the Slander of Title for the additional reason that SCO has failed to prove any special damages. These motions follow 2 motions for summary judgment filed by Novell late last year on 2 of their counterclaims.

Feed Lenovo laying off 1,400 employees, looking overseas (engadget.com)

Filed under: Desktops, Laptops

Tough news on the Lenovo front, as the "world's third ranking PC manufacturer" is looking to axe 1,400 of its US-based employees -- and fast. Reportedly, the firm has decided to lay off a good chunk of its American-based work force "within the next 30 to 60 days" as it turns around and creates around 750 new positions in Brazil, China, India and Slovakia. The company stressed that its return to profitability last year was greatly assisted by the laying off of upwards of 1,000 employees, and insinuates that the latest cost-cutting measures are just attempts to "make the organization more efficient by reducing expenses." The cuts also include a whopping 20-percent of the work force at Lenovo's Research Triangle Park (RTP) location and around five-percent overall, but should net some $100 million in savings for the new fiscal year. Sadly, it just seems to get more cutthroat every year in the corporate arena, regardless of accomplishments.

[Via TWW]

Read | Permalink | Email this | Comments

BOLD MOVES: THE FUTURE OF FORD A new documentary series. Be part of the transformation as it happens in real-time

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


Power

Submission + - Earth Day: 10 First Steps To Lighter Living

kitzilla writes: "Earth Day is Sunday — are you doing anything earthy? Here's a list [via Lifehacker] of ten easy things you can do to lighten your environmental "footstep." Nothing particularly complicated here, but a good review: from unplugging chargers and equipment in standby mode to buying locally grown food. Check of one or two of these, and grab some good Earth Day karma."
PC Games (Games)

Submission + - EA: No patches, no support for a 5-month-old game

Xyston writes: It's been five months since the release of EA's Rise of the Witch-King, and fans who were hoping for a patch were let down again this month when the promised patch never materialized. The game, which has been plagued by bugs, cheats and imbalances since its late November release, has become the source of frustration for gamers at several fan communities. While EA programmers admit they've neglected the game in favor of Command & Conquer 3, their last official statement was that a patch "should" have been available weeks ago. Gamers are still waiting.
Math

Submission + - Poll: Favourite Transcendental Number

An anonymous reader writes: 0
1
  (pi)
e
0.12345678910111213...
6006135

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...