Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Mars

'Colonizing the Red Planet,' a How-To Guide 288

Velcroman1 writes "A manned mission to Mars would be the greatest adventure in the history of the human race. And one man knows how to make it a reality. In fact, he just wrote the book on it — literally. Joel Levine, senior research scientist with NASA's Langley Research Center and co-chair of NASA's Human Exploration of Mars Science Analysis Group, just published 'The Human Mission to Mars: Colonizing the Red Planet.' The book reads like a who's who of Mars mission science, featuring senators, astronauts, astrophysicists, geologists and more on getting to Mars, studying its atmosphere and climate, the psychological and medical effects on the crew and other details. The most interesting bit: Levine presents is a solution for funding the trip, something unprecedented for NASA: advertising. 'The suggestion is marketing to different corporations and professional sports leagues for advertising, which is something NASA never does.'"
Communications

'Zombie' Satellite Returns To Life 98

realperseus writes "The American telecommunications satellite Galaxy 15 has been brought under control after spending most of the year traversing the sky and wreaking havoc upon its neighbors. The satellite is currently at 98.5 degrees west longitude (from 133 west). An emergency patch was successfully uploaded, ensuring that the conditions which caused it to 'go rogue' will not occur again. Once diagnosis and testing have been completed, Intelsat plans to move the satellite back to 133 west."
Open Source

What Can a Lawyer Do For Open Source? 162

zolltron writes "I have a friend who went to law school. He really enjoyed intellectual property law, and he seems to genuinely regret that he didn't end up as an IP lawyer. But, what's done is done, and he's not going to radically change career trajectories now. But, I think he might be interested in volunteering a little of his time if there was an interesting project he could get behind. Computer folks are always trying to figure out how to get involved in open source even if it won't be their full time job. So, now I ask you Slashdot, how can my friend use his expertise to help an open source project?"
Security

Android Trojan Found, Spreading From Chinese App Stores 277

wiredmikey writes that researchers from Lookout Mobile have discovered a sophisticated Trojan targeting Android devices. "The company says the mobile malware is 'The most sophisticated Android malware we've seen to date. Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user's phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.' What makes the Trojan different from most 'standard' mobile malware is that Geinimi is being 'grafted' onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets."
Technology

Most Anticipated Tech Products of 2011 155

adeelarshad82 writes "2011 is just around the corner, and with the new year comes expectations. Based on hype and recent announcements, PCMag put together a list of twelve most anticipated tech products of 2011. Some are new, like the technology to bridge Wi-Fi, PowerLine, and Ethernet or the 3D camcorders, which will let you create content for your 3D TV. Others will just carry over from what we anticipated in 2010 but never materialized like iPhone on the Verizon network or Phones with dual core processors."
Hardware

The 10 Worst Tech Products of 2010 203

Barence writes "PC Pro has a count down of the ten worst tech gadgets of the year. Included in its hall of shame are: iPad Made Simple, 'a book containing 704 pages of advice on how to use a device that's universally acknowledged as being ridiculously easy to use'; the Dell Inspiron Duo, 'a tablet that leaves you longing to return to a keyboard and a touchpad'; and the £99 Next Tablet, the highlight of which was the 'eight-page Quick Start Guide.'"
Communications

Lessons Learned From Skype’s Outage 278

aabelro writes "On December 22th, 1600 GMT, the Skype services started to become unavailable, in the beginning for a small part of the users, then for more and more, until the network was down for about 24 hours. A week later, Lars Rabbe, CIO at Skype, explained what happened in a post-mortem analysis of the outage."
Security

The Significant Decline of Spam 263

Orome1 writes "In October Commtouch reported an 18% drop in global spam levels (comparing September and October). This was largely attributed to the closure of Spamit around the end of September. Spamit is the organization allegedly behind a fair percentage of the world's pharmacy spam. Analysis of the spam trends to date reveals a further drop in the amounts of spam sent during Q4 2010. December's daily average was around 30% less than September's. The average spam level for the quarter was 83% down from 88% in Q3 2010. The beginning of December saw a low of nearly 74%."
The Internet

