Please create an account to participate in the Slashdot moderation system


Forgot your password?
Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

Submission + - Playdough for fun and profit (

morgan_greywolf writes: "You’re never too young (or too old) to start learning the joys of electronics. You don’t need to know how to solder, or even how to plug circuit components into a breadboard. As long as you’re past the “I’m going to stick this up my nose” phase, this homemade playdough circuit project is a great way to introduce kiddos and adults alike to basic circuits and electricity."

Submission + - Man dies of caffeine overdose ( 3

morgan_greywolf writes: A British man died after poisoning himself with two spoonfuls of caffeine powder bought over the internet, local media reported Friday.

Michael Lee Bedford, 23, from Mansfield, central England, was at a party in April when he swallowed caffeine powder that a friend bought online for £3.29 ($5.26), Nottingham Coroner’s Court heard Thursday.

He washed the powder down with an energy drink, and around 15 minutes later began sweating and vomiting blood. He later died at King’s Mill Hospital in Nottinghamshire, central England, the Nottingham Post reported.


Submission + - Think your Linux firewall is safe? Think again. (

morgan_greywolf writes: What if there were a way to attack your machine by entirely bypassing the operating system? According to two French security researchers at CanSecWest, a seldom-used remote administration mode on some Broadcom NetXtreme cards can be used to take full control of the victim’s network," and so long as the machine doesn't have or isn't using hardware virtualization, "the attacker can gain access to the victim’s computer memory and take full control of the machine," effecting bypassing the OS altogether.

Another researcher, Arrigo Triluzi, has dubbed a separate attack the Jedi Packet Trick. which involves a little-known factory diagnostic feature in some undisclosed network cards. Apparently, Triluzi has been able to install new firmware into these NICs, again entirely bypassing the operating system. According to Triluzi, once installed, the NIC can talk to other cards installed in the system, like oh, say, the video card, and use it to run malicious code, all without the operating system's knowledge.

Every cloud has a silver lining; you should have sold it, and bought titanium.