Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Microsoft

Submission + - Not One Microsoft Product On Kaspersky's Top 10 Vulnerabilities List 1

An anonymous reader writes: Security firm Kaspersky has released its latest IT Threat Evolution report. There were some interesting findings in the report, as always, but the most interesting thing that stuck out was all the way at the bottom: "Microsoft products no longer feature among the Top 10 products with vulnerabilities. This is because the automatic updates mechanism has now been well developed in recent versions of Windows OS."

Submission + - WW2 carrier pigeon and undecoded message found in chimney (bbc.co.uk)

BigBadBus writes: "The BBC is reporting that the remains of a World War 2 carrier pigeon were found during renovation of a chimney in England. What is interesting is that the pigeon's remains still had its message attached to the leg ring; even more interesting, this is the first recorded instance of a code being used rather than plain text. The successor to WW2 code-breaking HQ Bletchley Park, the GCHQ, is trying to decipher this unique code. Maybe a slashdot reader can beat them to it?"

Comment Why Privacy? (Score 5, Insightful) 190

Because a government that can search any person at any time can falsely incriminate anyone, and motives for doing so are abundantly self-evident.

"During a routine anti-terrorism sweep, civil liberties activist John Doe was found to be in possession of methamphetamine, child pornography, explosive-making material, and pirated ABBA songs. He was immediately taken into custody and is being held at an undisclosed location for the public's safety..."

Right now we have an important check in the form of a search warrant. Before searching me, a law enforcement agent must demonstrate to a judge probable cause that I have committed, or will commit, a crime. It's not perfect, and there are notable loopholes, but at least there is some documentation and accountability.

Transportation

Mammoth "Metal Moles" Tunnel Deep Beneath London 294

Hugh Pickens writes "BBC reports that the first of eight highly specialized Tunnel Boring Machines (TBM), each weighing nearly 1,000 tonnes, is being positioned at Royal Oak in west London where it will begin its slow journey east. It will carve out a new east-west underground link that will eventually run 73 miles from Maidenhead and Heathrow in the west, to Shenfield and Abbey Wood in the east. Described as 'voracious worms nibbling their way under London,' the 150-meter long machines will operate 24 hours a day and move through the earth at a rate of about 100m per week, taking three years to build a network of tunnels beneath the city's streets. Behind a 6.2-meter cutter head is a hydraulic arm. Massive chunks of earth are fed via a narrow-gauge railway along the interior of the machine, which is itself on wheels, as the machines are monitored from a surface control room which tracks their positions using GPS. Hydraulic rams at the front keep them within millimeters of their designated routes. 'It's not so much a machine as a mobile factory,' says Roy Slocombe, adding that the machine is staffed by a 20-strong 'tunnel gang' and comes with its own kitchen and toilet. Meanwhile, critics complain that the project is a peculiarly British example of how not to get big infrastructure schemes off the ground, because almost 30 years will have elapsed from its political conception in 1989 to its current projected completion date of 2018."

Comment Re:Actuarially, no. (Score 1) 676

The people who are ill are not the the problem. The people who are fine and think they can use a "free" service as much as they like are.

If only there were some way to dis-incentivize abuse of the system. Perhaps by attaching some sort of monetary cost to health care, in proportion to the level of labor and resources required to produce the service. But how would we determine the appropriate monetary cost? It's not like this sort of calculation happens invisibly and automatically.

Submission + - Iranian coder faces execution 'for building smut w (theregister.co.uk)

phands writes: "The Register is running a story from Amnesty International about the case of Saeed Malekpour, whose only crime was to write photo uploading software that was later used by pornographic websites without his permission. Malekpour, who has permanent residence status in Canada, has been in prison since he was arrested in October 2008 during a visit to see his terminally ill father. He is facing a death sentence.

If as many organisations as possible make this travesty public, there may be a chance to save a life."

