Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Submission + - Seeing the forest and the trees, all three trillion of them->

bhendersoncmd13 writes: A new international study estimates that there are more than 3 trillion trees on Earth, about seven and a half times more than some previous estimates. But the total number of trees has plummeted by roughly 46 percent since the start of human civilization. The results provide the most comprehensive assessment of tree populations ever produced and offer new insights into a class of organism that helps shape most terrestrial biomes.
Link to Original Source

Submission + - Scientists Take Huge Step Toward Universal Flu Vaccine->

Offsh0reOn writes: A universal flu vaccine — one that provides immunity against every strain of the influenza virus for multiple years — is the holy grail of flu research. It would be a medical breakthrough on the order of penicillin, with the potential to save hundreds of thousands of lives every year. And scientists just got one crucial step closer to making it a reality.
Link to Original Source

Submission + - New Russian laboratory to study mammoth cloning

An anonymous reader writes: While plans to clone a woolly mammoth are not new, a lab used in a joint effort by Russia and South Korea is. The new facility is devoted to studying extinct animal DNA in the hope of creating clones from the remains of animals found in the permafrost. IBtimes reports: "The Sakha facility has the world's largest collection of frozen ancient animal carcasses and remains, with more than 2,000 samples in its possession, including some that are tens of thousands years old, such as a mammoth discovered on the island of Maly Lyakhovsky; experts believe it may be more than 28,000 years old."

Submission + - For future wearable devices, the network could be you->

angry tapir writes: Researchers at the University of California, San Diego, have found a way for wearable devices to communicate through a person's body instead of the air around it. Their work could lead to devices that last longer on smaller batteries and don't give away secrets as easily as today's systems do.
Link to Original Source

Submission + - The Internet\'s Founder Never Thought It Would Get This Bad->

charleswright044 writes: On Sept. 2, 1969, Leonard Kleinrock strung a 15-foot cable between two computers, hoping it would help them converse.A professor of computer science at the University of California, Los Angeles, Kleinrock and a group of colleges had been tasked by the government to build a computer communication system, dubbed "ARPANET" by the group.

Their system would form the foundation of the modern Internet, but the topic of when it came into being is sharplydebated. Most say it began when the professors connected the aforementioned cable. Some, including UCLA, contest that the Internet was born almost two months later, on Oct. 29, 1969, when the network finally passed along its first message. (That message was supposed to be a single phrase, "login," but the researchers only managed to type the first two letters before the computer crashed.)

At the time of its conception, ARPANET was an experiment designed to test a way of freely exchanging information. The emphasis in this arrangement was on freedom. The scientists created a group of their graduate students and turned over many of the tasks of gearing up the system. It was a symbolic way of giving over the system to the people. As Kleinrock later wrote, the exchange shifted control "tothe people who were using the net, and not in the carriers, the providers or the corporate world."

Much has changed. While the initial system was used only by the small group that created it, it wasn\'t long before it expanded — first to computer scientists, then to other academic scientists and, finally, with the creation of the World Wide Web, to the world at large.

Part of what made the system so dynamic was the breadth of people this openness attracted. Other forms of communication, like the telegraph, printing press and television, could only move information to a select group. A single document on the Internet, however, could reach anyone with a connection.

But that openness comes with a dark side. In a paperwritten in 2004 for the 35th anniversary of ARPANET, Kleinrockadmitted he had never foreseen the modern version of the system. "Who ever thought that we would reach a billion users," he wrote, further wondering if he would have changed the system, had he known the end result.

A system that is founded to include any and all information — contributed by anyone who chooses to contribute — will naturally include some pretty terrible stuff.

Gone are the days when we could trust what came to us through the net, when we could expect that what was directed at us was relevant, useful, accurate and benign," he wrote. "Now we find ourselves confronted with junk, attacked by viruses, denied access, worried about our privacy, and confused about who can provide relief to these and other concerns."

