Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Submission + - Dear FCC : Please don't kill my PC! (dearfcc.org)

An anonymous reader writes: This past year the FCC passed a set of rules that require manufacturers to thwart end-users from violating rules intended to keep the airwaves usable by all. Unfortunately the rules are such that they will do nothing to stop violators who have the knowledge and intent to bypass them and are already having massive collateral damage on non-violating users. Many people in the OpenWRT and LibreCMC communities are already seeing these locks in newer stock firmware images.

What we would like people to keep in mind is that these rules are not explicit to routers and will hamper other devices as well. Can't install your favourite distribution on a new computer? These rules may be to blame.

The EFF, FSF, Purple Foundation, OpenWRT, ThinkPenguin, Qualcomm, and others have been working diligently to stop this, but we need your help. This is your last chance to send in comments for a set of proposed rules that will make the situation even worse than it already is. For accurate information (there have been many factually inaccurate and misleading stories/quotes) check out the following blog post: http://prpl.works/2015/09/21/y... and send your comments into the FCC via the EFF's new DearFCC.org site: https://www.dearfcc.org/. Also see http://www.savewifi.org/.

This is your last chance to stop this. The comment period ends October 9th!

Additional thoughts: Canada and Europe are also passing a similar set of rules. This fight won't be over any time soon. However we won't win unless we can overcome and win the first battle: stopping the proposed rules in the USA.

Comment Re:Oh, that's ironic (Score 3, Informative) 577

The second hit is a piece in the Wall Street Journal.

The piece mentions nothing of immigrants, Muslims, or anyone else filing a petition or calling for a ban.
It does mention that Christian Conservatives want to exclude all immigrants from festivities and Bavaria in general.

Having read ALL the first 20 links, it appears that the petition to ban Oktoberfest was submitted by the same Christian Conservatives and that all names and signatures were fraudulent. But I guess since these fraudsters aren't brown, we can now pretend the petition never happened.

Submission + - The $9 Computer is Shipping Today! (makezine.com)

An anonymous reader writes: The $9 CHIP computer is shipping. According to Dave Rauchwerk, CEO of Next Thing Co., single units will go out to early backers in 5 to 9 days; additional orders will arrive in December. But if you backed the project at the Kernel Hacker Backer level on Kickstarter, you will receive two CHIP computers — the second by mid-October.

Submission + - Malware Takes Screenshots Of The Infected Player's Virtual Poker Hand

An anonymous reader writes: Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of the infected player’s virtual poker hand and their player ID, the screenshots are then sent to the attacker who joins the victim’s virtual table by searching for the particular player ID. Thus, the attacker has the unfair advantage of being able to see the victim’s hand.

Comment Persecuting that which is not understood (Score 5, Insightful) 956

Salem Witch Trials, Mass Murder of Scientists, Islamophobia, 2007 Boston Bomb Scare, and now this.

The teacher confiscated the "bomb" which sat in their drawer until the end of class when it was taken to administration. If the teacher truly believed that the device could have even remotely been a bomb, they would not have touched it, would have evacuated the school, and would have called bomb squad. The teacher, the administration, and the police are complicit in perpetuating a fraud - a fraud against a child.

Even in the case that the clock resembled a "movie bomb" or was purposely contracted to do so, the child did nothing wrong as long as he didn't hint at it being a bomb or use it to threaten anyone. There are plenty of clocks on the market that resemble a bomb. Yes, it may have been a lark. Yes, it may have been a protest to create awareness. No, it wasn't malicious. No, it wasn't threatening. And no, it obviously wasn't convincing.

I seriously hope that he follows in his father's footsteps and keeps challenging the status quo.

Submission + - Windows VS Linux Software 1

An anonymous reader writes: With all the recent brouhaha about Windows 10 privacy violations and forced updates, I'm one of those that wants to thank Microsoft very gently, while taking it by the hand, and slamming the door behind it for good. Fortunately for me, I don't use any special software that is tied to Windows, except games, of course. One program I would really miss though is Total Commander file manager, which is basically my interface to the whole OS. So, I know there are Linux alternatives, but which one is the best? Also, I currently use PaleMoon fork of Firefox as my main browser, but there doesn't seem to be a Linux variant. What other software would you want to transplant to Linux, if any?

Submission + - Could a computer that runs perpetually solve global warming by cooling the air?

An anonymous reader writes: Daniel Sheehan Shows us a Perpetual Computer and he's a PhD in california questioning whether we really know as much about the second law as we think. Would Shannon's information theory need to be revised? Could we have cooler computers that required no batteries or AC wall outlet plugs ? Would the whole lithium battery industry be virtually useless since all things would just suck the energy from molecular speed of air...

It's basically a perpetual motion machine potentially violating the second law, solving the global warming problem. However this is not a crackpot proposing the device, it's a respected physicist from San Diego.

