Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Microsoft Announces Visual Studio 2015 Preview, Tool Upgrades To Azure, .NET

rjmarvin writes: Microsoft revealed Visual Studio, Visual Studio Online, Azure and .NET Framework updates http://sdtimes.com/microsoft-o... at a New York City developer event today. Public previews of Visual Studio 2015 and .NET 2015 are being made available today—along with new cross-platform Apache Cordova and Visual C++ tools in Visual Studio 2015—while .NET is going open source and cross-platform. The company also announced a free Community edition of Visual Studio, according to Microsoft corporate VP of the developer division Soma Somasegar.

Comment Re:Nokia Handsets Can Rise Again (Score 1) 67

I have totally different experience. Out of all modern mobile OS-es i like WP8.1 the most.

But damn, those Nokia phones can't satisfy my needs. I just don't like too large displays - 4" would be perfect. But i also want that amazing camera from Lumia 930...

So, alternative would be something like HTC 8x, but then i'm left without Nokia Here navigation...

Government

Senator Accuses CIA of Snooping On Intelligence Committee Computers 242

An anonymous reader writes "Sen. Feinstein, head of the Senate Intelligence Committee, publicly accused the CIA of inappropriately searching computers used by her committee, violating presidential directives, federal laws and the Fourth Amendment. The computers in question were provided by the CIA at an undisclosed CIA location for use by the members of the intelligence committee. When the committee staff received internal documents the CIA had not officially provided, the agency examined the computers used by the committee and removed the unauthorized documents. The action has been referred to the Justice Department for possible prosecution." There were rumors of such a few weeks ago, and now it's official. Read the transcript of her speech.
Privacy

Submission + - FBI compromises another remailer (google.com)

betterunixthanunix writes: "Another remailer has been compromised by the FBI, who made a forensic image of the hard disc of a remailer located in Austria. The remailer operator has reissued the remailer keys, but warns that messages previously sent through the remailer could be decrypted. The operator also warns that law enforcement agents had an opportunity to install a back door, and that a complete rebuild of the system will take some time."
Microsoft

Submission + - Asus working on Kinect Windows 8 laptop (winbeta.org)

An anonymous reader writes: New reports are appearing on the web today suggesting that Asus are working on a new laptop that will include Kinect gestures and will be compatible with Windows 8. What does this mean for the consumer? Portable gestures in Windows 8!
Security

DARPA Funding a $50 Drone-Droppable Spy Computer 86

Sparrowvsrevolution writes "At the Shmoocon security conference, researcher Brendan O'Connor plans to present the F-BOMB, or Falling or Ballistically-launched Object that Makes Backdoors. Built from just the disassembled hardware in a commercially-available PogoPlug mini-computer, a few tiny antennae, eight gigabytes of flash memory and some 3D-printed plastic casing, the F-BOMB serves as 3.5"-by-4"-by-1" spy computer. With a contract from DARPA, O'Connor has designed the cheap gadgets to be spy nodes, ready to be dropped from a drone, plugged inconspicuously into a wall socket, (one model impersonates a carbon monoxide detector) thrown over a barrier, or otherwise put into irretrievable positions to quietly collect data and send it back to the owner over any available Wi-Fi network. O'Connor built his prototypes with gear that added up to just $46 each, so sacrificing one for a single use is affordable."
Android

Submission + - Does Android Violate The GPL? Not So Fast (itworld.com)

jfruhlinger writes: "Patent gadfly Florian Mueller's latest post has made a fairly bold claim: that virtually all Android licensees are violating the GPL because of their failure to redistribute the code, and have thus lost their rights to redistribute Android. Mueller here is mostly promoting ideas put across by patent lawyer Edward J. Naughton. But others in the community are skeptical of the claims. Software Freedom Conservancy head Bradley Kuhn says he's never heard from Naughton. "Don't you think if he was really worried about getting a GPL or LGPL violation resolved, he'd contact the guy in the world most known for doing GPL enforcement and see if I could help?""

Submission + - False evidence in EU Apple vs Samsung case (webwereld.nl)

An anonymous reader writes: The Dutch webwereld.nl has found incorrect evidence submitted by Apple in the EU design-right case against Samsung. In the ex-parte case, a German judge has issued a temporary injunction against the sale of the Galaxy Tab 10.1 in the whole EU except the Netherlands.

The faulty evidence is a side-by-side picture of an iPad2 and the Galaxy Tab. The Tab is scaled to fit the iPad2, and the aspect ratio is changed from 1.46 to 1.36, closer matching the iPad2 aspect ratio of 1.3, according to webwereld.nl

On a side note: in the article, Florian Mueller is brought up to explain that this is probably an honest mistake by Apple.

Music

Submission + - Music Copyright War Looming (nytimes.com)

quarterbuck writes: When copyright law was revised in the mid-1970s, musicians, like creators of other works of art, were granted “termination rights,” which allow them to regain control of their work after 35 years, so long as they apply at least two years in advance. Recordings from 1978 are the first to fall under the purview of the law, but in a matter of months, hits from 1979, like “The Long Run” by the Eagles and “Bad Girls” by Donna Summer, will be in the same situation
Windows

Rootkit Infection Requires Windows Reinstall 510

CWmike writes "Microsoft is telling Windows users that they'll have to reinstall the OS if they get infected with a new rootkit. A new variant of a Trojan Microsoft calls Popureb digs so deeply into the system that the only way to eradicate it is to return Windows to its out-of-the-box configuration, Chun Feng, an engineer with the Microsoft Malware Protection Center (MMPC), said last week on the group's blog. 'If your system does get infected with Trojan:Win32/Popureb.E, we advise you to fix the MBR and then use a recovery CD to restore your system to a pre-infected state,' said Feng. A recovery disc returns Windows to its factory settings."

Slashdot Top Deals

To do nothing is to be nothing.

Working...