Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Oh, look! (Score 1) 888

I find it quite logical... sending 200000 soldiers to war, and if 5000 die, that is indeed a "minimal" casualty rate.
Deaths resulting from terrorism, are all unacceptable, where 10 people dying is a large number and anything more than 100 can be termed a huge number of deaths, simply because the lowest "acceptable" level of casualty in terrorist attacks is zero.

Comment Organic only means carbon based and nothing more (Score 1) 141

The logic jump from there being possible organic matter on the moon, to the near-assumption that this organic matter is life-based or life-supporting was apparently made by the writer of the original article http://www.dnaindia.com/scitech/report_indian-scientists-detect-signs-of-life-on-moon_1322785

While a lay person such as the reporter may claim ignorance of the difference between "carbon-based matter" and "carbon-based matter that supports or has come from live organisms", I am truly surprised at just how many non-humorous posts we have here on /. about life in space/on the moon/new intelligences etc.

Security

Hackers Find Remote iPhone Crack 114

Al writes "Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas." The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.

Comment Re:How hard is it for a computer to do addition? (Score 1) 239

As stated by the GP, the "desire" for association is an auditing requirement and not really a personal request of the voter.

If you had access to the vote db such that you could take my unique identifier and associate it with my vote, would any kind of system be able to stop you from doing that? Your point has merit, but it is far from the current discussion.

Comment Re:How hard is it for a computer to do addition? (Score 1) 239

It's quite simple really.

Voting machine shows UI requesting the user's (voter's) vote. User chooses candidate. Voting machine registers an additional vote for user's candidate into the votes table. This vote is assigned a unique identifier. This identifier is printed onto a paper receipt which is provided to the voter. This can be later used to confirm that user's vote for candidate A was indeed registered for candidate A.

Just how hard is that?

Earth

Antarctic Ice Bridge Finally Breaks Off 505

GreennMann writes "An ice bridge linking a shelf of ice the size of Jamaica to two islands in Antarctica has snapped. Scientists say the collapse could mean the Wilkins Ice Shelf is on the brink of breaking away, and provides further evidence of rapid change in the region. Sited on the western side of the Antarctic Peninsula, the Wilkins shelf has been retreating since the 1990s. Researchers regarded the ice bridge as an important barrier, holding the remnant shelf structure in place. Its removal will allow ice to move more freely between Charcot and Latady islands, into the open ocean."

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...