Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Mozilla

Mozilla Thunderbird 3 Released 272

supersloshy writes Today Mozilla released Thunderbird 3. Many new features are available, including Tabs and enhanced search features, a message archive for emails you don't want to delete but still want to keep, Firefox 3's improved Add-ons Manager, Personas support, and many other improvements. Download here."
Google

Submission + - Google's $4.6bn wireless plan grounded

Almir writes: Google's plans to bid for a portion of America's airwaves were dealt a blow last night when the Federal Communications Commission refused to approve two of the internet company's conditions. Google had said that it would match the $4.6 billion (£2.3 billion) reserve price set for a 700MHz licence, which could be used to provide wireless broadband internet access across the US from 2009, if the eventual winner was forced to meet four "open access" conditions. However, two more controversial provisions put forward by Google, which would require the eventual licensee to sell access to its network on a wholesale basis to rivals and allow other parties physical access to infrastructure at realistic points, were not included.
Media

Submission + - World's first Blu-Ray disc camcroders from Hitachi

morpheus83 writes: Hitachi Japan has announced the world's first Blu-Ray disc camcorders, the DZ-BD70 and DZ-BD7H hybrid which packs both an 8-cm BD writer and 30GB disk. The $ 22 single sided 8cms wide 4.5 GB BD-R disc can hold upto an hour of 1,920 x 1,080 MPEG-4 AVC/H.264 video and more if you dial-back the resolution. Both the cams pack in USB and HDMI jacks and a SD card slot as well.
Quickies

Submission + - ESA backs satellite broadcast(DVB-SH)to cellphones (theregister.co.uk)

Tech.Luver writes: "theRegister reports, " The European Space Agency (ESA) has joined the DVB-SH party by funding development of technologies for broadcasting TV to mobiles via satellite. ESA has called its standard DVB-SH (Digital Video Broadcast — Satellite, Handheld) and envisages using satellites to send out video at 2GHz to 4GHz (S-Band). Terrestrial repeaters would be used to give indoor coverage. ""
Communications

Submission + - Malicous websites can exploit & control iPhone (nytimes.com)

Whiney Mac Fanboy writes: "The New York Times is reporting that a serious vulnerability has been found in the iPhone — allowing arbitrary code to be run as root. From the Security Evaulators page:

When the iPhone's version of Safari opens the malicious web page, arbitrary code embedded in the exploit is run with administrative priviledges. In our proof of concept, this code reads the log of SMS messages, the address book, the call history, and the voicemail data. It then transmits all this information to the attacker. However, this code could be replaced with code that does anything that the iPhone can do.
The security researchers have also released a white paper. This sounds like a useful vector to allow native applications to run on the iPhone."

Enlightenment

Submission + - Rolling my own parental controls in Linux

ZekeSMZ writes: It's been a year since I made the switch from windows to Ubuntu, and I can safely say I'm never going back. One of the best things I've done is to set up an Edubuntu system for my kids — ages 4 and 2. With applications such as Supertux, TuxPaint, G Compris, Stellarium and even Kolf, they amuse themselves for hours with the machine and can't damage it like they can a Windows box.

Now that my 4 year old is learning to read and type, I'd like to set up some form of parental controls on my network. I consider myself a moderately competant Linux user, but I do not have anything approaching the skills of the talented sysadmins I've worked with over the years. So, I'd like to reach out to the Slashdot community for advice on how to lock down my network so that they won't accidentally bump into the seedier side of the web.

What are the best firewall apps to use for internal filtering? Do (or could) any of them support pro-active whitelisting, where I could get an email with a blocked URL that my kids tried to visit, and in response — I set up a rule to allow or deny access to the URL. This is a fairly mainstream feature of various parental control software out there, how could a similar solution be set up in Linux?

I'm going to assume that my kids are smarter than me and will one day figure out how to own the network. You get bonus points if you can give pointers on setting up a dual system, one that they can hack, and one that is running in the background in silent or stealth mode to monitor activity. My intent here is not to be big brother, but rather a responsible parent.

Slashdot Top Deals

1 + 1 = 3, for large values of 1.

Working...