Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Internet

Black Hat Presentation Highlights SSL Encryption Flaws 152

nk497 writes "Hackers at the Black Hat conference have shown that SSL encryption isn't as secure as online businesses would like us to think. Independent hacker Moxie Marlinspike showed off several techniques to fool the tech behind the little padlock on your screen. He claimed that by using a real world attack on several secure websites such as PayPal, Gmail, Ticketmaster and Facebook, he garnered 117 email accounts, 16 credit card numbers, seven PayPal logins and 300 other miscellaneous secure logins."
Biotech

Family Dog Cloned, Thanks To Dolly Patents 261

patentpundit writes "BioArts International announced today that they have delivered the world's first commercially cloned dog, a 10-week old Labrador named Lancey, to Florida residents Edgar and Nina Otto. According to the press release issued by the company, 'BioArts International is a biotech company focused on unique, untapped markets in the global companion animal, stem cell and human genomics industries. The Best Friends Again program is a collaboration between BioArts and the Sooam Biotech Research Foundation in South Korea, home to the best and most experienced dog cloning team in the world.' The technology that makes this animal cloning possible stems from the cloning patents developed at the Roslin Institute for the cloning of the now famous, or infamous depending on your view, Dolly the sheep."
Sci-Fi

Please No, Not a Blade Runner Sequel 585

bowman9991 submitted a story that ought to make even the most stone-hearted amongst you cry. He says "Travis Wright, one of the writers behind Eagle Eye, has been working on a sequel to Ridley Scott's Sci-Fi classic Blade Runner. Script proposals have explored the nature of the off-world colonies, what happens to the Tyrell Corporation in the wake of its founder's death, and what would become of Rachel. Travis said he intends to write a script 'with or without anyone's blessings.' Director Ridley Scott appears interested in a sequel too. At Comic-Con in 2007 Ridley said, 'If you have any scripts, you know where to send them.' It's doubtful he'll have time anytime soon though. He's already stated his next two science fiction films will be an adaptation of Aldous Huxley's Brave New Word with Leonardo DiCaprio and an adaptation of Joe Haldeman's The Forever War."
Security

Critical Vulnerability In Adobe Reader 160

An anonymous reader writes "Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions using Adobe's Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Successful exploitation of the vulnerability requires that users open a maliciously crafted PDF file, thereby allowing attackers to gain access to vulnerable systems and assume the privileges of a user running Acrobat Reader."
The Internet

Australian Censorship Bypassed Before Live Trials 184

newt writes "The Australian Government is planning to conduct live trials of as-yet-unspecified censorship technology. But as every geek already knows, these systems can't possibly work in the presence of VPNs and proxy servers. PC Authority clues the punters in." Maybe the ISPs secretly like encouraging SSH tunneling — and making everyone pay for the extra bandwidth used. Not really; Australia's major ISPs, as mentioned a few days ago, think it's a bad idea.
The Almighty Buck

How To Make Money With Free Software 81

bmsleight writes "The Dutch Ministry of Finance organized an architecture competition to design not a building, but rather the new 5-Euro commemorative coin. The theme was 'Netherlands and Architecture'. The winning design was made 100% with free software, mainly Python, but also including The Gimp, Inkscape, Phatch, and Ubuntu. The design is amazing — the head of Queen Beatrix is made up of the names of architects based on their popularity in Yahoo searches (rendered in a font of the artist's own devising). In the end the artist, Stani Michiels, had to collaborate closely on location with technicians of the Royal Dutch Mint, so all the last bits were done on his Asus Eee PC. Soon, 350,000 Dutch people will use and enjoy the fruits of free software."
It's funny.  Laugh.

The Greatest Scientific Hoaxes? 496

Ponca City, We love you writes "The New Scientist has an amusing story about the seven greatest scientific hoaxes of all time. Of course, there have been serious cases of scientific fraud, such as the stem cell researchers recently found guilty of falsifying data, and the South Korean cloning fraud, but the hoaxes selected point more to human gullibility than malevolence and include the Piltdown Man (constructed from a medieval human cranium); a ten-foot "petrified man" dug up on a small farm in Cardiff; fossils 'found' in Wurzburg, Germany depicting comets, moons and suns, Alan Sokal's paper loaded with nonsensical jargon that was accepted by the journal Social Text; the claim of the Upas tree on the island of Java so poisonous that it killed everything within a 15-mile radius; and Johann Heinrich Cohausen's claim of an elixir produced by collecting the breath of young women in bottles that produced immortality. Our favorite: BBC's broadcast in 1957 about the spaghetti tree in Switzerland that showed a family harvesting pasta that hung from the branches of the tree. After watching the program, hundreds of people phoned in asking how they could grow their own tree but, alas, the program turned out to be an April Fools' Day joke." What massive scientific hoaxes/jokes have other people witnessed?
Security

