Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Social Networks

Facebook To Preserve Accounts of the Dead 292

Barence writes "Social-networking site Facebook is planning to preserve the accounts of dead members. The new 'memorialized' accounts will continue to display photos and wall posts, but remove 'sensitive information' such as status updates and contact information. Friends or family who want to report the death of a Facebook member are encouraged to fill out the site's Deceased form. The form asks for proof of death, such as an obituary or news article, although it's not clear how Facebook can validate the death of a member if neither of those pieces of information is published on the internet. How long before someone snuffs it on Facebook before their time?"
Earth

Were Neanderthals Devoured By Humans? 502

Hugh Pickens writes "The Guardian reports that a Neanderthal jawbone covered in cut marks similar to those left behind when flesh is stripped from deer provides crucial evidence that humans attacked Neanderthals, and sometimes killed them, bringing back their bodies to caves to eat or to use their skulls or teeth as trophies. 'For years, people have tried to hide away from the evidence of cannibalism, but I think we have to accept it took place,' says Fernando Rozzi, of Paris's Centre National de la Récherche Scientifique. According to Rozzi, a discovery at Les Rois in south-west France provides compelling support for that argument. Previous excavations revealed bones that were thought to be exclusively human. But Rozzi's team re-examined them and found one they concluded was Neanderthal." (Continued, below.)

Comment This will change nothing in the long run (Score 2, Insightful) 129

Don't fool yourself, this (temporary) rejection was only possible because some of the left wing party sneaked at the last minute to vote AGAINST the proposal. There were not enough right wing (government) politicians in the assembly to vote for it and the text was rejected.

This, however, changes NOTHING in the long run: despite being a stupid, non-applicable, lobbied-by-the-SACEM*-to-maintain-the-outdated-cash-machine, this law *will* be accepted in the end, since the government has enough of its own members of the Assemblee Nationale to vote for it, regardless of what the other "deputes" do.

When this stupid law is effective everybody loses, except maybe for recoding companies which will be able to seat for 20 more years on their obsolete business plan.

Intel

Intel Recruits TSMC To Produce Atom CPUs 109

arcticstoat writes "Intel has surprised the industry by announcing a memorandum of understanding (MOU) with Taiwanese silicon chip maker TSMC to manufacture Atom CPUs. Although TSMC is already employed by AMD, Nvidia and VIA to make chips, it's not often you see Intel requiring the services of a third fabrication party. Under the MOU, Intel agrees to port its Atom CPU technology to TSMC, which includes Intel's processes, intellectual properties, libraries and design flows relating to the processor. This will effectively allow other customers of TSMC to easily build Atom-based products similarly to how they might use an ARM processor in their own designs. However, Intel says that it will still pick the specific market segments and products that TSMC will go after, which will include system-on-chip products, as well as netbooks, nettops and embedded platforms."
Music

French President Busted For Copyright Violation 317

An anonymous reader writes "ZeroPaid has an interesting take on the story of Nicolas Sarkozy being accused of copyright infringement. The irony, of course, is Sarkozy's pushing of a 3-strikes law — disconnecting from the Internet those accused of file sharing — in France and across the EU. The French president had apparently offered to settle the copyright infringement accusation for one Euro, but the band rejected the offer, calling it an insult. The article notes that each year since 2006, a high-profile anti-piracy entity has been on the wrong end of a copyright infringement notice. In 2008, Sony BMG was sued for software piracy. In 2007, anti-piracy outfit BASCAP received a cease and desist order related to pirated software. And in 2006, the MPAA was accused of pirating 'This Film is Not Yet Rated'."
Security

Working Around Slow US Gov. On DNS Security 91

alphadogg writes "Last fall, the US government sought comments from industry about how better to secure the Internet by deploying DNSSEC on the root zone. But it hasn't taken action since then. Internet policy experts anticipate further delays because the Obama Administration hasn't appointed a Secretary of Commerce yet, the position that oversees Internet addressing issues. Meanwhile, the Internet engineering community is forging ahead with a stopgap to allow DNSSEC deployment without the DNS root zone being signed. Known as a Trust Anchor Repository, the alternative was announced by ICANN last week and has been in testing since October."
Be

BeOS Successor Haiku Keeps the Faith 448

kokito writes "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and 'personality,' boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general." (More below.)

Comment Focus on the methodology rather than the company (Score 1) 93

I do not think anyone can recommend the "best" company as the criteria for "best" depend on your business needs.
That being said, I would recommend sending a request for proposal (or call for tender, I never know the correct name for this) to 5 companies with local offices so you can meet the ethical hackers if needed. This is good to avoid relying on a bunch of "not so white hackers" with little knowledge of collateral damages and potential impact of the pentest on the information system.

Make sure the intruders do not rely on automated tools. I have seen Eeye/ISS reports labelled as actual pentests reports, sold at pentest prices. A good pentest on a 3/3 application requires at least 8-10 days from my experience. These figures should be adapted to the complexity of the infrastructure of course.

