Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Cooking With Your USB Ports Screenshot-sm 188

tekgoblin writes "Wow, I would never have thought to try and cook food with the power that a standard USB port provides, but someone did. A standard port provides 5V of power, give or take a little. I am not even sure what it takes to heat a small hotplate, but I am sure it is more than 5V. It looks like the guy tied together around 30 USB cables powered by his PC to power this small hotplate. But believe it or not, it seems to have cooked the meat perfectly."

Study Finds Most Would Become Supervillians If Given Powers 419

It probably comes as no surprise, but researchers have found that most of us would gladly put on a mask and fight do-gooders if given super powers. From the article: "But power also acts like strong cologne that affects both the wearer and those within smelling distance, Galinsky noted. The person gains an enhanced sense of their importance, and other people may regard them with greater respect as well as extend leniency toward their actions. That combination makes for an easy slide into corruption."

Girls Bugged Teachers' Staff Room 227

A pair of enterprising Swedish schoolgirls ended up in court after they were caught bugging their teachers break room. The duo hoped they would hear discussions about upcoming tests and school work, allowing them to get better grades. It worked until one of them decided to brag about it on Facebook, and the authorities were called in. The girls were charged with trespassing and fined 2,000 kronor ($270) each in Stockholm District Court.

Submission + - Ex-Gov. Blagojevich Appears At Chicago Comic Con

theodp writes: Dadadada Blago! Earlier this week, a federal jury convicted Former Ill. Gov. Rod Blagojevich of lying to the FBI and deadlocked on 23 other charges. Still, that didn't stop Blago from connecting with his 'loyal supporters' Saturday at the Chicago Comic Con, where the ex-Gov charged $80 for each photo taken with him and $50 for autographs. He even hob-knobbed with celebrities like Adam West and Richard Roundtree. 'I met Batman. I met Shaft, and I know something about getting the shaft,' Blagojevich said.

New iPhone Attack Kills Apps, Reroutes Web Traffic 125

Trailrunner7 sends in a threatpost.com article on exploiting flaws in the way the iPhone handles digital certificates. "[Several flaws] could lead to an attacker being able to create his own trusted certificate and entice users into downloading malicious files onto their iPhones. The result of the attack is that a remote hacker is able to change some settings on the iPhone and force all of the user's Web traffic to run through any server he chooses, and also to change the root certificate on the phone, enabling him to man-in-the-middle SSL traffic from that phone. ... Charlie Miller, an Apple security researcher at Independent Security Evaluators, said that the attack works, although it would not lead to remote code execution on the iPhone. 'It definitely works. I downloaded the file and ran it and it worked,' Miller said. 'The only thing is that it warns you that the file will change your phone, but it also says that the certificate is from Apple and it's been verified.'"

Man Sues Neighbor For Not Turning Off His Wi-Fi Screenshot-sm 428

Scyth3 writes "A man is suing his neighbor for not turning off his cell phone or wireless router. He claims it affects his 'electromagnetic allergies,' and has resorted to being homeless. So, why doesn't he check into a hotel? Because hotels typically have wireless internet for free. I wonder if a tinfoil hat would help his cause?"
Technology (Apple)

Submission + - iPhone 3Gs Encryption Cracked in 2 Minutes

An anonymous reader writes: In a Wired News article, iPhone Forensics expert Jonathan Zdziarski explains how the much touted hardware encryption of the iPhone 3Gs is but a farce, and demonstrates how both the passcode and backup encryption can be bypassed in about 2 minutes. Zdziarski also goes on to say that all data on the iPhone — including deleted data — is automatically decrypted by the iPhone when it's copied, allowing hackers and law enforcement agencies alike access the device's raw disk as if no encryption were present. A second demonstration features the recovery of the iPhone's entire disk while the device is still passcode-locked. According to a similar article in ARS Technica, Zdziarski describes the iPhone's hardware encryption as, "like putting privacy glass on half your shower door," he told Ars. "What, pray tell, is the advantage in that?" with the iPhone being sold into 20% of Fortune-100s and into the military, just how worried should we be with such shoddy security?

We're living in a golden age. All you need is gold. -- D.W. Robertson.