Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Human Eye Could Detect Spooky Action At a Distance 255

Posted by samzenpus
from the I-seen-things dept.
KentuckyFC writes "The human eye is a good photon detector--it's sensitive enough to spot photons in handfuls. So what if you swapped a standard photon detector with a human eye in the ongoing experiments to measure spooky-action-at-a-distance? (That's the ability of entangled photons to influence each other, no matter how far apart they might be.) A team of physicists in Switzerland have worked out the details and say that in principle there is no reason why human eyes couldn't do this kind of experiment. That would be cool because it would ensure that the two human observers involved in the test would become entangled, albeit for a short period time. The team, led by Nic Gisin, a world leader on entanglement, says it is actively pursuing this goal (abstract) so we could have the first humans to experience entanglement within months."

Security Researcher Kaminsky Pushes DNS Patching 57

Posted by samzenpus
from the protect-ya-neck dept.
BobB-nw writes "Dan Kaminsky, who for years was ambivalent about securing DNS, has become an ardent supporter of DNS Security Extensions. Speaking at the Black Hat DC 2009 conference Thursday, the prominent security researcher told the audience that the lack of DNS security not only makes the Internet vulnerable, but is also crippling the scalability of important security technologies. 'DNS is pretty much our only way to scale systems across organizational boundaries, and because it is insecure it's infecting everything else that uses' DNS, the fundamental Internet protocol that provides an IP address for a given domain name, said Kaminsky, director of penetration testing at IOActive. 'The only group that has actually avoided DNS because it's insecure are security technologies, and therefore those technologies aren't scaling.'"

Obama Anti-Trust Chief on Google the Monopoly Threat 364

Posted by CmdrTaco
from the it-has-to-be-said dept.
CWmike writes "The blogosphere regularly excoriates Microsoft for being a monopoly, but Google may be in the cross-hairs of the nation's next anti-trust chief for monopolistic behavior, writes Preston Gralla. Last June, Christine A. Varney, President Obama's nominee to be the next antitrust chief, warned that Google already had a monopoly in online advertising. 'For me, Microsoft is so last century. They are not the problem,' Varney said at a June 19 panel discussion sponsored by the American Antitrust Institute, according to a Bloomberg report. The US economy will 'continually see a problem — potentially with Google' because it already 'has acquired a monopoly in Internet online advertising.' Varney has yet to be confirmed as antitrust chief, and she said all this before she was nominated. Still, it spells potentially bad news for Google. It may be time for the company to start adding to its legal staff."

Microsoft.com Makes IE8 Incompatibility List 358

Posted by CmdrTaco
from the my-head-just-asplodered dept.
nickull writes "Microsoft is tracking incompatible Web sites for its upcoming Internet Explorer 8 browser and has posted a list that now contains about 2,400 names — including Microsoft.com. Apparently, even though Microsoft's IE8 team is doing the 'right' thing by finally making IE more standards-compliant, they are risking 'breaking the Web' because the vast majority of Web sites are still written to work correctly with previous, non-standards-compliant versions of IE."
The Courts

Pirate Bay Founder Begs For Hacker Ceasefire 243

Posted by CmdrTaco
from the please-hammer-don't-hurt-'em dept.
Barence writes "Pirate Bay's co-founder has pleaded for hackers to stop attacking the sites of those organizations lined up against him. Peter Sunde is on trial with Pirate Bay's three other founders for allegedly distributing copyrighted material. The trial is about to enter its fourth day, and in a gesture of support for the four men hackers have begun assaulting plaintiff websites, beginning with that of the The International Federation of the Phonographic Industry. The campaign has caused concern in the Pirate Bay camp, prompting Sunde to write a post titled 'We're winning, stop hacking, please' on his blog."
The Internet

Black Hat Presentation Highlights SSL Encryption Flaws 152

Posted by timothy
from the well-hey-nothin's-perfect dept.
nk497 writes "Hackers at the Black Hat conference have shown that SSL encryption isn't as secure as online businesses would like us to think. Independent hacker Moxie Marlinspike showed off several techniques to fool the tech behind the little padlock on your screen. He claimed that by using a real world attack on several secure websites such as PayPal, Gmail, Ticketmaster and Facebook, he garnered 117 email accounts, 16 credit card numbers, seven PayPal logins and 300 other miscellaneous secure logins."

Web-based IDEs Edge Closer To the Mainstream 244

Posted by timothy
from the hope-your-connection-is-reliable dept.
snitch writes "Last week Mozilla released Bespin, their web-based framework for code editing, and only a few days later Boris Bokowski and Simon Kaegi implemented an Eclipse-based Bespin server using headless Eclipse plug-ins. With the presentation of the web-based Eclipse workbench at EclipseCon and the release of products like Heroku, a web-based IDE and hosting environment for RoR apps, it seems that web-based IDEs might soon become mainstream."

Comment: least privilege (Score 1) 823

by cyberbian (#26222357) Attached to: Configuring a Windows PC For a Senior Citizen?
Having spent days (weeks, months, years?) configuring Windows XP over the years I tend to follow a pattern that works for me, ymmv.
Windows still installs broken (imco) in that the first user installed becomes an Administrator by default. With Windows, we all know by now that running as Administrator is asking for it (some have likened it to pulling ones pants down and bending over the chair.) So it's important to remove Administrator group privileges from the primary user, having them run as Users only. This prevents a host of malware and other malfeasants from gaining illegitimate access to the computer.
Install a good anti-virus software, my personal favourite is Symantec Corporate for it's ease of configuration and automation for updates. I set the software to live update daily, perform a startup scan of files loading into memory at boot time, and a weekly full scan of everything on the hdd.
Ensure that you're running Windows Update to the last iteration and get all of the updates installed correctly. Turn on automatic updates, and set it to install automatically.
Run MBSA... follow the directions provided.
Install Firefox, and the NoScript add-on. Make it the default browser in all profiles by logging on and making that choice. Ensure NoScript is up and running correctly.
The base system has excellent accessibility tools, ensure the user is familiar with them, and perhaps ensure that accessibility shortcuts are available from the desktop if necessary.
Teach... (who says old dogs can't learn new tricks?)
Wash, rinse, repeat.

