Forgot your password?
typodupeerror
Privacy

Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos 265

Posted by samzenpus
from the gates-are-open dept.
swinferno writes with news about the leak of hundreds of private celebrity photos over the weekend. Hundreds of revealing pictures of female celebrities were leaked overnight after being stolen from their private collections. Hunger Games actress Jennifer Lawrence, Kirsten Dunst, and pop star Ariana Grande were among the celebrities apparently shown in the pictures, which were posted on infamous web forum 4chan. It's unclear how the images were obtained, but anonymous 4chan users said that they were taken from celebrities' iCloud accounts. The accounts are designed to allow iPhone, iPad, and Mac users to synchronize images, settings, calendar information, and other data between devices, but the service has been criticized for being unreliable and confusing. Earlier this year, Jennifer Lawrence herself complained about the service in an interview with MTV.
Microsoft

Microsoft Shutting Down MSN Messenger After 15 Years of Service 126

Posted by samzenpus
from the so-long-farewell dept.
New submitter airfuz writes Microsoft took a bold move announcing that users have to move away from the old version of Internet Explorer to the new version 11. And now not long after that, Microsoft announced that they are shutting down the 15-year-old MSN Messenger. Most people have moved away from the service to Facebook and other mobile based messengers such as Whatsapp, and so MSN is left with few users. But still, ending a 15-year messaging service like the MSN Messenger means something to the ones who grew up using it.
Wireless Networking

Wi-Fi Router Attack Only Requires a Single PIN Guess 82

Posted by Soulskill
from the one-two-three-four dept.
An anonymous reader writes: New research shows that wireless routers are still quite vulnerable to attack if they don't use a good implementation of Wi-Fi Protected Setup. Bad implementations do a poor job of randomizing the key used to authenticate hardware PINs. Because of this, the new attack only requires a single guess at the hardware PIN to collect data necessary to break it. After a few hours to process the data, an attacker can access the router's WPS functionality. Two major router manufacturers are affected: Broadcom, and a manufacturer to be named once they get around to fixing it. "Because many router manufacturers use the reference software implementation as the basis for their customized router software, the problems affected the final products, Bongard said. Broadcom's reference implementation had poor randomization, while the second vendor used a special seed, or nonce, of zero, essentially eliminating any randomness."
Android

MIPS Tempts Hackers With Raspbery Pi-like Dev Board 88

Posted by timothy
from the do-what-thou-will dept.
DeviceGuru (1136715) writes "In a bid to harness the energy and enthusiasm swirling around today's open, hackable single board computers, Imagination Technologies, licensor of the MIPS ISA, has unveiled the Creator C120 development board, the ISA's counter to ARM's popular Raspberry Pi and BeagleBone Black SBCs. The MIPS dev board is based on a 1.2GHz dual-core MIPS32 system-on-chip and has 1GB RAM and 8GB flash, and there's also an SD card slot for expansion. Ports include video, audio, Ethernet, both WiFi and Bluetooth 4.0, and a bunch more. OS images are already available for Debian 7, Gentoo, Yocto, and Arch Linux, and Android v4.4 is expected to be available soon. Perhaps the most interesting feature of the board is that there's no pricing listed yet, because the company is starting out by giving the boards away free to developers who submit the most interesting projects."
Space

Software Error Caused Soyuz/Galileo Failure 154

Posted by samzenpus
from the put-that-anywhere dept.
schwit1 writes An investigation into the recent failed Soyuz launch of the EU's Galileo satellites has found that the Russian Fregat upper stage fired correctly, but its software was programmed for the wrong orbit. From the article: "The failure of the European Union’s Galileo satellites to reach their intended orbital position was likely caused by software errors in the Fregat-MT rocket’s upper-stage, Russian newspaper Izvestia reported Thursday. 'The nonstandard operation of the integrated management system was likely caused by an error in the embedded software. As a result, the upper stage received an incorrect flight assignment, and, operating in full accordance with the embedded software, it has delivered the units to the wrong destination,' an unnamed source from Russian space Agency Roscosmos was quoted as saying by the newspaper."
PHP

