Dupple writes "The collapse of the Fukushima Dai-ichi Nuclear Power Plant caused a massive release of radioactive materials to the environment. A prompt and reliable system for evaluating the biological impacts of this accident on animals has not been available. This study suggests the accident caused physiological and genetic damage to the pale grass blue Zizeeria maha, a common lycaenid butterfly in Japan. We collected the first-voltine adults in the Fukushima area in May 2011, some of which showed relatively mild abnormalities. The F1 offspring from the first-voltine females showed more severe abnormalities, which were inherited by the F2 generation. Adult butterflies collected in September 2011 showed more severe abnormalities than those collected in May. Similar abnormalities were experimentally reproduced in individuals from a non-contaminated area by external and internal low-dose exposures. We conclude that artificial radionuclides from the Fukushima Nuclear Power Plant caused physiological and genetic damage to this species."
mellowdonkey writes "Last year's CanSecWest hacking contest winner, Charlie Miller, does it again this year in the 2009 Pwn2Own contest. Charlie was the first to compromise Safari this year to win a brand spankin new Macbook. Nils, the other winner, was able to use three separate zero day exploits to whack IE8, Firefox, and Safari as well. Full detail and pictures are available from the sponsor, TippingPoint, who acquired all of the exploits through their Zero Day Initiative program."
mithro writes "As everyone should already know, Google is running the Summer of Code again this year. For those who don't know, GSoC is where Google funds student's to participate in Open Source projects and has been running for 5 years, bringing together over 2600 students and 2500 mentors from nearly 100 countries worldwide. Google has just announced the projects which will be mentor organizations this year. It includes a great list of Open Source projects from a wide range of different genres, include content management systems, compilers, many programming languages and even a bunch of games!"
Bob the Super Hamste writes "CNN is reporting that the page recovery.gov is not as transparent as it claims to be. The examples pointed out are: 1. The user is greeted by a large pie chart that show the breakdown of money spent by 2 categories, state government distributions and local government distributions. 2. Finding projects involves a complicated search, information on projects is not actually hosted on recovery.gov 3. The format of the information available is of poor quality (the article specifically mentions a PDF document that was created from a scanned sideways copy of roadwork projects from New York state). Given that this site was meant to make the spending of the new stimulus money more transparent to the citizens of the Unites States of America it seems oddly opaque. CNN does seem to praise the ability for government agencies to be able to exchange HTML based information between systems, which for government I would call a massive accomplishment. I tried to find information for my state and searched for Minnesota. I got 4 matches, 2 of which were generic ones: one was the Minnesota state certification that is required for a state to receive funds and one that lays out public transportation spending for all states of which Minnesota gets $94,093,115."
Doxygen can produce UML diagrams for undocumented code. (UML_LOOK and EXTRACT_ALL)
Ksigpaul writes: Microsoft claims that Vista is a huge step forward in security, but one has to question this by some very deliberate choices between the Vista flavors. We all know the BitLocker(TM) technology is only available to Ultimate and Business users but what about EFS? Windows XP Professional has the EFS technology built in but you have to buy the 300+ Vista Ultimate just to be able to encrypt individual files in Vista. Can a community outcry or a couple of good articles from respected journalists essentially force Microsoft to include this for their Home Basic and Home Premium customers? Home customers have important files and are occassionaly burglarized or the victim of a laptop theft.