Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Iphone

Submission + - Huddl takes on GroupMe (huddl.me)

danielherdean writes: "You'd be interested to know of a new competitor on the market with a much different take on group messaging. Huddl just launched the other day and is like Instagram for groups. Huddl fills the gap between SMS and social networks like Facebook & Twitter and works with any mobile phone in the US, simplifying social group sharing.

In addition to providing similar messaging features as GroupMe, Huddl stands apart for two key reasons:

Open groups
- users can make their groups public to friends or private (like GroupMe)
- public groups make the app much more social and fun
- users can keep up with what their friends are doing by exploring their groups (called huddles).

Event groups
- users can create an event group by simply generating a QR code within the app
- event owner then posts the QR code and attendees can easily scan into group
- this is great for sharing photos and messages with friends at a concert, wedding or festival

Download the app at www.huddl.me."

Games

Submission + - San Francisco Opening Computer & Video Game Mu (telltalegames.com)

An anonymous reader writes: A team of game scholars, game journalists, and plain old geeks have gotten together to put together San Francisco's first and most comprehensive non-profit museum dedicated to the design, creation, history, and play of computer and video games.
The museum is currently raising funds and shopping around for a San Francisco space, but they've already managed to get some obscure relics — including the only copy in existence of 1984's never-released Atari Cabbage Patch Kids game. As a scholarly resource, the museum is also dedicated to making its entire collection playable by visitors

Security

Submission + - Convicted Terrorist Relied on Single Letter Cipher

Hugh Pickens writes writes: "The Register reports that the majority of the communications between convicted terrorist Rajib Karim and Bangladeshi Islamic activists were encrypted with a system which used Excel transposition tables which they invented themselves that used a single-letter substitution cipher invented by the ancient Greeks that had been used and described by Julius Caesar in 55BC. Despite urging by the Yemen-based al Qaida leader Anwar Al Anlaki, Karim rejected the use of a sophisticated code program called "Mujhaddin Secrets" which implements all the AES candidate cyphers, "because 'kaffirs', or non-believers, know about it so it must be less secure." "Tough communication interception laws [RIPA] were passed in the UK 10 years ago on the basis that they were needed to fight terrorism," says Duncan Campbell, who acted as an expert witness for the defense during the trial. "The level of cryptography they used was not even up to the standards of cryptology and cryptography in the Middle Ages, although they made it look pretty using Excel.""

Comment Re:Don't be evil? (Score 1) 671

1. A deeply intellectual corporate cultural, with 70% of its workforce having PhDs (I don't know if this is still true.) This includes the "20%" concept, whereby all Google staff is given free-reign to research what interests them 1 day out of 5. Google, to me, recalls the days of business-as-research-endeavor, the era of Xerox Parc and Bell Labs and the intellectual energy they represented.

You mean the Bell Labs which allowed their staff to do whatever interested them five days out of five? Sorry, there's no comparison. Google is business-to-make-money, not business-as-research.

Comment Re:Someone has high demands. (Score 3, Informative) 244

A few mailboxes (20 out of 200) had the wrong mail migrated into them. We don't even know the source of this problem yet, but the university could very well have TOLD Google to put sally.smith's e-mail into sally.jones' new mail box.

This isn't a google apps security problem. Please RTFA and get off your high horse.

No, why don't you RTFA and get off your high horse. According to an article linked from TFA, Google acknowledged the problem was on their end, and an earlier comment from a Brown sysadmin indicates that Google upgraded their migration tool right before this happened. It may have "only" been 20 out of 200 accounts, but the problem is squarely Google's fault; stop blaming the Brown sysadmins.

Comment Re:Someone has high demands. (Score 1) 244

My impression is that this incident is a fuckup at the customer end of things

No, according to this article, "The problem was on Google's end. They acknowledged a bug," and according to this comment, Google had upgraded their IMAP migration tool right before this happened.

Sounds like a case of insufficient testing on Google's part before rolling out the new version of their tool.

