Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Businesses

Games Workshop At 40: How They Brought D&D To Britain 64

Posted by Soulskill
from the still-not-over-the-hill dept.
An anonymous reader writes: Following on the fortieth anniversary of Dungeons & Dragons last year, another formative influence on modern gaming is celebrating its fortieth birthday: Games Workshop. Playing at the World covers the story of how the founders, Ian Livingstone and Steve Jackson (not the other Steve Jackson), started out as subscribers to the 1960s British gaming zine Albion playing Diplomacy by mail and (in Ian's case) publishing silly cartoons. When Albion folded at the beginning of 1975, Livingstone and Jackson formed Games Workshop with its own zine Owl & Weasel as a way to bring "progressive games" (as in "progressive rock") to the UK. Shortly thereafter, when they discovered Dungeons & Dragons, fantasy and role-playing games became their focus. After Owl & Weasel grew up into White Dwarf in 1977, its famous "Fiend Factory" column ended up populating the D&D Fiend Folio. And in the 1980s, of course, they brought us Warhammer and their retail stories brought stylish miniatures to many a needful gamer. Happy birthday to Games Workshop!
Star Wars Prequels

Homemade RC Millennium Falcon Is the Drone You've Always Dreamed of Flying 51

Posted by samzenpus
from the drone-that-made-the-kessel-run-in-less-than-twelve-parsecs dept.
MojoKid writes Here's a dose of Rebel goodness to tide you over while you wait for the next Star Wars trailer. A drone enthusiast in France recently graced the web with a few videos of a self-built quadcopter with a shell designed to look like the Millennium Falcon. It's enough to make a Star Wars fan tear up. The drone features a blue thruster light, just like the real Millennium Falcon, and has bright front lights as well. Its creator, who goes by "Oliver C", has some serious modding skills. The shape of the Millennium Falcon presented Oliver with some challenges, but he has the balance more or less handled by the time the spaceship (or quadcopter) takes its first flight outside.
Government

CIA on UFO Sightings: 'It Was Us' 197

Posted by Soulskill
from the tortured-the-aliens-until-they-left dept.
mrflash818 sends word that the CIA has taken the blame for a majority of early UFO sightings. In a tweet, the agency said, "It was us," and linked to a document summarizing their use of U-2 spy planes from 1954-1974 (PDF). "High-altitude testing of the U-2led to an unexpected side effect — a tremendous increase in reports of unidentified flying objects," the CIA wrote in the document, which it wrote in 1998. "In the mid-1950s, most commercial airliners flew at altitudes between 10,000 and 20,000 feet and [many] military aircraftoperated at altitudes below 40,000 feet. Consequently, once U-2s started flying at altitudes above 60,000 feet, air-traffic controllers began receiving increasing numbers of UFO reports." [T]he CIA cross-referenced UFO sightings to U-2 flight logs. "This enabled the investigators to eliminate the majority of the UFO reports," the CIA wrote, "although they could not reveal to the letter writers the true cause of the UFO sightings."
Piracy

Sony Leaks Reveal Hollywood Is Trying To Break DNS 388

Posted by Soulskill
from the scorched-net-policy dept.
schwit1 sends this report from The Verge: Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? To do that, the MPAA's lawyers would target the Domain Name System that directs traffic across the internet.

The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet. No one's ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy.
Transportation

It's Easy To Hack Traffic Lights 144

Posted by Soulskill
from the looking-forward-to-the-mobile-app dept.
An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.
Microsoft

Ballmer Leaves Microsoft Board 142

Posted by Soulskill
from the retirement!-retirement!-retirement! dept.
jones_supa writes: After leaving his position as CEO of Microsoft a year ago, Steve Ballmer has still held a position as a member of the board of directors for the company. Now, he is leaving the board, explaining why in a letter to fresh Microsoft CEO Satya Nadella. "I have become very busy," Ballmer explains. "I see a combination of Clippers, civic contribution, teaching and study taking up a lot of time." Despite his departure, the former-CEO is still invested in the company's success, and he spent most of the letter encouraging Nadella and giving advice. Nadella shot back a supportive, equally optimistic response, promising that Microsoft will thrive in "the mobile-first, cloud-first world."
Canada

