Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Power

Wind Power Is Cheaper Than Coal, Leaked Report Shows 610

merbs writes: A leaked report shows wind is the cheapest energy source in Europe, beating the presumably dirt-cheap coal and gas by a mile. Conventional wisdom holds that clean energy is more expensive than its fossil-fueled counterparts. Yet cost comparisons show that renewable energy sources are often cheaper than their carbon-heavy competition. The report (PDF) demonstrates that if you were to take into account mining, pollution, and adverse health impacts of coal and gas, wind power would be the cheapest source of energy.
Security

Password Security: Why the Horse Battery Staple Is Not Correct 549

First time accepted submitter Dadoo writes By now, everyone who reads Slashdot regularly has seen the XKCD comic discussing how to choose a more secure password, but at least one security researcher rejects that theory, asserting that password managers are the most important technology people can use to keep their accounts safe. He says, "In this post, I'm going to make the following arguments: 1) Choosing a password should be something you do very infrequently. 2) Our focus should be on protecting passwords against informed statistical attacks and not brute-force attacks. 3) When you do have to choose a password, one of the most important selection criteria should be how many other people have also chosen that same password. 4) One of the most impactful things that we can do as a security community is to change password strength meters and disallow the use of common passwords."
EU

Google Rejects 58% of "Right To Be Forgotten" Requests 144

gurps_npc writes CNN Money has a short, interesting piece on the results of Google implementing Europe's "Right to be Forgotten." They are denying most requests, particularly those made by convicted criminals, but are honoring the requests to remove salacious information — such as when a rape victim requested the article mentioning her by name be removed from searches for her name. "In evaluating a request, we will look at whether the results include outdated or inaccurate information about the person," Google said. "We'll also weigh whether or not there's a public interest in the information remaining in our search results -- for example, if it relates to financial scams, professional malpractice, criminal convictions or your public conduct as a government official."
Google

Ask Slashdot: Why Can't Google Block Spam In Gmail? 265

An anonymous reader writes Every day my gmail account receives 30-50 spam emails. Some of it is UCE, partially due to a couple dingbats with similar names who apparently think my gmail account belongs to them. The remainder looks to be spambot or Nigerian 419 email. I also run my own MX for my own domain, where I also receive a lot of spam. But with a combination of a couple DNSBL in my sendmail config, SpamAssassin, and procmail, almost none of it gets through to my inbox. In both cases there are rare false positives where a legit email ends up in my spam folder, or in the case of my MX, a spam email gets through to my Inbox, but these are rare occurrences. I'd think with all the Oompa Loompas at the Chocolate Factory that they could do a better job rejecting the obvious spam emails. If they did it would make checking for the occasional false positives in my spam folder a teeny bit easier. For anyone who's responsible for shunting Web-scale spam toward the fate it deserves, what factors go into the decision tree that might lead to so much spam getting through?
Privacy

The Correct Response To Photo Hack Victim-Blamers 622

Bennett Haselton writes As commenters continue to blame Jennifer Lawrence and other celebrities for allowing their nude photos to be stolen, there is only one rebuttal to the victim-blaming which actually makes sense: that for the celebrities taking their nude selfies, the probable benefits of their actions outweighed the probable negatives. Most of the other rebuttals being offered, are logically incoherent, and, as such, are not likely to change the minds of the victim-blamers. Read below to see what Bennett has to say.
Earth

Birth Control Pills Threaten Fish Stocks 147

BarbaraHudson writes Experimental research has shown that small amounts of estrogen in waste water can lead to rapid large-scale changes in fish populations. From the article: "The lead researcher of a new study is calling for improvements to some of Canada's waste water treatment facilities after finding that introducing the birth control pill in waterways created a chain reaction in a lake ecosystem that nearly wiped out a freshwater fish. 'Right away, the male fish started to respond to the estrogen exposure by producing egg yolk proteins and shortly after that they started to develop eggs,' she said in an interview from Saint John, N.B. 'They were being feminized.' Kidd said shortly after introducing the estrogen, the number of fathead minnow crashed, reducing numbers to just one per cent of the population. 'It was really unexpected that they would react so quickly and so dramatically,' she said. 'The crash in the population was very evident and very dramatic and very rapid and related directly to the estrogen addition.'" Estrogen pollution in waterways has been an issue for over a decade now.
Google

PETA Is Not Happy That Google Used a Camel To Get a Desert "StreetView" 367

First time accepted submitter flopwich writes Google used a camel-mounted camera to get a 'street view' of a stretch of desert in the United Arab Emirates. PETA's director Ingrid E. Newkirk is upset about it, saying they should have used jeeps. "These days, jeeps are in common use in the desert, as are light planes and even dune buggies, and satellite images could also easily have been taken instead," she said. "(Google) should leave camels out of its activites altogether."
Space

