Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Apple

Underground Mac Community Foils a Coup 253

An anonymous reader writes "In an attempted palace coup that would not have been out of place in a Shakespearian tragedy, a moderator faction at Mac Serial Junkie, one of the largest underground Mac communities, was shut out this weekend after it was discovered that many staff members were plotting a coup. The plans included a surreptitious takeover of the domain name macserialjunkie.com. In an Open Letter to the Community, the founders of MSJ explain how a number of people at the highest levels of the underground planned their takeover activities for almost two years, only to be foiled at the last minute."
Linux Business

Submission + - Not so implemented: Ubuntu Dell costs $225 more

An anonymous reader writes: One week ago the post titled Ubuntu Dell $50 Cheaper Than Vista Dell was linked to the Dell IdeaStorm page with the suggestion "Ubuntu $50 less than Windows". The status was "implemented". Today the status has changed on the same pages to "Reneged: Ubuntu Dell is $225 More Than Windows Dell". The full price of a Ubuntu Inspiron 1420N is in fact $50 cheaper compared to the same identical hardware configuration with Vista, except that a $275 free upgrade to 2GB memory and 160 GB hard drive is available for Windows only. At the time of this post, the free disk and RAM promotions are still available for Vista and Vista only on the Dell web site.
Unix

Submission + - Linux Gains Completely Fair Scheduler (kerneltrap.org)

SchedFred writes: KernelTrap is reporting that Ingo Molnar's Completely Fair Scheduler, or CFS, was just merged into the Linux Kernel. The new CPU scheduler includes a pluggable framework that completely replaces Molnar's earlier O(1) scheduler, and is described to "model an 'ideal, precise multi-tasking CPU' on real hardware. CFS tries to run the task with the 'gravest need' for more CPU time. So CFS always tries to split up CPU time between runnable tasks as close to 'ideal multitasking hardware' as possible." The new CPU scheduler should improve the desktop Linux experience, and will be part of the upcoming 2.6.23 kernel.
Space

Submission + - Man flies 193 miles in lawn chair (cnn.com)

bradgoodman writes: "BEND, Oregon (AP) — Last weekend, Kent Couch settled down in his lawn chair with some snacks — and a parachute. Attached to his lawn chair were 105 large helium balloons.

Balloons suspend Kent Couch in a lawn chair as he floats in the skies near Bend, Oregon, on Saturday.

With instruments to measure his altitude and speed, a global positioning system device in his pocket, and about four plastic bags holding five gallons of water each to act as ballast — he could turn a spigot, release water and rise — Couch headed into the Oregon sky."

Security

Submission + - Secretly monopolizing the CPU without being root

An anonymous reader writes: This year's Usenix security symposium includes a paper that implements a "cheat" utility, which allows any non-privileged user to run his/her program, e.g., like so

cheat 99% program

thereby insuring that the programs would get 99% of the CPU cycles, regardless of the presence of any other applications in the system, and in some cases (like Linux), in a way that keeps the program invisible from CPU monitoring tools (like 'top'). The utility exclusively uses standard interfaces and can be trivially implemented by any beginner non-privileged programmer. Recent efforts to improve the support for multimedia applications make systems more susceptible to the attack. All prevalent operating systems but Mac OS X are vulnerable, though by this kerneltrap story, it appears that the new CFS Linux scheduler attempts to address the problem that were raised by the paper.
Announcements

Submission + - Mythbuntu 7.10 Public Alpha 2 (mythbuntu.org)

superm1 writes: "Today the Mythbuntu team is announcing our second alpha image. This is being deliberately released shortly after Ubuntu 7.10 Tribe-2 because Mythbuntu is now tracking Ubuntu 7.10 for all packages. Also, all of our derivative specific changes are being submitted into the 7.10 repositories. Consequently, by tracking Ubuntu 7.10, we will adapt an identical target release date. See the Mythbuntu website for more information."
The Courts

Submission + - Is RIAA's Linares Affidavit Technically Valid? 1

NewYorkCountryLawyer writes: "In support of its ex parte, "John Doe", discovery applications against college students, the RIAA has been using a declaration by its "Anti-Piracy" Vice President Carlos Linares" (pdf) to show the Judge that it has a good copyright infringement case against the "John Does". A Boston University student has challenged the validity of Mr. Linares's declaration, and the RIAA is fighting back. Would appreciate the Slashdot community's take on the validity of Mr. Linares's "science"."
Software

Submission + - Open Source File Transfer Server Software?

