Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Science

67-Kilowatt Laser Unveiled 395

s31523 writes "Lawrence Livermore National Laboratory in California has announced they have working in the lab a Solid State Heat Capacity Laser that averages 67 kW. It is being developed for the military. The chief scientist Dr. Yamamoto is quoted: 'I know of no other solid state laser that has achieved 67 kW of average output power.' Although many lasers have peaked at higher capacities, getting the average sustained power to remain high is the tricky part. The article says that hitting the 100-kW level, at which point it would become interesting as a battlefield weapon, could be less than a year away."
Encryption

Submission + - Another Hit on AACS: Device Key Found

henrypijames writes: The intense effort by the fair-use community to circumvent AACS (the content protection protocol of HD DVD and Blu-Ray) has produced yet another stunning result: The AACS Device Key of the WinDVD 8 has been found, allowing any movie playable by it to be decrypted. This new discovery by ATARI Vampire of the Doom9 forum is based on the previous research of two other forum members, muslix64 (who found a way to located the Title Keys of single movies) and arnezami (who extracted the Processing Key of an unspecified software player). AACS certainly seems to be falling apart bit for bit every day now.
Security

Submission + - Can New York Times cause Identity Thefts ?

Vishal Mishra writes: "This is regarding a recent and very well written New York Times story on SlashDot, about Identity Thefts. While the story provides a lot of useful information, it also directs users to a search site developed by a company TrustedID, that can help people know if they have already been a victim of identity fraud. This site can potentially steal social security numbers by the way it collects SSN for verification against its database. The site does not use hashing at all, but instead requires customers to send SSN or credit card information unhashed. Here is a link to the blog describing the attack and the right secured way to build such search sites — http://vmtech.blogspot.com"
Music

Submission + - French reactions to Steve Jobs' thoughts on music

njondet writes: "Jobs' U-turn on DRMs has been received in France with a mix of disbelief from independent labels, defiance from the majors (whose largest member is French-owned Universal Music), and a hint of self-congratulation from the Culture Minister (picture, right) who argues that the new law will guarantee interoperability whether DRMs are dropped or not. http://french-law.net/index.php?option=com_content &task=view&id=21&Itemid=1"
Movies

Submission + - BitTorrent Inc Launches Digital Media Store

An anonymous reader writes: BitTorrent Inc announced that they will open their video store this Monday.

Movies will only be available for rental. Older titles will cost $2.99, while new releases will go for $3.99. Customers can take up to a month to watch a film. Once they start watching a title, they have up 24 hours to finish it. TV shows and music videos are "download to own" and cost $1.99 each.
All the content will be protected with Windows DRM, Ironically enough BitTorrent COO Ashwin Navin stated that DRM "will inspire people to pirate content".
Privacy

Submission + - Sarkozy wins piracy case

njondet writes: "Nicolas Sarkozy, the French Interior Minister and presidential candidate for the centre-right UMP party, has won a privacy case against a Swiss newspaper which had published information about his marital difficulties. The tribunal held that, though the announcement of his couple's separation did not breach his private life, the publication of details and allegations surrounding the separation did. http://french-law.net/index.php?option=com_content &task=view&id=16&Itemid=1"
Wireless Networking

Submission + - TV station transmits over kitchen wok

nut writes: A new local tv station at the bottom end of New Zealand, 45 South chose a $10 wok over a $20 000 commercial transmission dish. They claim better performance than their previous commercial aerials, as the solid metal of the wok prevents interference from behind the dish that plagued earlier wire mesh aerials.

The technology was originally developed by computer programmer Ken Jones to get broadband access at his rural property. Instruction on build your own Wok wireless acess point can be found here.
Networking

Submission + - Improvements to the Download Process

ant_tmwx writes: Metalinks collect information about files in an XML format used by programs that download. The information includes mirror lists, ways to retrieve the file on P2P networks, checksums for verifying and correcting downloads, operating system, language, and other details. Using Metalinks details the Free Software programs you can use to download them with. There are also clients on Mac and Windows. With a list of multiple ways to download a file, programs can switch to another method if one goes down. Or a file can be downloaded from multiple mirrors at once, usually making the download go much faster. Downloads can be repaired during transfer to guarantee no errors. All this makes things automatic which are usually not possible or at least difficult, and increases efficiency, availability, and reliability over regular download links. OpenOffice.org, openSUSE, and other Linux/BSD distributions use them for large downloads.
Businesses

