Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Spam

Submission + - Following the Search Spam Money Trail

Wormwood writes: Researchers at Microsoft have come up with a system to track the money that flows from big-name advertisers to search engine spammers. The methodology, created in partnership with the University of California, Davis, has already uncovered a complex scheme where a small group using false doorway pages are able to profit by redirecting traffic passed from search engines in one direction and then sending advertisements acquired from syndicators in the opposite direction.
Graphics

Submission + - How far would you all go with geek body art?

Kranfer writes: "Recently I got myself a nice tattoo of the logo to the United Federation of the Planets pic here and I was thinking to myself... I wonder how many other programmers/admins/tech folks out there went as far as to put symbols of geek culture permanently onto their bodies. Personally, I love Star Trek, so this tattoo was quite natural, however I have been thinking of getting Tux The Penguin on my other arm. So here I am asking all you slashdotters to share your inking experiences of geek culture. What do you have? Have you had any good/experiences from having them?"
Microsoft

Submission + - Thousands sign e-petition on rip-off Vista

CoolWolf writes: CustomPC News, Monday 26th February 2007
Thousands sign e-petition on rip-off Vista http://www.pcpro.co.uk/custompc/news/106025/thousa nds-sign-epetition-on-ripoff-vista.html

Petition info and link:
We the undersigned petition the Prime Minister to bring pressure on Microsoft to stop them overcharging the UK for its Vista Operating System.
Submitted by Paul Milne — Deadline to sign up by: 20 April 2007 — Signatures: 8,051
http://petitions.pm.gov.uk/VistaOvercharge/
Biotech

Submission + - Microfluidic bubble logic

Renckens writes: "The fine scientists from MIT have proposed an alternative to the electronic circuit using bubbles in microfluidics. Bubble logic AND/OR/NOT gates, as well as more advanced structures, have been demonstrated, allowing for Boolean logic through use of bubbles on chip. On lab-on-a-chip devices, this means that droplets of chemicals can now carry binary information as well as their chemical payload. This will allow the addition of a whole new toolset to the already impressive range of possibilities for biotechnological analysis. The stroy from MIT newsflash can be found in the url below. More interested users are referred to the full publication in Science: M. Prakash et al. — Science 315 p832 (2007).

http://web.mit.edu/newsoffice/2007/bubbles.html"
Censorship

Submission + - Ban from blogging due to "electronic missiles&

An anonymous reader writes: Web 2.0 news site 901am reports that Australian Olympic Athletes will be banned from Blogging at the 2008 Beijing Summer Olympics due to the risk that they may launch "electronic missiles". Australian Olympic Committee spokesman Craig Phillips said that Blogging would erode the sanctuary of the Olympic village and that athletes blogging would undermine team spirit.
Graphics

Submission + - Pop culture, art meet grandma hobby

Cybris writes: "Quilt parties are being upgraded for the 21st century: contemporary pop culture references and works inspired by well-known artists like Escher, Giger and Dali are meshed together in a collaborative art effort on OnlineQuilt.net. From Anime mecha to Smurfs, from Moebius strips to thick jungle, amateur artists combine their skills to create surrealistic art — even entering the third dimension in zooming quilts. This ain't your grandma's quilting bee... Giger Landscape and The Incredible Machine are some amazing finished works."
Hardware Hacking

Submission + - Study: Hackers Strike Every 39 seconds.

Jimness writes: "From Science Daily Web Site. www.sciencedaily.com

COLLEGE PARK, Md., Feb. 8 (UPI) — A U.S. study suggests computer hackers try to gain access to computers every 39 seconds.

University of Maryland researchers say their study is one of the first to quantify the near-constant rate of computer hacker attacks.

Assistant Professor Michel Cukier and two of his graduate students, Daniel Ramsbrock and Robin Berthier, set up four Linux computers with weak security and then recorded hacker attacks. "The computers in our study were attacked, on average, 2,244 times a day," said Cukier.

They discovered the vast majority of attacks came from relatively unsophisticated hackers using "dictionary scripts" — a type of software that runs through lists of common usernames and passwords while attempting to break into a computer.

"Root" was the top username guess, attempted 12 times as often as the second-place "admin." Successful "root" access would open the entire computer to the hacker, while "admin" would grant access to somewhat lesser administrative privileges. Other top usernames in the hackers' scripts were "test," "guest," "info," "adm," "mysql," "user," "administrator" and "oracle."

The username followed by "123" was the second most-tried choice. Other common passwords attempted included "123456," "password," "1234," "123," "test," and "1.""
Google

Submission + - Google Embarrassed in Australia

geek007 writes: Reporters at a Sydney, Australia newspaper discovered an embarrassing flaw in Google's Map product — Google recommends a 10.4 kilometer trip, across the harbor and back, to go the thirty steps from Google's Sydney headquarters to a hotel located across the street. The suggested route would also include a AU$3 bridge toll. Any query for driving directions from areas east, south or west of Google's headquarters will suggest the same detour across the harbor, using a toll tunnel or bridge. Google is blaming MapData Sciences, the Sydney-based company that supplies the mapping data to Google, for the problem. I imagine MapData is working on a fix rather urgently.
Media (Apple)

Submission + - The 10 worst things about Apple

Fine Line writes: What's the worst thing about Apple? This silicon.com article can't decide between the Mac maker's myriad crimes so it's come up with a list of 10 horrors — including the iPod (guilty of: battery defects, cracked screens and generally being a bit 'naff' now); the iPhone (it screams style over substance!); lunatic Mac fans who threaten to eat their firstborn if anyone dares suggest Steve Jobs is getting a little over-excited now; and Apple's so-called FairPlay DRM system. Perhaps Jobs was listening to the last point however — since the Cupertino CEO has just penned an open letter calling for record companies to unfetter the masses from the evils of digital rights management — which surely means Jobs has finally achieved that elusive godhood.
The Internet

Submission + - Keith Urban Sues Keith Urban Over Domain Name

An anonymous reader writes: Australian country singer Keith Urban has filed a lawsuit against a US painter of the same name, claiming that the lesser known Keith Urban's website KeithUrban.com infringes trademark and cyber-squatting laws.

The Australian singer's own website is located at KeithUrban.net. He wants the other website to be shut down and its domain name transferred to his ownership. He also seeks unspecified monetary damages.

http://www.dailydomainer.com/200759-keith-urban-su es-keith-urban-over-domain-name.html
Operating Systems

Submission + - Linux vs. Windows System Calls Graphed

cgrayson writes: "On Richard Stiennon's blog on ZDNet, a post titled Why Windows is less secure than Linux shows an interesting graphical comparison between system calls on Linux and Windows.

In its long evolution, Windows has grown so complicated that it is harder to secure. Well these images make the point very well. Both images are a complete map of the system calls that occur when a web server serves up a single page of html with a single picture.
"
Privacy

Submission + - UK Propose Registering Screen Names with Police

Oxygen99 writes: "In a series of kneejerk suggestions following this case, the UK Home Secretary, Dr John Reid has suggested that offenders on the Sex Offenders Register should register their online identities with the police. According to a home office spokesman this means that offenders, "online identities would be treated in exactly the same way as their real name". So, just how misguided is this and who's going to be the first to tell him?"

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...