Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Big Brother China Censors WeChat AGAIN->

Submitted by crazyeyes
crazyeyes (1091733) writes "Last week, Tencent removed at least 40 WeChat public pages, allegedly at the behest of the Chinese government. Of course, this isn't the first time WeChat has censored its pages for the Chinese government. Early in January 2013, they censored and banned words or Chinese characters that referred to the Southern Weekly, which had then called for "certain reforms and greater respect for constitutional rights".

This may sound like hyperbole, but this incident could well be the beginning of the end for WeChat as an international text and voice messaging service. The Chinese people may have no other decent options, but those of us outside the Great Firewall of China have a lot more choices. Better choices even.

For our part, we are uninstalling our WeChat messengers, partly because there are better (and less annoying) instant messengers, and partly because we don't care for censorship. Join us in uninstalling WeChat, if you don't care for censorship either. China can keep their Instant Messenger of Much Insecurity. Original article at http://www.techarp.com/showart..."

Link to Original Source

+ - Did the NSA use the Apple SSL bug to insert the DROPOUTJEEP spy software?

Submitted by crazyeyes
crazyeyes (1091733) writes "Here's an interesting look at the SSL bug in Apple's iOS and OS X operating systems :

There is speculation that this could well be the security hole which the NSA exploited to insert the DROPOUTJEEP software implant, probably using automatic updates via SSL. DROPOUTJEEP, whose existence was revealed by Edward Snowden, targets the Apple iPhone (but could conceivably be used on all other iOS devices) and allows the NSA to "remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.All communications with the implant will be covert and encrypted.”

Apple, of course, denies that the NSA can access or are accessing iOS devices as Snowden's leaked documents claim. Still, there is no denying that such a bug is a major flaw, and allows iOS and Mac OS to be exploited by malicious persons.

"

+ - The Linux kernel as an exquisitely sensitive stability test for overclocked PCs-> 1

Submitted by crazyeyes
crazyeyes (1091733) writes " This article looks at using the Linux kernel as a more accurate and sensitive stability test for overclocked PCs :

"Using an overclocked PC is not a problem, provided that the PC is stable at the overclocked settings. Several programs are available to assess system stability by stress-testing the overclocked system. However, most overclockers do not know that the Linux kernel is an exquisitely sensitive tool to detect instabilities in an overclocked system. In fact, it is more accurate and sensitive than either Prime95 or IBT/LinX.

The Linux kernel supplies users with a dead simple method for measuring hardware instabilities — like those caused by an 'unstable' overclock. There is nothing special to install as this functionality seems to be naively included in the kernel itself. To use it, simply run a standard stress test such as Prime95 or Linpack and watch the output from dmesg. If the system is unstable due to insufficient voltage settings, excessive heat, it will report...
"

Link to Original Source
Data Storage

+ - VelociRaptors vs. SSDs!->

Submitted by crazyeyes
crazyeyes (1091733) writes "This is the mighty battle of the ancient HDDs against the young SSD upstarts! The HDDs are represented by their finest warriors — the Western Digital VelociRaptors, and the SSDs by their favorite representatives — the Intel 520 Series and X25-M series. Will the HDDs prevail, or will the SSDs triumph and declare the beginning of the end of the HDD era? FIGHT! "
Link to Original Source
AMD

+ - NVIDIA's Ninja Graphics Technology details leaked->

Submitted by crazyeyes
crazyeyes (1091733) writes "There is a leak on NVIDIA's upcoming secret trick for their Kepler GPUs — the NVIDIA Ninja Graphics Technology . It claims to give NVIDIA gamers a random chance at evading bullets in FPS games through the manipulation of 3D primitives. Here's the key explanation :

"Normally, primitive data is converted to vertex points in 2D space before textures are applied and the scene is rendered. However, when an NVIDIA Kepler-based graphics card detects a game that supports Ninja Graphics, the GPU will automatically replicate an extra set of 3D primitive data for each frame and modify one copy with a random variable so that there are two slightly different primitives. The modified data will be sent back to the game, while the unmodified data sent to the vertex shaders and rendered normally.

Why do that at all? Well, the modified primitive data tricks the game into showing the player at a slightly different position in the game's world space. What this means is that the player appears slightly off to one side or another to other players (or the game's non-player characters) even though he is exactly where he's supposed to be. Perhaps this is why NVIDIA calls it Ninja Graphics — the player appears to be there, but isn't actually there.""

Link to Original Source

Documentation is the castor oil of programming. Managers know it must be good because the programmers hate it so much.

Working...