Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - NASA funded study states people could be on the moon by 2021 for $10 billion (examiner.com)

MarkWhittington writes: The Houston Chronicle reported that NextGen Space LLC has released the results of a study that suggests that if the United States were to choose to do space in some new and creative ways, American moon boots could be on the lunar surface by 2021. The cost from the authorization to the first crewed lunar landing would be just $10 billion. The study was partly funded by NASA and was reviewed by the space agency and commercial space experts.

Submission + - Critical vulnerability in all windows versions allowing remote code execution (microsoft.com)

QuantumReality writes: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Technology

Gun-Firing Drone Raises Some Eyebrows 216

An anonymous reader writes: A video posted on YouTube showing a drone firing a gun in a wooded area has caused some controversy today. The short video shows a four-rotored custom drone with a special rig containing a handgun. The handgun proceeds to fire four shots, handling the recoil better than might be expected. The user who posted the video also submitted it to Reddit, where a commenter noted that the apparent use of a solenoid trigger would class the device as an automatic weapon under ATF rules.

Submission + - US Government detained Laura Poitras every time she flew .. (techdirt.com) 1

An anonymous reader writes: Since the 2006 release of “My Country, My Country,” Poitras has left and re-entered the U.S. roughly 40 times. Virtually every time during that six-year-period that she has returned to the U.S., her plane has been met by DHS agents who stand at the airplane door or tarmac and inspect the passports of every de-planing passenger until they find her (on the handful of occasions where they did not meet her at the plane, agents were called when she arrived at immigration).

Each time, they detain her, and then interrogate her at length about where she went and with whom she met or spoke. They have exhibited a particular interest in finding out for whom she works.

Privacy

Anonymizing Wi-Fi Device Project Unexpectedly Halted 138

An anonymous reader notes that a project to develop an anonymizing Wi-Fi device has been canceled under mysterious circumstances. The device, called Proxyham, was unveiled a couple weeks ago by Rhino Security Labs. They said it would use low-frequency radio channels to connect a computer to public Wi-Fi hotspots up to 2.5 miles away, thus obscuring a user's actual location. But a few days ago the company announced it would be halting development and canceling a talk about it at Def Con, which would have been followed with a release of schematics and source code. They apologized, but appear to be unable to say anything further.

"In fact, all [the speaker] can say is that the talk is canceled, the ProxyHam source code and documentation will never be made public, and the ProxyHam units developed for Las Vegas have been destroyed. The banner at the top of the Rhino Security website promoting ProxyHam has gone away too. It's almost as if someone were trying to pretend the tool never existed." The CSO article speculates that a government agency killed the project and issued a gag order about it. A post at Hackaday calls this idea absurd and discusses the hardware needed to build a Proxyham. They say using it would be "a violation of the Computer Fraud & Abuse Act, and using encryption over radio violates FCC regulations. That’s illegal, it will get you a few federal charges — but so will blowing up a mailbox with some firecrackers." They add, "What you’re seeing is just the annual network security circus and it’s nothing but a show."

Submission + - Microsoft suspends availability of Windows 10 builds (betanews.com)

Mark Wilson writes: If you haven't already downloaded Windows 10 build 10162 or 10166, you're now too late. Microsoft has suspended the availability of these two builds — previously available on the Slow and Fast rings respectively — in the run up to the big launch day in a couple of weeks' time.

As we edge closer and closer to the RTM build of Windows 10, Microsoft is now asking Windows Insiders to stick with the build they currently have installed for the time being. Anyone who hasn’t upgraded to these latest preview builds is out of luck. As well as disabling upgrading through Windows Update, Microsoft is also suspending ISOs and activation.

Submission + - Ask Slashdot: VPN solution to connect two mixed environment households? 1

RavenLrD20k writes: My first Ask Slashdot, so be gentle... I am a programmer by trade with a significant amount of training as a Network Administrator (AAS in Computer Networking). I have no problem with how to build three or four separate networks in each location and make them route over the internet. My weakness is in trying to setup a VPN for a secured two way connection between location A and location B, both mixed OS environments, with the requirement that all of the internet traffic on B gets routed through A first. I've already looked at some boxed solutions, such as LogMeIn Hamachi, but there hasn't been much in the way of mixed environment support.

Some background: Due to recent events it's become necessary for me to have remote access to all of my Parents' computers which are about 4 hours away(location B) from my home location(location A). This is to facilitate me being able to log in and apply patches and security updates without requiring someone on the other end sending me Desktop Sharing invites (I'm already going to be upgrading their 2 systems to Windows 7 Ultimate on my dime for this purpose). The ISP for Location B also seems to be blocking the Desktop Sharing ports as this method has completely stopped working for us without notice, and router configs have been verified as forwarding the necessary ports. Location B also has 2 grandchildren that will have a Windows 7 Home Edition Laptop (for MS Office based classwork), a Linux Mint Machine (to start, he has full reign to do whatever he wants to this machine after initial setup with the understanding that if he "breaks" it, he fixes it), and several BeagleBone or R-Pi machines for my Son's experiments while he's visiting for the summer.

Location A has two networks. First is the one with the public IP that I run my Linux servers and physically connected Desktop on. This network also has a wireless interface that allows gaming machines and phones on the North side of the house to connect to. Network two is behind the NAT and runs a dual-band wireless connection for devices on the south side. I would rather not have this second network get internet access through the VPN but through the traditional means.

Location A has a 150/30 cable connection with a 2TB cap. Location B has a 20Mb/s symmetrical uncapped Fiber connection. I also have a VPS "in the cloud" running CentOS which has a 1Gbps Inbound 20Mbps(1Gbps burstable) Outbound connection which may be repurposed for this if necessary. I figure this to be common sense but I would prefer that the the connection between the locations be routed as opposed to bridged as to avoid the issues that come with sending broadcast packets over the internet.