Canada Halts Online Tax Returns In Wake of Heartbleed 50

Posted by timothy
from the worse-than-a-syrup-heist dept.
alphadogg (971356) writes "Canada Revenue Agency has halted online filing of tax returns by the country's citizens following the disclosure of the Heartbleed security vulnerability that rocked the Internet this week. The country's Minister of National Revenue wrote in a Twitter message on Wednesday that interest and penalties will not be applied to those filing 2013 tax returns after April 30, the last date for filing the returns, for a period equal to the length of the service disruption. The agency has suspended public access to its online services as a preventive measure to protect the information it holds, while it investigates the potential impact on tax payer information, it said."
Security

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees? 572

Posted by Unknown Lamer
from the padlock-icon-says-I'm-good-right dept.
New submitter Matt.Battey writes "I was recently on-site with a client and in the execution of my duties there, I needed to access web sites like Google Maps and my company's VPN. The VPN connection was rejected (which tends to be common, even though it's an HTTPS based VPN service). However, when I went to Google Maps I received a certificate error. It turns out that the client is intercepting all HTTPS traffic on the way out the door and re-issuing an internally generated certificate for the site. My client's employees don't notice because their computers all have the internal CA pushed out via Windows Group Policy & log-on scripts.

In essence, my client performs a Man-In-The-Middle attack on all of their employees, interrupting HTTPS communications via a network coordinated reverse-proxy with false certificate generation. My assumption is that the client logs all HTTPS traffic this way, capturing banking records, passwords, and similar data on their employees.

My question: How common is it for employers to perform MITM attacks on their own employees?"
Security

NBC News Confuses the World About Cyber-Security 144

Posted by samzenpus
from the think-of-the-athletes dept.
Nerval's Lobster writes "In a video report posted Feb. 4, NBC News reporter Richard Engel, with the help of a security analyst, two fresh laptops, a new cell phone, and a fake identity, pretended to go online with the technical naiveté of a Neanderthal housepet. (Engel's video blog is here.) Almost as soon as he turned on the phone in the Sochi airport, Engel reported hackers snooping around, testing the security of the machines. Engel's story didn't explain whether 'snooping around' meant someone was port-scanning his device in particular with the intention of cracking its security and prying out its secrets, no matter how much effort it took, or if the 'snooping' was other WiFi devices looking for access points and trying automatically to connect with those that were unprotected. Judging from the rest of his story, it was more likely the latter. Engel also reported hackers snooping around a honeypot set up by his security consultant which, as Gartner analyst Paul Proctor also pointed out in a blog posting, is like leaving the honey open and complaining when it attracts flies. When you try to communicate with anything, it also tries to communicate with you; that's how networked computers work: They communicate with each other. None of the 'hacks' or intrusions Engel created or sought out for himself have anything to do with Russia or Sochi, however; those 'hacks' he experienced could have happened in any Starbucks in the country, and does almost every day, Proctor wrote. That's why there is antivirus software for phones and laptops. It's why every expert, document, video, audio clip or even game that has anything at all to do with cybersecurity makes sure to mention you should never open attachments from spam email, or in email from people you don't know, and you should set up your browser to keep random web sites from downloading and installing anything they want on your computer. But keep up the fear-mongering."
Transportation

EU Secretly Plans To Put a Back Door In Every Car By 2020 364

Posted by timothy
from the don't-worry-we'll-only-track-you dept.
An anonymous reader writes "A secretive EU body has agreed to develop a device to be fitted to all cars allowing police to cut off any engine at will, it emerged today. The device, which could be imposed within a decade, would also allow police to track a vehicle's movements as well as immobilise it. According to The Daily Telegraph a group of senior EU officials, including several Home Office mandarins, have signed off the proposal at a secret meeting in Brussels."
Robotics

The Changing Face of Robotics 49

Posted by samzenpus
from the why-did-you-program-me-to-feel-pain? dept.
An anonymous reader writes "Using sensors to interface socially, the next generation of robots may not fit the classic idea of what a robot should be. Glen Martin writes: 'Equipped with two articulated arms, it can perform a multitude of tasks. It requires no application code to start up, and no expensive software to function. No specialists are required to program it; workers with minimal technical background can "teach" the robot right on the production line through a graphical user interface and arm manipulation.'"
Classic Games (Games)

