Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Biotech

Fear Detector To Sniff Out Terrorists 342

Hugh Pickens writes "Evidence that the smell of fear is real was uncovered by US scientists last year who studied the underarm secretions of 20 terrified novice skydivers and found that people appear to respond unconsciously to the sweat smell of a frightened person. Now the Telegraph reports that researchers hope a 'fear detector' will make it possible to identify individuals at check points who are up to no good. 'The challenge lies in the characterization and identification of the specific chemical that gives away the signature of human fear, especially the fear in relation to criminal acts,' says Professor Tong Tun at City University London, who leads the team developing security sensor systems that can detect the human fear pheromone. The project will look at potential obstacles to the device, such as the effects of perfume and the variances in pheromone production and if the initial 18-month feasibility study is successful, the first detectors could be developed in the next two to three years. 'I do not see any particular reason why similar sensor techniques cannot be expanded to identify human smells by race, age or gender to build a profile of a criminal during or after an incident,' Tong added."
Encryption

Of Encrypted Hard Drives and "Evil Maids" 376

Schneier has a blog piece about Joanna Rutkowska's "evil maid" attack, demonstrated earlier this month against TrueCrypt. "The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. ... [A] likely scenario is that you leave your encrypted computer in your hotel room when you go out to dinner, and the maid sneaks in and installs the hacked bootloader. ... [P]eople who encrypt their hard drives, or partitions on their hard drives, have to realize that the encryption gives them less protection than they probably believe. It protects against someone confiscating or stealing their computer and then trying to get at the data. It does not protect against an attacker who has access to your computer over a period of time during which you use it, too."
Businesses

Avatars To Have Business Dress Codes By 2013 221

nk497 writes "With businesses increasingly using digital tech like virtual worlds and Twitter, their staff will have to be given guidelines on how they 'dress' their avatars, according to analysts. 'As the use of virtual environments for business purposes grows, enterprises need to understand how employees are using avatars in ways that might affect the enterprise or the enterprise's reputation,' said James Lundy, managing vice president at Gartner, in a statement. 'We advise establishing codes of behavior that apply in any circumstance when an employee is acting as a company representative, whether in a real or virtual environment.'"
Earth

Captain Bligh's Logbooks To Yield Climate Bounty 232

Pickens writes "The BBC reports that researchers are digitizing the captains' logs from the voyages of Charles Darwin on HMS Beagle, Captain Cook from HMS Discovery, Captain Bligh from The Bounty, and 300 other 18th and 19th century ships' logbooks to provide historical climate records for modern-day climate researchers who will use the meteorological data to build up a picture of weather patterns in the world at the beginning of the industrial era. The researchers are cross-referencing the data with historical records for crop failures, droughts and storms and will compare it with data for the modern era in order to predict similar events in the future. 'The observations from the logbooks on wind force and weather are astonishingly good and often better than modern logbooks,' says Climatologist Dr. Dennis Wheeler from the University of Sunderland. 'Of course the sailors had to be conscientious. The thought that you could hit a reef was a great incentive to get your observations absolutely right!' The logbooks will be online next year at the UK's National Archives."
Security

Schneier On Un-Authentication 336

Trailrunner7 writes "Bruce Schenier writes on Threatpost.com: 'In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you un-authenticate yourself? My home computer requires me to log out or turn my computer off when I want to un-authenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability.'"
Microsoft

Dell Says Re-Imaging HDs a Burden If Word Banned 376

N!NJA writes "In an amicus curiae brief filed on Aug. 24, Dell asked the judge overseeing the Eastern District Court of Texas to reconsider its order blocking sales of Word, part of the original ruling in favor of Canadian software developer i4i. In the worst case, the brief argued, the injunction should be delayed by 120 days. 'The District Court's injunction of Microsoft Word will have an impact far beyond Microsoft,' Dell and HP wrote. 'Microsoft Word is ubiquitous among word processing software and is included on [redacted] computers sold by Dell.' 'If Microsoft is required to ship a revised version of Word in Dell's computers, a change would need to be made to Dell's images,' Dell wrote. 'Making such a change would require extensive time- and resource- consuming testing.' An addendum to the brief notes that it was authored in Microsoft Word, part of Office 2003."
Google

