Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Censorship

University of Florida Student Tasered At Political Rally 1819

An anonymous reader writes "During a political rally at the University of Florida, an annoying student was tasered while attempting to ask Senator Kerry (D-MA) some questions regarding the 2004 election. Police are looking into whether excessive force was used to prevent the student from going over his alloted question period." There are also several YouTube videos available of the incident.
Mozilla

Does Comcast Hate Firefox? 676

destinyland writes "Comcast is the largest ISP in America. And they're requiring Internet Explorer for installations — even if you're using a Mac. The Comcast homepage even specifies that the page is optimized for IE 5.5 (which was released in 2000), and 'is not optimized for Firefox browsers and Macs.' With 13 million subscribers, you'd think they could spring for a web developer who could handle multiple browsers. (From the last line of the article: 'I'm afraid to ask how Comcast handles Linux...')"
Science

Electrically Conductive Cement 159

zero_offset writes "The Tokyo Institute of Technology has announced a process for creating an inexpensive, nearly transparent, electrically conductive alumina cement. The conductivity is comparable to metal, and the transparency should be adequate for use in display panels. The process relies upon commonplace and inexpensive metals compared to the rare metals such as iridium currently used in display panels."
Oracle

Oracle Linux Adopters Suffer Backlash 274

atbarboz writes "One of the first converts to Oracle's support for Linux said it has endured a public backlash since its decision to drop Red Hat. 'Melbourne company Opes Prime Stockbroking told ZDNet Australia that in the weeks following its announcement to adopt Oracle Linux, upset Linux enthusiasts phoned, e-mailed and wrote about the company online to complain at the decision. "People called us out of the blue to tell us we were idiots," said Opes executive director Anthony Blumberg.'"

A Free XML-Based Operating System 175

Dotnaught writes "For the past five years, Xcerion has been working on an XML-based Internet operating system (XIOS) that runs inside a Web browser and promises radically reduced development time. To provide developers with an incentive to write for the platform, Xcerion's back-end system is designed to route revenue, either from subscription fees or from ads served to users of free programs, to application authors. Think of it as Google AdSense, except for programmers rather than publishers. Is it absurd to think this poses a threat to Google and Microsoft?"
Graphics

Submission + - Consumers pledge to support open graphics drivers

the Hewster writes: "A pledge has been setup at pledgebank.com to let the Free Software and Open Source community show that they are ready to vote with their wallet and support graphics cards manufacturers with open graphics drivers.
To add incentive to either nVidia or ATI to open up their drivers, the pledge is to support the first of the two to open their drivers over the next 5 years. Disclaimer: I am the author of the pledge."
Software

Submission + - What's your favourite filesystem?

mu22le writes: "What's your favourite filesystem?
  • ext2/ext3
  • reiserfs
  • reiser4
  • xfs
  • jfs
  • zfs
  • fat32
  • ntfs
  • HFS/HFSPlus
  • cowboynealfs
"
Google

Submission + - Google to charge for web apps

zakkie writes: "According to BBC News, Google is to start charging businesses for guaranteed availability and more features in the web apps like Gmail. The article suggests the timing is bad for Microsoft and their release of Office 2007, and is a "shot across their bows"."
Security

Submission + - Scanning Ajax for XSS Entry Points

An anonymous reader writes: Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application.
Google

Defused Googlebombs May Backfire 105

linguista submits for us today an article on the Guardian site, which theorizes Google's bomb defusing may backfire on the company. Article author Nicholas Carr calls out Google for tweaking search results based on the company public image. As he notes, the Google blog entry announcing the end to bombing didn't cite a desire for better queries as the reason behind the change. Instead "... we've seen more people assume that they are Google's opinion, or that Google has hand-coded the results for these Googlebombed queries. That's not true, and it seemed like it was worth trying to correct that misperception." While the general image of Google is still that it 'does no evil', it's worth noting that the search engine is not solely a link popularity contest. The results you get from Google are tweaked by a number of factors, and at the end of the day the company has complete control over what rises to the top.
Biotech

Are TV Pharmaceutical Ads Damaging? 383

trivialscene asks: "ABC News is carrying an article about a recently published study in the medical research journal Annals of Family Medicine which examined prime time television ads run by pharmaceutical companies. The researchers concluded that the generally ambiguous ads, which appeal almost entirely to emotion rather than fact, tend to confuse viewers. They also suggest that the ads may be creating problems at the doctor's office, as some people might become convinced they need a particular medication and insist on getting it, rather than leaving the decision to trained medical professionals. What do you think about the presence of drug advertisements on television?"
Security

Remote Exploit of Vista Speech Control 372

An anonymous reader writes "George Ou writes in his blog that he found a remote exploit for the new and shiny Vista Speech Control. Specifically, websites playing soundfiles can trigger arbitrary commands. Ou reports that Microsoft confirmed the bug and suggested as workarounds that either 'A user can turn off their computer speakers and/or microphone'; or, 'If a user does run an audio file that attempts to execute commands on their system, they should close the Windows Media Player, turn off speech recognition, and restart their computer.' Well, who didn't see that coming?"
United States

US Military Tests Non-Lethal Heat Ray 420

URSpider writes "CNN and the BBC are reporting on a US military test of a new antipersonnel heat ray. The weapon focuses non-lethal millimeter-wave radiation onto humans, raising their skin surface temperature to an uncomfortable 130 F. The goal is to make the targets drop any weapons and flee the scene. The device was apparently tested on two soldiers and a group of ten reporters, which makes me wonder how thoroughly this thing has been safety tested. The government is also appealing to the scientific community for help in creating another innovative military technology: artificial 'black ice'. They hope to deploy the 'ice' in chase scenarios to slow fleeing vehicles." We discussed the military's certification to use the device last month.

Chinese Prof Cracks SHA-1 Data Encryption Scheme 416

Hades1010 writes to mention an article in the Epoch Times (a Chinese newspaper) about a brilliant Chinese professor who has cracked her fifth encryption scheme in ten years. This one's a doozy, too: she and her team have taken out the SHA-1 scheme, which includes the (highly thought of) MD5 algorithm. As a result, the U.S. government and major corporations will cease using the scheme within the next few years. From the article: " These two main algorithms are currently the crucial technology that electronic signatures and many other password securities use throughout the international community. They are widely used in banking, securities, and e-commerce. SHA-1 has been recognized as the cornerstone for modern Internet security. According to the article, in the early stages of Wang's research, there were other data encryption researchers who tried to crack it. However, none of them succeeded. This is why in 15 years Hash research had become the domain of hopeless research in many scientists' minds. "
Games

The Details of Dead Bodies in Gaming 195

Via Stephen Totilo's Second Player blog, his most recent post at MTV concerns dead bodies in videogames. This rather morbid topic may seem like a small concern, but it's a big deal for the people making the games. From the article: "Dead bodies have been vanishing in games for decades because of technical difficulties. Old 2-D games -- like just about anything on the original Atari, Sega and Nintendo systems -- could only display a limited number of character graphics, or sprites, on a TV screen at one time. Letting a zapped enemy lie prone on the playing field caused problems, limiting the amount of new things, like new on-rushing enemies, that could be drawn onto the screen. 'You would end up sacrificing one of your precious moving objects to display an essentially useless dead body,' [game designer Ralph] Barbagallo said." With the advent of the newest generation of consoles, Totilo explains, we now have the luxury of corpses as far as the eye can see.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...