Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Google Taking Over New TLDs->

Submitted by bobo the hobo
bobo the hobo (302407) writes "In the corner of the internet where people care about DNS, there is a bit of an uproar at Google's application for over a hundred new top-level domains, including .dev, .lol, .app, .blog, .cloud and .search. Their application includes statements such as:
By contrast, our application for the .blog TLD describes a new way of automatically linking new second level domains to blogs on our Blogger platform – this approach eliminates the need for any technical configuration on the part of the user and thus makes the domain name more user friendly.

And also limiting usage of .dev to Google only:
Second-level domain names within the proposed gTLD are intended for registration and use by Google only, and domain names under the new gTLD will not be available to the general public for purchase, sale, or registration. As such, Charleston Road Registry intends to apply for an exemption to the ICANN Registry Operator Code of Conduct as Google is intended to be the sole registrar and registrant."

Link to Original Source

+ - Dish Network violated Do-Not-Call 57 million times->

Submitted by lightbox32
lightbox32 (1903946) writes "Dish Network has been found guilty of violating the Do Not Call list on 57 million separate occasions. They were also found liable for abandoning or causing telemarketers to abandon nearly 50 million “outbound telephone calls, in violation of the abandoned-call provision of the Federal Trade Commission’s Telemarketing Sales Rule."
Link to Original Source

+ - Investigation IDs Crew of 6 Behind Hack of Sony, Including Former Employee->

Submitted by chicksdaddy
chicksdaddy (814965) writes "Alternative theories of who is responsible for the hack of Sony Pictures Entertainment have come fast and furious (http://it.slashdot.org/story/14/12/24/1757224/did-north-korea-really-attack-sony)in recent weeks- especially since the FBI pointed a finger at the government of North Korea last week. (http://news.slashdot.org/story/14/12/18/0249222/us-links-north-korea-to-sony-hacking) But Norse Security is taking the debate up a notch: saying that they have conclusive evidence pointing to group of disgruntled former employees as the source of the attack and data theft.

The Security Ledger quotes Norse Vice President Kurt Stammberger saying that Norse has identified a group of six individuals — in the U.S., Canada, Singapore and Thailand — that it believes carried out the attack, including at least one 10 year employee of SPE who worked in a technical capacity before being laid off in May.(https://securityledger.com/2014/12/new-clues-in-sony-hack-point-to-insiders-away-from-dprk/)

Rather than starting from the premise that the Sony hack was a state sponsored attack, Norse researchers worked their investigation like any other criminal matter: starting by looking for individuals with the "means and motive" to do the attack. HR files leaked in the hack provided the motive part: a massive restructuring in Spring, 2014, in which many longtime SPE employees were laid off.

After researching the online footprint of a list of all the individuals who were fired and had the means to be able to access sensitive data on Sony's network, Norse said it identified a handful who expressed anger in social media posts following their firing. They included one former employee — a 10 year SPE veteran who he described as having a “very technical background.” Researchers from the company followed that individual online, noting participation in IRC (Internet Relay Chat) forums where they observed communications with other individuals affiliated with underground hacking and hacktivist groups in Europe and Asia.

According to Stammberger, the Norse investigation was eventually able to connect an individual directly involved in conversations with the Sony employee with a server on which the earliest known version of the malware used in the attack was compiled, in July, 2014.

While Stammberger admits that some clues in the investigation seemed to point to attackers in one of the Koreas, he says those paths all turned into dead ends, and that Norse investigators found no convincing evidence of North Korean involvement in the incident.

According to Stammberger, the company is briefing the FBI on its investigation on Monday. I'd love to be a fly on the wall in that room!"

Link to Original Source

+ - Whales survive only after huge sharks died out->

Submitted by Taco Cowboy
Taco Cowboy (5327) writes "Millions of years ago there were sharks as big as WW2 submarines. According to researchers from University of Zuric those gigantic sharks, or Megalodon, died out some 2.8 million years ago

The mega-shark was no lightweight. At 110 tonnes, it was about 30 times as heavy as a Great White and is thought to have had the most powerful bite of any animal in the Earth's history. With those humongous size sharks, whales don't get any fighting chance

It was such a ravenous predator, that its extinction may have allowed whales — today's heftiest seagoing fatties — to grow to the sizes we see nowadays. “When we calculated the time of Megalodon’s extinction, we noticed that the modern function and gigantic sizes of filter feeder whales became established around that time. Future research will investigate if Megalodon’s extinction played a part in the evolution of these new classes of whales,” said Catalina Pimiento of the University of Florida"

Link to Original Source

+ - Julian Assange: Google has the US government in its pocket->

Submitted by DW100
DW100 (2227906) writes "In an extract from a forthcoming book, WikiLeaks founder Julian Assange has hit out at Google, claiming it has a very cosy relationship with some of the top power brokers in US politics. "Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt's tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive mega-corporation," he writes."
Link to Original Source

+ - Cold fusion reactor verified by third-party researchers 2

Submitted by Paul Fernhout
Paul Fernhout (109597) writes "ExtremeTech reports that "Andrea Rossi's E-Cat — the device that purports to use cold fusion to generate massive amounts of cheap, green energy — has been verified by third-party researchers, according to a new 54-page report. The researchers observed a small E-Cat over 32 days, where it produced net energy of 1.5 megawatt-hours, or "far more than can be obtained from any known chemical sources in the small reactor volume." The researchers were also allowed to analyze the fuel before and after the 32-day run, noting that the isotopes in the spent fuel could only have been obtained by "nuclear reactions"...""

Comment: Jackass Moment (Score 1) 85

by d'baba (#47991289) Attached to: Device Allows Paralyzed Rats To Walk, Human Trials Scheduled Next Summer

The difference between this and what we did back in the 60's in biology class (making the frog's leg jump with a jolt of electricity) is sad, considering. The control systems are certainly better. Oh, and the marketing, yes.

Wake me when they have a video of a human doing this.

The longer the title, the less important the job.

Working...