Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Crime

Submission + - MD family helps to catch a thief using cellphone (washingtonpost.com)

tugfoigel writes: At first, all Kari and Derek Fisher knew about the man who broke into their house was that he was careful enough to cut the screen window and neatly fold it so as not to get scratched on the way out. Given the size of the opening, he probably wasn't very big. And he liked to talk.

The couple and their two young children were asleep early Sept. 24 when the burglar crept into their Adelphi home. He found the home office, where he palmed a pair of digital cameras, a video camera, a satellite radio, and two camera bags filled with memory cards and batteries. He swiped Derek Fisher's wallet and cellphone from a desk.

That revelation sparked a series of slightly panicked phone calls, first to the Prince George's County police and then to banks and credit card companies to cancel cards. The Fishers also called their cellphone carrier, Sprint Nextel.

When a customer service representative offered to cut off the stolen phone or transfer the number to a new one, Derek Fisher asked out of curiosity whether there was some way for the company to see where the phone was. The customer service rep told him about a locator service he could sign up for on a 15-day free trial. Fisher agreed and signed on.

The Sprint Family Locator service, launched in 2006, relies on GPS technology embedded in the phone. AT&T and Verizon offer similar versions of the service, which is marketed as a way for parents to surreptitiously keep tabs on their kids, or, as the online demo puts it, "to make sure Caroline made it to morning band practice without interrupting the music."

Submission + - The Walking Dead Is already here!

An anonymous reader writes: As we all know, The Walking Dead TV series episode 1 will be aired on Oct 31.
But guess what? The pre-aired it last October 25 and it was a huge success for all the fans!
If you guy want to watch this unique Zombie tv series you can watch every episode at:
Watch The Walking Dead Online I hope you guys will enjoy!
Hardware

Submission + - OLPC Gets $5.6M Grant From Marvell (xconomy.com)

tugfoigel writes: The One Laptop per Child Foundation and Santa Clara, CA-based semiconductor maker Marvell have cemented a partnership announced last spring, with Marvell agreeing to provide OLPC with $5.6 million to fund development of its next generation tablet computer, OLPC founder Nicholas Negroponte tells me. Negroponte says the deal, signed in the past week or so but not previously announced, runs through 2011.

"Their money is a grant to the OLPC Foundation to develop a tablet or tablets based on their chip," he says. "They're going to put the whole system on a chip."

The OLPC tablet, which Negroponte hinted at last November in an interview with my colleague Wade Roush and formally announced last December, is known as the XO 3 because it represents the third-generation of the XO laptop currently sold by OLPC (the foundation scrapped plans for its e-book-like XO 2 computer and is moving straight to the tablet). Marvell is a longtime corporate sponsor of the foundation, but with this grant has formally stepped up to take the lead on engineering development. "They've been sponsors all along," Negroponte says. "But they were one of ten. Now they are the technology partner." The deal, he says, means the tablet's development is "fully funded."

Google

Submission + - How to Recover From a Gmail Account Compromise (threatpost.com)

Trailrunner7 writes: Threatpost has a guest column from application security expert Caleb Sima about how to recover from a compromise of your Gmail account. "I recently read an article warning of attacks against Gmail accounts being conducted by the Chinese government. The article provided one solution to fix a hacked Gmail account: change your password. That's good advice, but insufficient. Any decent attacker will have at least one backdoor to regain control of your account so quickly that it will make your head spin.

  Gmail isn't just an email program, its part of an entire Web based application ecosystem. Check your authorized applications to see if the attacker added their own malicious application to be allowed on your account. This is my personal favorite. Everyone today adds social applications and gives permission to their Facebook/Google accounts through third party applications. Most people don't even look at what permissions the third party applications have. In Gmail applications can pretty much do everything an attacker would want to do. Even better, from the attacker's stand point, is that no one even knows where how to revoke or check permissions on these applications once they've been approved, they're forgotten. There are open source applications will grant full IMAP/SMTP access using OAUTH. (The Python scripts from the open source google-mail-xoauth-tools project are an example). Once the Gmail account is hijacked, an attacker can run this script and grant access to the application for full privileges. Even if you change your password multiple times, a rogue application can continue reading your email and accessing your personal data.

