Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:So he was rewarded for hiding her body? (Score 3, Insightful) 553

That is an amazingly homophobic comment. Its offensive on so many other levels too.

Cheers +1. Yep, not only on that level. What if you love a woman who isn't able to have children? If you want to stay monogamous and not pay a surrogate, should you get a divorce just because she can't get pregnant?!? GP should get a life.

-b.

Privacy

Houston Police Test Unmanned Surveillance Aircraft 236

54mc writes "The Houston Police Department was filmed testing an unmanned aircraft in a secretive gathering on Wednesday. The media were not allowed into the event; however they were told that the aircraft would be used for 'mobility' and 'tactical' issues, and possibly even for writing traffic tickets. The aircraft has a wingspan of 10 feet and is said to cost from $30K to $1M. Pictures and video are available at the link." The article mentions that the craft was being operated by staff from a private firm called Insitu, Inc.. The device in the video looks like the firm's ScanEagle.
Technology (Apple)

Submission + - We won't take cash (yahoo.com) 1

stox writes: "In an effort to control iPhones sold to unauthorized re-sellers, Apple will require iPhone purchases to be made with a credit or debit card only. This has some scary implications. What next, a three day waiting period?"
Communications

Submission + - Apple limits iPhones to 2 per person, rejects cash

b0s0z0ku writes: Citing concerns about availability for the holidays, Apple is now limiting iPhone purchases to two per person (at least at Apple stores) and only accepting credit card payments in order to create a record of who bought the phones. Could this possibly be their attempt to control the market for unlocked iPhones now that the 1.1.1 firmware has been cracked? Naaw, never.
Communications

Cellphone Use On Planes Coming Soon? 249

s31523 writes "A while back it was reported that cell phone use was given the OK on Emirate airlines. The BBC is now reporting European agencies back the use of cell phones in air. Plans have been developed to introduce technology that allow cell phone use on planes without any risk of interference. A spokesman for the UK regulator Ofcom said there were still many stages to pass through before final approval was given to the roll out of the plans, but the regulator said that the technology could be implemented next year."
Debian

Debian Refuses To Push Timezone Update For NZ DST 435

Jasper Bryant-Greene writes "Although a tzdata release that includes New Zealand's recent DST changes (2007f) has been out for some time, Debian are refusing to push the update from testing into the current stable distribution, codenamed Etch, on the basis that 'it's not a security bug.' This means that unless New Zealand sysadmins install the package manually, pull the package from testing, or alter the timezone to 'GMT-13' manually, all systems running Debian Etch in New Zealand currently have the incorrect time, as DST went into effect this morning. As one of the last comments in the bug report says, 'even Microsoft are not this silly.' The final comment (at this writing), from madcoder, says 'The package sits in volatile for months. Please take your troll elsewhere.'"
Censorship

University of Florida Student Tasered At Political Rally 1819

An anonymous reader writes "During a political rally at the University of Florida, an annoying student was tasered while attempting to ask Senator Kerry (D-MA) some questions regarding the 2004 election. Police are looking into whether excessive force was used to prevent the student from going over his alloted question period." There are also several YouTube videos available of the incident.
Handhelds

Submission + - iPhone vulnerable to trojan attack via USB?

An anonymous reader writes: I bought an iPhone last week, and have been playing with hacking it. The iPhone comes locked from Apple, both to the cell provider (AT&T) and with no possibility of installing third-party applications. There are several programs which, run from a box with an iPhone connected to it, can remove the application lock and install an installer on the phone. This requires almost no user intervention other than plugging in the phone and clicking on "OK"; no authentication of any type is required. The installer shows up in the phone's home screen automatically, and can then be used to install more third-party applications.

