Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Image

Scientists Say a Dirty Child Is a Healthy Child 331

Researchers from the School of Medicine at the University of California have shown that the more germs a child is exposed to, the better their immune system in later life. Their study found that keeping a child's skin too clean impaired the skin's ability to heal itself. From the article: "'These germs are actually good for us,' said Professor Richard Gallo, who led the research. Common bacterial species, known as staphylococci, which can cause inflammation when under the skin, are 'good bacteria' when on the surface, where they can reduce inflammation."
Security

Xbox Live Players Targeted In Denial-of-Service Attacks 77

The BBC reports on a growing trend where some Xbox Live players are launching denial-of-service attacks against those who beat them or otherwise irritate them in games. Quoting: "'The smart thing about these Xbox tools is that they do not attack the Xbox Live network itself,' [Chris Boyd, director of malware research at Facetime Communications said.] He said the tools work by exploiting the way that the Xbox Live network is set up. Game consoles connecting to the Xbox network send data via the net, and for that it needs an IP address. Even better, said Mr Boyd, games played via Xbox Live are not hosted on private servers. The tools mean anyone with a few dollars can boot rivals off Xbox Live. 'Instead,' he said, 'a lot of games on Xbox Live are hosted by players.' ... For $20 (£13) some Xbox Live hackers will remotely access a customer's PC and set up the whole system so it can be run any time they need it. Some offer low rates to add compromised machines to a botnet and increase the amount of data flooding a particular IP address."
Operating Systems

Windows 7 To Be 256-Core Aware 441

unassimilatible writes "As new features of Windows 7 continue to trickle out, ZDNet is now reporting that it will scale to 256 processors. While one has to wonder, like with Vista, how many of the teased features will actually make it into the final OS, I think we can all agree, 256 cores is enough for anybody." This Mark Russinovich interview has some technical details (Silverlight required).
Data Storage

Silencing a Hard Drive Using Household Items 275

Reader Justblair recommends his blog entry detailing how he made a hard drive silencer for a pittance. "This article demonstrates a very easy-to-make hard drive silencer that not only outperforms most commercially available devices, but is cheaper to implement as well. Requiring very little in fabrication skills, it is an ideal addition to a media PC or HTPC. It may even suit you if your head is aching after many hours of being whined at by your hard drive."
The Internet

The Effects of the Cloud On Business, Education 68

g8orade points out two recent articles in The Economist about the rise of cloud computing. The first discusses how software-as-a-service has come to pervade online interactions. "Irving Wladawsky-Berger, a technology visionary at IBM, compares cloud computing to the Cambrian explosion some 500m years ago when the rate of evolution sped up, in part because the cell had been perfected and standardised, allowing evolution to build more complex organisms." The next article examines how the cloud will force a "trade-off between sovereignty and efficiency." Reader pjones contributes news that the Virtual Computer Lab will be supplementing more traditional computer labs at North Carolina State University, and adds, "NCSU's Virtual Computing Lab and IBM are offering the VCL code as a software 'appliance' for use in schools to link to the program. Downloads are available at ibiblio at UNC-Chapel Hill. The VCL also is partnering with Apache.org to make the software available and to allow further community participation in future development."
Robotics

Packs of Robots Will Hunt Down Uncooperative Humans 395

Ostracus writes "The latest request from the Pentagon jars the senses. At least, it did mine. They are looking for contractors to 'develop a software/hardware suite that would enable a multi-robot team, together with a human operator, to search for and detect a non-cooperative human subject. The main research task will involve determining the movements of the robot team through the environment to maximize the opportunity to find the subject ... Typical robots for this type of activity are expected to weigh less than 100 Kg and the team would have three to five robots.'" To be fair, they plan to use the Multi-Robot Pursuit System for less nefarious-sounding purposes as well. They note that the robots would "have potential commercialization within search and rescue, fire fighting, reconnaissance, and automated biological, chemical and radiation sensing with mobile platforms."
The Media

Jobs Rumor Debacle Besmirches Citizen Journalism 286

On Friday someone posted a false rumor that Steve Jobs had suffered a heart attack on CNN's unverified citizen journalism site, iReport. Apple's stock price went vertical, losing 9% before Apple stepped in and denied the rumor; the stock then recovered most of its loss. The SEC is investigating. PCWorld looks at the hit taken by citizen journalism as a result of this incident. "[The] increasingly blurred line between journalism and rumor is a serious concern for Al Tompkins, the broadcast/online group leader at The Poynter Institute — a specialized school for journalists of all media forms. 'How could you possibly allow just anybody to post just anything under your [CNN] label unless you have blazing billboards that say, "None of this has been verified, we've not looked at any of this, we have no idea if this is true"?' he asks."
Encryption

