Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Cellphones

Windows Phone 7 Marketplace Hack Demonstrated 89

broggyr writes "Seems it didn't take long to hack the Windows Phone 7 marketplace. Quoting WPCentral: 'For developers, the weakness in Microsoft's DRM for Windows Phone 7 applications has been well known for quite some time, and there have been calls for Microsoft to address these concerns ... Since then, a "white hat" developer has provided WPCentral with a proof-of-concept program that can successfully pull any application from the Marketplace, remove the security and deploy to an unlocked Windows Phone with literally a push of a button. Alternatively, you could just save the cracked XAP file to your hard drive. Neither the app nor the methodology is public, and it will NOT be released ... It is important to note that this was all done within six hours by one developer.'"
Google

Beware of Using Google Or OpenDNS For iTunes 348

Relayman writes "Joe Mailer wanted to download an iTunes movie recently and his Apple TV told him it would take two hours. When he switched his DNS resolver settings, the download time dropped to less than 20 seconds. Apparently, iTunes content is served by Akamai which uses geolocation based on the IP address of the DNS request to determine which server should provide his content. When you use Google or OpenDNS to resolve the Apple domain name, all the requests to Akamai appear to be coming from the same location and they're all directed to the same server pool, overloading that pool and causing the slow downloads. The solution: be wary of using Google or OpenDNS when downloading iTunes files or similar large files. Use your own ISP's DNS servers instead or run your own resolving DNS server."
Education

Cheaters Exposed Analyzing Statistical Anomalies 437

Hugh Pickens writes "Proctors and teachers can't watch everyone while they take tests — not when some students can text with their phones in their pockets, so with tests increasingly important in education — used to determine graduation, graduate school admission, and — the latest — merit pay and tenure for teachers, Trip Gabriel writes that schools are turning to 'data forensics' to catch cheaters, searching for data anomalies where the chances of random agreement are astronomical. In addition to looking for copying, statisticians hunt for illogical patterns, like test-takers who did better on harder questions than easy ones, a sign of advance knowledge of part of a test or look for unusually large score gains from a previous test by a student or class. Since Caveon Test Security, whose clients have included the College Board, the Law School Admission Council, and more than a dozen states and big city school districts, began working for the state of Mississippi in 2006, cheating has declined about 70 percent, says James Mason, director of the State Department of Education's Office of Student Assessment. 'People know that if you cheat there is an extremely high chance you're going to get caught,' says Mason."
The Internet

Chinese Written Language To Dominate Internet 535

Zothecula writes "In the beginning, the language of the World Wide Web was English. Times change though, and the United States military's gift to civilization knows no national boundaries, and growing worldwide adoption of the internet has changed the audience make-up to such an extent that the dominant language of the internet is about to become Chinese. That's not to say the Chinese are all that comfortable with this either. There has just been an official decree requiring the use of Chinese translations for all English words and phrases in newspapers, magazines and web sites. While all countries have watched the unregulated global nature of the internet erode traditional cultural values and the integrity of national languages, it seems the Chinese powers-that-be have concluded that the purity of the Chinese language needs to be preserved."
Movies

Tron: Legacy — Too Much Imagination Required? 429

MoldySpore writes "Stepping back from the positive and negative reviews of the new Tron sequel, Tron: Legacy (which has so far amassed over $111,000,000 world-wide), something occurred to me after seeing the movie and reading the numerous reviews. It seems many of the reviews, and perhaps the reviewers themselves, can be split into two categories: those who saw the original Tron when it came out and can put the new movie in context, and those who either watched Tron recently to prepare for the sequel or never saw it and jumped right into the new movie." Read on for the rest of MoldySpore's thoughts.
Security

Auditors Question TSA's Tech Spending, Security Solutions 239

Frosty P writes "Government auditors have faulted the TSA and its parent agency, the Department of Homeland Security, for failing to properly test and evaluate technology before spending money on it. The TSA spent about $36 million on devices that puffed air on travelers to 'sniff' them out for explosives residue. All 207 of those machines ended up in warehouses, abandoned as unable to perform as advertised, deployed in many airports before the TSA had fully tested them. Since it was founded in 2001, the TSA has spent roughly $14 billion in more than 20,900 transactions with dozens of contractors, including $8 billion for the famous new body scanners that have recently come under scrutiny for being unable to perform the task for which they are advertised. 'TSA has an obsession of finding a single box that will solve all its problems. They've spent and wasted money looking for that one box, and there is no such solution,' said John Huey, an airport security expert."
Earth

African Villages Glow With Renewable Energy 172

Peace Corps Online writes "The NY Times reports that as small-scale renewable energy becomes cheaper, more reliable and more efficient, it is providing the first drops of modern power to people who live far from slow-growing electricity grids and fuel pipelines in developing countries playing an epic, transformative role. With the advent of cheap solar panels and high-efficiency LED lights, which can light a room with just 4 watts of power instead of 60, these small solar systems now deliver useful electricity at a price that even the poor can afford. 'You're seeing herders in Inner Mongolia with solar cells on top of their yurts,' says energy adviser Dana Younger. In addition to small solar projects, renewable energy technologies designed for the poor include simple subterranean biogas chambers that make fuel and electricity from the manure of a few cows, and 'mini' hydroelectric dams that can harness the power of a local river for an entire village. 'It's a phenomenon that's sweeping the world; a huge number of these systems are being installed,' says Younger."
Crime

