Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
United States

Submission + - The Great Iraq Swindle

Drahgkar writes: Have you ever wondered where all the money the government has spent on the war in Iraq has gone? Wonder no more as you read The Great Iraq Swindle on Rolling Stone's website. "How is it done? How do you screw the taxpayer for millions, get away with it and then ride off into the sunset with one middle finger extended, the other wrapped around a chilled martini? Ask Earnest O. Robbins — he knows all about being a successful contractor in Iraq."
Security

Submission + - How to Steal 80,000 Identities in One Day

nitsudima writes: How do you get the attention of the executives at your company if you feel the security systems are lacking? Fake a news article on a huge break in and place it on the CEO's desk. The Security hosts at Informit were asked to create such a story, and they posted it as a case study as to just how someone could Steal 80,000 Identities in One Day.
Announcements

Submission + - Report: Small Portion of Next-Gen Titles to be Pro

njkid1 writes: "If publishers aren't careful, they could be left with empty pockets on most next-gen game projects. A new report from Screen Digest has found that a tiny proportion of next-gen titles will achieve profitability. Also, Screen Digest believes Sony's PS3 will win the console battle by 2010. http://biz.gamedaily.com/industry/feature/?id=1533 9&ncid=AOLGAM000500000000026"
Microsoft

Windows For Warships Nearly Ready 387

mattaw writes "The Register is carrying the sanest and balanced article on Windows deployment in UK warships that I have read to date in the public domain. As an ex-naval bod myself we have long considered that this is potentially a REAL problem. The main issues are the huge amount of unrelated code that is imported with the kernel and the need for incredibly fast response times."
Sci-Fi

Submission + - US Patent office considers patenting Warp Drive

darthcamaro writes: Think that Warp drive is just a figment of Star Trek imagination? Think again. A patent application is now before the USPTO to patent Warp drive.
The Worsley-Twist warp drive does not depend upon traditional emissions of matter to create thrust. Rather, the drive creates a change in the curvature of the space-time continuum — thus allowing travel by warping space-time.
Portables

Submission + - Breach in Technology History

jcatcw writes: Bert Latamore, Computerworld's PDA Guerilla, liked the movie Breach but wonders why it changes a vital detail in the historic record. The real Eric O'Neill, now a lawyer in Washington, DC, says he raced down the hall with Hanssen's PDA and a technical team copied its contents for later decryption. In the film, O'Neill takes an SD card from the PDA he removed from Hanssen's briefcase. It 'is clearly a Palm III series PDA ... The problem is that none of the Palm III models, nor the Palm VII, used memory cards of any kind and certainly not the SD cards that the Tungstens use. Now Billy Ray was so careful about historical details that he hired O'Neill as technical consultant on the film and consulted with O'Neill on details like the gun models shown in a two-second shot of the inside of Hanssen's car trunk, ... So why did he fake this important detail?'
Security

Submission + - Hired to Create FUD: Faking an Network Break-in

tempered56 writes: "How do you get the attention of the executives at your company if you feel the security systems are lacking? Fake a news article on a huge break in, print it up on news paper, and strategically leave copies around the office. Well, the folks at InformIT.com were asked to create such a piece of FUD for a CISO who wanted to try something a bit out of the ordinary — an news article describing how his company Lost 80000 Identities in One Day."
Businesses

Are Exclusive Games GameStop's Secret Weapon? 102

An anonymous reader writes "It's one thing to try to muscle out the competition, but when you start to lock down the sales of certain games, consumers lose. This is how GameStop hopes to compete against the big box retailers. With sales of games predominantly happening at stores like Walmart or Best Buy, they must feel that extreme measures are required. 'Chulip--an offbeat game involving kissing--has been released in the US to the cheers of fans of quirky games. The only problem is that EBGameStop is going to be the only place to buy it. Strategy gamers will be annoyed to hear that The Settlers for the DS will also be an EBGameStop exclusive. The game has been getting some favorable early buzz, but if you'd like to buy it on the 28th of next month... well, you know where you'll have to go.'"
Portables

Submission + - Verizon Gafs on Bluetooth Again

Chris writes: "Verizon, known for hindering Bluetooth and disabling profiles in phones, can't seem to get a break. Now, they're promoting Bluetooth profiles that never even existed in phones! The Samsung u740 was touted as having A2DP (Bluetooth Stereo Headphone) support, however, customers are finding out that it doesn't. Worse, the flash-based marketing page clearly has the phone wrapped around a set of wireless headphones...

http://www.phonenews.com/content/view/1884/1/"
The Internet

Journal Journal: Coming coming Internet revolution in science

The Internet may soon change how the cognitive and social sciences are conducted, much in the way the open source movement has changed software, wikipedia has changed information gathering, etc. In the traditional lab-based model, scientists pay a small number of people to be subjects, subjecting them to a lot of testing. (By "a lot", I mean typically 1 hour, but it can last much longer.) The experiments are very carefully controlled in the lab. Now, as bandwidth has increased dramatically, it i
Security

Submission + - Where to report attempted break-ins?

tomscott writes: I run Linux and have opened port 22 on my cable modem so that I can SSH into my system from work. Being able to SSH into my system also gives me the oppurtunity to monitor my system and I noticed while running top that there were a lot of SSH connections begining and ending quickly. So I took a look at my /var/log/messages file and saw: Feb 26 02:33:05 tsc64 sshd[8115]: Did not receive identification string from 65.107.44.150 Feb 26 02:34:19 tsc64 sshd[8119]: Failed password for root from 65.107.44.150 port 4407 ssh2 Feb 26 02:34:20 tsc64 sshd[8121]: Invalid user admin from 65.107.44.150 Feb 26 02:34:20 tsc64 sshd[8121]: Failed password for invalid user admin from 65.107.44.150 port 44127 ssh2 ... Feb 26 07:04:06 tsc64 sshd[11384]: Invalid user test from 219.239.98.111 Feb 26 07:04:06 tsc64 sshd[11384]: Failed password for invalid user test from 219.239.98.111 port 59963 ssh2 So I am seeing two unauthorized systems try to gain access to mine via SSH. As far as I have seen in the logs no one has actually gained access to my system which is good. I would like to know if there is an organization or group or even if I should contact the police to report such things?
Democrats

Submission + - Are Democrats shooting themselves in the foot?

An anonymous reader writes: The message I am getting from the media is that if the Democrats take the Presidency in 2008, they will pull us out of Iraq. The impression I get from my own personal experience is that the American public wants an end to the Iraq war but at the same time does not want to abandon Iraq since we are responsible for breaking them. The tone of the media suggests that the Democrats do not want a solution to the Iraqi situation, but rather wants to abandon Iraq. Are Americans ready to abandon Iraq? If the Democrats take this stance, will they alienate the general public and cause another Republican to become President in 2008?

Slashdot Top Deals

"When the going gets tough, the tough get empirical." -- Jon Carroll

Working...