An anonymous reader writes: My company is looking for a solution to securely transfer files between our branches, clients, etc. It has to be stable, support multiple platforms, multiple protocols, be very auditable, allow secure access, provide reporting capabilities, send status emails, and (hopefully) expandable. I'm way beyond the simple sftp or rsync scripting, but not quite to EDI (yet). I need to support multiple simultaneous transfers, and prove beyond doubt that file "x" (in a wildcarded list of unknown size) got picked up at such-and-such a time from server "A", was a certain number of bytes, was no longer being written to, and that yes, it *did* in fact get transfered to it's destination (on yet another server) safely after trying a given number of times to do so. Afterwards the source copy was archived by various means, and now peacefully reposes in another location or format. I've found a goodly number of closed solutions that do this kind of thing, from simple software to enterprise EDI solutions, but I'm having trouble finding open solutions. My boss is willing to consider them, but they have to compete feature-wise with the closed choices. Has anyone done this before with open solutions? Do you have any software recommendations?
Security

Submission + - Grand Theft Auto mod virus uses YouTube to spread

An anonymous reader writes: According to CNET, someone is using a Grand Theft Auto mod video as a way to trick viewers into infecting themselves. Although YouTube videos remain safe to view, that hasn't stopped criminals from finding new ways to entice YouTube viewers to get infected with the latest Trojan horse. The latest example is a Grand Theft Auto video for a mod called Hood Life. Watching the You Tube video is safe. The danger comes at the end when the video displays a site where you can download the game mod itself. Should you download the file and install, your computer will be compromised upon reboot.
Data Storage

Submission + - New Mass. draft proposal allows OOXML (consortiuminfo.org)

mw13068 writes: "New story from Standards Blog:

The Massachusetts Information Technology Division (ITD), the state agency that effectively launched the voyage of ODF around the world in August of 2005, has released a new version of its Enterprise Technical Reference Model. And this new draft includes Microsoft's OOXML formats as an acceptable "open format." http://www.consortiuminfo.org/standardsblog/articl e.php?story=20070702101415578"

Security

Submission + - British Bomb Scare Prompts U.S. Camera Call (thehill.com)

mattnyc99 writes: Senator Joseph Lieberman is riding the successful capture of several terror suspects by British authorities in an alleged car bomb plot this weekend as ammunition to call for wider use of surveillance cameras in the U.S. It turns out the U.K. is already testing new flying police drones equipped with closed-circuit TV cameras. So is constant urban surveillance on the horizon? Or is Britain just ready to foil the next threat even faster, with better tech than we have back in the States?
Hardware Hacking

Cryptography To Frustrate Printer-Ink Piracy 305

Zack Melich writes with news of a new front about to open in the war printer manufacturers wage with cartridge counterfeiters, refillers, and hardware hackers. A San Francisco company, Cryptography Research Inc., is designing a crypto chip to marry cartridges to printers. There's no word so far that any printer manufacturer has committed to using it. Quoting: "The company's chips use cryptography designed to make it harder for printers to use off-brand and counterfeit cartridges. CRI plans to create a secure chip that will allow only certain ink cartridges to communicate with certain printers. CRI also said that the chip will be designed that so large portions of it will have no decipherable structure, a feature that would thwart someone attempting to reverse-engineer the chip by examining it under a microscope to determine how it works. 'You can see 95 percent of the [chip's] grid and you still don't know how it works,' said Kit Rodgers, CRI's vice president of business development. Its chip generates a separate, random code for each ink cartridge, thus requiring a would-be hacker to break every successive cartridge's code to make use of the cartridge."
Networking

Submission + - IP address doomsday: 2011? (networkworld.com)

carusoj writes: "The head of the American Registry of Internet Numbers (ARIN), John Curran, this week said we would run out of IP address space under IPv4 in 2011. According to a Network World article, he said that 68% of all available IPv4 addresses are gone and only 19% are available. The remaining 13% fall into a strange category of being unavailable, which means blocks of addresses that belong to a large company, a university or an ISP and are not used."

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...