Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Heroic IT Dept Less Likely to Steal... Lunches? 491

An anonymous reader writes "According to an article in the Houston Chronicle concerning lunch theft, people from IT are least likely to steal lunches because they are a "hero department." The most likely? Accounting and Customer-Support... "

'Stargate: SG-1' Cancelled 605

Ant writes "The Sci-Fi channel has announced that it will not be renewing its (very popular) original series Stargate SG-1 for another season.The spinoff series Stargate: Atlantis will get the nod, though, airing for a fourth year. SG-1 aired its 200th episode on August 18th, and the SF series is the longest-running SF show on American television." Gateworld has further details: "New episodes of both Stargate SG-1 and Stargate Atlantis continue Fridays this summer starting at 9 p.m. Eastern/Pacific, leading up to the mid-season finale on September 22. The second half of the season will begin in March, leading to SG-1's final bow on SCI FI in June."

VoIP Numbers Stations were Social Experiment 116

IO ERROR writes "The mysterious phone number stations appearing on Craigslist for the last three months, which resembled their shortwave radio cousins, and which Slashdot reported on in June, were an experiment devised by security researcher Strom Carlson and a group of Los Angeles hackers to determine if encrypted messages could be passed using unwitting third parties to foil traffic analysis by hostile intelligence agencies. Carlson and the hackers presented their findings at DEFCON earlier today and gave away CDs with "Make your own Mein Fraulein station" kits and posted one final number station for people to try to decrypt."

Vista Speech Recognition Goes Awry 418

An anonymous reader writes "It seems even MSNBC is willing to take a jab on those rare occasions when Microsoft products don't work. During a demo of Vista's speech recognition technology, Vista couldn't differentiate between mom and aunt, and all attempts to rectify the problem just made it worse. Wait until you see what it spat out, I think we have a new 'All your base.' Don't you just love Microsoft's live demonstrations?"

Tom's Hardware Reviews ATI and Nvidia on Linux 201

Beuno writes "I stumbled upon a GeForce vs Radeon review on Tom's Hardware, which seems normal enough. The big surprise is that it was actually a comparison of those two video cards on Linux (Fedora Core 5). The review isn't as thorough as I would like, but it does review all aspects ranging from tools available, complexity of getting them to work and benchmarks on performance. To me, this is a clear signs of Linux finally making a long expected breakthrough into common desktops."

The Software Internet Database 67

Larry points out an interesting project called The Software Internet Database, the goal of which "is to compile the largest database of software titles and credits on the Internet. This includes all types of software such as operating systems, security, financial, mapping, browsers, video editing, games, word processing, and more. They have made a good start but still need more titles. Please take some time to submit missing titles so that they may compile the database faster." It would be informative to have a subway-map overhead view to know which of these are still available from their makers,have been folded into other products, or are now abandonware.

Google Launches PayPal Rival 449

Google Checkout Launched

Roy van Rijn informs us that Google's new online payment system is now online. "Under the name Checkout, the venture offers an incorporated manner to search, advertise and pay. If you buy something on Checkout, 2% and $0.20 go to Google. Paypal, the biggest competitor uses 1,9% and $0,30. Analysts compare Google/Paypal to for example Visa/Mastercard living peacefully together, while others predict the end of Paypal." W3K adds "You can use your Google account to store an unlimited number of credit cards and addresses. The service allows you to track all your orders and shipping in one place," and adds a link to a quick video tour.

Google to Test PayPal Rival 268

Carl Bialik from WSJ writes "Google is set to introduce a test version of its GBuy online-payment service as early as this week, presaging a shake-up in the online-payments market now dominated by eBay's PayPal, the Wall Street Journal reports. From the article: 'Here is how the service will work: Consumers who search for items like "shoes" or "strollers" on Google's search site will see text ads with a symbol or icon designating advertisers that accept GBuy payments. Shoppers normally would have clicked on an ad and been linked to that merchant's Web site. Now, while they will still be linked to the merchant's site, they will go through a different checkout process integrated with Google if they choose GBuy for their transaction. Details of the service could still change before Google's official GBuy announcement.'"

Worm Wriggles Through Yahoo! Mail Flaw 186

Jasen Bell writes to mention a ZDNet article about a clever new worm affecting users of Yahoo!'s email service. The virus uses a flaw in JavaScript to infect a computer when an email is opened from the user's web-based mail. From the article: "The worm, which was spotted in the wild early this morning, has hit the remote server more than 100,000 times, forwarding Yahoo e-mail addresses harvested from unsuspecting users, Turner said. Although the worm is spreading quickly, and no patch has been issued, Symantec is rating the threat a '2.' The security vendor uses a 1-to-5 rating system, with '5' as its most severe category."

Google Admits Compromising Principles in China 459

muellerr1 writes "Google co-founder Sergey Brin admitted that it had adopted 'a set of rules that we weren't comfortable with' in their Chinese activities. Though it doesn't yet sound like they're admitting to actually doing evil, it does appear that they are thinking about pulling out of China rather than compromise their 'do no evil' motto."

Dvorak on Our Modern World 420

DigitalDame2 writes "If people from the 1920s suddenly landed in the here and now, they'd probably find modern technology a bit weird. Take digital cameras for instance. Nobody would have predicted that most people would now take pictures by holding the camera out in front of them and look at the preview screen to frame a shot. Then there's the iPod phenomenon. Is anyone's music collection that interesting? How many people are being deafened by these things, and what kind of a public health disaster is this? Take a stroll through our modern world with John C. Dvorak's hilarious take."

Universal Radio Grabber: the USRP 189

Nethemas the Great writes "The Universal Software Radio Peripheral or USRP created by Matt Ettus and Eric Blossom gives a new perspective on the radio spectrum, as in just about all of it from DC to 2.9Ghz. With the right software and daughterboards, their USRPs can capture FM, read GPS, decode HDTV, transmit over emergency bands, track peoples movement via their mobile phones, and much, much more. With prices starting at just $550 this new toy is accessible by most anyone."

'Destroyed' Hard Drive Found At Flea Market 424

Billosaur writes "From Yahoo News comes this tidbit about a couple who got a very shocking phone call. Henry and Roma Gerbus received a phone call from a man named Ed claiming he had purchased their old hard drive at a flea market. They had previously taken their computer to Best Buy to have the hard drive replaced and were told that the store would destroy it. Now it has turned up at a flea market, still containing their personal information, such as bank account numbers and Social Security numbers. The Gerbus' are a little perplexed and are very worried about identity theft."

Extortion Virus Code Cracked 371

Billosaur writes "BBC News is reporting that the password to the dreaded Archiveus virus has been discovered and is now available to anyone who needs it. Archiveus is a 'ransomware' virus, which combines files from the My Documents folder on Windows machines and exchanges them for a single, password-protected file, which it will not unlock unless a password is given. The user would normally be required to pay the extortionist money in order to receive the password, but apparently the virus writer made one small, critical error in coding: placing the password in the code. BTW, the 30-digit password locking the files is mf2lro8sw03ufvnsq034jfowr18f3cszc20vmw."

Slashdot Top Deals

Heisenberg may have been here.

Working...