Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Space

Herschel's First Science Results, Eagle Nebula 91

davecl writes "Over the next three days, many new science results will come out from Herschel. The first of these, a view deep inside the stellar nursery of the Eagle Nebula, finds a huge amount of activity, revealing new stars and filaments of dust that could not have been detected by previous telescopes. Also open today is OSHI, the online showcase of Herschel images where all the new science images will be found. Herschel news also available on the Herschel Mission Blog."
Linux Business

Dell To Offer Open Source Bundles 84

ruphus13 writes "Dell has been offering Linux-based machines for a while, especially its Server-class machines. Now, Dell has decided that there are several open source applications that are ready for mainstream consumers. From the post, 'While we've all been speculating about whether Dell is working on Android netbooks, the computer hardware and software vendor was busy bundling open source applications to offer to small- and medium-sized business customers looking for low-cost alternatives to commercial software. The pre-configured "SMB-in-a-box" software is only available in the US for now, but Dell expects to launch a similar offering in Asia by the end of 2009... Although no specifics have been given about which apps are included in Dell's first bundle, it is aimed at the retail sector.' It is going to be interesting to see what Dell picks as the 'must-have' applications for the SMB market."
Networking

How Demigod's Networking Problems Were Fixed 65

The launch of Demigod was troubled by piracy and networking difficulties, which publisher Stardock worked quickly to correct. They've now released a documentary that gives a detailed look behind the scenes of diagnosing and fixing those problems. It includes meetings, interviews with the devs, and part of the bug-tracking process during a frenzied 108-hour work week.
Worms

Twitter Gets Slammed By the StalkDaily XSS Worm 145

CurtMonash writes "Twitter was hit Saturday by a worm that caused victims' accounts to tweet favorably about the StalkDaily website. Infection occurred when one went to the profile page of a compromised account, and was largely spread by the kind of follower spam more commonly used by multi-level marketers. Apparently the worm was an XSS attack, exploiting a vulnerability created in a recent Twitter update that introduced support for OAuth, and it was created by the 17-year-old owner of the StalkDaily website. More information can be found in the comment thread to a Network World post I put up detailing the attack, or in the post itself. By evening, Twitter claimed to have closed the security hole."

Comment Re:I don't understand Pro Gaming (Score 1) 207

I think you are confusing leagues with teams

Leagues are sponsored and run the tournaments, which the players/teams come to compete in and win prize money

Teams are sponsored and provide their players with salaries/travel to events/hardware, whether they take a cut from players is up to them /I work for an international eSports league

Privacy

RMS and Clipperz Promoting Freedom In the Cloud 156

mbarulli writes "Clipperz and Richard Stallman recently launched a joint call for action to bring freedom and privacy to web applications. 'The benefits of web apps are many, but quite often users lose their freedom to study, modify and discuss the source code that powers those web apps. Furthermore, we are forced to trust third parties with our data (bookmarks, text documents, chat transcripts, financial info ... and now health records!) that no longer resides on our hard disks, but are stored somewhere in the cloud.' Clipperz and RMS urge web developers to adopt the new AGPL license and build their applications using a 'zero-knowledge architecture,' a framework for web services that has been derived from Clipperz online password manager. A smooth path toward web apps based on free software that know nothing about you and your data."
United States

Air Force Mistakenly Transports Live Nukes Across America 898

kernel panic attack writes "Surely the late Stanley Kubrick is somewhere smiling at this one. Forbes.com has a story about a B-52 Bomber that mistakenly flew 6-nuclear tipped cruise missles across several states last week. The 3-hour flight took the plane from Minot Air Force Base, N.D, to Barksdale Air Force Base, La., on Aug. 30. The incident was so serious that President Bush and Defense Secretary Robert Gates were quickly informed and Gates has asked for daily briefings on the Air Force probe, said Defense Department press secretary Geoff Morrell."
Privacy

