Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: soundtrack (Score 2) 96

by theultramage (#38214258) Attached to: Latest Humble Bundle Comes With <em>Uplink</em> Source Code

I actually examined their music.dat (zip file), investigated the .uni file format, and even found one standalone player that could play those. But I didn't like that, so I checked the strings inside the music files, grabbed the author name, and googled. Karsten Koch: The Blue Valley (main theme, I like this one the most).

The Internet

First American Internet Addiction Treatment Center 278

Posted by timothy
from the cure-for-what-doesn't-quite-ail-ye dept.
An anonymous reader writes "Taking their lead from China, two Americans have opened the first US-based Internet Addiction treatment center in Fall City, Wash. — ironically close to Redmond (Microsoft's hometown). The center, called reStart: Internet Addiction Recovery Program, is a 45-day treatment center where, for a steep set of fees, people can be cured of their addiction to the Web. After paying the $200 application fee, addicts are charged $14,500 for the 45 days, an additional $800 for a screening, and more for extra services, like kayaking ($1,575)."

Scientists Learn To Fabricate DNA Evidence 256

Posted by kdawson
from the tossing-a-bag-of-maryjane-in-the-back-seat dept.
Hugh Pickens writes "The NY Times reports that it is possible to fabricate blood and saliva samples containing DNA from a person other than the donor, and even to construct a sample of DNA to match someone's profile without obtaining any tissue from that person — if you have access to their DNA profile in a database. This undermines the credibility of what has been considered the gold standard of proof in criminal cases. 'You can just engineer a crime scene,' said Dan Frumkin, lead author of the paper. 'Any biology undergraduate could perform this.' The scientists fabricated DNA samples in two ways. One requires a real, if tiny, DNA sample, perhaps from a strand of hair or a drinking cup. They amplified the tiny sample into a large quantity of DNA using a standard technique called whole genome amplification. The other technique relies on DNA profiles, stored in law enforcement databases as a series of numbers and letters corresponding to variations at 13 spots in a person's genome. The scientists cloned tiny DNA snippets representing the common variants at each spot, creating a library of such snippets. To prepare a phony DNA sample matching any profile, they just mixed the proper snippets together. Tania Simoncelli, science adviser to the American Civil Liberties Union, says the findings were worrisome. 'DNA is a lot easier to plant at a crime scene than fingerprints,' says Simoncelli. 'We're creating a criminal justice system that is increasingly relying on this technology.'"

Comment: Re:Details on benefits (Score 1) 569

by theultramage (#29005081) Attached to: What Questions Should a Prospective Employee Ask?

Over here in Slovakia, law dictates mandatory 4 weeks per year of employment (fractions are supported), 5 weeks if you worked+studied for 15+ years after 18, and 8 weeks if you're a teacher. Maybe the poster was referring to some other form of free days? '4' sounds like a mistake/miscalculation made somewhere.

The Media

Murdoch Demands Kindle Users' Info 433

Posted by ScuttleMonkey
from the another-in-a-long-line-of-bad-decisions dept.
In yet another move to display how antiquated and completely ignorant of digital culture he is, Rupert Murdoch has started demanding that Amazon hand over user info for all Kindle users. This demand comes right after Murdoch just finished negotiating a larger share of revenue from Amazon sales. At least Amazon hasn't decided to comply with this request yet. "'As I've said before, the traditional business model has to change rapidly to ensure that our journalistic businesses can return to their old margins of profitability,' Murdoch said. 'Quality journalism is not cheap, and an industry that gives away its content is simply cannibalizing its ability to produce good reporting.'"

Comment: IEEE? (Score 1) 201

by theultramage (#28806695) Attached to: Researchers Outline Targeted Content Poisoning For P2P Data

The paper has tons of English grammar mistakes and typos. I also noticed several semantic mistakes, like calling p2p clients "networks", and using the word "swamp" when they obviously meant "swarm". They also repeated the "this won't work against FTP/email/DVD-in-mail" paragraph at least 3 times in the first two pages.

Doesn't IEEE have some quality standard for their publications?

Anyways, I got bored of reading this thing after the first few pages (maybe that was their intent?). In short, they propose a custom p2p content distribution system, or augmentation of existing p2p software. The main servers would do the management, and users would do the decentralized distribution part.

Their system adds some sort of authorization mechanism: after purchasing something you get a receipt, and you use that to connect to the network via a (company-controlled) bootstrap node. You have to continuously refresh your auth token against this node. And somehow this token lets anyone recognize a legal/illegal download request. And the poisoning part is there to stop clients that skip the authentication process (both producers and consumers). Does anyone feel like examining their method in detail?

Comment: Performance (Score 1) 80

by theultramage (#28661293) Attached to: Bethesda Releases <em>Daggerfall</em> For Free

Actually, this game is already decently playable on a (amd) 486. And flies on a P200. What you're seeing is dosbox emulation overhead.

I disagree with your "so poorly optimized" statement. This thing does 3d with texturized surfaces and large view distance, AI, and who knows what else, all in SOFTWARE. It even has realtime ambient lighting - and still runs fine on a 486! For me, Daggerfall has the most awesome sw engine I've ever seen.

My computer can beat up your computer. - Karl Lehenbauer