Encrypted Images Vulnerable To New Attack 155

rifles only writes "A German techie has found a remarkably simple way to discern some of the content of encrypted volumes containing images. The encrypted images don't reveal themselves totally, but in many cases do let an attacker see the outline of a high-contrast image. The attack works regardless of the encryption algorithm used (the widely-used AES for instance), and affects all utilities that use single symmetric keys. More significant to police around the world struggling with criminal and terrorist use of encryption, the attack also breaks the ability of users to 'hide' separate encrypted volumes inside already encrypted volumes, whose existence can now for the first time be revealed." The discoverer of this attack works for a company making full-disk encryption software; their product, TurboCrypt, has already been enhanced to defeat the attack. Other on-the-fly encryption products will probably be similarly enhanced, as the discoverer asserts: "To our knowledge is the described method free of patents and the author can confirm that he hasn't applied for protection."
Networking

Why the Olympics Didn't Melt the Internet 383

perlow tips his blog entry over at ZDNet on why the Internet didn't melt when millions of users streamed 480i video for a week. The short answer is Limelight Networks of Tempe, Arizona. "[W]hy the Internet didn't 'melt' is quite simple — [Limelight is] completely 'off the cloud.' In other words, unlike Akamai and similar content caching providers, their system isn't deployed over the public Internet... Limelight has partnered with over 800 broadband Internet providers worldwide... so that the content is either co-located in the same facility as your ISP's main communications infrastructure, or it leases a dedicated Optical Carrier line so that it actually appears as part of your ISP's internal network. In most cases, you're never even leaving your Tier 1 provider to get the video."
Linux

Why Is Adobe Flash On Linux Still Broken? 963

mwilliamson writes "As I sit reading my morning paper online I still cannot view the embedded videos due to auto-detection of my Flash player not working. One in every three or four YouTube videos crashes the browser. I remember sometime back reading that Adobe has a very small development team (possibly only one) working on the Linux port of Flash. It has occurred to me that Flash on Linux is the one major entry barrier controlling acceptance of Linux as a viable desktop operating system. No matter how stably, smoothly, efficiently, and correctly Linux runs on a machine, the public will continue to view it as second-rate if Flash keeps crashing. This is the worst example of being tied down and bound by a crappy 3rd-party product over which no Linux distribution has any control. GNASH is nice, but it just isn't there 100%. I really do have to suspect Adobe's motivation for keeping Flash on Linux in such a deplorable state."
Google

Outages Leave Google Apps Admins In the Hotseat 260

snydeq writes "This week's Google outages left several Google Apps admins in the lurch — and many of them are second-guessing their advocacy for making the switch to hosted apps, InfoWorld reports. The outages, which affected both Gmail and Apps, 'could serve as a deterrent to some IT and business managers who might not be ready to ditch conventional software packages that are installed on their servers,' according to the article. 'If we began to experience a similar outage more than about two or three business hours per quarter, we'd probably make Google Apps and Gmail a backup solution to a locally hosted mail system, if we used it at all,' said one Apps admin. 'And it would likely be years before we'd try a cloud-based collaborative system again from any vendor.' Coupled with recent Apple and Amazon cloud issues, these Google outages are being viewed by some as big wins for Microsoft."
Security

Apple Clients Still Vulnerable After DNS Patch 94

Glenn Fleishman sends word that SANS Institute testing indicates that, even after installing Apple's latest patch for the DNS vulnerability, Leopard desktops (not servers) are still vulnerable — or at least perpetuate risky behavior that makes exploitation easier. This matters because "With servers rapidly being patched worldwide, it's likely that the low-hanging fruit disappears, and vectors [will be] designed to attack massive numbers of clients on ISP networks."
Security

Apple Patches Kaminsky DNS Vulnerability 89

Alexander Burke writes "Apple has just released Security Update 2008-005, which patches BIND against the Kaminsky DNS poisoning issue. 'This update addresses the issue by implementing source port randomization to improve resilience against cache poisoning attacks. For Mac OS X v10.4.11 systems, BIND is updated to version 9.3.5-P1. For Mac OS X v10.5.4 systems, BIND is updated to version 9.4.2-P1.' It also closes the script-based local privilege escalation vulnerabilities, the most common examples of which were ARDAgent and SecurityAgent, and addresses other less-publicized security issues as well." A few days back we noted Apple's tardiness in fixing their corner of this Net-wide issue.
Microsoft

Microsoft's Open Source Guru Faces Tough Fight 432

coondoggie writes "Microsoft's Sam Ramji is like a turkey knocking on Thanksgiving's door. Ramji has the unenviable task of stretching his neck out into the open source world as Microsoft's representative. On top of it, his employer has preheated the oven with years of hubris, sleights of hand and broken promises. Ramji's Sisyphean task was evident last week in Portland at the Open Source Conference (OSCon) and will likely be fuel for chatter at next week's LinuxWorld gathering in San Francisco."

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...