The Internet

Family's Christmas Photos Hawk Groceries In Prague 263

Hugh Pickens writes "The Telegraph reports that Jeff and Danielle Smith sent a photo of themselves with their two young children to family and friends as a Christmas card, and posted the image on her blog and a few social networking websites. Then, last month, a friend of the family was vacationing in the Czech Republic when he spotted a full size poster of the Missouri family's smiling faces in the window of a local supermarket in Prague, advertising a grocery delivery service. The friend snapped a few pictures and sent them to the Smiths, who were flabbergasted. Mario Bertuccio, who owns the Grazie store in Prague, admitted that he had found the photo online but thought it was computer-generated and promised to remove it, and 'We'll be happy to write an e-mail with our apology,' he says. Meanwhile Mrs. Smith has received 180,000 visitors and over 500 comments on her blog since she posted the story. She says she is glad the photo wasn't used in an unseemly manner. 'Interesting. Bizarre. Flattering, I suppose,' writes Mrs. Smith. 'But quite creepy.'"

Submission + - Leges Motus Beta 1 Released! (sourceforge.net)

SF:greywhind writes: Leges Motus, the open-source 2D team-based tactical shooter set in zero-gravity, released its first open beta today. With nearly six months of development behind it, the game has solid multiplayer gameplay that combines twitch aiming with strategic planning as players attempt to move across the arena, freezing opponents to reach the other team\'s gate and bring it down. Leges Motus is looking for map-makers and artists to expand the game\'s resources, but mostly, it\'s just looking for you to join in the fun. If you want to try Leges Motus out for yourself, visit our SourceForge project page at http://sourceforge.net/projects/legesmotus. Here is a direct link to the packages: http://sourceforge.net/project/showfiles.php?group_id=263719&package_id=324169 Pick out the package for your operating system. Packages are available for Windows, Mac, and Linux. Official servers are online now, and you can run your own with the programs included in the package. To learn more about Leges Motus or to leave feedback, visit http://legesmotus.cs.brown.edu./ The website has screenshots as well, so you can see the game before you download. We\'ll see you on the servers. - The Leges Motus Team: Greywhind, AGWA, Archaemic, and Robert
The Military

US Army Will Upgrade To Windows Vista 374

MojoKid writes "While many organizations are preparing for an upgrade to Windows 7, the US Army is upgrading to Windows Vista. The upgrade will include getting rid of all the Office 2003 programs and installing Office 2007 in its place, and is scheduled for a Dec. 31 completion date. Half the Army's computers (they have 744,000 desktop units) have Office 2007 so far, and 13 percent are on Vista, which was released in January 2007. Windows 7 is supposed to launch before year's end, so the Army will be fully on Vista sometime after Microsoft's next-generation OS is already launched."
Programming

Are Quirky Developers Brilliant Or Dangerous? 1134

jammag writes "Most developers have worked with a dude like Josh, who's so brilliant the management fawns over him even as he takes a dump in the lobby flowerpot. Eric Spiegel tells of one such Josh, who wears T-shirts with offensive slogans, insults female co-workers and, when asked about documentation, smirks, "What documentation?' Sure, he was whipsmart and could churn out code that saved the company millions, but can we please stop enabling these people?"
Education

Best IT Solution For a Brand-New School? 411

Iain writes "I'm a teacher at a British 'City Academy' (ages 11-19) that is going to move into a new building next year. Management is deciding now on the IT that the students will use in the new building, as everything will be built from scratch. Currently, the school has one ICT suite per department, each containing about 25-30 PCs. My issue with this model is that it means these suites are only rarely used for a bit of googling or typing up assignments, not as interactive teaching tools. The head likes the idea of moving to a thin client solution, with the same one room per department plan, as he see the cost benefits. However, I have seen tablet PCs used to great effect, with every single classroom having 20-30 units which the students use as 'electronic workbooks,' for want of a better phrase. This allows every lesson to fully utilize IT (multimedia resources, Internet access, instant handout and retrieval of learning resources, etc.) and all work to be stored centrally. My question is: In your opinion, what is the best way for a school to use IT (traditional computer lab, OLPCs, etc.) and what hardware is out there to best serve that purpose? Fat clients for IT/Media lessons and thin client for the rest? Thin client tablets? Giving each student a laptop to take home? Although, obviously, cost is an issue, we have a significant budget, so it should not be the only consideration."

