Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Rosetta is Awake. Prepares to Chase Comet (sciencemag.org)

sciencehabit writes: The European comet-chasing probe Rosetta is up and running again today after it successfully roused itself from a 2½-year sleep and signaled anxious controllers on the ground. The spacecraft had been put into hibernation during the most distant part of its 10-year journey in pursuit of comet 67 P/Churyumov-Gerasimenko because sunlight was too dim to keep its solar-powered systems running. Dozing in a slow stabilizing spin, Rosetta could not receive signals from the ground, so there was a risk that some problem might prevent it from responding to its preset alarm call at 10:00 GMT this morning. Even then, there were many processes to go through before news reached Earth: The spacecraft’s heaters would need to warm up its systems, its startrackers get a fix, boosters halt the spin, solar arrays turn towards the sun, and, finally, its communications antenna would need to point at Earth. It was not till 18.18 GMT today that the signal was picked up by NASA’s ground stations at Goldstone, California, and Canberra in Australia, and transmitted to the European Space Agency’s (ESA’s) control center at Darmstadt in Germany. “This was one alarm clock not to hit snooze on, and after a tense day we are absolutely delighted to have our spacecraft awake and back online,” Fred Jansen, ESA’s Rosetta mission manager, said in a statement.

Submission + - Legendary Demonoid BitTorrent Tracker Apparently Back Online (torrentfreak.com) 1

Freshly Exhumed writes: TorrentFreak has broken the news that after more than a year of downtime the Demonoid tracker came back online on January 9, 2014. The tracker is linked to nearly 400,000 torrent files and more than a million peers, which makes it one of the largest working BitTorrent trackers on the Internet. There is no word yet on when the site will make a full comeback, but the people behind it say they are working to revive one of the most famous file-sharing communities. As the single largest semi-private BitTorrent tracker that ever existed, Demonoid used to offer a home to millions of file-sharers. Note that this is apparently the original Demonoid and not the d2 site that claims to be using the Demonoid database.

Submission + - Researchers propose alternative way to allocate science funding (embo.org)

arobatino writes: From the article:

The new approach is possible due to recent advances in mathematics and computer technologies. The system involves giving all scientists an annual, unconditional fixed amount of funding to conduct their research. All funded scientists are, however, obliged to donate a fixed percentage of all of the funding that they previously received to other researchers. As a result, the funding circulates through the community, converging on researchers that are expected to make the best use of it. “Our alternative funding system is inspired by the mathematical models used to search the internet for relevant information,” said Bollen. “The decentralized funding model uses the wisdom of the entire scientific community to determine a fair distribution of funding.”


Submission + - Yahoo's Email Encryption Needs Work (itworld.com)

itwbennett writes: On Tuesday, Yahoo delivered on a promise that it made in October to enable email encryption for everyone by default by January 8. While this is a great step, the company's HTTPS implementation appears to be inconsistent across servers and even technically insecure in some cases, according to Ivan Ristic, director of application security research at security firm Qualys. For example, some of Yahoo's HTTPS email servers use RC4 as the preferred cipher with most clients. 'RC4 is considered weak, which is why we advise that people either don't use it, or if they feel they must, use it as a last resort,' Ristic said.

Submission + - North Carolina destroys historical records .. (wordpress.com)

An anonymous reader writes: North Carolina destroys historical records ..

on Friday, December 6, 2013, at 6:00 in the evening (after all the county workers had left, and with no notice to the local historical group involved in the project), a team from the North Carolina Archives swept in and confiscated ALL the materials – with the cover of Law Enforcement! They took the documents to the County Incinerator, and methodically burned EVERYTHING. They did this while a few locals stood by, not understanding why or precisely what was happening.

Comment Re:I'm sorry Senator, your question isn't valid (Score 1) 363

As we have stated previously, meta-data is NOT data

Except when companies want to release metadata such as the number of national security orders received, in which case this one integer is so sensitive that they are forced to drop the lowest 10 significant bits and only report it in bands of 1,000. It's safe to assume that the NSA gets to store all the bits in their integers.

Comment Re:And the opinon of the NY Times matters because? (Score 1) 354

If the NSA pays folks to play video games, they will most certainly also pay folks to troll Slashdot. The comment that you responded to above looks, smells, walks and talks like a government flak.

See Hanlon's Razor. There are more than enough mindless authoritarians in the general population willing to do this for free.

Submission + - Peakl Oil Threat Gone - Era of Cheap Biofuels finaly here?