What's to stop someone from (for example) wrapping the installation tool in a fake iTunes update and sending out phishing e-mails linking to it, or making it part of a virus that modifies iTunes itself? The "update" would then install malware or a malware downloader on the phone itself. All processes on the phone run as root and have access to almost all components of the phone. Extant third-party apps include dialers, a voice recorder, and various chat and Internet tools. So I could see something that bugs a room and sends the audio over the 'net, something that sends copies of appointments and e-mails out to interested parties, or even a dialer repeatedly dials the number of a gay bordello in Washington, DC if the phone's number happens to belong to an Important Person.

My point is not to bash the iPhone. It's a fine device with a user interface nothing short of remarkable. But it would have been even better had Apple provided a *legitimate* installation mechanism for third-party applications, and a means of running them with reduced privileges. Nor do I have a problem with the people who created the iPhone hacks — they're just extending the phone's functionality to what it should have been out of the box. The lesson? Security through obscurity is never the answer, especially if it's easy to bypass!
Movies

G.I. Joe No Longer the Real American Hero? 548

Advocate123 writes "Clearly, Hollywood has forgotten the, 'Real American Hero.' G.I. Joe originally symbolized the American WWII soldier and a great generation. Now Hollywood celebrities are going to turn him into a international multicultural coed task force with no government affiliations. Isn't anything sacred to these people?"
News

Steve Fossett Missing 317

jd writes "Steve Fossett, the first person to fly a plane around the world without refueling, the first person to fly around the world in a balloon, and possibly the record-holder for the highest-altitude glider flight, is missing in Nevada. He is reported to have taken off in a light aircraft last night and has not been seen since. As he had filed no flight plan, would-be rescuers have no idea where to even begin looking. The plane took off from a private airstrip on a ranch at the south end of Smith Valley in western Nevada."
News

Man Arrested for Refusing to Show Drivers License 1972

NMerriam writes "Michael Righi was arrested in Ohio over the weekend after refusing to show his receipt when leaving Circuit City. When the manger and 'loss prevention' employee physically prevented the vehicle he was a passenger in from leaving the parking lot, he called the police, who arrived, searched his bag and found he hadn't stolen anything. The officer then asked for Michael's driver's license, which he declined to provide since he wasn't operating a motor vehicle. The officer then arrested him, and upon finding out Michael was legally right about not having to provide a license, went ahead and charged him with 'obstructing official business' anyways."
Biotech

Submission + - What constitutes a good geiger counter?

An anonymous reader writes: I've always wanted a geiger counter to play around with but thought they would be too expensive for mere mortals. But after a quick Google search, it looks like I was wrong and some ex-Russian models are available for pennies. I even found instructions on how to make my own doseometer. So I thought I'd ask Slashdot: What makes a good geiger counter? What features are most useful? Let's put together a geiger counter buying guide!
Editorial

Submission + - America's Hackable Backbone (forbes.com)

majorbytesrulz writes: "So just how easy is it to hack into America's Backbone.... "The first time Scott Lunsford offered to hack into a nuclear power station, he was told it would be impossible. There was no way, the plant's owners claimed, that their critical components could be accessed from the Internet. Lunsford, a researcher for IBM's Internet Security Systems, found otherwise. "It turned out to be one of the easiest penetration tests I'd ever done," he says. "By the first day, we had penetrated the network. Within a week, we were controlling a nuclear power plant. I thought, 'Gosh. This is a big problem.'"" Now that is some scary shit....I have been working with computers for over twenty years and with my knowledge of hardware and software systems I could more than likely pull of a similar feat...Not that I would, but if it is that easy to hack into the nuclear facility I just wonder what operating system they are using and what type of preventative measures they are using for security...I suppose I could just port scan the place in question....I have some honeypots on the net that I monitor frequently and I get plenty of suspicious traffic from all over the world, so I know that there is a lot of port scanning going on and it is just not to setup your friendly spam bot server.... I hope who ever told Scott Lunsford that it would be impossible to hack into their system is having nice dreams whenever he sleeps at night....if he does sleep....if it's on the net....ain't nothing phreaking impossible.... MB http://www.forbes.com/2007/08/22/scada-hackers-inf rastructure-tech-security-cx_ag_0822hack_print.htm l"

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...