Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×
It's funny.  Laugh.

Submission + - Hi Tech Urinals to Fight Drunk Driving

Anonymous Coward writes: "RIO RANCHO, New Mexico (AP) — New Mexico is hoping to keep drunks off the road by lecturing them at the last place they usually stop before getting behind the wheel: the urinal.

The state recently paid US$21 each for about 500 talking urinal-deodorizer cakes and put them in men's rooms in bars and restaurants. When a man steps up, the motion-sensitive plastic device says, in a woman's voice that is flirty, then stern: "Hey, big guy. Having a few drinks? Think you had one too many? Then it's time to call a cab or call a sobre friend for a ride home."

The recorded message ends: "Remember, your future is in your hand." l"

How Would You Deal With A Global Bandwidth Crisis? 478

lopy writes "First Google claimed the internet infrastructure won't scale to provide an acceptable user experience for online video. Then some networking experts predict that a flu pandemic would bring the internet to it's knees and lead to internet rationing. We used to think that bandwidth would always increase as needed, but what would happen if that isn't the case? How would you deal with a global bandwidth shortage? Would you be willing to voluntarily limit your internet usage if necessary? Could you live in a world without cheap and plentiful broadband internet access?"

Submission + - Malicious Websites Can Subvert Personal Routers

Apro+im writes: PCWorld is reporting: "If you haven't changed the default password on your home router, do so now. That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code."

The root of the problem seems to stem from routers allowing GET requests to have side-effects, allowing attackers to change settings and then perform man-in-the middle attacks. Though the story and the linked paper (PDF) claim that routers with changed passwords are immune, a quick experiment shows that routers which use HTTP Authentication can be compromised the same way, if the user has logged into their router earlier in the browser session. Also, though the article says this is a Javascript exploit, it can actually be executed by any tag which allows the inclusion of a "src" element from another domain (e.g., "img").

You are in the hall of the mountain king.