Medicine

Submission + - Scientists now develop e-skin (hindustantimes.com)

tugfoigel writes: Biotech wizards have engineered electronic skin that can sense touch, in a major step towards next-generation robotics and prosthetic limbs. The lab-tested material responds to almost the same pressures as human skin and with the same speed, they reported in the British journal Nature
Materials.

Important hurdles remain but the exploit is an advance towards replacing today’s clumsy robots and artificial arms with smarter, touch-sensitive upgrades, they believe.

“Humans generally know how to hold a fragile egg without breaking it,” said Ali Javey, an associate professor of computer sciences at the University of California at Berkeley, who led one of the research teams.

“If we ever wanted a robot that could unload the dishes, for instance, we’d want to make sure it doesn’t break the wine glasses in the process. But we’d also want the robot to grip the stock pot without dropping it.”

Submission + - Is multi-tasking a myth? (bbc.co.uk) 1

tugfoigel writes: Britons are increasingly overlapping their media habits — tapping out e-mails while watching TV, reading a paper while answering texts from friends. But, asks Hugh Wilson, does media multi-tasking mean instead of doing a few things well, we are just doing more things badly?

I was watching a documentary the other day about an educational issue that — as the father of a child about to start his first year at school — held more than a passing interest.

At the same time, I was actively participating in a three-way text message conversation about the coming weekend.

It's fair to say that, by the end of the evening, I had only a vague understanding of the message of the documentary and the weekend remained largely unplanned. I had multi tasked, but I hadn't done it particularly well.

Still, I was only doing what comes naturally, at least if the latest report from media regulator Ofcom is to be believed.

Space

Submission + - Computer blow to Europe's Goce gravity satellite (bbc.co.uk)

tugfoigel writes: A flagship European Earth observation satellite has been struck by a second computer glitch and cannot send its scientific data down to the ground.

The Goce spacecraft is on a mission to make the most precise maps yet of how gravity varies across the globe.

In February, a processor fault forced operators to switch the satellite over to its back-up computer system.

This too has now developed a problem and engineers are toiling to make the spacecraft fully functional again

The European Space Agency (Esa) remains confident the situation can be recovered, however.

"There's no doubt about it: we're in a difficult situation, but we are not without ideas," Goce mission manager Dr Rune Floberghagen told BBC News.

Only last year, Esa lost the use of an instrument on its billion-euro Herschel space telescope but still managed to find a way to bring it back online even though engineers were separated from the malfunctioning hardware by more than a million kilometres of space.

Programming

Submission + - GLiP - (a) Great LED Interactive Puzzle (www.glip.fr)

tugfoigel writes: It's really wonderful to see what creative people can do when they get together. Four students from Telecom ParisTech [http://www.telecom-paristech.fr/] got together and made GLiP. They describe it on their web site:

"It's really simple: this project's aim is to create small blocks displaying distributed animations on LED matrices (such as those found at Sparkfun, at Evil Mad Science in their Meggy project or in electronic public display systems) and able to communicate among them.
We now have 16 completely functional blocks which are able to display text, logos and small animations. They are automatically synchronized and a block's position is automatically detected, without any physical contact!"

Science

Submission + - Glass invisibility cloak shields infrared (eetimes.com)

An anonymous reader writes: Invisibility cloaks are slowly working their way down to shorter wavelengths--starting at millimeter long microwaves and working their way to the nanometer wavelengths of visible light. EETimes says we are about half way there--micrometer wavelengths--in this story about using chalcogenide glass to create invisibility cloaks in the infrared. Next stop Harry Potter style cloaks. Here's what EETimes says:

"Invisibility cloaks cast in chalcogenide glass can render objects invisible to infrared frequencies of light, according to researchers at Michigan Technological University...Most other demonstrations of invisibility cloaks have used metamaterials composed of free-space split-ring resonators that were constructed from metal printed-circuit board traces surrounded by traditional dielectric material. The Michigan Tech researchers...claim that by substituting nonmetallic glass resonators made from chalcogenide glass, infrared cloaks are possible too..."