Mediterranean Undersea Cables Cut, Again 329

Posted by ScuttleMonkey
from the cut-me-twice-shame-on-you dept.
miller60 writes "Three undersea cables in the Mediterranean Sea have failed within minutes of each other in an incident that is eerily similar to a series of cable cuts in the region in early 2008. The cable cuts are already causing serious service problems in the Middle East and Asia. See coverage at the Internet Storm Center, Data Center Knowledge and Bloomberg. The February 2008 cable cuts triggered rampant speculation about sabotage, but were later attributed to ships that dropped anchor in the wrong place."

Comment: built to suit both purposes (Score 3, Insightful) 1117

by cyberbian (#26161743) Attached to: What Restrictions Should Student Laptops Have?
Having worked extensively with a private school in this situation exactly, we chose to have roaming profiles, which allowed the student to log in to each machine locally, but their work was synched to their class server next login on campus. While logged in on campus, all internet content is filtered, we use jabber and bonjour messaging locally and the kids love it, these services are not given wan access.

When the student is logged in off-campus they can make documents, and use the internet as their local administrator (parent/guardian) deems appropriate. In those environments, it is considered the responsibility of the parents/guardians to provide content filtering and/or monitoring of their child's internet use. As the students are just plain users, they have few rights with respect to system modification on their local accounts, any software that they wish to install is handled via a parental request form. Machine software images are netbootable so it's quite trivial to refresh each machine.

It's important to remember that if the student and their parents ostensibly 'own' the machines, they should be granted any leeway they request, yet not undermine the local regime. Well implemented network services can ensure that your local rulesets are followed.

+ - Happy Pi Approximation Day

Submitted by cyberbian
cyberbian (897119) writes "Today is 22/7 which marks one of two holidays that celebrate our favorite irrational number. "Pi is one of the most important mathematical constants: many formulae from mathematics, science, and engineering involve ." So take some time today to break out of your circular reasoning and have a nice slice of pi(e)!"

Comment: HDD (Score 1) 716

by cyberbian (#23857901) Attached to: Most Hated Computer Component
Despite the recent increases in capacity, long term storage continues to be the bottleneck in todays high powered computing. Your new super fast quad-core still needs to wait while the arm seeks and reads the data stored on disk. Even with the newest hard drives they are still orders of magnitude slower than the rest of the system, chug power and consistently keep data-recovery labs in business. Not that I mind data-recovery labs, it's just the prices...
The Internet

+ - Net Neutrality Issues Facing Canada Now->

Submitted by cyberbian
cyberbian (897119) writes "It seems that Net Neutrality is also becoming a problem for Canadian Businesses and Consumers. The Progressive(?) Conservative Party have already pushed for deregulation plan for telecommunications in Canada, despite the objection of a Parliamentary Committee that was formed to study the issue.

Given the importance of internet communication to a country as large as Canada, it's imperative that we increase awareness of the net neutrality issue, and ensure that the public is raising its voice against the profiteering telecoms.

"When I invented the Web, I didn't have to ask anyone's permission. Now, hundreds of millions of people are using it freely. I am worried that that is going end" — Sir Tim Berners Lee.

Link to Original Source

+ - Election candidate faces EUCD charges in Finland

Submitted by
An anonymous reader writes "The Open Life blog reports that activists in Finland have partly succeeded in challenging the EUCD's constitutionality, that is, they have succeeded in getting themselves tried in court:

Mikko Rauhala and Einar Karttunen have on February 13th, 2007 been charged with breaking [...] the EUropean Copyright Directive, our equivalent of the DMCA. The charges are that they participated in an online service organised by Mr Rauhala to provide advice on how to circumvent DRM and in addition Mr Karttunen has published online a computer program written in the Haskell programming language. The charge is especially serious because Rauhala paid Karttunen 0,05€ for this program. Rauhala, Karttunen and 37 others did these supposedly criminal actions in January 2006, the first week that the new law was in force. [...]
Mikko Rauhala and the organiser of the 2005 demonstration Mikko Särelä are both running for parliament in the elections to be held on March 18th, 2007. [...] some of the momentum really might still be there [...] this week [...] they put out a website to collect pledges and within 24 hours had collected 8000 to buy a full page ad in Finlands main newspaper.
The blog also informs us that

Under current Finnish laws, the maximum penalty for filesharing is higher than for simply stealing an actual music CD from a shop

+ - Is age 40 too old for IT or Software Development?

Submitted by
An anonymous reader writes "I have read some stuff on Dice.com's message boards where some people are claiming that after age 40 or so that jobs become very scarce in the IT profession. I was wondering how prevalent this really is, and in particular I was wondering how hard it would be to actually start a career in IT or Software Development at age 40.

I recently finished up a degree in physics, and I have done a little basic IT support as well as some programming as part of my job working in an environmental testing lab. How difficult would it be to start a computer career at age 40, and what industries and fields will have the most problem with my age and which will have the least problem with my age?"

"The only way I can lose this election is if I'm caught in bed with a dead girl or a live boy." -- Louisiana governor Edwin Edwards