His paper grapples with a difficult issue, one that\'s even more relevant for the Internet of today: A system that is founded to include any and all information — contributed by anyone who chooses to contribute — will naturally include some pretty terrible stuff. Advocates of the "net neutrality" principal argue that the very premise of the Internet is based in the idea that all information should be treated equally on the web.

But even the staunchest net neutrality backers balk at how to deal with the web\'s worst content. We\'re all in favor of revolutionaries in totalitarian countries using the Internet to communicate — but what about when the Islamic State group begins using it for recruitment? Social media companies should allow anyone to create a profile — but what happens when a personal profile isconnected with a violent event, as in the case of Virginia shooting suspect Vester Flanagan?

It gets even more complicated when the rules intended to allow free access begin to contradict each other — like when free and open comments on social platformsbecome harassmentthat specifically targets women, people of color and members of the LGBT community and effectively cuts off their Internet free speech.

Now that the Internet is a diffuse conglomeration of things, much of the debate around How-Much-Information-Is-Too-Much is being worked out, not by the web\'s founders, but by platforms like Twitter and Facebook, which bear the brunt of the moderation burden.

As forKleinrock, his paper reveals no easy solutions. He writes that it is "essential" to maintain the Internet\'s history of open access and shared ideas, but that somehow these ideas must be managed.

Without management, Kleinrock writes, "then we will see a slowdown in Internet use and acceptance; if this happens, all of us lose."

-- This feed and its contents are the property of The Huffington Post, and use is subject to our terms. It may be used for personal consumption, but may not be distributed on a website.

Link to Original Source

Submission + - KDE developers respond to Phoronix criticism->

sfcrazy writes: Thomas Pfeiffer writes: About a month ago, Eric Griffith posted an article on Phoronix where he compared Fedora’s KDE spin to the main Fedora Workstation which uses GNOME. In that article, Eric described a number of issues that he became fully aware of when comparing his favorite desktop environment, Plasma (and the KDE applications he regularly uses) with GNOME’s counterparts.

I read that article, shared it with other KDE designers and developers, and we came to the conclusion that yes, at least some of the issues he describes there are perfectly valid and clearly documented. And since KDE does listen to user feedback if it makes sense, we decided we should do something about it.

Link to Original Source

Submission + - Check Point Changes the Malware Game With New CPU-Level Threat Prevention

An anonymous reader writes: After buying Israeli startup company Hyperwise earlier this year, Check Point Software Technologies (Nasdaq: CHKP) now unveils its newest solution for defeating malware. Their new offering called SandBlast includes CPU-Level Threat Emulation that was developed in Hyperwise which is able to defeat exploits faster and more accurately than any other solution by leveraging CPU deubgging instruction set in Intel Haswell, unlike known anti-exploitation solutions like kBouncer or ROPecker which use older instruction sets and are therefore bypassable. SandBlast also features Threat Extraction — the ability to extract susceptible parts from incoming documents.

Submission + - 'Extremely critical' OS X keychain vulnerability steals passwords via SMS-> 1

Mark Wilson writes: Two security researchers have discovered a serious vulnerability in OS X that could allow an attacker to steal passwords and other credentials in an almost invisible way. Antoine Vincent Jebara and Raja Rahbani — two of the team behind the myki identity management security software — found that a series of terminal commands can be used to extract a range of stored credentials.

What is particularly worrying about the vulnerability is that it requires virtually no interaction from the victim; simulated mouse clicks can be used to click on hidden buttons to grant permission to access the keychain. Apple has been informed of the issue, but a fix is yet to be issued. The attack, known as brokenchain, is disturbingly easy to execute.

Link to Original Source

Submission + - Netflix Open Sources Sleepy Puppy XSS Hunter->

msm1267 writes: Netflix has released a tool it calls Sleepy Puppy to open source. The tool injects cross-site scripting payloads into a target app that may not be vulnerable, but could be stored in a database and and tracks the payload if it's reflected to a secondary application that makes use of the data in the same field.