PHP 5.6.0 Released 115

Posted by timothy
from the still-hard-to-pronounce dept.
An anonymous reader writes The PHP team has announced the release of PHP 5.6.0. New features include constant scalar expressions, exponentiation using the ** operator, function and constant importing with the use keyword, support for file uploads larger than 2 GB, and phpdbg as an interactive integrated debugger SAPI. The team also notes important changes affecting compatibility. For example: "Array keys won't be overwritten when defining an array as a property of a class via an array literal," json_decode() is now more strict at parsing JSON syntax, and GMP resources are now objects. Here is the migration guide, the full change log, and the downloads page.
Crime

Anita Sarkeesian, Creator of "Tropes vs. Women," Driven From Home By Trolls 1221

Posted by timothy
from the bad-childhoods-never-end dept.
Sonny Yatsen writes: Anita Sarkeesian, the creator of Tropes vs. Women — a video series exploring negative tropes and misogynistic depictions of women in video games — reports that she has been driven from her home after a series of extremely violent sexual threats made against her. Her videos have previously drawn criticism from many male gamers, often coupled with violent imagery or threats of violence. The Verge story linked has this to say: The threats against Sarkeesian have become a nasty backdrop to her entire project — and her life. If the trolls making them hoped for attention, they've gotten it. They've also inexorably linked criticism of her work, valid or not, with semi-delusional vigilantism, and arguably propelled Tropes vs. Women to its current level of visibility. If a major plank of your platform is that misogyny is a lie propagated by Sarkeesian and other "social justice warriors," it might help to not constantly prove it wrong.
The Internet

Net Neutrality Is 'Marxist,' According To a Koch-Backed Astroturf Group 525

Posted by Unknown Lamer
from the toll-road-ahead dept.
Jason Koebler (3528235) writes American Commitment, a conservative group with strong ties to the Koch brothers has been bombarding inboxes with emails filled with disinformation and fearmongering in an attempt to start a "grassroots" campaign to kill net neutrality — at one point suggesting that "Marxists" think that preserving net neutrality is a good idea. American Commitment president Phil Kerpen suggests that reclassifying the internet as a public utility is the "first step in the fight to destroy American capitalism altogether" and says that the FCC is plotting a "federal Internet takeover," a move that "sounds more like a story coming out of China or Russia."

Comment: Re:It's not Java, it's the JVM (Score 1) 508

by DickBreath (#47747729) Attached to: If Java Wasn't Cool 10 Years Ago, What About Now?
It's not just the JVM. It's the fact that Java (and all JVM languages) have Garbage Collection.

When people (even in this Slashdot comments) talk about non-GC languages and compare then to GC languages such as Java, they are missing something important.

I have seen comments here comparing the language features, and concepts computer science students learn from either C or Java, etc. But they miss something very important.

When you have GC, you have something that deeply enables the ability to create vast libraries of code that interoperate well together. It is something so deeply implied in the source and binary ABI and APIs that you don't see it. Because of GC, there doesn't need to be any 'contract' in APIs about who owns what data structures. Who is responsible to delete what. What the protocols are for who is responsible for disposing of what, etc.

This cannot be overstated. This enables the creation of libraries that can create, or be passed external data structures, and can create and return data structures, without any concern for who owns what or who is responsible for disposing of what.

This is true whether the language is Java, Python, Ruby, etc, etc, etc. The GC languages are in an entirely different class than C or C++. Yes, I know that those languages have GC grafted on. But which GC mechanism? Do all of your libraries support it? Universally? What about some libraries use this memory management protocol and contract (maybe even non GC), and other libraries use a different memory management protocol and discipline?

Comment: Re:It's not Java, it's the JVM (Score 2) 508

by DickBreath (#47747639) Attached to: If Java Wasn't Cool 10 Years Ago, What About Now?
The JVM does some pretty amazing things. It has some pretty amazing optimizations. You can run a lot of languages on the JVM.

