Follow Slashdot stories on Twitter


Forgot your password?
Last Chance - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×

Comment Finally! (Score 2) 136

We can finally quiet the "moon landing was a hoax" nutjobs. With the ability to make long-exposure images that resolve objects just 0.02 arcseconds across — the equivalent of a dime viewed from more than a hundred miles away", we can actually take pictures of all the junk we left behind as proof that we were actually there.

Comment Re:What is it with these knuckleheads? (Score 1) 336

Well, remember, you are comparing some of the most revered people in United States history with some guy who just has a lot of money. What did Hamad do that would justify such a monument? And usually, monuments are erected by future generations as a tribute to someone. This is just some rich knucklehead who was bored.


Submission + - Summer Reading-Do-It-Yourself-Style (

GeekZilla writes: If you ever wanted to reproduce that one MacGyver gadget that you saw in Season 2, Episode 5, you can now look up the "recipe" for it over at MacRecipes. From the website:

"Have you ever wondered in how many different episodes MacGyver has made an arc welder (answer: 3 times in episodes 6, 52, and 87)? Or perhaps you forgot about your favorite episode (season 1, episode 12) when Mac escapes via a casket that transforms into a jetski. And how many times has Mac made a diversion? In order to placate all of your MacGyver-related curiosities, we offer you MacRecipes"


Submission + - SPAM: Samsung Galaxy S II Enters the Market

An anonymous reader writes: The Samsung Galaxy S was undoubtedly a hit for Samsung, and many view it as a major step forward for the Android operating system. It now has a sequel: the Galaxy S II.
Link to Original Source
The Courts

Submission + - Supreme Court Approves Warrantless Home Invasions (

An anonymous reader writes: The U.S. Supreme Court has made it significantly easier for police to force their way into a home without a warrant. On Monday, the court, by an 8-1 vote, upheld the warrantless search of an apartment ... police pursuing a drug suspect banged on the door of an apartment where they thought they smelled marijuana. After loudly identifying themselves, police heard movement inside, and suspecting that evidence was being destroyed, kicked in the door ... they found Hollis Deshaun King, smoking marijuana. Police also found cocaine ... King was not the suspect police had been looking for, but the drug evidence in the apartment was more than enough to charge him with multiple crimes. King was sentenced to 11 years in prison ... 'Occupants who choose not to stand on their constitutional rights but instead elect to attempt to destroy evidence have only themselves to blame for the warrantless exigent-circumstances search that may ensue,' wrote [Justice] Alito.

Comment Which is easier to believe? (Score 1) 964

If this person had secured his connection and someone had broken the encryption to download illegal pornography, how likely would it have been that the law enforcement would have believed him?

I know TFA mentioned it took three days and a "forensic" analysis of his electronics before they finally really believed him, but I wonder if it wouldn't have taken longer if the signal had been encrypted. Since these law enforcement personnel couldn't be bothered to do some basic research before over-reacting, how likely would they have been to believe Barry's claims if the router had been encrypted?

Barry: "No, really, I didn't do it!"

Law Enforcement: "Don't lie to us! That's impossible! Your wireless connection is encrypted!!"


Advent Calendar For Geeks 65

bLanark writes "Well, as children and adults all over the world begin their day with chocolate, with the traditional Advent calendar, I'd like to remind you that there's an alternative for geeks. The Perl Advent calendar will give you a new Perl tip every day right up to Christmas."

Some programming languages manage to absorb change, but withstand progress. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982