Ask Slashdot: Will You Start Your Kids On Classic Games Or Newer Games? 285

Posted by Soulskill
from the you-have-died-of-dysentery dept.
An anonymous reader writes "An article at The Verge got me thinking. Parents and those of you who plan to become parents: will you introduce your kids to the games you played when you were younger? Those of us who grew up playing Pong, Space Invaders, and Pac-Man have had a chance to see gaming software evolve into the enormously complex and graphically realistic beast it is today. I've begun to understand why my grandparents tried to get me to watch old movies. I'm also curious how you folks plan to teach your kids about computers and software in general. When teaching them Linux, do you just download the latest stable Mint or Ubuntu release and let them take it from there? Do you track down a 20-year-old version of Slackware and show them how things used to be? I can see how there would be value in that... the UIs we use every day have been abstracted so far away from their roots that we can't always expect new users to intuitively grasp the chain of logic. How do you think this should be handled?"
Earth

Enormous Tunneling Machine 'Bertha' Blocked By 'The Object' 339

Posted by Soulskill
from the new-television-series-already-under-development dept.
An anonymous reader sends word that 'Bertha,' the world's largest tunneling machine, which is currently boring a passage beneath Seattle's waterfront, has been forced stop. The 57.5ft diameter machine has encountered an unknown obstruction known as "the object." "The object’s composition and provenance remain unknown almost two weeks after first contact because in a state-of-the-art tunneling machine, as it turns out, you can’t exactly poke your head out the window and look. 'What we’re focusing on now is creating conditions that will allow us to enter the chamber behind the cutter head and see what the situation is,' [said project manager Chris Dixon]. Mr. Dixon said he felt pretty confident that the blockage will turn out to be nothing more or less romantic than a giant boulder, perhaps left over from the Ice Age glaciers that scoured and crushed this corner of the continent 17,000 years ago. But the unknown is a tantalizing subject. Some residents said they believe, or want to believe, that a piece of old Seattle, buried in the pell-mell rush of city-building in the 1800s, when a mucky waterfront wetland was filled in to make room for commerce, could be Bertha’s big trouble. That theory is bolstered by the fact that the blocked tunnel section is also in the shallowest portion of the route, with the top of the machine only around 45 feet below street grade."
Privacy

CBS 60 Minutes: NSA Speaks Out On Snowden, Spying 504

Posted by samzenpus
from the what-did-he-get? dept.
An anonymous reader writes "This week CBS New's 60 Minutes program had a broadcast segment devoted to the NSA, and additional online features. It revealed that the first secret Snowden stole was the test and answers for a technical examination to get a job at NSA. When working at home, Snowden covered his head and screen with a hood so that his girlfriend couldn't see what he was doing. NSA considered the possibility that Snowden left malicious software behind and removed every computer and cable that Snowden had access to from its classified network, costing tens of millions of dollars. Snowden took approximately 1.7 million classified documents. Snowden never approached any of multiple Inspectors General, supervisors, or Congressional oversight committee members about his concerns. Snowden's activity caught the notice of other System Administrators. There were also other interesting details, such as the NSA has a highly competitive intern program for High School students that are given a Top Secret clearance and a chance to break codes that have resisted the efforts of NSA's analysts — some succeed. The NSA is only targeting the communications, as opposed to metadata, of less than 60 Americans. Targeting the actual communications of Americans, rather than metadata, requires a probable cause finding and a specific court order. NSA analysts working with metadata don't have access to the name, and can't listen to the call. The NSA's work is driven by requests for information by other parts of the government, and there are about 31,000 requests. Snowden apparently managed to steal a copy of that document, the 'crown jewels' of the intelligence world. With that information, foreign nations would know what the US does and doesn't know, and how to exploit it."

+ - Brand new Bombardier CSeries airplane lifts off on maiden flight->

Submitted by JavaScrybe
JavaScrybe writes: Hey, a new type of bird. Bombardier's CSeries has taken its maiden flight. They boast a significant reduction in noise, which they hope will help them target urban airports, and lower fuel consumption for the eco-friendly. The canadian airplane maker hopes to challenge a significant dent in the 100-160 seats market for commercial aircrafts. At time of writing, no word yet if it landed safely, but they're hopeful.
Link to Original Source

"They that can give up essential liberty to obtain a little temporary saftey deserve neither liberty not saftey." -- Benjamin Franklin, 1759

Working...