Forgot your password?
typodupeerror

+ - Google/Samsung changes to SD card behaviour in KitKat (4.4.2) breaks apps.->

Submitted by TeddyR
TeddyR (4176) writes "With the widespread release of Androif 4.4.2 (kitkat) to many Samsung devices worldwide and specifically now with the US rollout by major providers in the US it seems that Samsung has decided to implement Googles latest API regulations for SD Card storage. This breaks MANY third party applications since only the Google/System/OEM/Carrier signed apps can now write to the external SD Card thus making MANY paid applications useless.

Confirmed affected: TMobile and Sprint Samsung Note 3 and potentially the Galaxy S4 and upcoming Galaxy S5. This change affects ALL Samsung KitKat 4.4.2 devices, including the Note 2, S3 once KitKat is released to those devices.

Time to call your carrier and lodge a complaint to ask that they request that this "feature" be returned to the original behavior.

References:
http://www.androidpolice.com/2...

http://lifehacker.com/android-..."

Link to Original Source

+ - Security Vulnerabilities Found in 90% of Top Mobile Banking Apps->

Submitted by concertina226
concertina226 (2447056) writes "Testing only iOS devices, Ariel Sanchez from IOActive found that 90% of the apps contain non-SSL links, which means that a hacker could potentially intercept the traffic and inject random JavaScript/HTML code in order to create a fake login phishing attempt.

For example, a user could be lured to a fake login page and told that their online banking password had "expired", and asked to re-enter their username and password in order to access their account. The hacker could then use those details to take control of the user's online banking account."

Link to Original Source

+ - CSIRO scientists 3D print dragon for Australian girl after letter goes viral->

Submitted by Anonymous Coward
An anonymous reader writes "A seven-year-old girl who wrote a letter to scientists asking if they could make her a dragon has got her wish after they created a special 3D printed one from titanium.

A letter written by Sophie from Queensland to Australia's Commonwealth Scientific and Industrial Research Organization (CSIRO) asking for a dragon, was posted on the scientists' website and went viral."

Link to Original Source

+ - LLVM and Clang 3.4 are out

Submitted by Anonymous Coward
An anonymous reader writes "With C++14 draft fully implemented in Clang and libc++. Read more in LLVM and Clang release notes."
Safari

Safari Stores Previous Browsing Session Data Unencrypted 135

Posted by Soulskill
from the security-through-obscurity dept.
msm1267 writes "Users of Apple's Safari browser are at risk for information loss because of a feature common to most browsers that restores previous sessions. The problem with Safari is that it stores session information including authentication credentials used in previous HTTPS sessions in a plaintext XML file called a Property list, or plist, file. The plist files, a researcher with Kaspersky Lab's Global Research and Analysis Team said, are stored in a hidden folder, but hiding them in plain sight isn't much of a hurdle for a determined attacker. 'The complete authorized session on the site is saved in the plist file in full view despite the use of https,' said researcher Vyacheslav Zakorzhevsky on the Securelist blog. 'The file itself is located in a hidden folder, but is available for anyone to read.'"

Comment: Re:Dice Strikes Again... (Score 1) 184

by DaphneDiane (#45648031) Attached to: Amazon Uses Robots To Speed Up Human 'Pickers' In Fulfillment Centers

I'm curious as to why it's more efficient to bring the shelf to the picker than take the picker to the shelf.
Those robots could just as easily be ferrying around the pickers.

They could but that would make the process into a serial process. Why waste the time bringing the picker back and forth from the shelves to the belt? If you have enough or fast enough robots, it is more efficient to have them timed so that another shelf arrives just in time for the previous shelf to be removed.

Comment: Re:Paid app switching to adware are what I uninsta (Score 1) 243

by DaphneDiane (#45440647) Attached to: Ask Slashdot: What Makes You Uninstall Apps?

It's not really the ads themselves, or even ad-based apps. ( Though I do prefer paying directly for my apps versus being the price for them. ) It's that once an app that was originally a paid app is redesigned to be ad-supported, the focus and quality of the app tends to change. If I really wanted to block ads that way I'd could just tweak my DNS server.