Most modern languages now take garbage collection for granted. If you build your new language on the JVM, you get GC for free. And a GC that has been researched, developed and optimized for almost two decades. You get a choice of GC algorithms. Each GC has many tuning parameters. (More than you need.)

You're right. It's not Java that is cool. It's the JVM.

The JVM compiles the JVM bytecode to machine code. On the fly. It continuously dynamically profiles your code to determine what needs to be compiled to native code. It aggressively inlines functions. Even though all methods are virtual functions, if the JVM can prove that there is only one implementation that exists for this method, or only one implementation that could be the actual one that would be invoked at a certain point, then it compiles it as a direct non-virtual call.

But, classes can be dynamically reloaded during runtime. So other code that inlined methods from the class being reloaded now has inlined code that is obsolete! The JVM will ensure that those methods are recompiled (possibly re-inlining, or not) the code from the newly loaded class. And it will ensure that this recompile happens before the stale inlined code can be executed again.

All of this is cross platform. Because your code is compiled by a compiler that knows about the actual hardware you are running on, it can do optimizations that are impossible in an ahead-of-time compiler like C. It can use extended instructions from the instruction set of the actual processor you are using. Furthermore, since it knows the entire set of code making up the application, it can do global optimizations that are also impossible with ahead of time compilers. An ahead of time compiler doesn't know anything about the implementation of the libraries that your program will link against at runtime. If the compiler knew about the actual implementation of the libraries that your application code was calling, there are optimization opportunities that an ahead of time compiler cannot make assumptions about.

With the JVM you can have heaps that are tens of gigabytes (or hundreds with some third party JVM implementations) and have max GC pause times in the tens of milliseconds.

That is what makes 'java' cool. It's the JVM. It's also the JVM that makes Java so darned fast. Not the Java language itself. Nor the Java compiler to JVM bytecode. The JVM has a unique perfect storm of amazing features that make it so attractive.

Comment: article summary is wrong (Score 5, Informative) 51

by The Pi-Guy (#47746003) Attached to: Aussie Airlines To Allow Uninterrupted Mobile Use During Flights

The article summary is completely wrong -- it mentions "while you're in coverage", to mean that you can leave the device connected to the network.

But from TFA: "Plane passengers will be allowed to use electronic devices weighing less than a kilogram in offline mode from gate to gate without needing to turn them off. The devices will need to remain in flight mode and cannot be used for calls, text or data, however."

So, all this really does is confirm the findings that the FAA had -- small devices are reasonable to use in airplane mode in all phases of flight.

Mars

Mangalyaan Gets Ready To Enter Mars Orbit 67

Posted by timothy
from the space-is-a-big-place dept.
William Robinson (875390) writes India's Mars Orbiter Mission, known as Mangalyaan is now at a distance of just nine million kilometres from the red planet, and is scheduled to enter the orbit of Mars at 7.30 am on September 24. Mangalyaan was launched on 5th November 2013 by ISRO, presently busy planning to reduce the speed of the spacecraft through the process of firing the LAM engine and bring it to 1.6 km/sec, before it is captured by the planet's gravity. Eventually, the mission's official updates page should catch up.
Chrome

New HP Laptop Would Mean Windows at Chromebook Prices 215

Posted by timothy
from the is-that-a-bargain? dept.
New submitter nrjperera (2669521) submits news of a new laptop from HP that's in Chromebook (or, a few years ago, "netbook") territory, price-wise, but loaded with Windows 8.1 instead. Microsoft has teamed up with HP to make an affordable Windows laptop to beat Google Chromebooks at their own game. German website Mobile Geeks have found some leaked information about this upcoming HP laptop dubbed Stream 14, including its specifications. According to the leaked data sheet the HP Stream 14 laptop will share similar specs to HP's cheap Chromebook. It will be shipped with an AMD A4 Micro processor, 2GB of RAM, 32GB of flash storage and a display with 1,366 x 768 screen resolution. Microsoft will likely offer 100GB of OneDrive cloud storage with the device to balance the limited storage option.

You have a tendency to feel you are superior to most computers.

Working...