Is Reading Spouse's E-Mail a Crime? 496

Hugh Pickens writes "The Detroit Free Press reports that Leon Walker is charged with unlawfully reading the e-mail of Ciara Walker, his wife at that time, which showed she was having an affair with her second husband, who once had been arrested for beating her in front of her son. Walker says he gave the e-mails to her first husband, the child's father, to protect the boy. 'I was doing what I had to do,' says Walker. 'We're talking about putting a child in danger.' Now prosecutors, relying on a Michigan statute typically used to prosecute crimes such as identity theft or stealing trade secrets, have charged Leon Walker with a felony for logging onto a laptop in the home he shared with his wife. Prosecutor Jessica Cooper defended her decision to charge Walker. 'The guy is a hacker,' says Cooper, adding that the Gmail account 'was password protected, he had wonderful skills, and was highly trained. Then he downloaded [the emails] and used them in a very contentious way.'"
Censorship

UK Banks Attempt To Censor Academic Publication 162

An anonymous reader writes "Representatives of the UK banking industry have sent a take-down notice (PDF link) to Cambridge University, demanding that they censor a student's webpage as well as his masters thesis (PDF). The banks' objection is that the information contained in the report might be used to exploit a vulnerability in the Chip and PIN system, used throughout Europe and Canada for credit and debit card payments. The system was revealed to be fundamentally flawed earlier this year, as it allowed criminals to use a stolen card with any PIN. Cambridge University has resisted the demands and has sent a response to the bankers explaining why they will keep the page online."
Bug

Problems With Truncation On the Common Application 135

jaroslav writes "A combination of rigid caps on space and poor documentation of the space limits is adding stress on students applying for college using the Common Application, the New York Times reports. The story explains that the application lists word limits for questions, but actually enforces space limits. As a result, an answer with wide characters, such as 'w' or 'm,' may run over space even without reaching the stated word limit. It is not explained why an electronic submission must have such strictly enforced limits."
GUI

10 Dos and Don'ts To Make Sysadmins' Lives Easier 246

CowboyRobot writes "Tom Limoncelli has a piece in 'Queue' summarizing the Computer-Human Interaction for Management of Information Technology's list of how to make software that is easy to install, maintain, and upgrade. FTA: '#2. DON'T make the administrative interface a GUI. System administrators need a command-line tool for constructing repeatable processes. Procedures are best documented by providing commands that we can copy and paste from the procedure document to the command line.'"
Science

The Tipping Point of Humanness 272

sciencehabit writes "Robert Zemeckis, take note. Using videos that morph the face of a baby or man into a doll, researchers have figured out at what point we stop considering a face human — and start considering it artificial. The ability, the researchers say, is key to our survival, enabling us to quickly determine whether the eyes we're looking at have a mind behind them. It may also explain why so many people hated The Polar Express."
Censorship

Spanish Congress Rejects Internet Censorship Law 229

TuringTest writes "A commission of the Spanish Congress has rejected a law that allowed the closure of web sites that provide unauthorized downloads. The government couldn't reach enough support from its allies, not because they opposed the law in principle, but because of the way it was redacted and the lack of negotiation. Recently the Spanish Senate rejected a law on net neutrality. Also the Wikileaks cables disclosed pressure from the USA on the Spanish government to pass a law to reduce Internet sharing of music and media, which is legal in Spain."
Piracy

RIAA, MPAA Recruit MasterCard As Internet Police 421

An anonymous reader writes "Two weeks ago, MasterCard felt the wrath of Anonymous Operation Payback-style DDoS attacks after refusing to process payments that were intended to fund WikiLeaks, the website which began leaking confidential US diplomatic cables last month. Now, the company is preparing to head down another controversial path by pledging to deny transactions which support websites that host pirated movies, music, games, or other copyrighted content. MasterCard lobbyists have also been in talks with entertainment industry trade groups, including the RIAA and the MPAA, and have made it clear that the company will support the Combating Online Infringement and Counterfeits Act (COICA), sources close to the talks have said."
Patents

Kodak's Patent Spat Threatens Photo Web Sites 171

Alain Williams writes "According to the BBC: 'Kodak claimed it owns patents regarding the display of online images that is being infringed by Shutterfly. The photo-sharing site disputes these claims and has launched a counter suit. But the landmark case could have ramifications for other popular online photo sites such as Yahoo's Flickr and Google's Picasa.'"

Slashdot Top Deals

Thus spake the master programmer: "Time for you to leave." -- Geoffrey James, "The Tao of Programming"

Working...