This story also has some other details about how invisibility cloaks work and predicts further developments will eventually realize Harry Potter style cloaks. I'm still not convinced that such cloaks would really be undetectable, but at least its fun to read about how seriously these researchers are taking the adage: 'Any sufficiently sophisticated technology is indistinguishable from magic,' Arthur C. Clarke.

Iphone

Submission + - Apple starts free case program for iPhone 4 owners (computerworld.com)

CWmike writes: As promised last week, Apple launched on Friday its free case program for iPhone 4 owners with reception problems. The iPhone 4 Case Program applies to iPhone 4s bought before Sept. 30, and it requires iPhone 4 users to download a special app from Apple's App Store to get a free case. In addition to enabling users to select rubber bumpers, the app also offers users a choice of several plastic cases from third-party vendors. iPhone 4 owners must sign in with an Apple ID to get access to the case selection, and once a case or bumper has been chosen, the app no longer allows you to look at the cases. In other words, buyers must choose wisely, since it doesn't looke like they'll have a chance to change the order after they make a decision. For those who already bought Apple-branded iPhone 4 Bumpers — which originally sold for $29.99 — Apple says it is already refunding the purchase price, plus taxes and shipping fees. Customers who bought bumpers from an AT&T store must fill out a rebate form (PDF) to get a reimbursement.
The Internet

Submission + - Pentagon Workers Tied To Child Porn

finalcutmonstar writes: According to the Washington Post "The Boston Globe's Bryan Bender reported Friday that federal investigators "have identified several dozen Pentagon officials and contractors with high-level security clearances who allegedly purchased and downloaded child pornography, including an undisclosed number who used their government computers to obtain the illegal material."

Employees under investigation have included individuals from "the National Security Agency, the National Reconnaissance Office, and the Defense Advanced Research Projects Agency — which deal with some of the most sensitive work in intelligence and defense — among other organizations within the Defense Department," the Globe reported, citing investigative reports."

Source : http://voices.washingtonpost.com/checkpoint-washington/2010/07/boston_globe_pentagon_workers.html
Wireless Networking

Submission + - Search For Aliens Needs To Change Tactics

sungsam writes: Benford, his brother James and nephew Dominic recently published a study outlining their idea of how to find alien life and why traditional radio astronomy might not be up to it. Benford thinks that's the wrong way to go if you want to find aliens. Aliens won't send out a continuous signal, but a pulsed one, in short bursts. "It's just not cost-effective," he said. "By many orders of magnitude it's cheaper to do broadband."
Idle

Submission + - The Antidote for Comic-Con (thedailyjim.com)

mad-timing writes: Bill Cosby Wearing Colorful Sweaters
Listen, we all want to be at Comic-Con right now ââoe the new movie screenings, the women dressed as Princess Leia, the tables of comics writers and artists being celebrated for their contributions to popular culture, the faint smell of desperation only slightly masked by Jedi robes and zombie make up, all of it! The thing is, itââs kind of this black hole of geek that no popular (or unpopular) culture nerd can escape until Monday.

Security

Submission + - WiFi WPA2 vulnerability found (networkworld.com)

BobB-nw writes: Perhaps it was only a matter of time. But wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available.

Malicious insiders can exploit the vulnerability, named "Hole 196" by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network and compromise other authorized devices using open source software, according to AirTight.

"There's nothing in the standard to upgrade to in order to patch or fix the hole," says Kaustubh Phanse, AirTight's wireless architect who describes Hole 196 as a "zero-day vulnerability that creates a window of opportunity" for exploitation.

Security

Submission + - Certified Lies: Big Brother In Your Browser (networkworld.com)

An anonymous reader writes: You probably feel safe when you see the padlock on your browser window indicating secure communication with your bank or e-mail account. What if instead of worrying about man-in-the-middle attacks, it became government-spy-in-the middle eavesdropping? Is Big Brother spying on you? Yes...

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...