Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Image

Jetman Attempts Intercontinental Flight 140

Last year we ran the story of Yves Rossy and his DIY jetwings. Yves spent $190,000 and countless hours building a set of jet-powered wings which he used to cross the English Channel. Rossy's next goal is to cross the Strait of Gibraltar, from Tangier in Morocco and Tarifa on the southwestern tip of Spain. From the article: "Using a four-cylinder jet pack and carbon fibre wings spanning over 8ft, he will jump out of a plane at 6,500 ft and cruise at 130 mph until he reaches the Spanish coast, when he will parachute to earth." Update 18:57 GMT: mytrip writes: "Yves Rossy took off from Tangiers but five minutes into an expected 15-minute flight he was obliged to ditch into the wind-swept waters."
Education

Students Take Pictures From Space On $150 Budget 215

An anonymous reader writes "Two MIT students have successfully photographed the earth from space on a strikingly low budget of $148. Perhaps more significantly, they managed to accomplish this feat using components available off-the-shelf to the average layperson, opening the door for a new generation of amateur space enthusiasts. The pair plan to launch again soon and hope that their achievements will inspire teachers and students to pursue similar endeavors."

Comment Park by Phone (Score 1) 863

The town of Wrightsville Beach, NC uses regular parking meters. In additon to using coins, each meter has a unique serial numbered clearly marked, and you can pay for your parking using your cell phone. You have to sign up online - I managed to sign up via my BlackBerry for the first use. It's really convenient and best of all - you can "feed the meter" via cell phone without returning to your car. http://www.park-by-phone.com/
Image

Man Accuses Cat of Downloading Child Porn 174

bruce_the_loon writes "They have blamed viruses. They have blamed neighbors. They have accused police of planting it. In rare cases, they have admitted downloading it. This is the first time someone has accused a cat of downloading child porn onto their computer. This seems like a defense almost too stupid to be made up."
Security

New Click-Fraud Attack Is Stealthiest Yet 99

An anonymous reader sends news from The Washington Post's Security Fix blog of a new Trojan horse program that takes click fraud to the next level. The Trojan, dubbed FFsearcher by SecureWorks, was among the pieces of malware installed by sites hacked with the Nine-Ball mass compromise, which attacked some 40,000 Web sites this month. The Trojan takes advantage of Google's "AdSense for Search" API, which allows Web sites to embed Google search results alongside the usual Google AdSense ads. (SecureWorks' writeup indicates that Yahoo search is targeted too, but the researchers saw no evidence if the malware redirecting Yahoo searches.) While most search hijackers give themselves away on the victim's machine by redirecting the browser through some no-name search engine, FFsearcher "...converts every search a victim makes through Google.com, so that each query is invisibly redirected through the attackers' own Web sites, via Google's Custom Search API. Meanwhile, the Trojan manipulates the victim's PC and browser so that the victim never actually sees the attacker-controlled Web site that is hijacking the search, but instead sees the search results as though they were returned directly from Google.com (and with Google.com in the victim browser's address bar, not the address of the attacker controlled site). Adding to the stealth is the fact that search results themselves aren't altered by the attackers, who are merely going after the referral payments should victims click on any of the displayed ads. What's more, the attackers aren't diverting clicks or ad revenue away from advertisers or publishers, as in traditional click fraud: They are simply forcing Google to pay commissions that it wouldn't otherwise have to pay." If FFSearcher were the only piece of malware on the machine, it would have a better chance of staying under the radar.
Robotics

Submission + - Tweenbots Test NYC Pedestrian-Robot Relations (tweenbots.com)

MBCook writes: "Kacie Kinzer seems to have come up with the idea to see if people in New York City would help a cute little robot get where it's going, and thus created tweenbots.

Tweenbots are human-dependent robots that navigate the city with the help of pedestrians they encounter. Rolling at a constant speed, in a straight line, Tweenbots have a destination displayed on a flag, and rely on people they meet to read this flag and to aim them in the right direction to reach their goal.

"

The Almighty Buck

Rescued Banks Sought Foreign Help During Meltdown 749

theodp writes "An AP review of visa applications has found that major US banks sought permission to bring thousands of foreign workers into the country under the H-1B visa program, even as the banking system was melting down and Americans were being laid off. The dozen banks now receiving the biggest rescue packages, totaling more than $150 billion, requested visas for more than 21,800 foreign workers over the past six years. (It's not known how many of these were granted; the article notes 'The actual number is likely a fraction of the... workers the banks sought to hire because the government only grants 85,000 such visas each year among all US employers.') The American Bankers Association blamed the US talent pool for forcing the move, saying they couldn't find enough Americans capable of handling sales, lending, and bank administration. The AP has filed FOIA requests to force the US Customs and Immigration Service to disclose further details on the bailed-out banks' foreign hires."
The Internet

Network Solutions Under Large-Scale DDoS Attack 139

netizen writes "CircleID is reporting a large-scale DDoS attack affecting all of Network Solutions' name servers for the past 48 hours, potentially affecting millions of websites and emails around the world hosting their domain names on the company's servers. The NANOG mailing list indicates that it is due to a very large-scale UDP/53 DDoS which Network Solutions has also confirmed: 'There is a spike in DNS query volumes that is causing latency for the delay in web sites resolving. This is a result of a DDOS attack. We are taking measures to mitigate the attack and speed up queries.""
Linux

Getting Inked for Tux at OSCON 108

OSCON isn't just a gathering for talks on topics like Creating Location-aware Web 2.0 Applications on an Open Source Geospatial Platform and fightin' words from the stage; it's also an excuse for some interesting social gatherings, like this year's Community Choice awards (organized and sponsored by the corporate overlords at SourceForge, as you might recall, and with Slashdot's own special category), at which, among other festive activities, attendees were offered the chance to get open-source-related tattoos. There are shots of some of these up on the SourceForge Community pages, and — with some overlap — even more in this set at Flickr. (My pasty bicep^h^h^h^h^h shoulder is the one now adorned with a circled head of a happy Tux ala IBM; I was expecting it to hurt more than it actually did.) Anyone with techie tattoos, please disclose below.
The Internet

Your Online Profile Actually Tells a Lot About You 272

An anonymous reader writes "Despite all the media reports that your Facebook profile is giving the wrong impression, a psychological study shows people really can understand your personality from your online profile. Turns out you're not giving the wrong impression with your profile; you're giving the right impression to the wrong people. You can actually learn more about someone's Agreeableness from their online profile than from a first date."
Businesses

Dead At 92, Business Computing Pioneer David Caminer 142

Brooklyn Bob points out this fascinating obituary of David Caminer, the first systems analyst. "The tea company he worked for developed their own hardware and software — in 1951! Quoting New Scientist: 'In today's terms it would be like hearing that Pizza Hut had developed a new generation of microprocessor, or McDonald's had invented the Internet.'"

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...