Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Different use case than standard RPI (Score 5, Informative) 51

by Radium_ (#46685709) Attached to: Raspberry Pi Compute Module Release

As discussed on the Raspberry forum, there is some integrated memory, but no USB or Ethernet are present.
Liz from the RPI foundation writes that "there’s much more IO, so you can add your own . The idea here is that it’s the barest minimum, so folks working on industrial applications can add the ports and extra connectivity they need."


+ - Interview: Linus on Linux->

Submitted by
Radium_ writes: "Along with the 20th anniversary of the release of the 1st Linux kernel, Linuxfr -a french speaking Linux website- published an interview of Linus Torvalds. The creator of Linux answers questions about Linux kernel licensing, his contributions to the kernel development model and Linux in 2031."
Link to Original Source

SCO Asks Judge To Give Them the Unix Copyright 286

Posted by CmdrTaco
from the we-promise-to-walk-it-every-day dept.
Raul654 writes "In March, the jury in the Novell/SCO case found that Novell owns the copyright to Unix. Now, SCO's lawyers have asked judge Ted Stewart to order Novell to turn over the Unix copyright to them. 'SCO contends the jury did not answer the specific issue before Stewart that involves a legal principle called "specific performance," under which a party can ask a court to order another party to fulfill an aspect of an agreement.'" Over at Groklaw, PJ is deep into a community project to annotate SCO's filing. It's for the benefit of future historians, but it makes amusing reading now.

What Free Antivirus Do You Install On Windows? 896

Posted by timothy
from the is-clamav-no-longer-good? dept.
Techman83 writes "After years of changing between AVG Free + Avast, it's coming time to find a new free alternative for friends/relatives who run Windows. AVG and Avast have been quite good, but are starting to bloat out in size, and also becoming very misleading. Avast recently auto updated from 4.8 to 5 and now requires you to register (even for the free version) and both are making it harder to actually find the free version. Is this the end of reasonable free antivirus, or is there another product I can entrust to keep the 'my computer's doing weird things' calls to a minimum?"

China's Human Flesh Search Engine 248

Posted by timothy
from the google-is-mine dept.
Hugh Pickens writes "The NY Times has an interesting article about Human-flesh search engines — renrou sousuo yinqing — that have become a phenomenon in China: they are a form of online vigilante justice in which Internet users hunt down and punish people who have attracted their wrath. The goal is to get the targets of a search fired from their jobs, shamed in front of their neighbors, or run out of town. It's crowd-sourced detective work, pursued online — with offline results. 'In the United States, traditional media are still playing the key role in setting the agenda for the public,' says Jin Liwen. 'But in China, you will see that a lot of hot topics, hot news or events actually originate from online discussions.' In one well known case, when a video appeared in China of a woman stomping a cat to death with the sharp point of her high heel, the human flesh search engine tracked the kitten killer's home to the town of Luobei in Heilongjiang Province, in the far northeast, and her name — Wang Jiao — was made public, as were her phone number and her employer. 'Wang Jiao was affected a lot,' says one Luobei resident. 'She left town and went somewhere else.' The kitten-killer case didn't just provide revenge; it helped turn the human-flesh search engine into a national phenomenon. Searches have also been directed against cheating spouses, corrupt government officials, amateur pornography makers, Chinese citizens who are perceived as unpatriotic, journalists who urge a moderate stance on Tibet and rich people who try to game the Chinese system."

When Will AI Surpass Human Intelligence? 979

Posted by samzenpus
from the I'm-afraid-I'm-smarter-than-you-dave dept.
destinyland writes "21 AI experts have predicted the date for four artificial intelligence milestones. Seven predict AIs will achieve Nobel prize-winning performance within 20 years, while five predict that will be accompanied by superhuman intelligence. (The other milestones are passing a 3rd grade-level test, and passing a Turing test.) One also predicted that in 30 years, 'virtually all the intellectual work that is done by trained human beings ... can be done by computers for pennies an hour,' adding that AI 'is likely to eliminate almost all of today's decently paying jobs.' The experts also estimated the probability that an AI passing a Turing test would result in an outcome that's bad for humanity ... and four estimated that probability was greater than 60% — regardless of whether the developer was private, military, or even open source."
Social Networks

Facebook To Preserve Accounts of the Dead 292

Posted by samzenpus
from the last-status-update dept.
Barence writes "Social-networking site Facebook is planning to preserve the accounts of dead members. The new 'memorialized' accounts will continue to display photos and wall posts, but remove 'sensitive information' such as status updates and contact information. Friends or family who want to report the death of a Facebook member are encouraged to fill out the site's Deceased form. The form asks for proof of death, such as an obituary or news article, although it's not clear how Facebook can validate the death of a member if neither of those pieces of information is published on the internet. How long before someone snuffs it on Facebook before their time?"

