Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

East Texas Getting Compressed Air Energy Storage Plant 248

First time accepted submitter transporter_ii writes "A compressed air energy storage (CAES) plant was first built in Germany in 1978, but East Texas will be the site of one of the world's first modern CAES plants. How does it work? A CAES power generation facility uses electric motor-driven compressors (generated by natural gas generators) to inject air into an underground storage cavern and later releases the compressed air to turn turbines and generate electricity back onto the grid, according to the plants owner. The location near Palestine, Texas was selected because of its large salt dome, which will be used to store the compressed air. The plant is estimated to cost $350 million-plus, and will create about 20 to 25 permanent jobs."

Southwest Airlines iPhone App Unencrypted, Vulnerable To Eavesdroppers 139

New submitter davidstites writes "I am a masters computer science student at University of Colorado at Colorado Springs, and in November I performed a security audit of 230+ popular iOS applications because I wanted to know how secure apps on smartphones and tablets really are. I made a shocking discovery. The largest single potential security breach was with the Southwest Airlines application. Southwest Airlines' iPhone app leaves a user's information vulnerable to hackers. When you login to the application on your phone using your Rapid Rewards account, the app submits your username and password information as plain-text (unencrypted) to a Southwest remote server ( A potential attacker can simply sniff for the data on the network and steal it. This situation is a hackers dream! If a victims credentials were captured, a hacker could use those credentials to login to that particular account and they would have access to anything the victim would have access to, such as addresses, birthdays, e-mail, phone and credit cards. They could even book a flight in the victims name." (Read on below for more details.)

A good supervisor can step on your toes without messing up your shine.