Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Support (Score 1) 407

One question that is completely missing in the discussion is "Why did they attack?" ... I think to most people this is still a deep mystery, it just came out of the blue for no reason at all. Very few see the connect to the (still ongoing) US foreign policy against the peoples of the Middle East.

Submission + - Israeli to be treated as terrorist for stolen cred (haaretz.com)

An anonymous reader writes: Yesterday Israel declared it would respond to the recent credit card breach as if it was terrorism. Now that at least one Israeli have been identified as profiting from the stolen credit cards, it is now time to see how Israel's terrorism laws will come into play.

Comment Technion (Score 1) 351

About Technion:

http://uprootedpalestinians.blogspot.com/2010/10/montreal-activists-launch-campus.html

... "an academic institution that not only places a major amount of its efforts in military technology, but also in promoting student/soldier cooperative programs, is therefore deeply implicated in the occupation and crimes committed by the military." ...

Comment Re:Did South-Africa ... (Score 1) 351

This is by some complicated ancient accounting where only those in favor of the rulers (ie: Settlers in the territories, but not Palestinians) are allowed to vote, and where even larger parts of the population in the diaspora (ie: Palestinians but not Jews) will be shot on entry. And you will of course have to serve in the Army, which for Palestinians means you must be willing to expel your own relatives if this has not already happened. Yes, it's different, very
PlayStation (Games)

PS3 Hacked? 296

Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...