Businesses

Submission + - How the US Lost Out on iPhone Work

Hugh Pickens writes writes: "Not long ago, Apple boasted that its products were made in America. Today, almost all of the 70 million iPhones, 30 million iPads and 59 million other products Apple sold last year manufactured overseas. "It isn’t just that workers are cheaper abroad," write Charles Duhig and Keith Bradsher. "Rather, Apple’s executives believe the vast scale of overseas factories as well as the flexibility, diligence and industrial skills of foreign workers have outpaced their American counterparts so much that “Made in the U.S.A.” is no longer a viable option for most Apple products." Apple executives say that going overseas, at this point, is their only option and recount the time Apple redesigned the iPhone’s screen at the last minute, forcing an assembly line overhaul. A foreman immediately roused 8,000 workers inside the company’s dormitories, each employee was given a biscuit and a cup of tea, guided to a workstation and within half an hour started a 12-hour shift fitting glass screens into beveled frames. Within 96 hours, the plant was producing over 10,000 iPhones a day. “The speed and flexibility is breathtaking,” says one Apple executive. “There’s no American plant that can match that.” Apple’s success has benefited the US economy by empowering entrepreneurs and creating jobs at companies like cellular providers and businesses shipping Apple products but ultimately, Apple executives say curing unemployment is not Apple's job. “We don’t have an obligation to solve America’s problems. Our only obligation is making the best product possible.”"
Crime

Submission + - Weaponizable Police UAV Now Operational in Texas (click2houston.com) 2

crackspackle writes: The Montgomery County Sheriff's Office in suburban Houston, Texas is preparing to launch operations with a newly received Vanguard Defense Industries Shadowhawk MK-III unmanned aerial vehicle, paid for by grant money received by the Department of Homeland Security. The MK-III is a product marketed for both military and law enforcement applications. Michael Buscher, chief executive officer of manufacturer Vanguard Defense Industries, said this is the first local law enforcement agency to buy one of his units. "The aircraft has the capability to have a number of different systems on board. Mostly, for law enforcement, we focus on what we call less lethal systems," he said, including Tazers that can send a jolt to a criminal on the ground or a gun that fires bean bags known as a "stun baton.You have a stun baton where you can actually engage somebody at altitude with the aircraft. A stun baton would essentially disable a suspect," he said. "To be in on the ground floor of this is pretty exciting for us here in Montgomery County," Sheriff Tommy Gage said. The MK-III also has more lethal options available, capable of carrying either a 40mm or 37mm grenade launcher or 12 gauge shotgun with laser designator. Sheriff Gage has stated he has no immediate plans to outfit his drone with weapons.
Android

RMS: 'Is Android Really Free Software?' 433

An anonymous reader points out an article by Richard Stallman in The Guardian which questions whether Android should be described as 'free' or 'open.' Quoting: "Google has complied with the requirements of the GNU General Public License for Linux, but the Apache license on the rest of Android does not require source release. Google has said it will never publish the source code of Android 3.0 (aside from Linux), even though executables have been released to the public. Android 3.1 source code is also being withheld. Thus, Android 3, apart from Linux, is non-free software, pure and simple. ... Android is a major step towards an ethical, user-controlled, free-software portable phone, but there is a long way to go. Hackers are working on Replicant, but it's a big job to support a new phone model, and there remains the problem of the firmware. Even though the Android phones of today are considerably less bad than Apple or Windows smartphones, they cannot be said to respect your freedom."
Medicine

Magnetic Nanoparticles Fry Tumors 111

sciencehabit writes "In a new study, a team found that injecting mice with tiny magnets and cranking up the heat eliminated tumors from the animals' bodies with no apparent side effects. The nanoparticles heat up when a magnetic field is applied, and because they are only injected into tumors, only cancerous cells get fried. Researchers hope the technique, known as magnetic hyperthermia, could be used in cancer patients, obviating the need for chemotherapy and radiation."
Government

US Pressing Its Crackdown Against Leaks 213

NotSanguine writes with this quote from a NY Times article: "The Justice Department shows no sign of rethinking its campaign to punish unauthorized disclosures to the news media, with five criminal cases so far under President Obama, compared with three under all previous presidents combined. This week, a grand jury in Virginia heard testimony in a continuing investigation of WikiLeaks, the antisecrecy group, a rare effort to prosecute those who publish secrets, rather than those who leak them. The string of cases reflects a broad belief across two administrations and in both parties in Congress that leaks have gotten out of hand, endangering intelligence agents and exposing American spying methods."
Crime

25% of US Hackers Are FBI/CIA Informers 185

An anonymous reader writes "The Guardian reports that the FBI and CIA have 'persuaded' up to 25% of US hackers to 'work' for them. 'In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars. ... The best-known example of the phenomenon is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, who is suspected of passing secret documents to WikiLeaks.' What implications does this hold for privacy? Or is it just good work by the authorities?" As you may have guessed, the estimate appears to be based only on the number of black hats, rather than all hackers.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...