Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Linux

Submission + - ClamAV 0.97 has been released! (clamav.net)

kc0re writes: ClamAV 0.97 has been released with new detection functionality, and integration with the free Immunet Anti-virus program
Networking

Submission + - Security researcher feels the wrath of Anonymous (networkworld.com)

An anonymous reader writes: Wikileaks defenders Anonymous are firing both barrels at a security researcher who promised to name people in the group.
Aaron Barr vowed he’d expose organizers of the online activist group Anonymous next week, but in response Anonymous hacked his Twitter account, broke into his company network and posted more than 44,000 of the company’s e-mails.They also posted his home address, phone number and Social Security number on his Twitter page.

Iphone

Submission + - Verizon iPhone could have supported GSM and CDMA (tekgoblin.com)

tekgoblin writes: iFixit has revealed in its recent teardown of the Verizon iPhone 4 that the phone could have supported both GSM and CDMA networks. They know this because the phone contains a Qualcomm MDM6600 chip which supports "HSPA+ data rates of up to 14.4 Mbps and CDMA2000® 1xEV-DO Rev. A/Rev. B." They also point out that the phone lacks a sim card slot which would be needed for it to support GSM networks. Who knows why Apple did not allow the phone to actually support both networks, maybe Verizon didn't want it or maybe AT&T. Maybe the next iPhone 5 will support both Networks and be sold directly from Apple on a website where you can choose which carrier that you want.

Another difference with the new iPhone 4 than the previous AT&T one is the changed antenna design. As you can see above on the left is the Verizon iPhone 4 with 4 segments in the antenna design while AT&T on the right has 3. The changed antenna design allows the phone to work on Verizon's 2 800 MHz and 1900 MHz CDMA/EVDO bands, while AT&T had to support 4 GSM bands and 4 UTMS bands for international usage.

Crime

Submission + - Drug Dogs False Alert Over 200 Times In Study (sfgate.com)

Aldenissin writes: The accuracy of drug- and explosives-sniffing dogs is affected by human handlers' beliefs, possibly in response to subtle, unintentional cues, UC Davis researchers have found.

    The study, published in the January issue of the journal Animal Cognition, found that detection-dog teams erroneously "alerted," or identified a scent, when there was no scent present more than 200 times, particularly when the handler believed that there was scent present.

In other words, at best, dogs are responding to the subtle non-verbal cues of their masters to find drugs or explosives where the human thinks there should be drugs or explosives. The cop suspects you have pot so his body language makes the dog alert. At worst, the cop is purposefully cuing his dog to alert when he wants a handy excuse to violate your 4th Amendment rights.

Submission + - The Lossiness of your Camera (wordpress.com)

pizzach writes: I recently had something occur to me with the growing interest in 3D cameras since the appearance of the Nintendo 3DS. Pictures taken by 2D cameras are lossy. I am not talking about JPEG compression either.

Cameras can be used to apply various blurs and lighting effects to photos on the spot by using the lense and the flash before recording the image data. Most are used such that the subject of the photograph is more visible from the background.

But what if you could switch between these effects on a 'raw' photo after the picture has been taken? All it would take is having a camera that is optimized for photographing with minimuim distance blur and with high darkness sensitivity. It would also reduce the complexity on camera controls since you wouldn't have to switch between modes as often because everything is done in the postprocessing.

On top of this, photoshop filters would be able to do many interesting effects by just using a single slider and minimium tom-foolery. Want the background blurrier? Just pull the 1 slider right. Want the background less saturated? Pull this other slider. Since the photo is 3D, all of the needed data for distance should be able to be able to be automatically extrapulated with no fuss.

It seems that there are more perks to 3D photography than just for sterioscopic displays. So why hasn't this tech appeared yet, Slashdot? Am I missing something? Or are people worried so much about the glasses that they can't see the effect 3D photography will have on 2D photos?

Submission + - Ken Olsen RIP (ianwaring.com)

An anonymous reader writes: A mail going around the DEC Alumni tonight: It is with great regret that I inform you that our beloved CEO Ken Olsen passed away, yesterday in Indiana, with his immediate family all around him. Ken had been in ill health for the last few months and was in Hospice care. Sad time for their family now, but Ken and Alliki had a wonderful life. It's sad to know that they both have now passed.

Ken, RIP. You were the greatest.

Submission + - Excel vulnerable for over 6 months. (zerodayinitiative.com) 1

zonky writes: Zero Day Initative have just released the following to Full Disclosure. Excel 2003 & 2007 are vulnerable to remote code executition. While user interaction is required to exploit this vulnerability — in that the target must visit a malicious page or open a malicious file — the big issue is that Microsoft have known about this for over 6 months, and have failed to act.
Microsoft

Microsoft Explains Windows Phone 7 'Phantom Data' 270

Fuzzy Eric writes "Microsoft has confirmed that some handsets running its Windows Phone 7 software are sending and receiving 'phantom data.' The problem surfaced in early January with some owners of phones running Windows Phone 7, claiming that their phone was sending 'between 30 and 50MB of data' every day; an amount that would eat into a 1GB allowance in 20 days. Microsoft said its investigation found that most problems were caused by a unnamed 'third party' service. It said that the problem seemed to only affect 'a small (low single-digit) percentage of Windows Phone customers.'"
Windows

ClamAV For Windows Open Beta Begins 127

An anonymous reader writes "The public beta for ClamAV for Windows 3.0, which includes full integration of the ClamAV engine into the Immunet Protect product, is now open. If you are interested in playing with ClamAV for Windows 3.0, please see these forums. 32-bit and 64-bit versions are available for download. ClamAV for Windows should not be confused with ClamWin, a separate project."
Security

Is Open Source SNORT Dead? 127

alphadogg writes "Is Snort, the 12-year-old open-source intrusion detection and prevention system, dead? The Open Information Security Foundation, a nonprofit group funded by the US Dept. of Homeland Security to come up with next-generation open source IDS/IPS, thinks so. But Snort's creator, Martin Roesch, begs to differ, and in fact, calls the OISF's first open source IDS/IPS code, Suricata 1.0 released this week, a cheap knock-off of Snort paid for with taxpayer dollars. The OISF was founded about a year and a half ago with $1 million in funding from a DHS cybersecurity research program, according to Matt Jonkman, president of OISF. He says OISF was founded to form an open source alternative and replacement to Snort, which he says is now considered dead since the research on what is supposed to be the next-generation version of Snort, Snort 3.0, has stalled."
Security

Adobe Putting PDF Reader In a Sandbox 225

Captain Eloquence writes "The next major version of Adobe's PDF Reader will feature new sandboxing technology aimed at curbing a surge in malicious hacker attacks. The initial sandbox implementation will isolate all 'write' calls on Windows 7, Windows Vista, Windows XP, Windows Server 2008, and Windows Server 2003. Adobe security chief Brad Arkin believes this will mitigate the risk of exploits seeking to install malware on the user's computer or otherwise change the computer's file system or registry. In a future dot-release, the company plans to extend the sandbox to include read-only activities to protect against attackers seeking to read sensitive information from the user's computer."

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...