Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Something is wrong with /. article title (Score 1) 401

The original article says than: "second generation XO, which it claims will cost $75 " "To anticipate them costing $20 each is not out of the question." That's not a 12$ laptop, but then i guess the article submiter didnt read properly this part: "that can be the difference between earning $1 an hour instead of $1 a day." I guess that s where the 12$ comes from , but it s not the laptop price, but rather the eventual buyer's income for 12h of work at 1$/h
Google

Submission + - Is there value in the SMART monitoring technology?

Khuffie writes: "Ars Technicha has a very interesting writeup regarding a study made by Google about hard-drive failures and SMART technology. Their findings? SMART wasn't a very effective way of predicting hard-drive failure, and that contrary to popular belief, "drive failures did not increase with high temperatures or CPU utilization"."
Announcements

Submission + - Stable Open Source NTFS After 12 Years of Work

irgu writes: "Open source NTFS development started in 1995 by Martin von Loewis under Linux, which was taken over by Anton Altaparmakov in 2000. Two years ago Apple hired Altaparmakov to work on Mac OS X and made a deal with the team to relicense the code and return the new one, soonest in the spring of 2008. But the team also continued the work and Szabolcs Szakacsits announced the read/write NTFS-3G driver for beta testing last year. Only half year passed and NTFS-3G reached the stable status and has been already ported to FreeBSD, Mac OS X, BeOS, Haiku, 64-bit and big-endian architectures, and new CPU's!"
Security

Submission + - Metasploit running on embedded devices

An anonymous reader writes: Its seems that security researcher David Maynor has gotten the popular open source security tool Metasploit to run on the Nokia N800 internet tablet. Since the N800 runs uses Linux as its OS all that was required was a ruby interpreter. Maynor shows pictures of breaking into a Windows 2000 machine from the N800. http://blogs.zdnet.com/security/?p=54
Security

Tricking Vista's UAC To Hide Malware 221

Vista's User Account Control, love it or hate it, represents a barrier against unwanted software getting run on users' computers. A Symantec researcher has found a simple way to spoof UAC and says that it shouldn't be completely trusted. The trick is to disguise the UAC warning dialog in the color associated with alerts generated by Windows itself.

Slashdot Top Deals

The moon is made of green cheese. -- John Heywood

Working...