Comment: Paid app switching to adware are what I uninstall (Score 2) 243

by DaphneDiane (#45438671) Attached to: Ask Slashdot: What Makes You Uninstall Apps?

Biggest one for me is when a formerly paid app switches to being advertising base. What I've found is that even if they offer a way to remove the ads by paying again, or grandfather the original purchases into an ad free mode that the apps tend to suffer redesigns that are motivated to support advertisers and that many of these redesigns impact the use of the apps even for paid users. I've already uninstalled a bunch of apps for this reason, such as Quickoffice Pro, OneTap, etc. and have been considering uninstalling apps like The Weather Channel.

+ - Book: Fox News PR Used Sockpuppet Accounts To Rebut Critical Blog Posts->

Submitted by toadlife
toadlife (301863) writes "NPR media reporter David Folkenflik writes in his forthcoming book Murdoch's World that Fox News' public relations staffers used an elaborate series of dummy accounts to fill the comments sections of critical blog posts with pro-Fox arguments. A former staffer told Folkenflik that they had personally used "one hundred" fake accounts to plant Fox-friendly commentary. Fox PR staffers were expected to counter not just negative and even neutral blog postings but the anti-Fox comments beneath them. One former staffer recalled using twenty different aliases to post pro-Fox rants. Another had one hundred. Several employees had to acquire a cell phone thumb drive to provide a wireless broadband connection that could not be traced back to a Fox News or News Corp account."
Link to Original Source

Comment: Re:Can I piggyback that over VOIP? (Score 3, Interesting) 410

by DaphneDiane (#44873321) Attached to: The last time I used a dial-up modem was...

Yes. As someone that works in telephony industry the amazing thing to me is how many modems are still in use. And the fun of making sure that modems, faxes and the like continue to work even when the device plugged into a VoIP line ( SIP, H.248, or MGCP ) and/or going over IP trunking. There are actually protocols designed to recognize fax data and process it differently so that it still works, see T.38.

Comment: Re:missing the point (Score 1) 196

by DaphneDiane (#44791161) Attached to: Can Even Apple Make a Watch Insanely Smart?

Just click the big blue circled arrow to the right of the names in recent calls list to views the contact entry to send text, pick different numbers etc. Seems like Apple made the right choice here. 99% of the time I want to call the recent callers back, but if I need to send a text or call a different number it is easy.

Likewise, for messages there are the "Email", "Facetime" and "Contact>" buttons at the top of the window. You might need to scroll to the top to seem them if you have a long conversation.

Education

For Education, Why TI-83 > iPad 340

Posted by timothy
from the depends-how-prussian-you-want-to-get dept.
theodp writes "Writing in The Atlantic, Phil Nichols makes a convincing case for why educational technologies should be more like graphing calculators and less like iPads. Just messing around with TI-BASIC on a TI-83 Plus, Nichols recalls, 'helped me cultivate many of the overt and discrete habits of mind necessary for autonomous, self-directed learning.' So, with all those fancy iPads at their schools, today's kids must really be programming up a storm, right? Wrong. Nichols, who's currently pursuing a PhD in education, laments, 'The iPad is among the recent panaceas being peddled to schools, but like those that came before, its ostensibly subversive shell houses a fairly conventional approach to learning. Where Texas Instruments graphing calculators include a programming framework accessible even to amateurs, writing code for an iPad is restricted to those who purchase an Apple developer account, create programs that align with Apple standards, and submit their finished products for Apple's approval prior to distribution.'"
Privacy

Report: Britain Has a Secret Middle East Web Surveillance Base 237

Posted by samzenpus
from the what-do-you-got-there dept.
wiredmikey writes "Britain is running a secret Internet surveillance station in the Middle East, according to a recent report citing the latest leaked documents obtained by fugitive US security contractor Edward Snowden. The Independent newspaper said it was not disclosing the country where the base is located, but said the facility can intercept emails, telephone calls and web traffic for the United States and other intelligence agencies and taps into underwater fibre-optic cables in the region, the newspaper said. The Independent did not disclose how it obtained the details from the Snowden files."

"Stupidity, like virtue, is its own reward" -- William E. Davidsen

Working...