Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Nice, but need more info (Score 1) 378

AT&T was supposed to release one(HTC Lancaster) at the end of July, but backed out with little fanfare. I dealt with a Blackberry with a non-working 0 for a month in order to get that one with my upgrade.... only to end up with another blackberry.

I wouldn't count on anything from AT&T until you can see it in the store.

Feed Science Daily: 'Killer Bees' Now Established In New Orleans (sciencedaily.com)

Africanized honeybees, 'killer bees' have been found in the New Orleans area since July of 2005, but the regularity and frequency of finding them there is new cause for concern. Another confirmed positive Africanized honeybee sample in the New Orleans area indicates the bees are most likely established there now, according to the Agriculture and Forestry Commissioner.

Feed Science Daily: Fire Ants Killing Baby Song Birds At High Rates (sciencedaily.com)

Red imported fire ants may be killing as many as a fifth of baby song birds before they leave the nest, according to new research. Of the nests where there was no pesticide treatment protecting the baby birds from fire ants, only 10 percent of the young birds fledged and were able to leave the nests. Of the treated nests 32 percent of the baby birds fledged.
Space

Opportunity Takes a Dip Into Victoria Crater 79

Muad'Dave writes "From the NASA News Release 'Today, NASA's Mars Exploration Rover Opportunity entered Victoria Crater for the first time. It radioed home information via a relay by NASA's Mars Odyssey orbiter, reporting its activities for the day. Opportunity drove far enough in — about four meters (13 feet) — to get all six wheels past the crater rim. Then it backed uphill for about three meters (10 feet). The driving commands for the day included a precaution for the rover to stop driving if its wheels were slipping more than 40 percent. Slippage exceeded that amount on the last step of the drive, so Opportunity stopped with its front pair of wheels still inside the crater.' This marks the beginning of perhaps the greatest 'Opportunity' for new discoveries on Mars."
Programming

Programmer's Language-Aware Spell Checker? 452

Jerry Asher writes "Not all of my coworkers are careful about spelling errors. Sometimes this causes real embarrassment as spelling errors creep into software interfaces. Does anyone know of spell checkers for programming languages? I don't want a text spell checker, I want a programming-language-aware spell checker. A spell checker that I can pass all of my code through and will flag spelling errors in function names, variable names, and comments, but will ignore language keywords, language constructs and expressions, and various programming styles (camel code, or underscores, or...). I want a spell checker that knows that void *functionSigniture(char *myRoutine) contains one spelling error. Does anyone have such a thing for Java or C++? Are there any Eclipse plugins that do this?"
Links

Submission + - The 10 Commandments for New Linux Users (linuxbraindump.org) 2

An anonymous reader writes: Thou shalt not log in as root. Use "sudo" or "su -" for administrative tasks. That's how it starts. The rest are at Linux Brain Dump. How does the Slashdot community feel about these commandments? Should new users adhere to these guidelines? Do you have other suggestions?
Programming

Submission + - AJAX-Solutions For Professional Coding: Reviewed (smashingmagazine.com)

Vitaly Friedman writes: Web-developers can create amazing web-applications with AJAX. Netvibes, GMail and dozens of further web-projects offer a new level of interactivity we've used to give up the idea of. Modern web-applications can be designed with enhanced user interfaces and functionalities, which used to be the privelege of professional desktop-applications. AJAX makes it possible to create more interactive, more responsive and more flexible web-solutions. The article 80+ AJAX-Solutions For Professional Coding presents over 90 useful AJAX-based techniques. Auto-completion, instant field editing, menus, calendars, interactive elements, visual effects, animation, basic javascripts, as well as an extensive develope's suite.
Security

Submission + - Someone Might Be Trying to Hack My Accounts

aplusjimages writes: I think I have someone trying to hack into my forum accounts that I have throughout the Internets. I've had 2 different forums email me that my account has been temporarily locked because someone has been trying, but failed to login to my account. Both forums have given me the IP Address 70.86.138.114. My question is what should I do about this? Both protection wise and possible retaliation wise. Thanks.
Hardware Hacking

Submission + - Flaws in ARM and XScale (and likely PowerPC)

V4Vendetta writes: Barnaby Jack developed a method for exploiting certain NULL pointer dereferences on the ARM and XScale architectures (and likely PowerPC).

In general, NULL pointer dereference flaws are considered non-exploitable. On the XScale and ARM architectures the memory address 0 is mapped, and also holds the exception vector table. The exception vector table is a set of branch instructions that correspond to different exceptions, such as software and hardware interrupts. When a case arises that writes to the 0 address with user-defined source data, it is possible to gain execution control by rewriting the exception table.

This method affects a lot of devices since most mobile phones and PDA are ARM based (iPhone?), and high-end routers often use the XScale architecture. The PowerPC architecture (used by Nintendo Wii, XBox360 and Playstation 3) also stores the vector table at a low address, and is likely vulnerable to this same attack.

This attack is more reliable than a remote stack overflow, due to the fact that no offsets are required. You will always be writing to address 0. The only data needed by an attacker is a copy of the vector table, which can be acquired by downloading and reversing the targets firmware. As embedded exploitation is still in its infancy, I don't foresee a worm in the very near future — but yes, if a worm was targeting embedded devices, this would be a reliable attack vector.
Patents

Submission + - Five Things Every Software Developer Should Know (saperlaw.com)

BBrown writes: Saper Law Offices, the same Chicago law firm that has been mentioned here twice before for their successes against the RIAA, has posted a blog article on the legal issues surrounding software development. The article, titled "Five Things Every Software Developer Should Know", gives a concise but informative legal tutorial on patents, trademarks, and trade secrets. Definitely a must-read for anybody involved in a small or personal business doing software development.
Enlightenment

Submission + - Father of scientific climatology says "hooey&#

An anonymous reader writes: "Reid Bryson, known as the father of scientific climatology, considers global warming a bunch of hooey.

The UW-Madison professor emeritus, who stands against the scientific consensus on this issue, is referred to as a global warming skeptic. But he is not skeptical that global warming exists, he is just doubtful that humans are the cause of it."

Bryson didn't see Al Gore's movie about global warming, "An Inconvenient Truth."

"Don't make me throw up," he said. "It is not science. It is not true."

http://www.madison.com/tct/mad/topstories/197613

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...