Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - The Patent Problem Is Bigger Than Trolls

Bob9113 writes: Ars Technica reports the following: "Canada-based telecom Nortel went bankrupt in 2009 and sold its biggest asset--a portfolio of more than 6,000 patents covering 4G wireless innovations and a range of technologies--at an auction in 2011. Google bid for the patents, but didn't get them. Instead, they went to a group of competitors--Microsoft, Apple, RIM, Ericsson, and Sony--operating under the name "Rockstar Bidco." The companies together bid the shocking sum of $4.5 billion. This afternoon, that stockpile was finally used for what pretty much everyone suspected it would be used for--launching an all-out patent attack on Google and Android. The smartphone patent wars have been underway for a few years now, and the eight lawsuits filed in federal court today by Rockstar Consortium mean that the conflict just hit DEFCON 1."
Security

Airgap-Jumping Malware May Use Ultrasonic Networking To Communicate 265

Hugh Pickens DOT Com writes "Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. 'It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was,' says Ruiu. 'The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers.'"
Networking

Ars: Cross-Platform Malware Communicates With Sound 245

An anonymous reader writes "Do you think an airgap can protect your computer? Maybe not. According to this story at Ars Technica, security consultant Dragos Ruiu is battling malware that communicates with infected computers using computer microphones and speakers." That sounds nuts, but it is a time-tested method of data transfer, after all.
Windows

Chrome Will End XP Support in 2015; Firefox Has No Plans To Stop 257

Billly Gates writes "Microsoft is ending support for Windows XP in 2014. Fortunately for its users who want to keep browsing the web, Google is continuing to support Chrome until at least 2015. Firefox has no current plans to end support for XP. Hopefully this will delay the dreaded XPopacalypse — the idea that a major virus/worm/trojan will take down millions of systems that haven't been issued security patches. When these browsers finally do end XP support, does it mean webmasters will need to write seperate versions of CSS and JavaScript for older versions if the user base refuses to leave Windows XP (as happened with IE6)?" Update: 10/29 17:31 GMT by S : Changed headline and summary to reflect that Mozilla doesn't have plans to drop XP support any time soon.
Space

Is Europa Too Prickly To Land On? 140

astroengine writes "A deadly bed of icy javelins — known as penitentes — could be awaiting any spacecraft that tries to land on some parts of the ice-covered world Europa, say researchers who have carefully modeled the ice processes at work on parts of the Jovian moon to detect features beyond the current low resolution images. If the prediction of long vertical blades of ice is correct, it will not only help engineers design a lander to tame or avoid the sabers, but also help explain a couple of nagging mysteries about the strange moon. 'This is a game changer,' said planetary scientist Don Blankenship of the University of Texas in Austin. Blankenship has been involved in NASA's planning process for sending a reconnaissance spacecraft and eventually a lander to Europa."
Books

Book Review: The App Generation 59

First time accepted submitter Sara Konrath writes "The App Generation gives an overview of how digital media and technology may affect young people's perceptions of themselves, their ability to relate to others, and their creativity. As the director of the Interdisciplinary Program on Empathy and Altruism Research (iPEAR), my research finds that there have been generational changes in personality traits related to social functioning. For example, we find that narcissism has been rising while dispositional empathy has been declining in recent generations. I also study the relationship between such traits and the use of social media. Considering this, I was excited to get a copy of the book ahead of its release date." Keep reading for the rest of Sara's review.

