Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Cellphones

iPhone 1.1.3 Update Confirmed, Breaks Apps and Unlocks 412

An anonymous reader writes "Gizmodo has gathered conclusive evidence which confirms that the iPhone Firmware 1.1.3 update is 100% real. It installs only from iTunes using the obligatory Apple private encryption key, which nobody has. The list of new features, like GPS-like triangulation positioning in Google Maps, has been confirmed too. Apparently it will be coming out next week, but there's bad news as expected: it breaks the unlocks, patches the previous vulnerabilities used by hackers and takes away all your third-party applications."
Communications

Email In the 18th Century 279

morphovar forwards a writeup in Low-tech Magazine recounting an almost-forgotten predecessor to email and packet-switched messaging: the optical telegraph. The article maps out some of the European networks but provides no details of those built in North America in the early 1800s. Man-in-the-middle attacks were dead easy. "More than 200 years ago it was already possible to send messages throughout Europe and America at the speed of an airplane — wireless and without need for electricity. The optical telegraph network consisted of a chain of towers ... placed 5 to 20 kilometers apart from each other. Every tower had a telegrapher, looking through a telescope at the previous tower in the chain. If the semaphore on that tower was put into a certain position, the telegrapher copied that symbol on his own tower. A message could be transmitted from Amsterdam to Venice in one hour's time. A few years before, a messenger on a horse would have needed at least a month's time to do the same."
OS X

Leopard as the New Vista? 734

ninja_assault_kitten writes "There's an interesting rant from Oliver Rist up on the PC Magazine site. He compares the catastrophe that is Vista to the recently released OS X Leopard. While clearly one is a lion and the other a cub, there do appear to be some frustrating similarities. From the article: 'A month of using Leopard with the same software I had under Tiger and the OS has dumped six times. That's six cold reboots for Oliver. Apple isn't even honest enough to admit that Leopard is crashing: The OS just grays out my desktop and pops up a dialog box telling me I've got to reboot. Like the whole thing is my fault. I even snapped a picture of it. After all, I HAD PLENTY OF CHANCES!'"
Biotech

Submission + - End to Stem Cell Harvesting Moral Debate In Sight 1

MikShapi writes: This Just In: Skin Cells can now be turned back to Stem Cells. A genetic modification to four genes using a viral vector reverses differentiating, making the cells revert to a stem cell state, capable for becoming any other cell in the body. Published in Cell and Nature by teams of researchers from the universities of Kyoto and Wisconsin, implications range from uprooting the moral justification for the GWB veto to expand funding for embryonic stem cell research, to an important step in the engineering roadmap to end (involuntary) aging. And, lest it go unmentioned, should this technique be adopted, stem cells will henceforth be abundant, easier and cheaper to come by for research and therapeutic purposes.
Biotech

Journal Journal: Scientists guide human skin cells to embryonic state

In a paper to be published Nov. 22 in the online edition of the journal Science , a team of University of Wisconsin-Madison researchers reports the genetic reprogramming of human skin cells to create cells indistinguishable from embryonic stem cells. The finding is not only a critical scientific accomplishment, but potentially remakes the tumultuous political and eth
Security

Submission + - Using Google to crack MD5 passwords. (lightbluetouchpaper.org) 2

stern writes: "A security researcher at Cambridge, trying to figure out the password used by somebody who had hacked his website, ran a dictionary through the encryption hash function. No dice. Then he pasted the hacker's encrypted password into Google, and Shazzam — the all-knowing Google delivered his answer. Conclusion? Use no password any other human being is ever likely to use for any purpose, I think."
Cellphones

Is Apple Tracking iPhone Users Through IMEI? 218

ariefwn writes ""As I sit here applying a new layer of Reynolds tin foil to my international hat of conspiracy, its been proven that Apple tracks iPhone usage and tracks IMEI numbers of all their iPhones worldwide. Hidden in the code of the 'Stocks' and 'Weather' widgets is a string that sends the IMEI of your phone to a specialized URL that Apple collects. I wonder if there will be any implications to owners of hacked iPhones..."
Power

The Nuclear Power Renaissance 927

Actual Reality writes "It is ironic to me that much of the same sentiment that thwarted the nuclear power industry back in the 80's is partially responsible for reviving it. Nuclear power is very clean compared to any power source that burns fuel. The US has missed several advancements in nuclear technology. We can only hope that environmental concerns will not again stifle our progress."
It's funny.  Laugh.

Evidence of Historical Zombie Attack at Hierakonpolis 244

sertsa writes "A tongue-in-cheek article just published by the Archaeological Institute of America hypothesizes that the formation of ancient Egypt is linked to recurrent Predynastic zombie attacks due to outbreaks of Solanum virus. 'From the very beginning of Predynastic research, Sir W.M. Flinders Petrie reported several headless, but seemingly intact, burials during his famous excavations at Naqada in 1895. Further excavations at Gerzeh and other sites revealed more of these curious burials, but no satisfactory explanation could be proposed at the time. More recently, excavations in the non-elite cemetery at Hierakonpolis (HK43), undertaken from 1996 to 2004, have uncovered more of these strange headless burials in addition to 21 individuals whose cervical vertebrae bear cut marks indicative of complete decapitation. The individuals include men and women ranging in age from 16 to 65. The number and the standard position of the cut marks (usually on the second-fourth cervical vertebrae; always from the front) indicate an effort far greater than that needed simply to cause the death of a normal (uninfected) person. The standard position also indicates these are not injuries sustained during normal warfare.'"
Privacy

The Implications of a Facebook Society 226

FloatsomNJetsom writes "The site Switched.com is taking a look at the slow death of privacy at the hands of social media sites such as Facebook and MySpace with a link to a report on the creepy practice of Facebook employees monitoring what pages you look at and a thought-provoking video interview with social media expert Clay Shirky — who says that social networks are profoundly changing our ability to keep our private lives private. 'Eventually, Shirky theorizes, society will have to create a space that's implicitly private even though it's technically public, not unlike a personal conversation held on a public street. Otherwise, our ability to keep our lives private will be forever destroyed. Of course, that might already be the case.'"
Security

Fake Codec is Mac OS X Trojan 473

Kenny A. writes "Multiple news organisations are reporting on an in-the-wild Mac OS X malware attack that uses porn lures to plant phishing Trojans on Mac machines. The attack site attempts to trick users into download a disk image (.dmg) file disguised as a codec that's required for viewing the video. If the Mac machine's browser is set to to open 'Safe' files after downloading, the .dmg gets mounted and the Installer is launched. The target must click through a series of screens to become infected but once the Trojan is installed, it has full control of the machine."
Security

OS X Leopard Firewall Flawed 300

cycoj writes with a report in the German IT magazine Heise, taking a look at the new OS X Leopard firewall. They find it flawed. When setting access to specific services and programs to only allow SSH access, for example, they found that a manually started service was still accessible. From the article: "So the first step after starting Leopard should be to activate the firewall. The obvious choice to do so is the option to 'Set access to specific services and programs,' which promises more control over network traffic. Mac OS X automatically enters all shared resources set up by the user, such as 'Remote login' for SSH servers, into the list of accessible resources... However, initial functional testing quickly dispels any feeling of improved security. A service started for testing purposes was able to be addressed from outside without any difficulty. The firewall records this occurrence... Even with the firewall set to 'Block all incoming connections' ports to netbios, ntp and other services were still open... Specifically these results mean that users can't rely on the firewall."

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...