“We were looking for a way to provide coverage on applications that come from different origins or may not be publicly accessible,” said co-developer Scott Behrens, a senior application security engineer at Netflix. “We also wanted to observe where stored data gets reflected back, and how data that may be stored publicly could also be reflected in a large number of internal applications.”

Sleepy Puppy is available on Netflix's Github repository and is one of a slew of security tools its engineers have released to open source.

Link to Original Source

Submission + - Ransomware Jumped 58 Percent in Q2->

dkatana writes: DARKReading Sara Peters reports that randsomware is still rising, and jumped 58% last quarter, compared to the first three months of the year.

McAfee attributes the huge leap in ransomware samples to the quick growth of new families like CTB-Locker and CryptoWall, which the FBI said cost US citizens $18 million.

Also mobile specific randsomware is growing steadily, at 17%, but not as fast as the adoption of mobile devices.

Link to Original Source

Submission + - Survey shows that millennials are more irked by spelling errors than older group->

jamesjperry writes: A survey by appears to show that, while older generations might consider themselves the last bastions of correct spelling and grammar, almost three quarters of 18-34 year olds are irked by grammar and spelling slips on social media — higher than any other age group.

According to the online Harris Poll in early August, as reported by The Associated Press, 80 percent of American adults consider themselves good spellers, but they may be overestimating their abilities — as 71 percent say they often find spelling mistakes in correspondence from others.

Women notice more errors than men (three-quarters of women say they find errors in other people\'s writing compared to two-thirds of men).

Link to Original Source

Submission + - Mutt 1.5.24 Released->

kthreadd writes: Version 1.5.24 of the Mutt email client has been released. New features in this release includes among other things terminal status-line (TS) support, a new color object "prompt", the ability to encrypt postponed messages and opportunistic encryption which automatically enables/disables encryption based on message recipients. SSLv3 is now also disabled by default.
Link to Original Source

Submission + - Can living in total darkness for 5 days "reset" the visual system?->

the_newsbeagle writes: That's what one neuroscientist is aiming to find out. He wants to put patients with a type of amblyopia, the vision problem commonly called lazy eye, into the dark for 5 days. His hypothesis: When they emerge, their brains' visual cortices will be temporarily "plastic" and changeable, and may begin to process the visual signals from their bad eyes correctly. Before he could do this study, though, he had to do a test run to figure out logistics. So he himself lived in a pitch black room for 5 days. One finding: Eating ravioli in the dark is hard.
Link to Original Source

Submission + - China preparing to send crewed Shenzhou 11 to Tiangong 2 space station in 2016->

MarkWhittington writes: China has not sent people into space since the mission of the Shenzhou 10 to the prototype space station Tiangong 1 in June 2013. Since then the Chinese have accomplished the landing of the Chang’e 3 on the lunar surface. According to a story in Space Daily, the hiatus in Chinese crewed spaceflight is about to end with the launch of the Tiangong-2 prototype space station in 2016 with the subsequent visit by a crew of Chinese astronauts on board the Shenzhou 11. The mission will be a prelude to the construction of a larger Chinese space station, slated to be completed by 2022.
Link to Original Source

Submission + - 95% Of Websites In 10 New TLDs Are Suspicious

An anonymous reader writes: Much has changed since the early days of the Internet when the Web had only six common top level domains. Back then, what most consumers and businesses encountered were a small number of standard TLDs. However, since 2013, the number of new TLDs has skyrocketed. Blue Coat analyzed hundreds of millions of Web requests from more than 15,000 businesses and 75 million users and revealed new research that shows the TLDs, or “neighborhoods,” most associated with suspicious websites. More than 95 percent of websites in 10 different TLDs are rated as suspicious, with that percentage increasing to 100 percent for the top two highest ranking TLDs, .zip and .review.

Genius is ten percent inspiration and fifty percent capital gains.