Submission + - Dyson Patents Hint At 'Silent' Hair Dryer (theguardian.com)

dryriver writes: The Guardian reports: Whisper it, but it looks like Sir James Dyson – creator of the bladeless fan and bagless vacuum cleaner – is building a silent hair dryer. When Dyson, now 66, became frustrated with his wheelbarrow, he invented the 'Ballbarrow' – replacing the wheel with a ball so it would turn more easily. When he had to vacuum the house, his annoyance at conventional bag cleaners led to the invention of the Dyson cyclone cleaner. Possibly Dyson has become annoyed at the time and especially noise involved in drying his full head of hair. Diagrams that have surfaced at the UK's patents office show that his company has filed patents for 'a hand-held blower with an insulating chamber' – in other words, a hairdryer, which is already being dubbed 'the Hairblade', playing on the name of its Airblade hand dryer. Crucially, he seems to be aiming to make it much quieter than current models – rather as the Dyson bladeless fan is almost silent. Standard hairdryers are extremely loud, reaching up to 75 decibels – as loud as a vacuum cleaner, but held beside your head. The patents, which become public earlier this week, are surprisingly detailed, and show what looks like a hairdryer with an air chamber linked by two smaller cylinders to a smaller base unit. The air would flow through the two cylinders and into the base. The patent publication is a rare slip-up by Dyson, which goes to extraordinary lengths to keep its new products secret. It shrouded the launch of its most recent product – a combined tap-and-hand-dryer – in secrecy, demanding journalists sign non-disclosure agreements. Key among the phrases used in the application in the 56-page application show that it would have 'sound absorbing' and 'vibration absorbing' properties 'tuned to the resonant frequencies of the appliance2. Dyson has also focused on the safety aspect of hairdryers, where anything that gets sucked into the air intake can come into contact with the electrically heated wires which warm up the incoming air and cause a short circuit. It moves the warming element away from the air intake: 'if something is inserted into the appliance, it cannot contact the heater directly,' it says.
The Courts

Scientology's Fraud Conviction Upheld In France 321

schwit1 writes "France's top appeals court has upheld a fraud conviction and fines totaling hundreds of thousands of euros against the Church of Scientology, for taking advantage of vulnerable followers. France regards Scientology as a cult, not a religion, and had prosecuted individual Scientologists before, but the 2009 trial marked the first time the organization as a whole had been convicted. 'The head of a parliamentary group on religious cults in France, lawmaker Georges Fenech, hailed the ruling. 'Far from being a violation of freedom of religion, as this American organization contends, this decision lifts the veil on the illegal and highly detrimental practices' of the group, said Fenech. The court case followed a complaint by two women, one of whom said she was manipulated into handing over 20,000 euros in 1998 for Scientology products including an "electrometer" to measure mental energy. A second woman claimed she was forced by her Scientologist employer to undergo testing and enrol in courses, also in 1998. When she refused she was fired.'"

Submission + - The Linux Backdoor Attempt of 2003

Hugh Pickens DOT Com writes: Ed Felton writes about an incident, in 2003, in which someone tried to backdoor the Linux kernel. Back in 2003 Linux used a system called BitKeeper to store the master copy of the Linux source code. If a developer wanted to propose a modification to the Linux code, they would submit their proposed change, and it would go through an organized approval process to decide whether the change would be accepted into the master code. But some people didn’t like BitKeeper, so a second copy of the source code was kept so that developers could get the code via another code system called CVS. On November 5, 2003, Larry McAvoy noticed that there was a code change in the CVS copy that did not have a pointer to a record of approval. Investigation showed that the change had never been approved and, stranger yet, that this change did not appear in the primary BitKeeper repository at all. Further investigation determined that someone had apparently broken in electronically to the CVS server and inserted this change.

if ((options == (__WCLONE|__WALL)) && (current->uid = 0))
retval = -EINVAL;

A casual reading by an expert would interpret this as innocuous error-checking code to make wait4 return an error code when wait4 was called in a certain way that was forbidden by the documentation. But a really careful expert reader would notice that, near the end of the first line, it said “= 0” rather than “== 0” so the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words it’s a classic backdoor. We don’t know who it was that made the attempt—and we probably never will. But the attempt didn’t work, because the Linux team was careful enough to notice that that this code was in the CVS repository without having gone through the normal approval process. "Could this have been an NSA attack? Maybe. But there were many others who had the skill and motivation to carry out this attack," writes Felton. "Unless somebody confesses, or a smoking-gun document turns up, we’ll never know."
Science

