Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption

BD+ Successfully Resealed 443

IamTheRealMike writes "A month on from the story that BD+ had been completely broken, it appears a new generation of BD+ programs has re-secured the system. A SlySoft developer now estimates February 2009 until support is available. There's a list of unrippable movies on the SlySoft forums; currently there are 16. Meanwhile, one of the open source VM developers seems to have given up on direct emulation attacks, and is now attempting to break the RSA algorithm itself. Back in March SlySoft confidently proclaimed BD+ was finished and said the worst case scenario was 3 months' work: apparently they underestimated the BD+ developers."
Transportation

Simple Device Claimed To Boost Fuel Efficiency By Up To 20% 674

Ponca City, We love you writes "Temple University physics professor Rongjia Tao has developed a simple device that could dramatically improve fuel efficiency in automobiles by as much as 20 percent. The device, attached to the fuel line of a car's engine near the fuel injector, creates an electric field that thins fuel, reducing its viscosity so that smaller droplets are injected into the engine. Because combustion starts at the droplet surface, smaller droplets lead to cleaner and more efficient combustion. Six months of road testing in a diesel-powered Mercedes-Benz automobile showed an increase from 32 miles per gallon to 38 mpg, a 20 percent boost, and a 12-15 percent gain in city driving. 'We expect the device will have wide applications on all types of internal combustion engines, present ones and future ones,' Tao wrote in the study published in Energy & Fuels. 'This discovery promises to significantly improve fuel efficiency in all types of internal combustion engine powered vehicles and at the same time will have far-reaching effects in reducing pollution of our environment,' says Larry F. Lemanski, Senior Vice President for Research and Strategic Initiatives at Temple."
The Internet

Former FBI Agent Calls for a Second Internet 486

An anonymous reader writes "Former FBI Agent Patrick J. Dempsey warns that the Internet has become a sanctuary for cyber criminals and the only way to rectify this is to create a second, more secure Internet. Dempsey explains that, in order to successfully fight cyber crime, law enforcement officials need to move much faster than average investigators and cooperate with international law enforcement officials. The problem is various legal systems are unprepared for the fight, which is why he claims we must change the structure of the Internet."

Comment Re:Wireless security (Score 1) 139

Am I the only one who's paranoid of entering my PayPal or CC info on an unencrypted public access point? I don't care if it's an AP ran by some mega-trusted corporation, the signal is still out there and anyone can get it.


Um, do you really enter your PayPal or CC info on a non-HTTPS connection? Because if you're on an HTTPS connection, there shouldn't be an issue. Your browser and the site itself have done a key exchange with RSA and are communicating with a very secure block cipher at that point. It doesn't matter whether the connection to the router is encrypted or not, since you've already got very strong encryption within the signal itself. If the signal is also encrypted with WEP or WPA, then you're doubly encrypted, at least for that first hop.
Book Reviews

The Symantec Guide To Home Internet Security 139

r3lody writes "There are many households that have high-speed Internet connections, yet most people are simply not doing enough to protect themselves from the many exploits that exist. The Symantec Guide to Home Internet Security by Andrew Conry-Murray and Vincent Weafer was written to speak to those people. Symantec Press is the publisher, yet it remains reasonably vendor-neutral. This book is for non-technical people. Its ten chapters cover a relatively slim 240 pages, so it should not intimidate someone who is not a computer professional. Also, you do not really have to read the book front-to-back, but you can focus in on the chapter or chapters that interest you and have fairly complete information." Read on for the rest of Ray's review.
Education

Science Text Attempts to Reconcile Religion and Science 1071

terrymaster69 writes "The New York Times reports that the National Academy of Sciences has just published their third book outlining guidelines for the teaching of evolution. 'But this volume is unusual, people who worked on it say, because it is intended specifically for the lay public and because it devotes much of its space to explaining the differences between science and religion, and asserting that acceptance of evolution does not require abandoning belief in God.'"
Privacy

Should Apple Give Back Replaced Disks? 446

theodp writes "As if having to pay $160 to replace a failed 80-GB drive wasn't bad enough, Dave Winer learned to his dismay that Apple had no intention of giving him back the disk he paid them to replace. Since it contained sensitive data like source code and account info, Dave rightly worries about what happens if the drive falls into the wrong hands. Which raises an important question: In an age of identity theft and other confidentiality concerns, is it time for Apple — and other computer manufacturers — to start following the practice of auto mechanics and give you the option of getting back disks that are replaced?"