I would also ask for information regarding
- system tests vs application tests. The latter cannot be automated to be effective, but both are necessary for a pentest to be meaningful
- the pentest methodology (do they have anything set or do they do it "as they feel" for each project),
- audit trails gathering (all traffic between the pentest lab and your information system should be archived)
- alert processes (what should they do if a critical vulnerability is discovered) and so on

Many companies with little knowledge of professional penetration testing sell intrusion services, from my point of view it is your job to select the best one, nobody on Slashdot can do that for you.

The Courts

SCO Proposes Sale of Assets To Continue Litigation 290

gzipped_tar sends in this excerpt from the Salt Lake Tribune: "The embattled SCO Group Inc. is proposing to auction off its core products and use proceeds to continue its controversial lawsuits over the alleged violations of its copyrights in Linux open-source software. The Lindon company has filed a new reorganization plan with the federal court in Delaware where it sought bankruptcy protection from creditors after an adverse ruling in the Linux litigation. If approved by a bankruptcy judge, the plan could mean SCO's server software and mobile products lines are owned by other parties while SCO itself remained largely to pursue the lawsuits under the leadership of CEO Darl McBride. 'One goal of this approach is to separate the legal defence of its intellectual property from its core product business,' McBride said in a letter to customers, partners and shareholders. Jeff Hunsaker, president and COO of The SCO Group, said the litigation had been distracting to the company's efforts to market its products. 'We believe there's value in these assets and in order for the business to move forward it's imperative we separate it from our legal claims and we allow our products business to move forward,' he said Friday."
Image

Sleep Mailing Screenshot-sm 195

Doctors have reported the first case of someone using the internet while asleep, when a sleeping woman sent emails to people asking them over for drinks and caviar. The 44-year-old woman found out what she had done after a would be guest phoned her about it the next day. While asleep the woman turned on her computer, logged on by typing her username and password then composed and sent three emails. Each mail was in a random mix of upper and lower cases, unformatted and written in strange language. One read: "Come tomorrow and sort this hell hole out. Dinner and drinks, 4.pm,. Bring wine and caviar only." Another said simply, "What the......." If I had known that researchers were interested in unformatted, rambling email I would have let them read my inbox. They could start a whole new school of medicine.
Windows

Performance Tests Show Early Windows 7 Build Beats Vista 534

The Other A.N. Other writes "How does the latest build of Windows 7 stack up against Windows Vista? The answer seems to be very well if the benchmarks run by ZDNet are anything to go by. If Microsoft keeps up the good then Windows 7 should be head and shoulders better than Vista. 'What we have here is one set of data points for one particular system, but I think that the results are very promising. The fact that Windows 7 comes out on top in three out of four of these tests at this early stage is very promising indeed. The boot time and PCMark Vantage results are particularly good.'"
Businesses

Enterprise 2.0 47

mantex writes "The title of this book combines two coded terms — 'Web 2.0' and 'The Enterprise' — for which read 'social networking software' and 'Big Business.' And the purpose is to show how the techniques and concepts behind Web 2.0 applications (blogs, wikis, tagging, RSS, and social bookmarking) can be used to encourage collaboration efforts in what was previously thought of as secretive, competitive businesses." Read on for the rest of Roy's review.
Space

Black Hole At Center of Milky Way Confirmed 392

Smivs writes "The BBC are reporting that a German team has confirmed the existence of a Black Hole at the center of the Milky Way. Astronomers tracked the movement of 28 stars circling the center of the Milky Way, using the 3.5m New Technology Telescope and the 8.2m Very Large Telescope (VLT) in Chile. Both are operated by the European Southern Observatory (Eso). The black hole is four million times heavier than our Sun, according to the paper in The Astrophysical Journal. According to Dr Robert Massey, of the Royal Astronomical Society (RAS), the results suggest that galaxies form around giant black holes in the way that a pearl forms around grit."
Mozilla

Firefox 3.1 Beta 2 Adds Private Browsing 216

CWmike was one of several readers to point out the release of Firefox 3.1 Beta 2, the first version of its flagship browser to switch on the much faster TraceMonkey JavaScript engine and sport a working privacy mode dubbed "Private Browsing." An ancillary addition to Private Browsing is a new addition to the "Clear Recent History" dialog box allowing users selectively to erase the last hour, the last two hours, the last four hours, today's, or all browsing history — previously, the wipe was all or nothing. This beta includes support for "web worker threads," a developing specification that will let Web-based application developers run background processes to speed up their apps. One feature present in Beta 1 is gone in the new beta: Ctrl-Tab switching. According to the developer, the UI needs more work; the feature probably won't be in the final 3.1.
The Internet

Researchers Latch Onto BitTorrent To Spot Connection Problems 87

alphadogg writes "Northwestern University researchers have developed a system that gives a heads up about traffic problems on the Internet, where there is no central management system. Their Network Early Warning System (NEWS), which latches on to a popular BitTorrent client, is designed to spot problems by encouraging feedback from end users who are experiencing problems. 'You can think of it as crowd sourcing network monitoring,' said associate professor Fabián Bustamante. He has a track record with BitTorrent users, having developed the popular Ono plug-in for speeding up P2P interactions."

Slashdot Top Deals

Scientists will study your brain to learn more about your distant cousin, Man.

Working...