Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

The War Is Over, and Linux Has Won 593

xtaski writes "Dana Blankenhorn bluntly states a reality that many have known: 'The war is over and Linux won'. With Oracle and Microsoft putting Linux in the spotlight and positioning themselves to grow with Linux. 'A new report shows that 83% of companies expect to support new workloads on Linux against 23% for Windows. ... Over two-thirds of the respondents said they will increase their use of Linux in the next year, and almost no one said the opposite.'"

Weakness In Linux Kernel's Binary Format 281

Goodfellas writes, "This document aims to demonstrate a design weakness found in the handling of simply linked lists used to register binary formats handled by the Linux kernel. It affects all the kernel families (2.0/2.2/2.4/2.6), allowing the insertion of infection modules in kernel space that can be used by malicious users to create infection tools, for example rootkits. Proof of concept, details, and proposed solution (in PDF form): English, Spanish.

Astronomers Awaiting 1a Supernova 204

Aryabhata writes to tell us BBC News is reporting that astronomers have sighted a star on the brink of a "1a" supernova. This opportunity presents the first chance astronomers have ever had to view a supernova of this magnitude up close. From the article: "They are so rare that the last one known in our galaxy was seen in 1572 by the great Danish astronomer Tycho Brahe, who first coined the term nova, for "new star", not realizing he was in fact witnessing the violent end of an unknown star. It has long been believed that type 1a supernovae are the death throes of a white dwarf star. But all modern ones have been so distant that it has not been possible to see what had been there beforehand."

Is SETI@home Where Your Cycles Belong? 202

Yesterday's post about a Wall Street Journal article critiquing the current allocation of distributed number-crunching projects drew a huge range of comments, some favoring the proposition that seemingly quixotic distributed-computing endeavors (specifically, the alien-hunting SETI@home project) were diverting resources better spent on closer-to-home, pragmatic research, such as cancer or climate prediction, or perhaps best never converted to electricity in the first place. Read on for the Backslash summary of the conversation.

Remote or Unattended Installation Solutions? 45

HaloZero asks: "I work for a medium-sized company (350+ users), and am charged with new builds and deployments for a mix of aged and new desktops, and a smattering of similar laptops. The hardware is certainly not uniform across the entire infrastructure. Our current deployment 'system' (Ghost/Sysprep, Acronis/NewSID) is somewhat of a kludge -- as my mentor would say -- and I've been looking into alternative, cleaner methods. We're burgeoning on an Active Directory domain, so RIS has been the hot topic on my desk as of late. Does anyone have any experience with RIS? Is there anything that isn't very well documented that I should watch out for? We're considering other unattended install solutions, such as nLite, and a composite of Bart's PE Builder-type setups. Any other suggestions out there?"

Bellagio Fountains Recreated with Mentos and Coke 220

Trip writes "What happens when you combine 200 liters of Diet Coke and over 500 Mentos mints? It's amazing and completely insane. The first part of this video demonstrates a simple geyser, and the second part shows just how extreme it can get. Over one hundred jets of soda fly into the air in less than three minutes. It's a hysterical and spectacular mint-powered version of the Bellagio Fountains in Las Vegas."

Extortion Virus Code Cracked 371

Billosaur writes "BBC News is reporting that the password to the dreaded Archiveus virus has been discovered and is now available to anyone who needs it. Archiveus is a 'ransomware' virus, which combines files from the My Documents folder on Windows machines and exchanges them for a single, password-protected file, which it will not unlock unless a password is given. The user would normally be required to pay the extortionist money in order to receive the password, but apparently the virus writer made one small, critical error in coding: placing the password in the code. BTW, the 30-digit password locking the files is mf2lro8sw03ufvnsq034jfowr18f3cszc20vmw."

Google's Insular Nature 188

stockpicker_dude_78 writes "Robert Cringley has written a thought-provoking article on Google's insular nature, and compares them to the similar environment at Microsoft." From the article: "Google is secretive. This started as a deliberate marketing mystique, but endures today more as a really annoying company habit. Google folks don't understand why the rest of us have a problem with this, but then Google folks aren't like you and me. The result of this secrecy and Google's 'almighty algorithm' mentality is that the company makes changes -- and mistakes -- without informing its customers or even doing all that much to correct the problems."

AT&T Accidentally Leaks NSA Suit Information 274

op12 writes "CNET has an article describing how AT&T accidentally leaked sensitive information involving the NSA lawsuit. From the article: 'AT&T's attorneys this week filed a 25-page legal brief striped with thick black lines that were intended to obscure portions of three pages and render them unreadable. But the obscured text nevertheless can be copied and pasted inside some PDF readers, including Preview under Apple's OS X and the xpdf utility used with X11. The deleted portions of the legal brief seek to offer benign reasons why AT&T would allegedly have a secret room at its downtown San Francisco switching center that would be designed to monitor Internet and telephone traffic. The Electronic Frontier Foundation, which filed the class action lawsuit in January, alleges that room is used by an unlawful National Security Agency surveillance program.""

Busting People for Pointing Out Security Flaws 350

gsch writes "'In 2004, Bret McDanel was convicted of violating section 1030 when he e-mailed truthful information about a security problem to the customers of his former employer. The prosecution argued that McDanel had accessed the company e-mail server by sending the messages, and that the access was unauthorized within the meaning of the law because the company didn't want this information distributed. They even claimed the integrity of the system was impaired because a lot more people (customers) now knew that the system was insecure. Notwithstanding the First Amendment's free speech guarantees, the trial judge convicted and sentenced McDanel to 16 months in prison. I represented him on appeal, and argued that reporting on security flaws doesn't impair the integrity of computer systems. In an extremely unusual turn of events, the prosecution did not defend its actions, but voluntarily moved to vacate the conviction.'"
The Almighty Buck

The FAA Saves $15 Million by Migrating to Linux 191

Neopallium writes "Red Hat has announced that the U.S. Department of Transportation's Federal Aviation Administration (FAA) saved the federal government more than $15 million in datacenter operating and upgrading costs by migrating to Red Hat Enterprise Linux. The FAA executed a major systems migration to Red Hat Enterprise Linux in one-third of the original scheduled time and with 30 percent more operational efficiency than the previous system."

J.J. Abrams To Direct New 'Star Trek' Film 482

Tycoon Guy writes "TrekToday reports that Paramount has asked 'Lost' creator J.J. Abrams to direct a new 'Star Trek' film. The movie will be set at Starfleet Academy and will feature younger versions of James T. Kirk and Spock, chronicling their first meeting at the Academy and their first outer space mission. The movie is set for a 2008 release and will apparently be one of Paramount's biggest projects for the year."

OS Virtualization Interview 184

VirtualizationBuff writes "KernelTrap has a fascinating interview with Andrey Savochkin, the lead developer of the OpenVZ server virtualization project. In the interview Savochkin goes into great detail about how virtualization works, and why OpenVZ outshines the competition, comparing it to VServer, Xen and User Mode Linux. Regarding virtualization, Savochkin describes it as the next big step, 'comparable with the step between single-user and multi-user systems.' Savochkin is now focused on getting OpenVZ merged into the mainline Linux kernel."

Does Anyone Still Use Token Ring? 185

blanchae asks: "Does anyone still use Token Ring, or is it dead? I remember hearing about 100 mbps TR a few years ago but nothing since. I remember that the strong point of TR over Ethernet was the QOS and the consistent response time. Does the banking community still use TR?"

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...