IE 8 Passes Acid2 Test 555

notamicrosoftlover writes to tell us Channel9 is reporting that Internet Explorer 8 has correctly rendered the Acid2 page in "standards mode". "With respect to standards and interoperability, our goal in developing Internet Explorer 8 is to support the right set of standards with excellent implementations and do so without breaking the existing web. This second goal refers to the lessons we learned during IE 7. IE7's CSS improvements made IE more compliant with some standards and less compatible with some sites on the web as they were coded. Many sites and developers have done special work to work well with IE6, mostly as a result of the evolution of the web and standards since 2001 and the level of support in the various versions of IE that pre-date many standards. We have a responsibility to respect the work that sites have already done to work with IE. We must deliver improved standards support and backwards compatibility so that IE8 (1) continues to work with the billions of pages on the web today that already work in IE6 and IE7 and (2) makes the development of the next billion pages, in an interoperable way, much easier. We'll blog more, and learn more, about this during the IE8 beta cycle." There's also a video interview regarding IE8 development on Channel9."
Games

Electronic Arts Purchases BioWare, Pandemic 232

Kotaku is reporting that EA has purchased BioWare and Pandemic Studios, having offered some $620 million in cash to the Elevation Partners group to buy up VG Holding Corp. From the press release: "'We are truly excited by John Riccitiello's new vision for EA,' said Ray Muzyka, Co-founder and CEO of BioWare Corp. 'This vision is consistent with BioWare's focus on crafting the highest quality story-driven games in the world. It will enable us to further the careers of the passionate, creative and hard working teams at BioWare Edmonton and BioWare Austin.'"
Spam

Fight Spam With Nolisting 410

An anonymous reader writes with the technique of Nolisting, which fights spam by specifying a primary MX that is always unavailable. The page is an extensive FAQ and how-to guide that addressed the objections I immediately came up with. From the article: "It has been observed that when a domain has both a primary (high priority, low number) and a secondary (low priority, high number) MX record configured in DNS, overall SMTP connections will decrease when the primary MX is unavailable. This decrease is unexpected because RFC 2821 (Simple Mail Transfer Protocol) specifies that a client MUST try and retry each MX address in order, and SHOULD try at least two addresses. It turns out that nearly all violators of this specification exist for the purpose of sending spam or viruses. Nolisting takes advantage of this behavior by configuring a domain's primary MX record to use an IP address that does not have an active service listening on SMTP port 25. RFC-compliant clients will retry delivery to the secondary MX, which is configured to serve the role normally performed by the primary MX)."

Rootkit Could Hide In PCI Cards 134

Reverse Gear writes "SecurityFocus has an interesting article about a paper published on the possibility of hiding a rootkit in different PCI cards and having the rootkit survive a reboot or cleansing of the hard disk. It seems though that the author of the article doesn't think this would be abused frequently. From the article and paper: '(Because) enough people do not regularly apply security patches to Windows and do not run anti-virus software, there is little immediate need for malware authors to turn to these techniques as a means of deeper compromise.'"

Linux Users Banned From World of Warcraft? 515

Turmoyl writes "Many Cedega (formerly WINEX) users claim to have been mistakenly caught up in a security sweep of the U.S. game servers performed by Blizzard's World of Warcraft Game Master (GM) staff. Affected users received the same strongly-worded 'Notice of Account Closure' email messages that true bot users did, in which they were accused of the 'Use of Third Party Automation Software.' While diagnosis of this event continues early speculation points to Blizzard's use of the Warden anti-cheating spyware application that is bundled with World of Warcraft, and the odd things that may have been produced by it when it was run via Cedega. Emails to World of Warcraft's Account Administration staff continue to go unanswered while the list of affected people continues to grow."

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...