Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications

When Telemarketers Harass Telecoms Companies 234

farnz writes "Andrews & Arnold, a small telecoms company in the UK, have recently been hit with an outbreak of illegal junk calls. Unlike larger firms, they've come up with an innovative response — assign 4 million numbers to play recordings to the telemarketers, put them on the UK's Do-Not-Call list and see what happens. Thus far, the record is over 3 minutes before a telemarketer works out what's going on." The sound quality (and the satisfying humor) of the recording gets better as it goes on.

Submission + - Pirate Party to host The Pirate Bay in parliament (piratpartiet.se) 1

m94mni writes: The Swedish Pirate Party has announced today that they will host The Pirate Bay from inside the Swedish parliament, should they gain enough votes (4%) in the elections on September 19. The party plans to take advantage of parliamentary immunity to protect information freedom from being abused be the entertainment industry.
Mars

NASA Gives Mars Rover Extra Smarts 116

coondoggie writes "NASA today said it upgraded the software controlling its Mars Rover Opportunity to let it make its own decisions about what items like rocks and interesting red planet formations to focus its cameras on. The new system, which NASA uploaded over the past few months, is called Autonomous Exploration for Gathering Increased Science, or AEGIS and it lets Opportunity's computer examine images that the rover takes with its wide-angle navigation camera after a drive, and recognize rocks that meet specified criteria, such as rounded shape or light color. It can then center its narrower-angle panoramic camera on the chosen target and take multiple images through color filters, NASA stated."
Censorship

A Second Lessig Fair-Use Video Is Suppressed By WMG 187

Bios_Hakr points out an ironic use of the DMCA: for the second time, a video tutorial on fair use that Larry Lessig uploaded to YouTube has been muzzled. This time the sound has been pulled from the video; last time the video was taken off of YouTube. (Video and sound for the new "webside chat" can be experienced together on BlipTV.) Both times, Warner Music Group was the party holding copyright on a song that Lessig used in an unarguably fair-use manner. TechDirt is careful not to assume that an actual DMCA takedown notice was issued, on the likelihood that Google's automatic copyright-violation detectors did the deed. "The unintended consequences of asking tool providers [e.g., Google] to judge what is and what is not copyright infringement lead to tremendous problems with companies shooting first and asking questions later. They are silencing speech, on the threat that it might infringe on copyright. This is backwards. We live in a country that is supposed to cherish free speech, not stifle it in case it harms the business model of a company. We live in a country that is supposed to encourage the free expression of ideas — not lock it up and take it down because one company doesn't know how to adapt its business model. We should never be silencing videos because they might infringe on copyright."
Security

New "Spear Phishing" Attacks Target IT Admins 134

snydeq writes "A new breed of 'spear phishing' aimed at IT admins is making the rounds. The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses. The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider. 'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate — especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares. Certainly fodder for some bone-headed mistakes on the part of admins, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.'"
User Journal

Journal Journal: Marketing to myself but nobody else?

Recently I came into some money that I could afford to invest so, being a coder I had visions of grandeur and decided to make a dream come true. I had been testing out some php/mysql code and decided to buy the real thing from someone else and start a website. Well, here is where the problem lies, making the code changes was the easy part, setting up a merchant gateway was easy. The thing that I have discovered is that I have no idea of how to create traffic, advertising I guess you might cal

Security

Submission + - DIY: Defending Against A DDoS Attack (darkreading.com)

IDOXLR8 writes: "There's no way to prevent a distributed denial-of-service (DDoS) attack, but there are some do-it-yourself techniques and strategies for fighting back and minimizing its impact.

DDoS victims can "tarpit," or force the attacking bot to drastically scale back its payload, enlist the help of the botnet hunter community, or even get help to wrest control of the botnet. Joe Stewart, a researcher with SecureWorks' Counter Threat Unit, says these self-defense techniques are little known or used today by victims of DDoS attacks, but they offer an alternative to purchasing a commercial DDoS product or service and working with ISPs to try to stop an attack."

