Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Submission + - Coming Next: TSA Taser Bracelets? (

CaVp writes: From the article: "The TSA’s security policies are getting more and more bizarre, from testing people’s drinks for explosives to ordering all travelers to freeze on command, but could a frightening policy that was seriously explored by the DHS be resurrected – forcing people to wear taser bracelets that would deliver an electric shock if they got out of line?" Fox coverage here.

Imagine a nutjob with a radio transmitter tuned to the bracelet radio frequency... instant bacon!...


Submission + - Apple iPad: Chinese Authorities Urged to Ban Export and Import (

Hkibtimes writes: Proview, which won a court ruling that it owns the iPad name in China, has said that it will ask customs officials to ban import and export of Apple's iPads.

"We are now working on a request to China Customs to ban and seize all the import and export of the iPad products that have violated the trademark," Xie Xianghui, a Proview lawyer, was quoted by the Associated Press as saying. But he has not indicated when the request will be lodged.


Submission + - Microsoft Details Windows 8 for ARM (

An anonymous reader writes: Microsoft has detailed Windows 8 for ARM: architected for low power consumption, apps that can only target WinRT, restricted desktop that allows only Office 15 and some Windows components to run.

Submission + - When vuln disclosures are outlawed (

doperative writes: 'Legal goons from Magix AG sent a nasty gram to a researcher who goes by "Acidgen" after he reported the stack buffer overflow in the company's Music Maker 16. According to the report, Acidgen alerted Magix representatives to the bug in several emails that also included proof-of-concept code that forced the Windows calculator to open, indicating the flaw could be exploited to execute malicious code on a victim's computer.

"They misunderstood that I was getting money for doing this ... and illegally breaking into networks" link

Comment: of course the vulnerability isn't in the application but in the underlying Operating System ...


Submission + - DOJ: FBI Too Focused On Child Porn ( 1

itwbennett writes: "The Department of Justice has issued a scathing report [PDF] on the ineffectiveness of the FBI in investigating and countering cyber attacks. The shortcomings are partly attributed to lack of training and lack of communication, but the biggest issue is the allocation of effort. From the report:

Overall, we determined that in FY 2009 the FBI used 19 percent of its cyber agents on national security intrusion investigations, 31 percent to address criminal-based intrusions, and 41 percent to investigate online child pornography matters.



Submission + - 160,000+ Watch Japan Virtual Popstar Hatsune Miku (

kkleiner writes: "She’s beautiful, she’s talented, she’s immensely popularand she’s not real. Hatsune Miku the virtual popstar creation of Crypton Future Media in Japan, has sold out another concert. Her much anticipated second annual March 9th (39) performance was seen live by over 2000 attendees, watched by thousands more in theaters screening the concert around the country, and streamed in real time to over 160,000 fans via Nico Nico Douga. That is a level of attendance reserved for world class entertainment, and Hatsune Miku didn’t fail to deliver. Her nearly three hour show featured multiple encores, special guest appearances, and was met by fervent enthusiasm by her fans attending live in Tokyo."

Submission + - SPAM: Home Secretaries Start Talks in India

An anonymous reader writes: Home secretaries of both countries (Pakistan and India) Qamar Zaman Chaudhry and G.K. Pillai were meeting on Monday in New Delhi.

The secretaries were discussing counter terrorism and the 2008 Mumbai attacks in a new effort to advance the slow moving peace process.

Link to Original Source

Submission + - Do not show your ID when robbing a bank (

bradley13 writes: Combine a clever teller with, well, not the brightest bank robber. When poor Nathan went in to rob a bank, the teller told him she needed to see two forms of ID before she could give him the money. Nathan is now enjoying three hots and a cot.

Submission + - Twitter already has two factions under its hood (

vinujadhv writes: If you were amongst the people who thought that social media would usher in utopian communication era would certainly be shaken by this piece of research by Cornell University students. They say that Twitter now has two nations that are walled off from each other – unhappy people and happy people.

Submission + - Anonymous Git Hosting for PS3 Tools (

Anonymous Coward writes: " maintains a decentralized git server for all the code and tools Sony has been trying to remove off the internet. No logs are kept of user access, ip, etc and no owner names are given out. We hope to provide the PS3 Homebrew community with a comprehensive list of software and tools for hacking the PS3 all hosted in one place."

Social Networks

Submission + - Man Jailed For Creating 35 Blogs Insulting Ex ( 1

An anonymous reader writes: 38-year-old Stephen Andreassen ended a relationship with 36-year-old Rebecca Pattinson, and immediately started creating websites to insult, embarrass, and terrorize her. Andreassen was apparently annoyed that Pattinson said no when he asked her to look at an apartment together after four weeks of dating, so he created up to 35 blogs to get back at her.

After the breakup, Andreassen began bombarding her with calls, e-mails, texts, and Facebook messages begging to be taken back. Pattinson reacted by threatening to call the police, removing all her contact details from her online profiles, and deactivating her Facebook account. Andreassen then set up a series of blogs, posting messages to warn all men about her and listing links to his other websites giving his account of their affair.


Submission + - Wells Fargo blocks iPhones, tablets and Twitter ( 3

jbrodkin writes: "For all the talk about the "consumerization of IT," major organizations like Wells Fargo are still blocking employees from using personal smartphones and tablets at work. Employees "can't connect [smartphones and tablets] to our networks," says Wells Fargo CIO Wayne Mekjian. "We won't let them in." Wells Fargo does provide mobile devices to some employees, however, leading to the curious situation of workers carrying two phones and two iPads at all times. Wells Fargo, which has been undergoing a huge technology integration project since acquiring Wachovia, also blocks Facebook and Twitter access."

Submission + - iPad 2 forces Samsung to reevaluate Galaxy Tab (

An anonymous reader writes: Apple’s iPad competitors are still spec-obsessed, and Apple’s next-gen iPad coupled with the same affordable price point is forcing Samsung to rethink its tablet strategy and pricing methodology altogether.
The South Korean Yonhap News Agency relays a quote from Lee Don-joo, executive VP of Samsung’s mobile division, about Samsung’s upcoming Galaxy Tab 10.1 compared to the new iPad.

“We will have to improve the parts that are inadequate,” Don-joo said. “Apple made it very thin.”
Feature aside, Samsung also finds itself in a bind price wise. The upcoming Galaxy Tab, complete with a 10.1-inch screen and Android 3.0, was initially going to be priced higher than the current 7-inch Galaxy Tab. Apple’s iPad 2, however, is forcing Samsung to “think that over.”

Do not underestimate the value of print statements for debugging.