Follow Slashdot stories on Twitter


Forgot your password?

Comment: Vulnerability? In software? (Score 1) 193

by archatheist (#43058097) Attached to: New Java 0-Day Vulnerability Being Exploited In the Wild

Yes, yes. Panic! There's a Java 0day! Dear Lord forfend! Of course, as you read this you are probably running Windows, with tons of extensions and software. You're probably using Flash. You probably have a web browser - heck, obviously you have a web browser. Well, not to worry: After disabling Java you will be completely safe.

Comment: Hey! Wait a minute! (Score 1) 142

by archatheist (#41714927) Attached to: Craig Venter Wants To Rebuild Martian Life In Earth Lab

Didn't I just read on this very site (or possibly Gizmodo; they all run together) that Jurassic Park was impossible because DNA degrades too fast? So how is this going to work? Because I'm pretty sure DNA (if that was how Martian life worked) would be subject to conditions that were even more harsh.

Comment: Re:It's all tied together (Score 2) 550

by archatheist (#41674995) Attached to: Teen Suicide Tormentor Outed By Anonymous

Okay. I read your blog post at the link. Your definition of rape omits the concept of consent, and randomly includes premarital sex (which would fit the definition in the first line) and homosexuality. Good luck with your mimeographed newsletter; I shall file you under "troll" and carry on. I sine Deus.

Comment: Re:It's all tied together (Score 5, Insightful) 550

by archatheist (#41674783) Attached to: Teen Suicide Tormentor Outed By Anonymous

Atheism leads to this.

I'm pretty sure you don't need to believe in God to consider rape and murder unethical, immoral, and just wrong. In fact, plenty of people have pointed out (repeatedly) the fallacy of assuming that one needs God and/or religion to be good, so there is no reason to say more on that topic here. Go forth and Google.

The culture of consent and contraception, leads to this.

I'm not sure what the "culture of contraception" is, but I am pretty sure it does not lead to this kind of behavior, either. In fact, I strongly suspect this behavior - in general, minus the Internet - predates the widespread availability of contraception.

Comment: Re:GPL requires no DRM? (Score 2, Informative) 717

by archatheist (#34079540) Attached to: VLC Developer Takes a Stand Against DRM Enforcement



Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.

In short, I think there are problems beyond DRM with GPL software being distributed through the app store.


Open Source Software Meets Do-It-Yourself Biology 113

Posted by Soulskill
from the releasing-your-genome-under-the-gpl dept.
destinyland writes "This article profiles a growing movement — DIY biology — that's made possible in part by open source tools. Using programs like BioPerl and BioPython, DIY biologists write their own code (computer and genetic), designing their own biological systems and altering the genome. A protein-folding simulator, Folding@home, is now the most powerful distributed computing cluster in the world, and as the movement evolves, cooperatives are also springing up where hobbyists pool resources and create 'hacker spaces' to reduce costs and share knowledge. 'As the shift to open source software continues, computational biology will become even more accessible, and even more powerful,' this article argues — while intellectual property and other bureaucracies continue to hobble traditional forms of research."
It's funny.  Laugh.

+ - Berlin "sex academy" offers tips for visit->

Submitted by suraj.sun
suraj.sun writes: "Finally — an exhibition for those who always have to touch everything."

BERLIN (Reuters) — Wannabe Latin lovers can improve their technique by playing with the erogenous zones of naked mannequins at a new interactive exhibition that has now opened in Berlin.

The "Amora sex academy" that opened in Berlin on Thursday welcomes visitors with the wry slogan, "Finally — an exhibition for those who always have to touch everything."

More than 50 interactive displays guide visitors through the intimate areas of the male and female bodies, offering helpful tips on everything from striptease to oral sex and how to achieve a perfect orgasm.

A voice shrieks "That's it!" when the visitor manages to put his finger on the elusive G-spot.

Next to it is what the museum called its "Spank-o-meter." It measures the level of pleasure a mannequin receives when spanked with a leather whip.