Hardware Hacking

DIY 1980s "Non-Von" Supercomputer 135

Brietech writes "Ever wanted to own your own supercomputer? This guy recreated a 31-processor SIMD supercomputer from the early 1980s called the 'Non-Von 1' in an FPGA. It uses a 'Non-Von Neumann' architecture, and was intended for extremely fast database searches and artificial intelligence applications. Full-scale models were intended to have more than a million processors. It's a cool project for those interested in 'alternative' computer architectures, and yes, full source code (Verilog) is available, along with a python library to program it with." Hope the WIPO patent has expired.
Data Storage

Coming Soon, 250 DVDs In a Quarter-Sized Device 209

Several readers have remarked on a new technique developed by scientists at UC Berkeley and University of Massachusetts Amherst that has the promise of achieving storage densities of 10 terabits per square inch. "The method lets microscopic nanoscale elements precisely assemble themselves over large surfaces. ... Xu explained that the molecules in the thin film of block copolymers — two or more chemically dissimilar polymer chains linked together — self-assemble into an extremely precise, equidistant pattern when spread out on a surface... Russell and Xu conceived of the elegantly simple solution of layering the film of block copolymers onto the surface of a commercially available sapphire crystal. When the crystal is cut at an angle... and heated to 1,300 to 1,500 degrees Centigrade... for 24 hours, its surface reorganizes into a highly ordered pattern of sawtooth ridges that can then be used to guide the self-assembly of the block polymers."
Privacy

Bill Would Require ISPs, Wi-Fi Users To Keep Logs 857

suraj.sun notes CNet reporting on bills filed in the US House and Senate that would require all ISPs and operators of Wi-Fi hotspots — including home users — to maintain access logs for 2 years to aid in law enforcement. The bills were filed by Republicans, but the article notes that the idea of forcing data retention has been popular on both sides of the aisle over the years. "Republican politicians on Thursday called for a sweeping new federal law that... would impose unprecedented data retention requirements on a broad swath of Internet access providers and is certain to draw fire from businesses and privacy advocates. ... Each [bill] contains the same language: 'A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user [i.e., DHCP].'"
Space

Collided Satellite Debris Coming Down? 155

Jamie found this Bad Astronomy blog on the many reports beginning about 7 hours ago of one or more fireballs in the sky across Texas. That blog's proprietor first doubted that the phenomena could be due to the satellites that collided in orbit last week, but later left the possibility open. The National Weather Service for Jackson, KY put out an announcement about possible explosions and earthquakes across the area and blamed the defunct satellites. "These pieces of debris have been causing sonic booms...resulting in the vibrations being felt by some residents...as well as flashes of light across the sky. The cloud of debris is likely the result of the recent in orbit collision of two satellites on Tuesday...February 10th when Kosmos 2251 crashed into Iridium 33." An Austin TV station has more reports.
Patents

Submission + - Pirate Bay - Pirate Bus En Route

IDOXLR8 writes: "The Harvard Law students defending accused file-swapper Joel Tenenbaum are doing their best to turn his upcoming trial into a media event, but when it comes to pure spectacle, they have nothing on The Pirate Bay. They are referring to the event as a "spectrial," a combination of "spectacle" and "trial." They have also set up a site where you can track their current location, complete with journal entries. The trial begins next Monday and comes complete with a live audio feed and Twitter translations."
Windows

Submission + - Falling into the Vista Trap

iB1 writes: Business editor of the BBC Tim Weber has an interesting tale of woe about his experience of upgrading from XP to Vista. Although it appears that the initial upgrade went without a hitch, it was the frustrating realisation that a substantial number of his peripherals did not and would never work with Vista that tipped him over the edge.
Microsoft

Submission + - Is Vista a trap?

logube writes: BBC has an article about installing Vista in your existing desktop. Written by Tim Weber, a self-confessed "sucker for technology", this article is a good introduction to the pain and extra money required to get on the latest product of the evil empire. See how you can spend an extra 130 british pounds, and still have no working webcam!
Windows

Submission + - Vista activation cracked by brute force

Bengt writes: The Inquirer has a story about a brute force Vista key activation crack.

From TFA: The crack is a glorified guesser, and with the speed of modern PCs and the number of outstanding keys, the 25-digit serials are within range. The biggest problem for MS? If this gets widespread, and I hope it will, people will start activating legit keys that are owned by other people.

There is really no differentiating between a legit copy with a manually typed in wrong key and a hack attempt. Sure MS can throttle this by limiting key attempts to one a minute or so on new software, but the older variants are already burnt to disk. The cat is out of the bag. The crack was first mentioned on the Keznews forums, a step by step How-to can be found HERE

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...