Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×
Games

Linux 3D Games Run Faster On PC-BSD 298

koinu writes "Phoronix has published benchmarks comparing 3D game performance on Ubuntu Linux 11.04 with the FreeBSD Linux ABI emulation on the 8.2 release of PC-BSD, which is a desktop variant of FreeBSD. Most results show that the emulated Linux layer on FreeBSD performs better than Linux natively. It's pretty interesting, because most people would expect that an additional abstraction layer would generally slow down the execution of binaries."
Security

Spammers Using Soft Hyphen To Hide Malicious URLs 162

Trailrunner7 writes with this excerpt from ThreatPost illustrating the ongoing Spy-vs.-Spy battle between spammers and the rest of us: "Spammers have jumped on the little-used soft hyphen (or SHY character) to fool URL filtering devices. According to researchers, spammers are larding up URLs for sites they promote with the soft hyphen character, which many browsers ignore. Spammers aren't shy about jumping humans flexible cognitive abilities to slip past the notice of spam filters (H3rb41 V14gr4, anyone?). ... The latest trend involves the use of an obscure character called the soft hyphen or 'SHY' character to obscure malicious URLs in spam messages. Writing on the Symantec Connect blog, researcher Samir Patil said that the company has seen recent spam messages that insert the HTML symbol for the soft hyphen to obfuscate URLs for Web pages promoted by the spammers."
Linux

Adobe (Temporarily?) Kills 64-Bit Flash For Linux 272

An anonymous reader writes "It seems that with the release of the 10.1 security patches, Adobe has, at least temporarily, killed 64-bit Flash for Linux. The statement says: 'The Flash Player 10.1 64-bit Linux beta is closed. We remain committed to delivering 64-bit support in a future release of Flash Player. No further information is available at this time. Please feel free to continue your discussions on the Flash Player 10.1 desktop forums.' The 64-bit forum has been set to read-only."
Microsoft

Submission + - Bing Maps Wows 'Em at TED2010

theodp writes: In an eye-candy filled presentation that earned him a standing-O at TED2010, Blaise Aguera y Arcas demos augmented-reality mapping technology from Microsoft. In his eight minute spiel, an extension of a shorter tech preview video, the Bing Maps architect shows how geo-tagged Flickr images can be precisely incorporated into streetside views, demonstrates indoor panoramas at Pike Place Market complete with live video overlays, and even takes the audience into space with Microsoft's Worldwide Telescope. Very high wow factor — even BillG is impressed.
Science

Programmable Quantum Computer Created 132

An anonymous reader writes "A team at NIST (the National Institute of Standards and Technology) used berylium ions, lasers and electrodes to develop a quantum system that performed 160 randomly chosen routines. Other quantum systems to date have only been able to perform single, prescribed tasks. Other researchers say the system could be scaled up. 'The researchers ran each program 900 times. On average, the quantum computer operated accurately 79 percent of the time, the team reported in their paper.'"
Government

City Laws Only Available Via $200 License 411

MrLint writes "The City of Schenectady has decided that their laws are copyrighted, and that you cannot know them without paying for an 'exclusive license' for $200. This is not a first — Oregon has claimed publishing of laws online is a copyright violation." This case is nuanced. The city has contracted with a private company to convert and encode its laws so they can be made available on the Web for free. While the company works on this project, it considers the electronic versions of the laws its property and offers a CD version, bundled with its software, for $200. The man who requested a copy of the laws plans to appeal.

Comment Re:Robot discovers Humans "unnecessary"... (Score 1) 250

This is a worst case solution since it would imply that the brain is not understood yet.

That's not too bad. When we build one of those, we can afford it with a probe facility that it can use to observe and manipulate its own brain or clones thereof. It can then find out how its brain works and tell us, or code up a minimal AI if we want that.

Comment Re:I wish the US Supreme Court was that smart. (Score 3, Insightful) 708

"Something you know" isn't what counts when it comes to protecting you from self incrimination; it is whether the "something you know" is incriminating you.

This leads to an interesting idea. Claim that you passphrase is a confession. If you plan ahead, you can even make that claim true. Encrypt your plan to assassinate the president with "I plan to assassinate the president OV:}A7MC".

Music

Wal-Mart Ends DRM Support 231

An anonymous reader writes "So, you thought you did well to support the fledgling music industry by purchasing your tracks legally from the Wal-Mart store? Well, forget about moving these tracks to a new PC! Since they started selling DRM-free tracks last year, there's no money to be made in maintaining the DRM support systems, and in fact, support is being shut down. Make sure you circumvent the restrictions by burning the tracks to an old-fashioned CD before Wal-mart 'will no longer be able to assist with digital rights management issues for protected WMA files purchased from Walmart.com.' Support ends October 9th."
Security

Submission + - Kaminsky DNS Bug Fixed by Single Character Patch?

An anonymous reader writes: According to this thread on the bind-users mailing list ( http://marc.info/?t=121981071400003 ) there is nothing inherent in the DNS protocol that would cause the massive vulnerability discussed at length here and elsewhere.

As it turns out, it appears to be a simple off-by-one error in BIND, which favors new NS records over cached ones (even if the cached TTL is not yet expired). The patch changes this in favor of still-valid cached records, removing the attacker's ability to succesfully poison the cache outside the small window of opportunity afforded by an expiring TTL, which is the way things used to be before the Kaminsky debacle.

Source port randomization is nice, but removing the root cause of the attack's effectiveness is better...

"Why should we subsidize intellectual curiosity?" -Ronald Reagan

Working...