Founded by Frenchman Johan Rizki, the sex academy opened in London earlier this year and is also due to come to Barcelona.

Reuters :

Link to Original Source

+ - Cheney Is Linked to Concealment of C.I.A. Project 1

Submitted by archatheist
archatheist writes: The Central Intelligence Agency withheld information about a secret counterterrorism program from Congress for eight years on direct orders from former Vice President Dick Cheney, the agency's director, Leon E. Panetta, has told the Senate and House intelligence committees, two people with direct knowledge of the matter said Saturday.

+ - Hackers' Next Target - Your Brain? 2

Submitted by
Hugh Pickens
Hugh Pickens writes: "Wired reports that as neural devices become more complicated — and go wireless — some scientists say the risks of "brain hacking" should be taken seriously. "Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future," said computer security expert Tadayoshi Kohno of the University of Washington. "But if we don't start paying attention to security, we're worried that we might find ourselves in five or 10 years saying we've made a big mistake." For example, the next generation of implantable devices to control prosthetic limbs will likely include wireless controls that allow physicians to remotely adjust settings on the machine. If neural engineers don't build in security features such as encryption and access control, an attacker could hijack the device and take over the robotic limb. "As these medical devices start to become more and more complicated, it gets easier and easier for people to overlook a bug that could become a very serious risk," says Kohno. "Because the internet was not originally designed with security in mind, it is incredibly challenging — if not impossible — to retrofit the existing internet infrastructure to meet all of today's security goals" but until now, few groups have considered how neural devices might be hijacked to perform unintended actions. "The first thing is to ask ourselves is, 'Could there be a security and privacy problem?'" Kohno says. "Asking 'Is there a problem?' gets you 90 percent there, and that's the most important thing.""

Montana City Requires Workers' Internet Accounts 836

Posted by timothy
from the are-you-now-or-have-you-ever-been dept.
justinlindh writes "Bozeman, Montana is now requiring all applicants for city jobs to furnish Internet account information for 'background checking.' A portion of the application reads, "Please list any and all, current personal or business websites, web pages or memberships on any Internet-based chat rooms, social clubs or forums, to include, but not limited to: Facebook, Google, Yahoo,, MySpace, etc.' The article goes on to mention, 'There are then three lines where applicants can list the Web sites, their user names and log-in information and their passwords.'"

+ - Human Language Gene Changes How Mice Squeak 2

Submitted by archatheist
archatheist writes: Researchers at the Max Planck Institute for Evolutionary Anthropology in Leipzig, Germany, have engineered a mouse whose FOXP2 gene has been swapped out for (different) human version. This is interesting because the gene is implicated in human language, and this has changed how mice squeak. Forget planet of the apes... get your tiny paws off me, you darn dirty mouse!

Comment: Re:Excellent!! (Score 5, Informative) 194

by archatheist (#24739889) Attached to: Browser Extension Defeats Internet Eavesdropping

This is in the FAQ. From TFA:

Q: But what if an attacker takes over all paths to the destination?

A: There are two answers to that. Please see our academic paper for a detailed security analysis.

1) Perspectives actually keeps a record of the keys used by a service over time. Thus, even if a powerful adversary is able to take over the whole Internet (scenario L_server in the paper), clients can still detect the key as suspicious because the key has recently changed. If the attacker is able to compromise all paths for a long time, then you are in trouble, but then again such a powerful adversary could also fool the so-called "verification procedures" of many certificate authorities, which often consist of a one-time email verification.

2) Even though a powerful adversary can defeat the system, it makes man-in-the-middle attacks much harder. Today an attacker must only be on the path between you and the destination, which isn't very hard. Think about an open wireless network, or the recent DNS attacks which compromise a targeted DNS resolver. Being on all links is much harder, and in the end security is nothing but making an attack harder.

The last person that quit or was fired will be held responsible for everything that goes wrong -- until the next person quits or is fired.