Comment Re:So, what's the big deal (Score 2, Informative) 300

SSL is not supposed to be preventing MITM nor is it supposed to be for identifying purposes.

I disagree. Why else does SSL have certificate signing capabilities? SSL even has client-side certificates for client identification, though it isn't widely used in HTTPS. In order for any asymmetric cryptosystem to work you need to exchange public keys, and you always have to establish some kind of trust system for those keys.

We have other technologies for that like PGP but the internet relies on anonymity so you're never 100% sure that you're going to talk to the correct persons.

Hence the need for SSL.

Even with PGP, your initial communications will have to be trusted (eg. you personally hand over or get a key) or any subsequent communications will be compromised. SSL doesn't even go that far because every communication is viewed as an initial communication. If the certificate is re-signed or changed to another CA the next day, your browser will not complain as long as that CA is in it's trusted root certificates.

This is a fault of how the key management in SSL has been implemented in web browsers, but says nothing about the technology itself. Two examples of systems using SSL with better (but less convenient) key management systems are OpenSSH and OpenVPN.

It's the browsers fault and the CA's as well (with VeriSign the biggest) by asserting that SSL certificates can be used to authenticate an entity rather than a communications.

There's a middle ground between "entity" and "communications." Yes, it is very difficult to verify that a certificate is being issued to the entity "Bank of America," but it should not be hard to verify that you're issuing a certificate to the domain name www.bankofamerica.com. And the latter is all you need to protect against MITM.

Censorship

Aussies Hit the Streets Over Gov't Internet Filters 224

mask.of.sanity writes "Outraged aussies will hold simultaneous protests across Australia in opposition to the government's plans for mandatory ISP internet content filtering. The plan will introduce nation-wide filtered internet using blacklists operated by a government agency, away from public scrutiny. Politicians and ISPs will join protesters in the streets to voice their opposition to the government's plan, which has ploughed ahead, despite intense criticism that the technology will crippled internet speeds and infringe on free speech. Opponents said the most accurate filter chosen by the government will incorrectly block up to 10,000 Web pages out of 1 million."
Security

The Trap Set By the FBI For Half Life 2 Hacker 637

eldavojohn writes "You might remember the tiny news that Half Life 2 source code was leaked in 2003 ... it is the 6th most visited Slashdot story with over one kilocomment. Well, did anything happen to the source of the leak, the German hacker Axel 'Ago' Gembe? Wired is reporting he was offered a job interview so that Valve could get him into the US and bag him for charges. It's not the first time the FBI tried this trick: 'The same Seattle FBI office had successfully used an identical gambit in 2001, when they created a fake startup company called Invita, and lured two known Russian hackers to the US for a job interview, where they were arrested.'"
Robotics

Packs of Robots Will Hunt Down Uncooperative Humans 395

Ostracus writes "The latest request from the Pentagon jars the senses. At least, it did mine. They are looking for contractors to 'develop a software/hardware suite that would enable a multi-robot team, together with a human operator, to search for and detect a non-cooperative human subject. The main research task will involve determining the movements of the robot team through the environment to maximize the opportunity to find the subject ... Typical robots for this type of activity are expected to weigh less than 100 Kg and the team would have three to five robots.'" To be fair, they plan to use the Multi-Robot Pursuit System for less nefarious-sounding purposes as well. They note that the robots would "have potential commercialization within search and rescue, fire fighting, reconnaissance, and automated biological, chemical and radiation sensing with mobile platforms."

Slashdot Top Deals

No man is an island if he's on at least one mailing list.

Working...