Submission + - Easy to exploit critical BIND DoS bug affects all DNS (theregister.co.uk)

mask.of.sanity writes: Attackers now have the ability to disrupt large swathes of the web through a remote denial of service vulnerability found in the most widely used software for DNS servers. The BIND bug (CVE-2015-5477) patched overnight affects all DNS servers running the software, and can be attacked with ease. Attackers can send a crafted DNS query packet to trigger a REQUIRE assertion failure, causing BIND to exit.

Submission + - BBC reveals links censored by Google's Right To Be Forgotten (betanews.com)

Mark Wilson writes: Google's Right To Be Forgotten gives people the chance to request the removal of search results linking to pages that contain information they believe to be "inadequate, irrelevant or no longer relevant". Google says it rejects more requests than it complies with, but there is still concern that the company is not providing enough detail about what it is doing. There have been calls for greater transparency from the company about the censorship that is taking place.

The BBC has published a list of all of the stories from its own site that have been removed from Google search results. The corporation announced that it wanted to be clear with people about which links has been deleted and plans to update the list each month. It already extends to nearly 200 entries and the BBC explains that while the stories may no longer be shown by Google, they are still available uncensored on the BBC site.

Writing on the BBC Internet blog, Neil McIntosh says that the list was important to maintain the integrity of the BBC's online archives.

Submission + - Australia passes site-blocking legislation (smh.com.au)

ausrob writes: Cementing their position as Australia's most backwards and dangerous government in recent memory comes this nasty bit of legislation, riddled with holes (which is nothing new for this decrepit Government): "The legislation allows rights holders to go to a Federal Court judge to get overseas websites, or "online locations", blocked that have the "primary purpose" of facilitating copyright infringement. If a rights holder is successful in their blocking request, Australian internet providers, such as Telstra and Optus, will need to comply with a judge's order by disabling access to the infringing location."

Submission + - British Government instituted 3-month deletion policy, apparently to evade FOIA (thestack.com)

An anonymous reader writes: In late 2004, weeks before Tony Blair’s Freedom of Information (FOI) act first came into force, Downing Street adopted a policy [http://www.ft.com/cms/s/0/d42d3c68-141d-11e5-abda-00144feabdc0.html — PAYWALLED] of automatically deleting emails more than three months old. The IT decision has resulted in a 'dysfunctional' system according to former cabinet officials, with Downing Street workers struggling to agree on the details of meetings in the absence of a correspondence chain. It is still possible to preserve an email by dragging it to local storage, but the relevance of mails may not be apparent at the time that the worker must make the decision to do so.

Former special adviser to Nick Clegg Sean Kemp said: "Some people delete their emails on an almost daily basis, others just try to avoid putting anything potentially interesting in an email in the first place,”

Submission + - Apple CORED: Boffins reveal password-killer 0days for iOS and OS X (theregister.co.uk)

An anonymous reader writes: Six university researchers have revealed dangerous zero-day flaws in Apple's iOS and OS X, claiming it is possible to crack Apple's keychain, break app sandboxes and bypass its App Store security checks so that attackers can steal passwords from any installed app including the native email client without being detected.

The team was able to upload malware to the Apple app store, passing the vetting process without triggering alerts that could raid the keychain to steal passwords for services including iCloud and the Mail app, and all those store within Google Chrome.

Lead researcher Luyi Xing says he and his team complied with Apple's request to withhold publication of the research for six months, but had not heard back as of the time of writing. [Paper] [video demos]

Submission + - NSA Planned to Hijack Google App Store to Hack Smartphones (firstlook.org)

Advocatus Diaboli writes: "The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals. The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia."

"The newly published document shows how the agencies wanted to “exploit” app store servers – using them to launch so-called “man-in-the-middle” attacks to infect phones with the implants. A man-in-the-middle attack is a technique in which hackers place themselves between computers as they are communicating with each other; it is a tactic sometimes used by criminal hackers to defraud people. In this instance, the method would have allowed the surveillance agencies to modify the content of data packets passing between targeted smartphones and the app servers while an app was being downloaded or updated, inserting spyware that would be covertly sent to the phones."

Submission + - Linux Dev's Purported 4096 bit RSA Key Factored 1

An anonymous reader writes: A PGP subkey for Kernel developer Peter Anvin from a public Sks Keyserver was discovered to be divisible by 3. The weak key was discovered by a web service which calls itself the Phuctor which has since factored two other keys as a chews on an sks keyserver dump. Whether the key was generated weak or if it was strong before becoming corrupted on a keyserver it is extremely troubling that such a weak key representing such an important Linux developer could be served.

Uncertain fortune is thoroughly mastered by the equity of the calculation. - Blaise Pascal