Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Google

Google Releases Street View Images From Fukushima Ghost Town 63

Posted by samzenpus
from the new-fallout-map dept.
mdsolar writes in with news that Goolge has released Street View pictures from inside the zone that was evacuated after the Fukushima disaster. "Google Inc. (GOOG) today released images taken by its Street View service from the town of Namie, Japan, inside the zone that was evacuated after the Fukushima nuclear disaster in March 2011. Google, operator of the world's biggest Web search engine, entered Namie this month at the invitation of the town's mayor, Tamotsu Baba, and produced the 360-degree imagery for the Google Maps and Google Earth services, it said in an e-mailed statement. All of Namie's 21,000 residents were forced to flee after the March 2011 earthquake and tsunami crippled the Fukushima Dai-Ichi nuclear plant, about 8 kilometers (5 miles) from the town, causing the world's worst nuclear accident after Chernobyl. Baba asked Mountain View, California-based Google to map the town to create a permanent record of its state two years after the evacuation, he said in a Google blog post."
Security

+ - SCADA: 10 Years Behind Enterprise IT Security->

Submitted by wiredmikey
wiredmikey (1824622) writes "A recent burned out water pump at a public utility has once again put SCADA and Industrial Control Systems security in the spotlight.

Several experts have chimed in on the matter, with some saying that SCADA Security is typically a decade behind other large enterprise security systems.

Why? These Industrial Control Systems were never intended to be connected to the Internet, and lack many of the security controls and features that most modern IT systems have in place. Additionally, many critical infrastructure systems are running older operating systems such as Windows 95 – something that brings its own set of security issues.

Another expert said the security problems with SCADA software are twofold: One is the prospect of security vulnerabilities in the software itself; the other is improper configurations and bad security around the software.

The challenges are exacerbated by such systems being connected to the Internet, which can be discovered and potentially breached...."

Link to Original Source
Oracle

RIP, SunSolve 100

Posted by timothy
from the to-the-moon-instead dept.
Kymermosst writes "Today marks the last day that SunSolve will be available. Oracle sent the final pre-deployment details today for the retirement of SunSolve and the transition to its replacement, My Oracle Support Release 5.2, which begins tomorrow. People who work with Sun's hardware and software have long used SunSolve as a central location for specifications, patches, and documentation."
United States

+ - Web 2.0 & Honesty in Sex, Politics and Religio

Submitted by jg21
jg21 (677801) writes "Till now the best known example of what is technically known as 'the online disinhibition effect' is probably what's more colloquially called "web rage" – brutal rudeness, racism, flamings and the like. But this article suggests another, sex-related example: the new world of Web 2.0 is fast altering the human psyche, with social network users often, in a safe fantasy setting, "transgresssing" into a new sexual identity that has no necessary day-to-day link to their personas in 'real life.'

[From the article: 'Web 2.0 permits the construction of personal identity at different levels of 'personal privacy'...Internet culture now allows someone to express an 'abnormal' part of themselves (often a very minor part) without being obliged to include it in the self-identity that is designed to accomodate social or community expectations.']"
Education

+ - Getting involved with writing open source licenses

Submitted by bulio
bulio (884542) writes "I'm planning on studying civil law, and would like to gain some experience in the field by helping to write and revise licenses such as the GNU Free Documentation License, and licenses such as Creative Commons (and its derivatives). My question is, how does one help to revise and improve licenses like these? Is there a mailing list or IRC channel that I could visit? On another note, how would one go about writing his own documentation license?"
Networking

+ - Flash based PC for ssh-based router?

Submitted by
iansmith
iansmith writes "I have an internal network I reach through a Linux box by using ssh to tunnel in via the internet.

The problem is I want to be able to reach this network even if the linux box(es) crash or get powered down.

Are there any flash based linux boxes (like the linksys wireless router) that have at least two ethernet ports to allow me to connect two networks together? It does not need to be fast or full featured, I just want a single service (ssh) running without needing to worry about an entire computer.

I'd use an old Cisco router (don't we all have a box of those in a closet?) but without firmware updates, no way will I put one on my network."
Security

+ - Malware Self-Defense Technologies Evolution->

Submitted by Anonymous Coward
An anonymous reader writes "This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also provides an overview of the current situation. In order to avoid confusion about what is considered a self-defense technology and what is not, it examines only the most popular and obvious means of malware self-defense. First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions."
Link to Original Source
Security

+ - The IT department as corporate snoop->

Submitted by
coondoggie
coondoggie writes "As if we needed more proof that insiders are a seriously worse threat to your corporate jewels than any malicious hacker, a study released today says that one in three of IT employees snoop through company systems and peek at confidential information such as private files, wage data, personal emails, and HR background. The survey, which claims to reveal "the hidden scandal of IT staff snooping," is from Cyber-Ark Software, a company that, naturally specializes in password protection. As if that weren't bad enough, the survey found that more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, with no one to stop them. http://www.networkworld.com/community/?q=node/1573 1"
Link to Original Source
Censorship

+ - Domain Registrars Censoring the Internet

Submitted by Anonymous Coward
An anonymous reader writes "Domain registrars and hosting providers routinely take sites off line when the contain illegal content, or are involved in spamming or fraud. These companies assert an absolute right to make these decisions without oversight, and we just assume they are right.

So, what happens if they are wrong?

Writing here the owner of a bittorrent site describes how two different Registrars/DNS Hosts have blocked the site, even though the actual host has no problem with it.

No big deal, right? Because bittorrent is illegal, and anybody using it must be involved in piracy. At least that is apparently the logic of the DNS providers DynDNS and Sitelutions.

In fact, the owner, who goes by the handle "Dr.E," says that the site is a "bittorrent news site. We do not operate a tracker, we do not host any torrent files, or directly link to any torrent files." He says that "I personally am a strong advocated for copyright law reform, and the site does encourage users to take full advantage of their rights to use material within the law, but those positions are completely legitimate, and espousing them is constitutionally protected free speech."

There is a big difference between opposing piracy and supporting censorship, and when some of the largest registrars are actively involved in censoring the internet, it should make people take notice."
Encryption

+ - Engineer Discovers 'Thermal Noise' Encryption->

Submitted by
techitout
techitout writes "PC World ran an article that Laszlo Kish of Texas A&M University devised a way to encrypt messages using the natural noise caused by electrons flowing along a wire. When data is sent intermittently (using a $100 device), it can be camouflaged by this 'thermal noise.' To snoopers eavesdropping on the line, it just appears that the thermal noise level varies randomly. It has an edge over another proposed encryption solution, quantum key distribution (QKD) technology, with a lower cost, a 99.98 percent message reception accuracy, and 2,000 km delivery distance."
Link to Original Source

Pohl's law: Nothing is so good that somebody, somewhere, will not hate it.

Working...