Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission How Volkswagen Cheated Emissions Tests And Who Authorized It?->

Lucas123 writes: The method by which Volkswagen diesel cars were able to thwart emissions tests and spew up to 40X the nitrogen oxide levels set by the Environmental Protection Agency was relatively simple. It was more likely no more than a single line of code used to detect when an emissions test was being performed and place the emissions system in an alternate mode — something as simple as a software "on/off" switch. Volkswagen AG CEO Martin Winterkorn, who stepping down as the result of his company's scandal, has said he had no knowledge of the emissions cheat, but software dev/test audit trails are almost certain to pinpoint who embedded the code and who authorized it. You can actually see who asked the developer to write that code," said Nikhil Kaul, a product manager at test/dev software maker SmartBear Software. "Then if you go upstream you can see who that person's boss was...and see if testing happened...and, if testing didn't happen. So you can go from the bottom up to nail everyone."
Link to Original Source

Comment Re:That was easy (Score 1) 867

YMMV, hibernate/suspend is indeed buggy but it will not stay that way ;). And think of various Linux failures as opportunities: the community makes it so that you don't get several Gb of unattended updates unless you ask for it. Any distro that violates that is readily swappable with one that doesn't.

Submission Tiny Pebbles Built the Gas Giant Behemoths->

astroengine writes: Scientists have long puzzled over how gas planets like Jupiter and Saturn got to be so big. Current theories suggest the cores of these behemoths are comprised of mini-planets, some 62- to 620 miles in diameter, which collided and gradually merged together over time. But computer simulations show this process is more likely to produce hundreds of Earth-sized worlds. Instead, a new study suggests "slow pebble accretion" is a more likely process.
Link to Original Source

Submission ISPs Claim Title II Regulations Don't Apply to the Internet Because "Computers"->

Gryle writes: ArsTechnica is reporting on an interesting legal tactic by ISPs in the net neutrality fight. In a 95-page brief the United States Telecom Association claims Internet access qualifies as information service, not a telecommunication service, because it involves computer processing. The brief further claims "The FCC's reclassification of mobile broadband internet access as a common-carrier service is doubly unlawful" (page 56).
Link to Original Source

Submission Undergraduates Discover Densest Ultracompact Dwarf Galaxies->

Applehu Akbar writes: This discovery, using imaging data from several large telescopes, identifies two new ultracompact dwarf galaxies (UCD), M59-UCD3 and M85-HCC1.

UCDs are small galaxies that have stellar densities of, in the case of M85-HCC1, up a million times higher than Earth's stellar neighborhood. That would mean stars averaging one twentieth of a light year apart. In such a place our own Oort cloud would contain other stars.

Furthermore, these galaxies are considerably older than our own and contain an abundance of heavy elements.

Link to Original Source

Submission Ultimate Guide for Linux Logging->

An anonymous reader writes: Linux logs always confused me, but this guide makes them really easy. It shows how to troubleshoot why a system shut down, who is trying to attack or log into the system, and more. It even covers basic command line tools all the way to more sophisticated analysis systems.
Link to Original Source

Comment Re:In Other Words... (Score 1) 432

So I'm going to explain myself as I see you are meeting my point:
Why do we have to complain about regulations instead of implementing them, proactively, as you have noticed that some areas in these activities needs some ground rules? Basic, simple, sane rules.
I agree with you on Hillary's approach on this, and I'll add to that that most politicians taking on the task to solve this problem will only serve some limited group or perspective. They will almost always lack the insight concerning exploits, abuse, scams or difficulties caused by either unregulated or poorly regulated activities, and yet they will dictate the policies.

Submission The Free Software Foundation's statement on Canonical's updated licensing terms ->

donaldrobertson writes: "On July 15th, 2015, the Free Software Foundation's Licensing and Compliance Lab, along with the Software Freedom Conservancy, announces that, after two years of negotiations, Canonical, Ltd. has published an update to the licensing terms of Ubuntu GNU/Linux.

This update now makes Canonical's policy unequivocally comply with the terms of the GNU General Public License (GPL) and other free software licenses. It does this by adding a "trump clause" that prevails in all situations possibly covered by the policy:"

Link to Original Source

Submission Atlas V Rocket Set to Launch GPS IIF-10 Satellite Into Orbit->

An anonymous reader writes: The Atlas V rocket is on schedule to launch this morning from Cape Canaveral to send a new generation GPS satellite into orbit. The GPS IIF-10 being launched into orbit by the Atlas V rocket will serve U.S. military options on lad, sea, and by air. The new tech provides greater accuracy, increased signals, and enhanced performance for users.
Link to Original Source

Submission TeslaCrypt 2.0 Targets Gamers, Makes It Impossible To Decrypt Affected Files

An anonymous reader writes: Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting computer gamers, it displays an HTML page in the web browser which is an exact copy of CryptoWall 3.0, another ransomware program. After a successful infection, the malicious program demands a $500 ransom for the decryption key; if the victim delays, the ransom doubles. When TeslaCrypt infects a new victim, it generates a new unique Bitcoin address to receive the victim’s ransom payment and a secret key to withdraw it. TeslaCrypt’s C&C servers are located in the Tor network. The Trojan’s version 2.0 uses two sets of keys: one set is unique within one infected system, the other is generated repeatedly each time the malicious program is re-launched in the system. Moreover, the secret key with which user files get encrypted is not saved on the hard drive, which makes the process of decrypting the user files significantly more complicated.

Submission ARM Support Comes to SUSE Linux Enterprise Server->

jrepin writes: SUSE announced partner program expansion to include support for 64-bit ARM server processors. This expansion makes available to partners a version of SUSE Linux Enterprise 12 that allows them to develop, test and deliver products to the market using 64-bit ARM chips. To simplify partner access, SUSE has also implemented support for ARM and AArch64 into its openSUSE Build Service. This allows the community to build packages against real 64-bit ARM hardware and the SUSE Linux Enterprise 12 binaries,
Link to Original Source

Comment Re:In Other Words... (Score 1) 432

Just tell me one thing: what unregulated activity works well as is? No exploits, no abuse and no scamming...

While I agree with your freedom reflexes, instead of whining about any attempt to tackle a problem please be the one to say the sane solution(s). Because there are simple solutions. Not solving correctly our problems is what gives them the task of screwing it up. So it's our fault, not theirs.

Comment Blacklisting and whitelisting (Score 1) 267

I have a similar policy at work: there are a number of intranet and whitelisted internet sites and for the rest you use credentials. Intranet also contains a socialisation portal for mostly professional purposes. Also, every time you enter the credentials you see a notification that traffic is monitored. They have also blacklisted known malware sites and some potentially dangerous sites (such as the infamous In principle this is a reasonable policy, as a lot of attacks/infections come from willful disregard of good practices and rules.

All this policy is coupled with inability to install software (except from approved list in a software catalog) and the inability to use USB pen drives except for a couple of approved models.

Now, my local IT dept. has bent some of these rules for me and a few others that need special conditions, specified and justified: ability to install software on work laptop, special/separate internet access at the price of additional screening at a flexible rate. Correctly describing the policies, rules and exceptions and good management/collaboration for the purpose of ensuring reasonable productivity (my company does not produce IT - services or software) is what keep us both secure and in business.

"You must have an IQ of at least half a million." -- Popeye