Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Back for a limited time - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×
The Internet

Ship Anchor, Not Sabotaging Divers, Possibly Responsible For Outage 43

Nerval's Lobster writes "This week, Egypt caught three men in the process of severing an undersea fiber-optic cable. But Telecom Egypt executive manager Mohammed el-Nawawi told the private TV network CBC that the reason for the region's slowdowns was not the alleged saboteurs — it was damage previously caused by a ship. On March 22, cable provider Seacom reported a cut in its Mediterranean cable connecting Southern and Eastern Africa, the Middle East and Asia to Europe; it later suggested that the most likely cause of the incident was a ship anchor, and that traffic was being routed around the cut, through other providers. But repairs to the cable took longer than expected, with the Seacom CEO announcing March 23 that the physical capability to connect additional capacity to services in Europe was "neither adequate nor stable enough," and that it was competing with other providers. The repairs continued through March 27, after faults were found on the restoration system; that same day, Seacom denied that the outage could have been the work of the Egyptian divers, but said that the true cause won't be known for weeks. 'We think it is unlikely that the damage to our system was caused by sabotage,' the CEO wrote in a statement. 'The reasons for this are the specific location, distance from shore, much greater depth, the presence of a large anchored vessel on the fault site which appears to be the cause of the damage and other characteristics of the event.'"

Ubisoft's Authentication Servers Go Down 634

ZuchinniOne writes "With Ubisoft's fantastically awful new DRM you must be online and logged in to their servers to play the games you buy. Not only was this DRM broken the very first day it was released, but now their authentication servers have failed so absolutely that no-one who legally bought their games can play them. 'At around 8am GMT, people began to complain in the Assassin's Creed 2 forum that they couldn't access the Ubisoft servers and were unable to play their games.' One can only hope that this utter failure will help to stem the tide of bad DRM."

LHC Has First Collisions After Years of Waiting 324

An anonymous reader writes "Only four days after the first attempt to send a particle beam around the LHC, we have arrived at the point when all four experiments got their first real collisions from the machine. This was met by celebrations and champagne, as people have been waiting years and years for this moment. It is a testament to the engineering of the machine that collisions were reached already, so few days after restarting. The LHC had already demonstrated ca 10h stable beams, and now also stable beams in both directions at the same time. In the coming weeks, we need only wait for increased intensity and the first attempts at acceleration."
The Media

Wikipedia Bans Church of Scientology 665

El Reg writes "Showing a new-found resolve to crack down on self-serving edits, Wikipedia has banned contributions from all IP addresses owned or operated by the Church of Scientology. According to Wikipedia administrators, this marks the first time such a high-profile organization has been banished for allegedly pushing its own agenda on the 'free encyclopedia anyone can edit.'"

Submission + - MacGyver Multi-tool bypass for Medeco Locks

An anonymous reader writes: Over at Engadget and also at in.security.org there an analysis detailing the bypass of Medeco's High Security m3 slider with nothing more than a paper clip. While this is only one of three levels of security in this lock the author claims that with this bypass the lock is susceptible to bumping and picking. (previously Medeco touted the m3 as "bump proof" and "pick proof")

Submission + - iPhone/Yahoo mail security vulnerability (isode.com)

Will Sheward writes: "Whilst trying to figure out how the iPhone was doing it's 'push' email with Yahoo (it seems it doesn't — but that's another story) we came across another security flaw. The iPhone authenticates with Yahoo using a private protocol called XYMPKI, used in conjunction with IMAP. Yahoo do not provide a general IMAP service — they use IMAP only for iPhone access. Although the iPhone supports TLS (Transport Layer Security) Yahoo! IMAP doesn't, which can lead to a replay attack. Anyone able to eavesdrop on the authentication exchange, such as when using any open (public or private) wi-fi service, can easily gain full access to the user's email account until the user changes their password. We would advise against using the Yahoo service with an iPhone, because of this security risk. Full details here"

Adding features does not necessarily increase functionality -- it just makes the manuals thicker.