Chinese Written Language To Dominate Internet 535

Zothecula writes "In the beginning, the language of the World Wide Web was English. Times change though, and the United States military's gift to civilization knows no national boundaries, and growing worldwide adoption of the internet has changed the audience make-up to such an extent that the dominant language of the internet is about to become Chinese. That's not to say the Chinese are all that comfortable with this either. There has just been an official decree requiring the use of Chinese translations for all English words and phrases in newspapers, magazines and web sites. While all countries have watched the unregulated global nature of the internet erode traditional cultural values and the integrity of national languages, it seems the Chinese powers-that-be have concluded that the purity of the Chinese language needs to be preserved."
Ubuntu

Ubuntu Powered Tablet Spotted! 169

dkd903 writes "The year 2010 had been all buzz with tablets and a similar trend is expected during the year 2011 too. We have already seen a lot of Android powered tablets. But how does a tablet powered by Ubuntu sound? A Chinese manufacturer TENQ has launched a tablet called P07. The device is said to be running Ubuntu 10.10 Netbook Edition and the boot time reported to be almost instant."
Open Source

Open Source After 12 Years 174

GMGruman writes "12 years ago, seven people in a room coined the term "open source" and launched what initially seemed like a quixotic exercise. Today, open source is mainstream, with original believers such as Red Hat worth billions and superpowers such as Oracle buying in. But open source has changed along the way, says InfoWorld's Peter Wayner, and may change more in coming years."
Security

4chan Has Been DDOSed 710

An anonymous reader writes "According to the 4chan status page all of the 4chan boards have been DDOSed and are down."
The Internet

After IPv4, How Will the Internet Function? 320

An anonymous reader writes "36 countries in the world have over 100% per-capita usage of mobile phones, and this is driving a real crunch on IPv4 addresses as more and more of these devices are data-capable. The mobile network operators are acting fast to deploy IPv6, and T-Mobile USA has had an IPv6-only trial going on for over 9 months now using NAT64 to bridge to IPv4 Internet content. It is interesting to note that the original plan for IPv6 transition, dual-stack, has failed since IPv4 addresses are effectively already exhausted for many people who want them. Dual-stack also causes many other issues and has forced the IETF to generate workarounds for end users called happy eyeballs (implying that eyeballs are not happy with dual-stack), and a big stink around DNS white-listing. How will you ensure that your network, users, and services continue to work in the address-fractured world of the future where some users have only IPv4 (AT&T ), some users have only IPv6 (mobile and machine-to-machine as well as developing countries), and other Internet nodes have both?"
Crime

Is Reading Spouse's E-Mail a Crime? 496

Hugh Pickens writes "The Detroit Free Press reports that Leon Walker is charged with unlawfully reading the e-mail of Ciara Walker, his wife at that time, which showed she was having an affair with her second husband, who once had been arrested for beating her in front of her son. Walker says he gave the e-mails to her first husband, the child's father, to protect the boy. 'I was doing what I had to do,' says Walker. 'We're talking about putting a child in danger.' Now prosecutors, relying on a Michigan statute typically used to prosecute crimes such as identity theft or stealing trade secrets, have charged Leon Walker with a felony for logging onto a laptop in the home he shared with his wife. Prosecutor Jessica Cooper defended her decision to charge Walker. 'The guy is a hacker,' says Cooper, adding that the Gmail account 'was password protected, he had wonderful skills, and was highly trained. Then he downloaded [the emails] and used them in a very contentious way.'"
Data Storage

What's the Oldest File You Can Restore? 498

turtleshadow writes "Now that it's almost 2011, a question for anyone who's kept backups since before the Y2K non-event: Have you personally/professionally had to recover something from 10+ years ago? If so, please share the interesting 'hows,' especially if you had to do multiple media transfers and file formats to get data into a usable file format on a modern hardware platform of your choice. Native solutions are rated higher than emulation. Also, what are your plans for recovering in 2021? Street cred goes to the oldest, most technical and complex restores ... that are of course successful. I'm working the night shift Christmas/New Year's; I ask everybody still stirring and hardcore SysOPs."

Slashdot Top Deals

Your computer account is overdrawn. Please reauthorize.

Working...