Were Neanderthals Devoured By Humans? 502

Posted by timothy
from the subsumed-or-consumed dept.
Hugh Pickens writes "The Guardian reports that a Neanderthal jawbone covered in cut marks similar to those left behind when flesh is stripped from deer provides crucial evidence that humans attacked Neanderthals, and sometimes killed them, bringing back their bodies to caves to eat or to use their skulls or teeth as trophies. 'For years, people have tried to hide away from the evidence of cannibalism, but I think we have to accept it took place,' says Fernando Rozzi, of Paris's Centre National de la Récherche Scientifique. According to Rozzi, a discovery at Les Rois in south-west France provides compelling support for that argument. Previous excavations revealed bones that were thought to be exclusively human. But Rozzi's team re-examined them and found one they concluded was Neanderthal." (Continued, below.)

Comment: This will change nothing in the long run (Score 2, Insightful) 129

by Radium_ (#27517583) Attached to: French Assembly Rejects Three Strikes Bill

Don't fool yourself, this (temporary) rejection was only possible because some of the left wing party sneaked at the last minute to vote AGAINST the proposal. There were not enough right wing (government) politicians in the assembly to vote for it and the text was rejected.

This, however, changes NOTHING in the long run: despite being a stupid, non-applicable, lobbied-by-the-SACEM*-to-maintain-the-outdated-cash-machine, this law *will* be accepted in the end, since the government has enough of its own members of the Assemblee Nationale to vote for it, regardless of what the other "deputes" do.

When this stupid law is effective everybody loses, except maybe for recoding companies which will be able to seat for 20 more years on their obsolete business plan.


Intel Recruits TSMC To Produce Atom CPUs 109

Posted by ScuttleMonkey
from the plug-and-play-companies dept.
arcticstoat writes "Intel has surprised the industry by announcing a memorandum of understanding (MOU) with Taiwanese silicon chip maker TSMC to manufacture Atom CPUs. Although TSMC is already employed by AMD, Nvidia and VIA to make chips, it's not often you see Intel requiring the services of a third fabrication party. Under the MOU, Intel agrees to port its Atom CPU technology to TSMC, which includes Intel's processes, intellectual properties, libraries and design flows relating to the processor. This will effectively allow other customers of TSMC to easily build Atom-based products similarly to how they might use an ARM processor in their own designs. However, Intel says that it will still pick the specific market segments and products that TSMC will go after, which will include system-on-chip products, as well as netbooks, nettops and embedded platforms."

French President Busted For Copyright Violation 317

Posted by kdawson
from the do-as-i-say dept.
An anonymous reader writes "ZeroPaid has an interesting take on the story of Nicolas Sarkozy being accused of copyright infringement. The irony, of course, is Sarkozy's pushing of a 3-strikes law — disconnecting from the Internet those accused of file sharing — in France and across the EU. The French president had apparently offered to settle the copyright infringement accusation for one Euro, but the band rejected the offer, calling it an insult. The article notes that each year since 2006, a high-profile anti-piracy entity has been on the wrong end of a copyright infringement notice. In 2008, Sony BMG was sued for software piracy. In 2007, anti-piracy outfit BASCAP received a cease and desist order related to pirated software. And in 2006, the MPAA was accused of pirating 'This Film is Not Yet Rated'."

Working Around Slow US Gov. On DNS Security 91

Posted by kdawson
from the kicking-the-dragging-feet dept.
alphadogg writes "Last fall, the US government sought comments from industry about how better to secure the Internet by deploying DNSSEC on the root zone. But it hasn't taken action since then. Internet policy experts anticipate further delays because the Obama Administration hasn't appointed a Secretary of Commerce yet, the position that oversees Internet addressing issues. Meanwhile, the Internet engineering community is forging ahead with a stopgap to allow DNSSEC deployment without the DNS root zone being signed. Known as a Trust Anchor Repository, the alternative was announced by ICANN last week and has been in testing since October."

BeOS Successor Haiku Keeps the Faith 448

Posted by timothy
from the still-want-a-be-box-led-meter dept.
kokito writes "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and 'personality,' boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general." (More below.)

Comment: Focus on the methodology rather than the company (Score 1) 93

by Radium_ (#26411273) Attached to: Best Security / Vulnerability Testing Firms for Web Apps?

I do not think anyone can recommend the "best" company as the criteria for "best" depend on your business needs.
That being said, I would recommend sending a request for proposal (or call for tender, I never know the correct name for this) to 5 companies with local offices so you can meet the ethical hackers if needed. This is good to avoid relying on a bunch of "not so white hackers" with little knowledge of collateral damages and potential impact of the pentest on the information system.

Make sure the intruders do not rely on automated tools. I have seen Eeye/ISS reports labelled as actual pentests reports, sold at pentest prices. A good pentest on a 3/3 application requires at least 8-10 days from my experience. These figures should be adapted to the complexity of the infrastructure of course.

I would also ask for information regarding
- system tests vs application tests. The latter cannot be automated to be effective, but both are necessary for a pentest to be meaningful
- the pentest methodology (do they have anything set or do they do it "as they feel" for each project),
- audit trails gathering (all traffic between the pentest lab and your information system should be archived)
- alert processes (what should they do if a critical vulnerability is discovered) and so on

Many companies with little knowledge of professional penetration testing sell intrusion services, from my point of view it is your job to select the best one, nobody on Slashdot can do that for you.

Any given program will expand to fill available memory.