Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - How Flight Tracking Works: A Global Network Of Volunteers

Submitted by Anonymous Coward
An anonymous reader writes "If a website can show the flight path and all those little yellow planes in real time, how can they not know where Malaysia Airlines flight MH370 went down? Answering that involves understanding a little about how flight-tracking sites work, where they get their data, and the limitations of existing technologies. It also involves appreciating a relatively new approach that the two large flight-tracking companies, Texas-based FlightAware and Sweden-based Flightradar24 are rushing to expand, a global sensor system known as ADS-B, which broadcasts updates of aircraft GPS data in real time. ADS-B is slowly superseding the ground-based radar systems that have been used for decades, becoming central not only to flight tracking but also to the future of flight safety. And it's powered, in part, by thousands of dedicated aviation hobbyists around the globe."

+ - NASA's Abandoned Launch Facilities

Submitted by trazom28
trazom28 (134909) writes "I ran across an interesting slideshow of NASA's abandoned launch facilities. Interesting piece of scientific history. It is described as images from "photographer Roland Miller's upcoming book, 'Abandoned in Place, titled' "Abandoned Space Graveyard Photos". ‘Abandoned in Place’ is a visual study of the deactivated launch and research facilities that played an essential role in early American space exploration.""

+ - When Social Betrayal Breaks Your Logins 1

Submitted by Anonymous Coward
An anonymous reader writes "What do you do when the answers to your security questions are known by someone who dislikes you, such as a stalker or an ex-partner? It's getting hard to remember some of the more obscure factoids about my own life, like where I ate my first reuben sandwich, or things that might change over time, like my favorite TV show. Is it just me or is this a ridiculous security hole? Anyone have good suggestions for workarounds when I'm signing up for a new site?"

+ - Hillary Clinton Used Personal Email at State Dept., Possibly Breaking Rules-> 1

Submitted by HughPickens.com
HughPickens.com (3830033) writes "The NYT reports that Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, State Department officials said, and may have violated federal requirements that officials’ correspondence be retained as part of the agency’s record. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act. “It is very difficult to conceive of a scenario — short of nuclear winter — where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business,” says Jason R. Baron. A spokesman for Clinton defended her use of the personal email account and said she has been complying with the “letter and spirit of the rules.”"
Link to Original Source

+ - DOJ Offers $3 Million Reward for Gameover Zeus Botnet Suspect->

Submitted by itwbennett
itwbennett (1594911) writes "The U.S. Department of Justice and the Department of State’s Transnational Organized Crime Rewards Program announced on Tuesday that they are offering a $3 million reward for information leading to the arrest or conviction of a Russian man suspected of having served as an administrator for the destructive Gameover Zeus botnet. Evgeniy Mikhailovich Bogachev is charged in the U.S. with several crimes related to Gameover Zeus, which targeted banking credentials and other personal information over a two-year period."
Link to Original Source

+ - I'm Done With Twitter 1

Submitted by PainMeds
PainMeds (1301879) writes "Forensic scientist and author Jonathan Zdziarski has abandoned Twitter, citing intentional ignoring of repeated and widespread abuse complaints involving criminal threatening, death threats, and a myriad of other abuses of the service to harass users. "Twitter’s response was not only insufficient, but downright disgusting." ... "I even managed to find a couple still-live tweets containing death threats. Twitter will make excuses until there are no more to make, and then they will just stop talking to you altogether." Zdziarski also provides a number of tips for responding to such threats, having been through it himself, including contacting the police to alert them of possible SWAT attempts, and planning for good disaster recovery. "If I get hacked some day, I just don’t care You should be this confident – not in your security, but in your disaster recovery. ""

+ - Computer chess created in 487 bytes, breaks 32-year-old record->

Submitted by Anonymous Coward
An anonymous reader writes "The record for smallest computer implementation of chess on any platform was held by 1K ZX Chess, which saw a release back in 1983 for the Sinclair ZX81. It uses just 672 bytes of memory, and includes most chess rules as well as a computer component to play against.

The record held by 1K ZX Chess for the past 32 years has just been beaten this week by the demoscene group Red Sector Inc. They have implemented a fully-playable version of chess called BootChess in just 487 bytes."

Link to Original Source

+ - Sloppy File Permissions Make Red Star Vulnerable

Submitted by Anonymous Coward
An anonymous reader writes "Red Star OS Desktop 3.0, the official Linux distro of North Korea, which recently found its way onto torrents and various download sites in form of an ISO image, is interesting for a number of reasons, including its attempt to look like commercial operating systems (currently OS X, earlier versions mimicked the Windows GUI). Hackers are also poking Red Star for security vulnerabilities. An pseudonymous researcher noted in a post to the Open Source Software Security (oss-sec) mailing list, that the OS has one significant security hole: Red Star 3.0 ships with a world-writeable udev rule file /etc/udev/rules.d/85-hplj10xx.rules (originally designed for HP LaserJet 1000 series printers) which can be modified to include RUN+= arguments executing arbitrary commands as root by Udev. In the post he also mentions how the older Red Star 2.0 shipped with another schoolboy mistake: /etc/rc.d/rc.sysinit was world-writeable."

+ - Terrestrial Gamma Ray Bursts Very Common

Submitted by Rambo Tribble
Rambo Tribble (1273454) writes "It was long thought that gamma ray bursts were the exclusive province of deep space sources. More recently it was found that storms could produce such emissions, but such occurrences were thought rare. Now, data from NASA's Fermi satellite suggest such events happen over a thousand times a day. Per Prof. Joseph Dwyer, from the University of New Hampshire, "These are big, monster bursts of gamma rays, and one would think these must be monster storms producing them. But that's not the case. Even boring-looking, garden-variety, little storms can produce these.""

+ - We most certainly did not just find dark matter

Submitted by StartsWithABang
StartsWithABang (3485481) writes "There seems to be a formula for this very specific extraordinary claim: point your high-energy telescope at the center of a galaxy or cluster of galaxies, discover an X-ray or gamma ray signal that you can't account for through conventional, known astrophysics, and claim you've detected dark matter! Only, these results never pan out; they've turned out either to be due to conventional sources or simply non-detections every time. There's a claim going around the news based on this paper recently that we've really done it this time, and yet that's not even physically possible, as our astrophysical constraints already rule out a particle with this property as being the dark matter!"

+ - Car thieves and insurers vote on keyless car security

Submitted by RockDoctor
RockDoctor (15477) writes "The BBC are reporting that Britain's car thieves, rapidly followed by Britain's car insurance companies, have been expressing their opinions on the security of keyless car entry and/or control systems. The thieves are happy to steal them (often using equipment intended for dealer maintenance of the vehicles) and in consequence the insurance companies are refusing to insure such vehicles (or to accept new policies on such vehicles) unless they are parked overnight in underground (or otherwise secured) car parks.

So, I guess I won't be considering buying one of those for another generation. If ever."

fortune: cannot execute. Out of cookies.

Working...