Are Unfinished Products Now the Norm? 111

Paul asks: "Long ago when digital synthesizers first became commonly available, I recall a reviewer lamenting how he was getting more and more products to test whose software was unfinished and buggy and would require updates and fixes (this, before the internet allowed easy downloads, would have meant a journey to a specialist repair center). The review also commented how this common problem with computer software was spreading (this was before Windows 95 was out), and asked if it was going to become the norm. These days it seems ubiquitous, with PDAs, digital cameras, PVRs and all manner of complex goods needing after-market firmware fixes often simply to make them have the features promised in the adverts, let alone add enhancements. Are we seeing this spread beyond computers and computer-based products; jokes apart, will we be booting our cars up and installing flash updates every week to prevent computer viruses getting into the control systems? Can anyone comment on any recent purchases where they've been badly let down by missing features, or are still waiting for promised updates even whilst a new model is now on the shelves? How can we make the manufacturers take better responsibility? Apart from reading every review possible before making a purchase, what strategy do you have, or propose, for not being caught out?"
It's funny.  Laugh.

What Vista Is Really Like 305

This waking dream has been making the rounds: what if you woke and found a strange and beautiful woman in your bed, and she was inscrutible, unpredictable, and dangerous... but oh so beautiful? That's Vista for you.
Security

Submission + - Connex SMS service hacked in Australia

An anonymous reader writes: Train operator Connex is investigating the origin of a hoax text message sent to thousands of Victorian commuters, saying its inspectors loved killing people and would help bomb a train. About 10,000 commuters who subscribe to the train operator's timetable messaging service received the threatening text message on Friday night after hackers broke into the system. The message, sent after 9.30pm (AEDT), reads: ALLAHU AKBR FROM CONNEX! our inspectorS Love Killing people — if you see one coming, run. Want to bomb a train? they will gladly help. See you in hell! http://news.ninemsn.com.au/article.aspx?id=229232
The Internet

Submission + - Why Vandalize Wiki's?

An anonymous reader writes: Why are people fascinated with vandalizing Wiki's, such as Wikia, Wikipedia, or Wikibooks? Sure, some of the reasons are obvious, such as Link Spam, but what motivates users to post full page vandalizations such as a few on Wikia, knowing those reverts will be undone shortly? What are these vandals trying to accomplish? I can understand the pride in defacing a web site that has security you need to break, but isn't it a moot point "hacking" a publicly editable site? It's an interesting social phenomenon, and I'd love to hear from the vandals themselves.
Spam

Submission + - "Spam Be Gone" and search moderation

What about Bob writes: "Search engine spam has become the achilles heal for the major search players.The more you index, the more spam you deal with- not going away. Sproose, a new social search engine allows the users to "vote" and rank the index of a users favorite sites, creating a personalized index. This moves the URL's up or down depending on the vote -score. It then moves the voted sites up or down for all users through a weighted score. So what does this have to do with spam? Spam essentially, over time gets pushed down in the voted index by the collective moderation of the users. Instead of spammers gaming the algorithmic search, people score one up over spam. www.sproose.com"
The Internet

Submission + - ESA Pushes U.S. Law on Canadian Mod Chips

An anonymous reader writes: The Entertainment Software Alliance recently demanded that Canada be placed on a blacklist for piracy, but apparently isn't waiting for Canada to change the law. A new report finds that the lobby group is now targeting mod chips in Canada and claiming that U.S. copyright law applies to Canadians who use them for personal purposes.
Books

DRM Causes Piracy 413

igorsk recommends an essay by Eric Flint, editor at Baen Publishing and an author himself, over at Baen's online SF magazine, Baen Universe. In it Flint argues that, far from curbing piracy of copyrighted materials, DRM actually causes it. Quoting: "Electronic copyright infringement is something that can only become an 'economic epidemic' under certain conditions. Any one of the following: 1) The products they want... are hard to find, and thus valuable. 2) The products they want are high-priced, so there's a fair amount of money to be saved by stealing them. 3) The legal products come with so many added-on nuisances that the illegal version is better to begin with. Those are the three conditions that will create widespread electronic copyright infringement, especially in combination. Why? Because they're the same three general conditions that create all large-scale smuggling enterprises. And... Guess what? It's precisely those three conditions that DRM creates in the first place. So far from being an impediment to so-called 'online piracy,' it's DRM itself that keeps fueling it and driving it forward."

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...