Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Networking

Submission + - China taking on U.S. in cyber arms race (cnn.com)

Pabugs writes: "China has developed information warfare units — China is seeking to unseat the United States as the dominant power in cyberspace, a U.S. Air Force general leading a new push in this area said Wednesday."

Feed Muscle Weakness: New Mutation Identified (sciencedaily.com)

New research has identified a novel mutation associated with muscle weakness and distal limb deformities. The study demonstrates that muscle weakness experienced by persons with a regulatory protein tropomyosin mutation is directly related to a mechanism by which the mutant tropomyosin modulates contractile speed and force-generation capacity.

Feed Screening Approach Leads To Discovery Of Gene Linked To Breast Cancer (sciencedaily.com)

Using a novel three-part screening process, scientists have identified a gene that is made inappropriately in about a third of all breast cancers. Unlike breast cancer-susceptibility genes such as BRCA1 and BRCA2, the newly identified gene, called IKBKE, is not inherited in a mutated form that increases the risk of developing breast cancer at an early age. Rather, the mutation arises during a woman's life.
Privacy

Submission + - FBI audit finds widespread abuse in data collectio

Pritchard1 writes: "If we violate the law, ignorance of the law is not an acceptable rationale. Why is it for a Government agency? http://news.yahoo.com/s/nm/20070614/tc_nm/fbi_patr iotact_abuses_dc_3;_ylt=AgAaotQ923PNz1otcRKmX54E1v AI FBI audit finds widespread abuse in data collection 2 hours, 25 minutes ago WASHINGTON (Reuters) — An internal FBI audit has found the agency violated rules more than 1,000 times while collecting data on domestic phone calls, e-mails and financial transactions in recent years, The Washington Post reported on Thursday. ADVERTISEMENT The number of violations uncovered by the audit was far greater than those previously documented in a Justice Department report in March, the Post said. The vast majority of newly discovered violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect, the Post said. The agents retained the information in their files, which mostly concerned suspected terrorist or espionage activities, according to the report. The new audit covers just 10 percent of the FBI's national security investigations since 2002, so the actual number of violations in the FBI's domestic surveillance efforts probably number several thousand, bureau officials told the newspaper in interviews. The Justice Department audit found 22 violations in a much smaller sampling. Of the more than 1,000 violations uncovered by the new audit, about 700 involved the provision of information by phone companies and other communications firms that exceeded what the FBI's National Security Letters had sought, the Post said. However, some two dozen of the newly discovered violations involved agents' requests for information that U.S. law did not allow them to have, the audit found. National Security Letters allow the FBI to compel the release of private information such as communications or financial records without getting court authority. Their use has grown exponentially since the September 11, attacks, the Post said. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, it said. "The FBI's comprehensive audit of National Security Letter use across all field offices has confirmed the inspector general's findings that we had inadequate internal controls for use of an invaluable investigative tool," FBI General Counsel Valerie Caproni was quoted as telling the Post. Caproni said that steps have been implemented since March 2007 to fix the problem. FBI officials said the audit found no evidence that any agent knowingly or willingly violated the laws or that supervisors encouraged such violations, the Post reported. Rather it showed that many agents did not understand or follow the required legal procedures and paperwork requirements when collecting personal information, the Post reported."
Linux Business

Submission + - Dell offering Ubuntu XPS, featured on front page

stoomart writes: When going to www.dell.com today, I was surprised to see their Ubuntu product line staring at me. After clicking on the link, another surprise was that they are now offering an XPS 410 N with Ubuntu.

This is very cool to me because it seems that they are actively trying to validate their other products to run Ubuntu. Hopefully this leads to a choice between MS Windows and Ubuntu when choosing any product.

Feed Jet engine-powered go-kart roars onto eBay (engadget.com)

Filed under: Transportation

Here's one that's sure to make Toad weep, even if he's toting a golden mushroom or two. In a bid to make every Mario Kart (or speed demon) freak's dream come true, a bloke in Inverness has concocted a jet engine-equipped go-kart that actually sports a functioning afterburner. Similar to a number of other jet-powered vehicles we've seen, this one is fitted with a military spec JFS-100 jet engine and a push button afterburner that emits "extra thrust, noise, and spectacular fire / smoke effects." Moreover, you'll find an EGT gauge, MOMO steering wheel, and digital RPM meter crammed inside the wee vehicle, and if you just so happen to reside in the UK, you can get the bidding starting for a mere £5,000 ($9,864). More drool-worthy snapshots after the break.

[Via El Reg]

Continue reading Jet engine-powered go-kart roars onto eBay

Read | Permalink | Email this | Comments

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


Security

Submission + - Vista "Security feature"

jaritk writes: How to crack Microsoft Windows Vista / XP-workstations and Windows 200x servers in a minute?

"What's the problem?

This problematic security feature exists because Windows Vista Repair Computer / System Recovery program enables the use of command prompt without any user authentication with highest possible — system-level — priviledges.

Cracking Windows operating systems has been possible by using cracking software found from various web pages. This is the first time when cracking Windows operating systems is really easy and needs no deeper technical knowledge. This is the reason, why everyone using Windows should understand the cracking method and start preparing safety systems, if needed."

Read the whole story : http://ict-tuki.fi/vistasec_eng/

Feed Making Strides In Quantum Dot Infrared Photodetectors (sciencedaily.com)

Researchers have made significant strides in the development of quantum dot infrared photodetectors -- technology that may provide new imaging techniques with applications in medical and biological imaging, environmental and chemical monitoring, night vision and infrared imaging from space. Conventional technology for imaging applications typically requires that the detector be cooled to very low temperatures. By using nanotechnology to form quantum dots, the researchers are closer to developing high-performance imaging techniques that can operate at higher temperatures.

Feed Hurricane Monitoring System Improved In US (sciencedaily.com)

Hurricane forecasters will test a new technique this summer that provides a detailed 3-D view of an approaching storm every six minutes and shows whether the storm is gathering strength as it nears land. The technique, which relies on existing coastal radars, will help meteorologists quickly alert coastal communities.
Power

Submission + - Purdue Researchers Generate Hydrogen From Water +

Control Group writes: A team of researchers at Purdue University, led by Jerry Woodall, have have developed a method to extract hydrogen from water by using an aluminum/gallium alloy.

Hydrogen is generated spontaneously when water is added to pellets of the alloy, which is made of aluminum and a metal called gallium. The researchers have shown how hydrogen is produced when water is added to a small tank containing the pellets. Hydrogen produced in such a system could be fed directly to an engine, such as those on lawn mowers.
.

The key, they say, is the addition of the gallium, "because it hinders the formation of a skin normally created on aluminum's surface after oxidation." The gallium is not consumed by the process, meaning it can be reused. The aluminum, of course, oxidizes and must be recycled. While the current price of aluminum means this won't be cost-competitive with gasoline in the near term, in combination with fuel cell technology, immediate gains could be realized.

Slashdot Top Deals

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...