Bloody Rag May Not Have Touched Louis XVI's Severed Head 87

sciencehabit writes "It seemed like the perfect forensic tale. Earlier this year, a geneticist concluded that the remains of a blood-soaked cloth stored for centuries in an 18th century gourd likely belonged to the severed head of the last French king, Louis XVI — a conclusion supported by the fact that the DNA matched that taken from a mummified head belonging to his direct ancestor, King Henry IV. So confident were some people about the findings that a company now offers a blood test for anyone who wants to see if they, too, are descendants of this royal family. But new research released today calls into question the identities of both the blood and the head, arguing that the DNA in those samples does not match the DNA in living relatives of these kings."

Submission + - A Subject of Real Gravity: The Flyby Anomaly (bbc.com)

Rambo Tribble writes: The BBC reports that Nasa's Juno spacecraft will by doing a slingshot flyby of Earth, today, on its way to Jupiter. In the process it may rewrite the science of gravity. as it will be testing why many such a slingshot pass with spacecraft has obtained an unexpected boost.

Submission + - Auto Makers To Standardize On Open Source (computerworld.com)

Lucas123 writes: There are efforts underway within the auto industry to create a standard, Linux-based platform for In-Vehicle Infotainment (IVI) systems so that cars will act more like smartphones instead of having only about 10% of that functionality today. For example, Tesla's Model S IVI system, which is based on Linux, is designed to allow drivers to navigate using Google Maps with live traffic information, listen to streaming music from any online radio station and have access to an Internet browser for news or restaurant reviews. Having an industry-wide open-source IVI operating system would create a reusable platform consisting of core services, middleware and open application layer interfaces that eliminate the redundant efforts to create separate proprietary systems by automakers and their tier 1 suppliers like Microsoft. By developing an open-source platform, carmakers can share upgrades as they arrive.
Communications

Data Mining Reveals the Emotional Differences In Emails From Men and Women 100

KentuckyFC writes "Sentiment analysis relies on vast databases of common words which are marked as positive, negative or neutral and associated with one of the eight fundamental emotions: joy, trust, fear, surprise, sadness, discuss, anger and anticipation. It is then a straightforward matter to search Tweets, novels and even fairy tales to see what emotions appear. Now, researchers have carried out the first large-scale study of sentiment in workplace emails. They examined the emotions associated with words in over 30,000 emails and analyzed the emotional differences between messages sent by men and women. It turns out that women use more cheerful words in emails than men, that men use more fear words, especially when communicating with other men, and that both men and women are far more likely to use anticipation words when emailing a member of the opposite sex. The same researchers say they are developing a Google app that will allow users to track their own emotions towards the people they correspond with in Gmail. And they plan to make a public call for volunteers willing to share their data for research purposes."

Submission + - Dice Ruins Slashdot (slashdot.org) 12

An anonymous reader writes: In an attempt to modernize Slashdot, Dice has removed everything that made Slashdot unique and worthwhile and has turned it into a generic blog site. User feedback has been unanimously negative, but this is to no avail, and users will have to head elsewhere for insightful and entertaining commentary on tech news.
Announcements

Come Try Out Slashdot's New Design (In Beta) 1191

Slashdot's biggest redesign effort ever is now in beta and you're invited to help guide it. This redesign has been shaped by feedback from community members over the past few months (a big thanks to those of you who participated in our alpha testing phase!), and we'd like your thoughts on it, too. This new design is meant to be richer but also simpler to use, while maintaining the spirit of what Slashdot is all about: News for Nerds. Stuff that matters. Read on for the details of what's included, or read this blog post. Update: 10/02 19:16 GMT by T : Since this post went live, we've been reading through the comments below as well as your (hundreds!) of emails. These are all valuable, as we continue to implement our current features into the Beta. Keep 'em coming; we love the feedback. Please keep in mind that this is called Beta for a reason; we've still folding in lots of improvements. One important thing to bear in mind is that the images are optional: check out the Classic mode by clicking on the view selection widget (just above the stories) on the Beta page.

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...