Widespread Spying Preceded '04 GOP Convention 471

Frosty Piss alerts us to a story in the New York Times reporting on details that are emerging of a far-flung spying operation lasting up to a year leading up to the 2004 Republican National Convention. The New York Police Department mounted a spy campaign reaching well beyond the state of New York. For at least a year before the convention, teams of undercover New York police officers traveled to cities across the US, Canada, and Europe to conduct covert observations of people who planned to protest at the convention. Across the country undercover officers attended meetings of political groups, posing as sympathizers or fellow activists. In at least some cases, intelligence on what appeared to be lawful activity was shared with other police departments. Outlines of the pre-convention operations are emerging from records in federal lawsuits brought over mass arrests during the convention.
Windows

Vista DRM Cracked by Security Researcher 379

An anonymous reader writes "Security researcher Alex Ionescu claims to have successfully bypassed the much discussed DRM protection in Windows Vista, called 'Protected Media Path' (PMP), which is designed to seriously degrade the playback quality of any video and audio running on systems with hardware components not explicitly approved by Microsoft. The bypass of the DRM protection was in turn performed by breaking the Driver Signing / PatchGuard protection in the new operating system. Alex is now quite nervous about what an army of lawyers backed by draconian copyright laws could do to him if he released the details, but he claims to be currently looking into the details of safely releasing his details about this at the moment though."
Google

Google Video Becomes Search-Only, YouTube Holds Content 119

Bangor writes "Google is planning to turn Google Video into a search index of all the world's available video online. The change will see YouTube becoming Google's only platform for user-generated video and premium content sales, and Google said that YouTube content would be immediately added to the Google Video search index. The company plans to expand that to eventually include all video online. From the article: 'The company said that they 'envision most user-generated and premium video content being hosted on YouTube,' which clearly suggests that the Google Video storefront will eventually give way to YouTube.'"
Games

'Over 30' Section For Games Stores? 220

A New York law introduced by Representative Keith Wright seeks just that, a section for gaming stores that keeps 'violent games' under lock and key, and is accessible only to people over 30. The law is one of two poorly-thought pieces of legislation being considered by New York state's legal system. From the 1up article: "The history of the courts striking down such legislation goes just about as far back as politicians who attempt to bolster their own image by capitalizing on the public fear and hysteria over the bogeyman of video gaming. It's interesting to note that recently, courts have begun penalizing entities who purposely waste their time with attempts at passing frivolous and unconstitutional anti-videogame legislation. You'd think might deter motions like [these] somewhat, wouldn't you?" Update: 01/19 04:10 GMT by Z : As ahecht points out in the comments 1up has things wrong here. There is only one bill, and it restricts violent games from being sold to those under 18 only. Line 5 of the bill's text is the section in question.

How Do You Know Your Code is Secure? 349

bvc writes "Marucs Ranum notes that 'It's really hard to tell the difference between a program that works and one that just appears to work.' He explains that he just recently found a buffer overflow in Firewall Toolkit (FWTK), code that he wrote back in 1994. How do you go about making sure your code is secure? Especially if you have to write in a language like C or C++?"
Unix

The Birth of vi 459

lanc writes "Bill Joy, co-founder of Sun, tells the story of how he wrote the vi editor. The article at The Register delves into his motives, who instigated the project, and some of the quirks of leaving a 'gift to mankind'. From the piece: '9600 baud is faster than you can read. 1200 baud is way slower. So the editor was optimized so that you could edit and feel productive when it was painting slower than you could think. Now that computers are so much faster than you can think, nobody understands this anymore. The people doing Emacs were sitting in labs at MIT with what were essentially fibre-channel links to the host, in contemporary terms. They were working on a PDP-10, which was a huge machine by comparison, with infinitely fast screens. So they could have funny commands with the screen shimmering and all that, and meanwhile, I'm sitting at home in sort of World War II surplus housing at Berkeley with a modem and a terminal that can just barely get the cursor off the bottom line.'"

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...