Bodhammer writes: Pacific Northwest Nation Labs has developed a new technology that turns algae to crude in an hour. This press release http://www.pnnl.gov/news/release.aspx?id=1029 describes process and the partner they have selected for the pilot plant. The process is efficient and produces crude oil which can be traditionally refined, clean water, gas which can be burned or cleaned to make LNG, and nutrients that can go back into the process. Is this the end of the Peak Oil threat?

Submission + - NSA's Malware Heroics Questioned By Security Experts (informationweek.com)

CowboyRobot writes: The NSA helped foil a "nation state" that planned to launch a BIOS-bricking malware attack against the United States. That claim was delivered Sunday night in an 'Inside the NSA' segment on CBS's 60 Minutes that was partially filmed inside the intelligence agency's headquarters. The agency, of course, is struggling to repair its image — and stave off additional oversight or curtailing of its intelligence-gathering techniques — since documents leaked by former agency contractor Edward Snowden revealed how the NSA has created a massive digital dragnet that's been intercepting millions of Americans' communications and related tracking data. Industry analysts have said that the fallout from those revelations could cost technology businesses billions in lost revenue over the next few years. Miller's interviewees included NSA director Gen. Keith Alexander, who first approached CBS about doing the news segment. But Alexander relied on evasion and doublespeak when it came to addressing some of the NSA's more contentious practices, for example when responding to questions about whether the agency hacks into datacenters run by the likes of Google and Yahoo. "We do target terrorist communications. And terrorists use communications from Google, from Yahoo, and from other service providers. So our objective is to collect those communications no matter where they are."

Submission + - Edward Snowden's coworker refutes NSA claims (forbes.com)

wannabegeek2 writes: check for dupes.

in an article which purportedly was carefully verified, a former coworker states that the NSA's current PR blitz amounts to a smear campaign against Mr. Snowden. Further, he describes him as a genius among genius's, who was given the access he needed by the NSA, and did not need to steal or dupe his coworkers to obtain passwords to accomplish his task.

Submission + - Child 'training' book triggers backlash

mrspoonsi writes: BBC Reports: A child-raising book that advocates whipping with branches and belts has sold hundreds of thousands of copies to evangelical Christians. But the deaths of three children whose parents appear to have been influenced by the authors' teachings have provoked a growing backlash. The implements can vary. For a child under one year old, a willowy branch or a 1ft (30cm) ruler is recommended. For older children, a larger branch or a belt. But the objective of the "spanking" described in Michael and Debi Pearl's To Train Up a Child is the same — making children surrender completely to their parents' will. Like other people who have witnessed Michael Pearl's advice being put into practice, Hannah says her parents were seduced by the idea of a simple formula that would make their children compliant. "The problem is that [Pearl] tells you you have to break your children," she says. "And to get there you have to be completely ruthless." To Train Up a Child is widely seen as the most extreme of the publications produced by conservative Christians in the US who advocate corporal punishment.

Submission + - OpenSSH has a new cipher, chacha20-poly1305, from D.J. Bernstein!

ConstantineM writes: Inspired by a recent Google initiative to adopt ChaCha20 and Poly1305 for TLS, OpenSSH developer Damien Miller has added a similar protocol to ssh, chacha20-poly1305@openssh.com, which is based on D. J. Bernstein algorithms that are specifically optimised to provide the highest security at the lowest computational cost, and not require any special hardware at doing so. Some further details are in his blog, and at undeadly. The source code of the protocol is remarkably simple — less than 100 lines of code!

Submission + - Why Drone Package Delivery Will Be A Nightmare For Law Enforcement (forbes.com) 1

SonicSpike writes: Law enforcement may already be gritting its teeth over the idea of legal drone delivery. Being able to send things by drone could be hugely disruptive to the existing mail system: a peer-to-peer postal service that cuts out the USPS and FedEx. That’s fine when Amazon is shipping out books, but what about the kind of deliveries that law enforcement wants to be able to track? The existing postal system is full of surveillance.

If drones took off (heh) as a private way to send packages and letters over short or long distances, law enforcement would lose an important crime-fighting tool: their surveillance of the mail system. Much like electronic communication has gone “dark” thanks to encryption tools, the postal system could go “dark” thanks to private robot postmen.

This may sound far-fetched, but private, illicit drone deliveries are already happening. Last month, three men and a woman were caught smuggling tobacco into a Georgia prison. They used an Octocopter to do it. Unfortunately for them, their drone wasn’t an autonomous one and they had to crouch in the woods near the prison yard and watch the flight of their copter with binoculars. If it had been an autonomous drone, they may well have gotten away with the crime, and the smugglers wouldn’t be facing up to 20 years in their drone delivery zone for crossing prison guard lines with contraband.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...