An anonymous reader writes "Microsoft [Thursday] announced a change to how it handles adware, a form of malware that pushes unwanted advertisements to the user. As of July 1, the company's security products will immediately stop any adware they detect and notify the user, who can then restore the program if they wish. Currently, when any of Microsoft's security products (including Microsoft Security Essentials and Microsoft Forefront) detects a program as adware, it will alert the user and offer them a recommended action. If the user doesn't do anything, the security product will let the program continue to run until the user makes a decision." If adware is malware, why wait until July?
An anonymous reader writes "In an unprecedented total disruption of a fully operational GNSS constellation, all satellites in the Russian GLONASS broadcast corrupt information for 11 hours, from just past midnight until noon Russian time (UTC+4), on April 2 (or 5 p.m. on April 1 to 4 a.m. April 2, U.S. Eastern time). This rendered the system completely unusable to all worldwide GLONASS receivers."
New submitter Budgreen writes: "Knife-wound or gunshot victims will be cooled down and placed in suspended animation later this month. The technique involves replacing all of a patient's blood with a cold saline solution, which rapidly cools the body and stops almost all cellular activity. 'If a patient comes to us two hours after dying you can't bring them back to life. But if they're dying and you suspend them, you have a chance to bring them back after their structural problems have been fixed,' says surgeon Peter Rheeat from the University of Arizona in Tucson, who helped develop the technique. 10 gunshot and stabbing victims will take part in the trials."
An anonymous reader writes "Google today announced Google Now is coming to the Chrome stable channel for Windows and Mac 'starting today and rolling out over the next few weeks.' This means Google Now notifications will finally be available to desktop and laptop Chrome users, in addition to Android and iOS users. To turn the feature on, all you need to do is sign in to Chrome with the same Google Account you're using for Google Now on mobile. If you use Google Now on multiple devices, you will need to manage your location settings for each device independently (change Location Reporting on Android and iOS)."
RedHat has always embraced CentOS, as proof that they really mean it when they say they're not selling Linux, they're selling support. Use CentOS when your boss's butt isn't on the line, support contract-wise. Use RedHat Enterprise where you need to be able to pay someone to help with your problems.
OMG! What's this goatse doing here?? I thought all these images were taken down by a DMCA notice by the original asshole!
New submitter TheRealHocusLocus writes "The FCC is drafting rules to formalize the process of transition of 'last-mile' subscriber circuits to digital IP-based data streams. The move is lauded by AT&T Chairman Tom Wheeler who claims that significant resources are spent to maintain 'legacy' POTS service, though some 100 million still use it. POTS, or 'Plain Old Telephone Service,' is the analog standard that allows the use of simple unpowered phone devices on the wire, with the phone company supplying ring and talk voltage. I cannot fault progress, in fact I'm part of the problem: I gave up my dial tone a couple years ago because I needed cell and could not afford to keep both. But what concerns me is, are we poised to dismantle systems that are capable of standing alone to keep communities and regions 'in-touch' with each other, in favor of systems that rely on centralized (and distant) points of failure? Despite its analog limitations POTS switches have enforced the use of hard-coded local exchanges and equipment that will faithfully complete local calls even if its network connections are down. But do these IP phones deliver the same promise? For that matter, is any single local cell tower isolated from its parent network of use to anyone at all? I have had a difficult time finding answers to this question, and would love savvy Slashdot folks to weigh in: In a disaster that isolates the community from outside or partitions the country's connectivity — aside from local Plain Old Telephone Service, how many IP and cell phones would continue to function?"
An anonymous reader writes "HP has been the sole holdout on the Itanium, mostly because so much of the PA-RISC architecture lives on in that chip. However, the company recently began migration of Integrity Superdome servers from Itanium to Xeon, and now it has announced that the top of its server line, the NonStop series, will migrate to x86 as well, presumably the 15-core E7 V2 Intel will release next year. So while no one has said it, this likely seems the end of the Itanium experiment, one that went on a lot longer than it should have, given its failure out of the gate."
Hugh Pickens DOT Com writes "Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. 'It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was,' says Ruiu. 'The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers.'"
MojoKid writes "Anyone who has tried to host their own website from home likely knows all-too-well the hassles that ISPs can cause. Simply put, ISPs generally don't want you to do that, preferring you to move up to a business package (aka: more expensive). Not surprisingly, the EFF doesn't like these rules, which seem to exist only to upsell you a product. The problem, though, is that all ISPs are deliberately vague about what qualifies as a 'server.' Admittedly, when I hear the word 'server,' I think of a Web server, one that delivers a webpage when accessed. The issue is that servers exist in many different forms, so to target specific servers 'just because' is ridiculous (and really, it is). Torrent clients, for example, act as servers (and clients), sometimes resulting in a hundred or more connections being established between you and available peers. With a large number of connections like that being allowed, why would a Web server be classified any different? Those who torrent a lot are very likely to be using more ISP resources than those running websites from their home — yet for some reason, ISPs force you into a bigger package when that's the kind of server you want to run. We'll have to wait and see if EFF's movement will cause any ISP to change. Of all of them, you'd think it would have been Google to finally shake things up."
The 5D mk 2 has a 'green box' mode, and it seriously constrains your options in nearly all the menus.
Typical absolute max storage temps are from -65 to 150 C (-85 to 302 F). 130 degrees F is only 55 degrees C, which even commercial chips are fine to operate at (they typically go to 70 C (158 F). I don't think a cop sitting in -20F temperature is giong to try to operate a laptop. Obviously, rotating drives is a different issue - I'd use SSD in my car for vibration sake.
New kalalau_kane writes with this tidbit from Extreme Tech: "A group of European researchers has proposed the largest quantum network yet: Between Earth and the International Space Station. Such a network would see entangled photons transmitted over a distance of 250 miles — two or three times greater than previous quantum communication experiments. Not only will this be the first quantum experiment in space, but it will allow the scientists to see if entanglement really is instantaneous over long distances, and whether it's affected by gravity." The proposal (licensed CC BY).
An anonymous reader writes "A small U.S. university has come up with a novel solution to reduce the possibility of using a dead person's hand to get past a fingerprint scanner through the use of hemoglobin detection. The device quickly checks the fingerprint and hemoglobin 'non-intrusively' to verify the identity and whether the individual is alive. This field of research is called Biocryptology and seeks to ensure that biometric security devices can't be easily bypassed."
One very useful definition of a supercomputer is "any computer with performance within an order of magnitude of the fastest computer on the TOP500 list".