Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Scientist Uses His Brain to Control Another Guy's Finger->

Submitted by slas6654
slas6654 (996022) writes "This story may be a little challenging to read but the synopsis is that one guy was able to control the finger of the other guy thru an EEG machine on his end that was connected to a magnetic skull cap to the guy on the other end. FTA:

On Aug. 12, Rao sat in his lab, wearing a cap with electrodes hooked up to an electroencephalography machine. The EEG machine read Rao's brain activity while he watched a simple cannon-shooting video game unfold on a video screen. When it was time for Rao to shoot the cannon, he imagined moving his right hand to hit a "fire" button — while making sure not to move the hand in real life.

Link to Original Source

Comment: Official Oracle Security Alert (Score 0) 243

by slas6654 (#42581117) Attached to: Oracle Ships Java 7 Update 11 With Vulnerability Fixes

I am a sysadmin on several web apps and I went and got the official security alert. I have to admit I am a bit confused by the message:


Oracle Security Alert for CVE-2013-0422


This Security Alert addresses security issues CVE-2013-0422 (US-CERT Alert TA13-010A - Oracle Java 7 Security Manager Bypass Vulnerability) and another vulnerability affecting Java running in web browsers. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software.

The fixes in this Alert include a change to the default Java Security Level setting from "Medium" to "High". With the "High" setting, the user is always prompted before any unsigned Java applet or Java Web Start application is run.

These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages these vulnerabilities. Successful exploits can impact the availability, integrity, and confidentiality of the user's system. "

Yet Oracle released another notice that talks about a critical patch update for several Oracle products (ie.: db, app servers, etc.)

Does anybody understand why there are cpu's for their products if the zde doesn't affect there products?

Comment: Re:Why does this matter? (Score 1) 414

by slas6654 (#41847311) Attached to: Fisker Hybrids Get Bad Karma From Superstorm Sandy
Ha ha. I used to own a Volkswagen Beetle - the kind with the battery under the back seat. In the days before the plastic insulation clip for the nodes, this was a real fire hazard because there was a metal bench-seat frame resting over the battery. A friend of mine, a somewhat heavy-set girl, was riding home from college with me. She sat on the exact spot needed to short the battery. By the time we got home, flames were shooting out from under the rear bench seat. I don't think I have laughed as hard since that time.

"One Architecture, One OS" also translates as "One Egg, One Basket".