Become a fan of Slashdot on Facebook


Forgot your password?
Back for a limited time - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×
Open Source

Submission + - Eclipse Foundation has much to lose in the Hudson (

GMGruman writes: "InfoWorld columnist Savio Rodrigues notes that Oracle's hand-off — or perhaps dumping — of the open source Hudson project could be bad for the Eclipse Foundation by making Eclipse appear to be merely a dumping ground for unwanted open source projects, rather than as the central location for vibrant open source activities."

The Strange Disappearance of Dancho Danchev 160

rudy_wayne writes "ZDNet is reporting that Zero Day blogger and malware researcher Dancho Danchev has gone missing since August of last year. Dancho, who was relentless in his pursuit of cyber-criminals, last blogged here on August 18. His personal blog has not been updated since September 11, 2010. 'At ZDNet, we made multiple attempts to contact him, to no avail. Telephone numbers are going to Bulgarian language voicemails and our attempts to reach him via a snail mail address also came up empty. Just recently, a trusted member of the malware research community reached out to us to say he had received a troubling letter from Dancho on September 9, 2010, about the threat of persecution in Bulgaria.'"

Mars Polar Cap Mystery Solved 77

Matt_dk writes "Scientists are now able to explain why Mars' residual southern ice cap is misplaced, thanks to data from ESA's Mars Express spacecraft (the same probe running the 'Mars Webcam'). It turns out the martian weather system is to blame. And so is the largest impact crater on Mars — even though it is nowhere near the south pole. Like Earth, Mars has frozen polar caps, but unlike Earth, these caps are made of carbon dioxide ice as well as water ice. During the southern hemisphere's summer, much of the ice cap sublimates, a process in which the ice turns straight back into gas, leaving behind what is known as the residual polar cap. The mystery was that while the winter cap is symmetrical about the south pole, the residual cap was offset, and scientists couldn't figure out why."
The Military

US Congress Funds Laser Weapons 423

An anonymous reader writes "The Washington Post reports that the US Congress is funding laser weapons for use in the near future. Low-power lasers called 'dazzlers' are already being used in Iraq to temporarily reduce a person's vision. High-power laser weapons would allow precision attacks that minimize civilian casualties. From the Post: 'The science board said tactical laser systems could be developed for broader use because they "enable precision ground attack to minimize collateral damage in urban conflicts." The report suggested, for example, that "future gunships could provide extended precision lethality and sensing." The board also proposed using lasers to protect against rockets, artillery, mortars and unmanned airborne vehicles by blasting them out of the sky. Last month, the Army awarded Boeing $36 million to continue development of a high-energy laser mounted on a truck that could hit overhead targets. But deployment is not expected until 2016, even if all goes well.'"

Feds Tighten DNS Security On .Gov 140

alphadogg writes "When you file your taxes online, you want to be sure that the Web site you visit — — is operated by the Internal Revenue Service and not a scam artist. By the end of next year, you can be confident that every U.S. government Web page is being served up by the appropriate agency. That's because the feds have launched the largest-ever rollout of a new authentication mechanism for the Internet's DNS. All federal agencies are deploying DNS Security Extensions (DNSSEC) on the .gov top-level domain, and some expect that once that rollout is complete, banks and other businesses might be encouraged to follow suit for their sites. DNSSEC prevents hackers from hijacking Web traffic and redirecting it to bogus sites. The Internet standard prevents spoofing attacks by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption."

SanDisk, Music Publishers Push DRM-free SlotMusic Format 368

Strudelkugel writes "The LA Times and others are reporting the music industry is working with SanDisk to try unrestricted music files on microSD memory cards to improve sales of physical media: 'In addition to music, the slotMusic cards will come pre-loaded with other things, such as liner notes, album-cover artwork and sometimes video.' The important part: 'The music on slotMusic comes without copyright protection, so it can be used on almost all computers, mobile phones and music players — but it won't play on an iPod, which doesn't have a micro-SD memory slot. It has one gigabyte of memory, and the music tracks are played back at high quality.' Could it be the labels have finally recognized that providing features and convenience to customers is preferable to suing them?" Most computers also don't have microSD slots; according to EMI's press release, there will be a "tiny USB sleeve" packaged with each card, and the "high quality" format means up to 320kbps MP3. From the given description, it seems like it would be no harder to transfer the tracks to an iPod (via a computer) than to most other players.
The Media

Debating "Deletionism" At Wikipedia 484

Ian Lamont writes "In a strange turn of events, the Wikipedia entry for Deletionpedia — an online archive of deleted Wikipedia articles — is now being considered for deletion. The entry for Deletionpedia was created shortly after the publication of an Industry Standard article and a discussion on Slashdot this week. Almost immediately, it was nominated for deletion, which has sparked a running debate about the importance of the Wikipedia entry, Deletionpedia, and the sources that reference it. For the time being, you can read the current version of the Deletionpedia entry, while the Wikipedia editors carry on the debate."

Neopwn, the World's First Pentesting Mobile Phone 103

thefanboy writes "What do you get when you cross BackTrack Linux apps with a mobile phone? This is the first ever publicly available mobile phone running a full custom Linux network auditing distribution, and it runs it surprisingly well. One can literally go from phone to pwn in 2 seconds. Based off of the Openmoko Neo Freerunner, many steps have been taken to compensate for the lack of a QWERTY keyboard with automation scripts, dialogs, and a point-and-pwn menu. It runs applications such as Metasploit and the Aircrack suite quite well, especially given the fact that it supports a wide array of USB WLAN cards."

Palin Email Hacker Found 767

mortonda writes to tell us that the person responsible for breaching Sarah Palin's private email account has been found. We discussed the breach last Wednesday, shortly before the hacker, a University of Tennessee-Knoxville student, posted a message detailing his methods. Wired has a story examining the potential legal consequences for the hacker.

Quark! Quark! Beware the quantum duck!