Hawking Radiation Mimicked In the Lab 66

Annanag writes *Nothing* escapes a black hole, right? Except 40 years ago Stephen Hawking threw a spanner in the works by suggesting that, courtesy of quantum mechanics, some light particles can actually break free of a black hole's massive pull. Then you have the tantalizing question of whether information can also escape, encoded in that so-called 'Hawking radiation'. The only problem being that no one has ever been able to detect Hawking radiation being emitted from a black hole. BUT a physicist has now come closer than ever before to creating an imitation of a black hole event horizon in the lab, opening up a potential avenue for investigating Hawking radiation and exploring how quantum mechanics and general relativity might be brought together.
China

China Bans "Human Flesh Searching" 109

hackingbear writes The Supreme People's Court, China's top court, has outlined the liabilities of network service providers in a document on the handling of online personal rights violation cases. "Rights violators usually hide in the dark online. They post harmful information out of the blue, and victims just can't be certain whom they should accuse when they want to bring the case to court," said Yao Hui, a senior SPC judge specializing in civil cases. Those re-posting content that violates others' rights and interests will also answer for their actions, and their liability will be determined based on the consequences of their posts, the online influence of re-posters, and whether they make untruthful changes to content that mislead. This essentially tries to ban the so-called human flesh searching. Though this does not stop others from using the chance to highlight the country's censorship problems even though the rulings seem to focus on personal privacy protection.
Government

Ex-NSA Director Keith Alexander's Investments In Tech Firms: "No Conflict" 59

Presto Vivace (882157) writes "No conflicts appear to exist" among Keith Alexander's investments, the NSA said. "New financial disclosure documents released this month by the National Security Agency (NSA) show that Keith Alexander, who served as its director from August 2005 until March 2014, had thousands of dollars of investments during his tenure in a handful of technology firms." Don't worry, the NSA assures us that there was no conflict of interest.
Security

How Poor Punctuation Can Break Windows 94

An anonymous reader writes with a report at Ars Technica about how a small bug can lead to a security problem. In this case, the problem is that quotation marks — or the lack of them — can be significant. From the Ars article: "The scenario... requires a 'standard' user with access rights to create a directory to a fileserver and an administrator executing a vulnerable script," Frank Lycops and Raf Cox, security researchers with The Security Factory, said in an e-mail interview. "This allows the attacker to gain the privileges of the user running the script, thus becoming an administrator." While the attack falls short of the severity of the Shellshock family of Linux shell vulnerabilities, the two researchers stressed that it's a good example of how untrusted input can be used to execute commands on a system. The researchers identified at least one popular script with the vulnerability. When the script attempts to set the starting directory for system administration work, it inadvertently runs the command appended to the malicious directory's name as well. ... The solution is to use proper coding practices—in this case, the judicious use of quotation marks. Quotation marks are used in the shell environment to make sure that the data inside the quotes is not interpreted by the program as a command.
China

Core Secrets: NSA Saboteurs In China and Germany 228

Advocatus Diaboli writes with this snippet from The Intercept: The National Security Agency has had agents in China, Germany, and South Korea working on programs that use "physical subversion" to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used under cover operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency's "core secrets" when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
Piracy

FBI Says It Will Hire No One Who Lies About Illegal Downloading 580

wabrandsma writes with this excerpt from The State Hornet, the student newspaper at Sacramento State On Monday, Sacramento State's Career Center welcomed the FBI for an informational on its paid internship program where applications are now being accepted. One of the highly discussed topics in the presentation was the list of potential traits that disqualify applicants. This list included failure to register with selective services, illegal drug use including steroids, criminal activity, default on student loans, falsifying information on an application and illegal downloading music, movies and books. FBI employee Steve Dupre explained how the FBI will ask people during interviews how many songs, movies and books they have downloaded because the FBI considers it to be stealing. During the first two phases of interviews, everything is recorded and then turned into a report. This report is then passed along to a polygraph technician to be used during the applicant's exam, which consists of a 55-page questionnaire. If an applicant is caught lying, they can no longer apply for an FBI agent position. (Left un-explored is whether polygraph testing is an effective way to catch lies.)
Medicine

Prosthetic Hand Capable of Delivering Texture Sensations 30

Zothecula writes: A new prosthetic system allows amputees to feel familiar sensations and also, somewhat unexpectedly, reduces their phantom pain. Researchers at Case Western Reserve University and the Louis Stokes Cleveland Veterans Affairs Medical Center developed the system to reactivate areas of the brain that produce the sense of touch, but recipients of prosthetic hands reported their phantom pain subsiding almost completely after being hooked up to the system.
The Internet

BitHammer, the BitTorrent Banhammer 429

michaelcole writes: Its name is BitHammer. It searches out and bans BitTorrent users on your local sub-net.

I'm a digital nomad. That means I travel and work, often using shared Wi-Fi. Over the last year, I've been plagued by rogue BitTorrent users who've crept onto these public hostpots either with a stolen/cracked password, or who lie right to my face (and the Wi-Fi owners) about it.

These users clog up the residential routers' connection tables, and make it impossible to use tools like SSH, or sometimes even web browsing. Stuck for a day, bullied from the Wi-Fi, I wrote BitHammer as a research project. It worked rather well. It's my first Python program. I hope you find it useful.

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...