Alarm Raised On Teenage Hackers 213

Arno Igne writes to tell us that the number of underage participants in "high-tech" crimes has risen steeply in recent history. Reporting children as young as 11 swapping credit card details and asking for hacks, many are largely unskilled and thus more likely to get caught and arrested. "Communities and forums spring up where people start to swap malicious programs, knowledge and sometimes stolen data. Some also look for exploits and virus code that can be run against the social networking sites popular with many young people. Some then try to peddle or use the details or accounts they net in this way. Mr Boyd said he spent a lot of time tracking down the creators of many of the nuisance programs written to exploit users of social networking sites and the culprit was often a teenager."
Politics

WV Voters Say Machines Are Switching Votes 900

An anonymous reader writes "Three Putnam County voters say electronic voting machines changed their votes from Democrats to Republicans when they cast early ballots last week. This is the second West Virginia county where voters have reported this problem. Last week, three voters in Jackson County told The Charleston Gazette their electronic vote for 'Barack Obama' kept flipping to 'John McCain.'"
Businesses

Should You Break TOS Because Work Asks You? 680

An anonymous reader writes "My boss recently assigned me a project that was all his idea, with two basic flaws that would require me to break multiple web sites' Terms of Service (TOS). Part requires scraping most of the site, parsing the data and presenting it as our own without human intervention. While we're safe on copyright issues, clearly scraping like this is normally not allowed. At times it might also put a load on those sites. The other is, for lack of better words, a 'load balancing' part that requires using multiple free accounts instead of purchasing space and CPU time for less than $2,000 USD per month. The boss sees it as 'distributed' computing when in reality it's 'parasitic.' My question is: am I wrong about the ethics? If I do need to walk, how best can I handle it without damaging my reputation and future employment opportunities?"
Software

OpenOffice.org V3.0 Sets Download Record, 80% Windows 451

thefickler writes "The newest version of OpenOffice, version 3.0, has set a download record in its first week of availability. Most surprising is the fact that over 80% of downloads were from Windows users. As one commentator noted, when it comes to a choice between almost identical software (e.g. Microsoft Office and OpenOffice), price is the determining factor."
Communications

US Army Sees Twitter As Possible Terrorist "Operation Tool" 320

Mike writes "A draft US Army intelligence report has identified the popular micro-blogging service Twitter as a potential terrorist tool. A chapter titled 'Potential for Terrorist Use of Twitter' notes that Twitter members reported the July Los Angeles earthquake faster than news outlets and activists at the Republican National Convention in Minneapolis used it to provide information on police movements. 'Twitter is already used by some members to post and/or support extremist ideologies and perspectives,' the report said. The report goes on to say, 'Terrorists could theoretically use Twitter social networking in the US as an operation tool.' Just wait until the Army finds out about chat rooms and email!"
Power

Warning Future Generations About Nuclear Waste 616

Smivs writes "How do we warn people 10,000 years in the future about our nuclear waste dumps? There is a thought-provoking essay in the The Guardian newspaper (UK) by Ulrich Beck concerning this problem. Professor Beck also questions whether green issues are overly influencing politicians and clouding our judgement regarding the dangers of nuclear power."
Bug

RHN Bind Update Brings Down RHEL Named 312

alexs writes "Red Hat's response to update bind through RHN, patching the DNS hole, made a fatal error which will revert all name servers to caching only servers. This meant that anyone running their own DNS service promptly lost all of their DNS records for which they were acting as primary or secondary name servers. Expect quite a few services provided by servers running RHEL to, errr, die until their system administrators can restore their named.conf. Instead of installing etc/named.conf to etc/named.rpmnew, Red Hat moved the current etc/named.conf to etc/named.conf.rpmsave and replaced etc/named.conf with the default caching only configuration. The fix is easy enough, but this is a schoolboy error which I am surprised Red Hat made. Unfortunately we were hit and our servers went down overnight while RHN dropped its bomb and I am frankly surprised there has not been more of an uproar about this."
The Courts

GPS Tracking Device Beats Radar Gun in Court 702

MojoKid writes "According to a release issued by Rocky Mountain Tracking, an 18-year old man, Shaun Malone, was able to successfully contest a speeding ticket in court using the data from a GPS device installed in his car. This wasn't just any old make-a-left-turn-100-feet-ahead-onto-Maple-Street GPS; this was a vehicle-tracking GPS device — the kind used by trucking fleets — or in this case, overprotective parents. The device was installed in Malone's car by his parents, and the press release makes no mention if the teenager knew that the device was installed in his vehicle at the time."

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...