Amazon, MS, Google Clouds Flop In Stress Tests 154

Eponymous writes "A seven month study by academics at the University of New South Wales has found that the response times of cloud compute services of Amazon, Google and Microsoft can vary by a factor of twenty depending on the time of day services are accessed. One of the lead researchers behind the stress tests reports that Amazon's EC2, Google's AppLogic and Microsoft's Azure cloud services have limitations in terms of data processing windows, response times and a lack of monitoring and reporting tools."

Comment Re:Hmm... (Score 1) 439

May I suggest you cancel your cable or satellite TV? You've already indicated your awareness that it is completely manufactured drivel. Mainstream media to real life is like Cramer is to investing -- not to be paid attention to and ideally not to be watched period.

Just turn the shit off and go do something outside.

Sci-Fi

Looking For a Link Between Sci-Fi UFOs and UFO Reports 202

NewsWatcher writes "The BBC has an interesting story about the link between sightings of UFOs and sci-fi films. From the article: 'Documents from the Ministry of Defence released by the National Archives show the department recorded 117 sightings in 1995 and 609 in 1996.' Those years correlate with the screening of the film Independence Day (1996) and when The X-Files was at the height of its popularity in the UK (1995). 'The more that alien life is covered in films or television documentaries, the more people look up at the sky and don't look down at their feet,' said an expert on UFO sightings based at Sheffield Hallam University."
Security

The iPhone SMS Hack Explained 94

GhostX9 writes "Tom's Hardware just interviewed Charlie Miller, the man behind the iPhone remote exploit hack and winner of Pwn2Own 2009. He explains the (now patched) bug in the iPhone which allowed him to remotely exploit the iPhone in detail, explaining how the string concatenation code was flawed. The most surprising thing was that the bug could be traced back to several previous generations of the iPhone OS (he stopped testing at version 2.2). He also talks about the failures of other devices, such as crashing HTC's Touch by sending a SMS with '%n' in the text."
Supercomputing

Can We Build a Human Brain Into a Microchip? 598

destinyland writes "Can we imprint the circuitry of the human brain onto a silicon chip? It requires a computational capacity of 36.8 petaflops — a thousand trillion floating point operations per second — but a team of European scientists has already simulated 200,000 neurons linked up by 50 million synaptic connections. And their brain-chip is scaleable, with plans to create a superchip mimicking 1 billion neurons and 10 trillion synapses. Unfortunately, the human brain has 22 billion neurons and 220 trillion synapses. Just remember Ray Kurzweil's argument: once a machine can achieve a human level of intelligence — it can also exceed it."

Will Mainstream Media Embrace Adblockers? 417

Blarkon writes "Slashdotters are aware of and often use Adblock Plus," and notes that "if newspapers wanted to hit the online content industry hard right now, they would be running non-stop information about how to obtain and use Adblock Plus.' That a scorched-earth approach to blocking Internet advertising through AdBlock Plus might collapse free online competitors by starving them of revenue. If more people are aware of Adblock plus, it will be more tempting for other browser manufacturers to include similar ad blocking functionality. Might Rupert Murdoch's apparent 'traffic killing' move to paywall content be a desperate gamble to avoid the impact of a future crash in the ad-supported online business model caused by everyone's browser including something like Adblock Plus?"
Encryption

Another New AES Attack 93

Jeremy A. Hansen writes "Bruce Schneier gives us an update on some ongoing cryptanalysis of AES. 'Over the past couple of months, there have been two new cryptanalysis papers on AES. The attacks presented in the paper are not practical — they're far too complex, they're related-key attacks, and they're against larger-key versions and not the 128-bit version that most implementations use — but they are impressive pieces of work all the same. This new attack, by Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir, is much more devastating. It is a completely practical attack against ten-round AES-256.' While ten-round AES-256 is not actually used anywhere, Schneier goes on to explain why this shakes some of the cryptology community's assumptions about the security margins of AES."

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...