Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Radar Data Yields High-Resolution Views of Near-Earth Asteroid HQ124 29

On June 8th, with a radio source beamed at the asteroid designated 2014 HQ124 (less formally, "the beast") while two other telescopes tracked that beam's reflections, NASA was able to gather high-quality images of the object as it zipped by a mere 776,000 miles from Earth. (Some asteroids are closer, and a vast number of them could soon be better known, but none have allowed as good an opportunity for radar obvservation.) Astronomy Magazine's account adds a bit more detail: To obtain the new views, researchers paired the 230-foot (70m) Deep Space Network antenna at Goldstone, California, with two other radio telescopes, one at a time. Using this technique, the Goldstone antenna beams a radar signal at an asteroid and the other antenna receives the reflections. The technique dramatically improves the amount of detail that can be seen in radar images. To image 2014 HQ124, the researchers first paired the large Goldstone antenna with the 1,000-foot (305m) Arecibo radio telescope in Puerto Rico. They later paired the large Goldstone dish with a smaller companion, a 112-foot (34m) antenna, located about 20 miles (32km) away. ... The first five images in the new sequence — the top row in the collage — represent the data collected by Arecibo and are 30 times brighter than what Goldstone can produce observing on its own.

Comment Re:Cute but dumb (Score 1) 125

I'd be more worried about it turning non-issues into bugs, the cases when programmers think: "ah that can never happen" or "the program would've crashed/thrown-an-exception before getting here..." and in 1 in 1000 installs that cases has some weird behavior. Personally I prefer less intrusive, honey pot based approaches Bitcoin Vigil It's not perfect, but at least it doesn't have side effects, or false-positives.

Submission + - Service uses bitcoins as an intrusion detection system (bitcoinvigil.com)

erikina writes: A new service called Bitcoin Vigil detects intruders and malware by using small amounts of bitcoins as honey pots. Bitcoin Vigil listens on the bitcoin network, and if any transaction originates from one of these honey pots, instantly emails and SMS warnings are sent. An impress assortment of malware is known to be caught

Comment Re:Be warned, the community is noxious (Score 1) 118

I'm not sure about spoil, but definitely leave a bad impression. I started playing Heroes of Newerth without any DotA experience, and I can say the learning curve was STEEP, and people definitely hurled a lot of abuse at me (well, I was "letting the team down" and in hindsight, ruined a lot of games (they're normally 5 people vs 5, so one person learning is a huge disadvantage). That said, after I learnt how to play; and my stats got lower (which reflected the fact I was bad, the game became a lot more enjoyable. What they really need is a tutorial (which they have now implemented) and (forced) beginner games to classify people, and make sure they play with people their own skill level. After it's all said and done, it's a fantastic game -- and I highly recommend everyone give it a try. (And it runs great in Linux, which was the thing that got me hooked and preorder)

Apple's Trend Away From Tinkering 965

theodp writes "Having cut his programming teeth on an Apple ][e as a ten-year-old, Mark Pilgrim laments that Apple now seems to be doing everything in their power to stop his kids from finding the sense of wonder he did: 'Apple has declared war on the tinkerers of the world. With every software update, the previous generation of "jailbreaks" stop working, and people have to find new ways to break into their own computers. There won't ever be a MacsBug for the iPad. There won't be a ResEdit, or a Copy ][+ sector editor, or an iPad Peeks & Pokes Chart. And that's a real loss. Maybe not to you, but to somebody who doesn't even know it yet.'"

Comment Re:Found the source (Score 1) 275

Paranoid much?

I haven't finished writing my fake SSH server yet to see what people do when they get in, but I'm betting the entire medium is just one giant funnel to beijing intelligence looking to slurp down as many usernames and passwords as they can.

Not sure why you need a fake SSH server (and how long could it take, anyway?) but I've seen what they do. First command was a uname -a, second command was to wget some binary. You can guess the third command

Comment Re:Not more safe (Score 1) 611

Ha. I got this (annoying) piece of crap on a reasonably fresh install of Windows (XP). The install was up to date, and barely used other than a few games (I use Fedora primarily). The thing I attributed it to was the fact the Windows install I got was from thepiratebay. After reinstalling with an MSDN install I haven't had the issue again (Which raises the question of why I didn't just download the msdn copy originally)

Comment Re:It's "bloody" fun! (Score 1) 113

If you've actually got the algorithms to back that up, you'd be a pioneer in AI.

You're joking, right? The theory behind an aimbot is pretty much as simple as it gets. And it's not like you have to kill every person on the map, you could easily use the aimbot to achieve "snapping" to the target or what not.

Want to prove it? Dial Goog-411. That's right, that's Google doing voice-recognition.

While I'm sure you've proved something, it has nothing to do with this. If the task isn't suitable for a bot, don't do it with a bot. You'll notice I also qualified it with a statement "as long as a computer is better at the task" part. Things like social element and group work is going to be too difficult.

your aimbot is going to both be too perfect at headshotting people, and it'll make stupid mistakes that only a bot would

It's a silly point, as it's all down to implementation of the bot. The bot doesn't need to do more than just assist you to be a huge advantage.

One such bot that comes to mind is: tibiabot It only uses data accessible to a person, and only does actions a person could do. And it primarily sits on the background until needed. An example of its use is to automatically hit someone when they're on low health (before they have time to heal) or to automatically heal (with an optional rand(x,y)) delay on low health. Or you can use "combo" features where multiple people playing will all target the same person automatically etc. And even to automatically heal a friend, something that would normally go missed because a player is too focused on something else. It can make a beginner player far more effective player than an advanced player in battles. And is all done without extra data.

"From there to here, from here to there, funny things are everywhere." -- Dr. Seuss