As I said, I primarily want this to be able to remote into my parents' systems to provide maintenance and support instead of having to budget an emergency trip when things go awry. On top of this I'd also like some way to be able to monitor/control my son's online activities while he's away (hence my desire to route at least his traffic, if not all Location B internet traffic, through Location A). Also note: I'm not a helicopter parent by any means and only monitor once in a while to get a general idea of what his online trend is; and the extent of "control" is if grandpa and grandma say he needs time off the computer for x days for bad behavior or whatever, I want to be able to enforce that rule where he won't be able to sneak around while they're in bed. This connection will not have any firewalling or blocking enabled by default. I want everyone to have complete open access to the full internet (this too is to help educate my son in smart browsing/chatting and encourage "you break it, you fix it").
Earth

How the Biggest, Most Expensive Oil Spill In History Changed Almost Nothing 195

merbs writes: Tthe biggest oil spill in US history, despite incurring the largest environmental fine on the books—$18.7 billion, handed down this month—has done almost nothing to change the nation's relationship to oil. Five years after the spill, and, by BP's count, $54 billion in projected total expenses, there have been no serious legislative efforts to improve the oversight or regulation of the United States' still-expanding offshore oil operations. Public opinion of deepwater drilling barely budged during the ordeal; today, a majority of Americans favor doing even more of it.
Medicine

The Cure Culture: Our Obsession With Cures That Are 'Just Around the Corner' 204

citadrianne writes: Cures for major disease always seem just a few short years away. We constantly read about promising new treatments for cancer, diabetes, HIV, ALS, and more. While the prognosis for these diseases has improved over the years — sometimes greatly — we still focus doggedly on the cure. "The idea of a cure is simpler, it's more appealing as a fantasy." This article takes a look at so-called "Cure Culture" — the focus on reaching for a cure when our scientific efforts may be better expended attacking a disease in other ways. It asks, "Why are we telling our children, our friends, and our family members that we are going to cure them? ... What does it mean to be cured of a disease that is encoded within your DNA from the moment you become a zygote until the moment you are dead? ... And why are we eschewing or overlooking treatments—real, honest-to-god treatments—that can let patients lead longer, more normal lives?
Transportation

NYC Asks Google Maps For Fewer Left Turns 363

An anonymous reader writes: Members of the New York City Council have sent a letter to Google asking that its Maps navigation system provide users an option to "reduce left turns." Pedestrian safety is the issue they're trying to improve. In the U.S., a quarter of all accidents involving pedestrians happen while a vehicle is making a left turn. "The first cause of death for New York City children under 13 is not gangs, it's not poverty, not violence. It's being hit by cars and trucks. This is the time for the city to reach out to the private sector, so they can help us to provide information to drivers about where you should avoid making left turns." The council members are also asking for an option that would let truckers stay on known truck routes, hoping that would prevent the problems that arise when big-rigs wander onto streets not large enough to safely accommodate them.
Oracle

Oracle Bullies Enterprise Clients Into Cloud Purchases, Consultant Claims 184

An anonymous reader writes: A consultant claims that Oracle has adopted the widespread use of 'breach notices' this year to force existing enterprise customers to adopt its newly-bolstered range of cloud services, or else be told to stop using all Oracle software within thirty days. Speaking to Business Insider, the unnamed source described the tactic as a 'nuclear option' which is now practically the default when the need to add services or users to an existing contract triggers an 'audit' by Oracle. An ex-Oracle contract negotiator who now works in the ever-expanding business niche of 'Oracle contract negotiation' commented 'Internally, the water cooler gossip there is that they've never seen this kind of aggression before. Oracle has really dialed it up. Customers are buying cloud services to make the Oracle issue go away, not because they have any intention of using cloud services.'
Google

Google Photos Uploading Your Pics, Even If You Don't Want It To 217

New submitter Adekyn writes that, according to David A. Arnott of The Business Journals, the Google Photos app will sync your photos — even after you have deleted the application from your device. From the article: All I had to do to turn my phone into a stealth Google Photos uploader was to turn on the backup sync, then uninstall the app. Whereas one might reasonably believe uninstalling the app from the phone would stop photos from uploading automatically to Google Photos, the device still does it even in the app’s absence. Since making this discovery, I have re-created the issue multiple times in multiple settings on my Galaxy S5. I reached out to Google, and after reaching someone on the phone and describing the issue, was told to wait for a comment. Several hours later, I received a terse email that said, “The backup was as intended.” If I want to stop it from happening, I was told I'd have to change settings in Google Play Services. A video of the process accompanies the article.
Encryption

The Rise of the New Crypto War 91

blottsie writes: For more than 20 years, the U.S. government has been waging a war on encryption, with the security and privacy of all Americans at stake. Despite repeated warnings from security experts, the FBI and other agencies continue to push tech companies to add "backdoors" to their encryption. The government's efforts, which have angered tech companies and researchers, are part of a long-running campaign to pry into every secure system—no matter what the consequences. This article takes readers from the first Crypto War of the early 1990s to the present-day political battle to keep everyone who uses the Internet safe.
Crime

Vancouver Area Teen Sentenced To 16 Months For Swatting 331

An anonymous reader writes: A 17-year-old from the Vancouver area in Canada has been sentenced to 16 months in youth custody and 8 months under supervision in the community after pleading guilty to 23 charges including criminal harassment, public mischief, extortion and uttering threats. The teenager was responsible for a number of swatting calls across the United States and Canada — mostly of female gamers. The judge told him, "It appears that when real life became too hard you retreated into the online world and became increasingly socially isolated. While you may think you enjoyed greater success in the online world, that success was an illusion. You were left with severely limited social skills and a significant educational deficit."

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...