Businesses

Tesla Showroom in Southern UK Damaged By Accidental Fire (bbc.com) 40

AppleHoshi writes: The BBC is reporting that an accidental fire at Tesla's Gatwick Service Centre in the U.K. has damaged "at least half" of the facility. Initial reports are that the fire did not begin in the service area itself, but started in a parts storage area and spread from there. The fire was extinguished within three hours and no staff or customers were injured.
The fire "was not caused by Tesla cars, chargers or batteries," according to the West Sussex Fire and Rescue Service.
United Kingdom

48 Organizations Now Have Access To Every Brit's Browsing Hstory (zerohedge.com) 251

schwit1 quotes a report from Zero Hedge on Great Britain's newly-enacted "snoopers' charter": For those who missed our original reports, here is the new law in a nutshell: it requires telecom companies to keep records of all users' web activity for a year, creating databases of personal information that the firms worry could be vulnerable to leaks and hackers. Civil liberties groups say the law establishes mass surveillance of British citizens, following innocent internet users from the office to the living room and the bedroom. They are right. Which government agencies have access to the internet history of any British citizen? Here is the answer courtesy of blogger Chris Yuo, who has compiled the list
Click through to the comments to read the entire list.
Security

Cryptsetup Vulnerability Grants Root Shell Access On Some Linux Systems (threatpost.com) 89

msm1267 quotes a report from Threatpost: A vulnerability in cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems. From there, an attacker could have the ability to copy, modify, or destroy a hard disk, or use the network to exfiltrate data. Cryptsetup, a utility used to setup disk encryption based on the dm-crypt kernel module, is usually deployed in Debian and Ubuntu. Researchers warned late last week that if anyone uses the tool to encrypt system partitions for the operating systems, they're likely vulnerable. Two researchers, Hector Marco of the University of the West of Scotland and Ismael Ripoll, of the Polytechnic University of Valencia, in Spain, disclosed the vulnerability on Friday at DeepSec, a security conference held at the Imperial Riding School Renaissance Vienna Hotel in Austria. According to a post published to the Full Disclosure mailing list, the vulnerability (CVE-2016-4484) affects packages 2.1 and earlier. Systems that use Dracut, an infrastructure commonly deployed on Fedora in lieu of initramfs -- a simple RAM file system directory, are also vulnerable, according to the researchers. The pair say additional Linux distributions outside of Debian and Ubuntu may be vulnerable, they just haven't tested them yet. The report adds: "The problem stems from the incorrect handling of a password check when a partition is ciphered with LUKS, or Linux Unified Key Setup, a disk encryption specification that's standard for Linux. Assuming an attacker has access to the computer's console, when presented with the LUKS password prompt, they could exploit the vulnerability simply by pressing 'Enter' over and over again until a shell appears. The researchers say the exploit could take as few as 70 seconds. After a user exceeds the maximum number of three password tries, the boot sequence continues normally. Another script in the utility doesn't realize this, and drops a BusyBox shell. After carrying out the exploit, the attacker could obtain a root initramfs, or rescue shell. Since the shell can be executed in the initrd, or initial ram disk, environment, it can lead to a handful of scary outcomes, including elevation of privilege, information disclosure, or denial of service."
Businesses

Bird-Shaped Drone Symbolizes New Forms Of Covert Surveillance To Come (mirror.co.uk) 95

One security writer in Somali recently discovered a downed metal drone that had been carefully disguised as a bird, a reminder that drones will bring powerful new forms of surveillance. Slashdot reader Stephen Sellner also shares an article by the CEO of one unmanned systems company who's predicting that the commercial drone industry will create more than 100,000 new jobs and generate more than $82 billion for the U.S. economy, and suggesting "security of industrial areas (shipyard, storage facility, etc.) can now be augmented by drones to provide a quick eye in the sky."

But it may be inevitable that drones will be used in a variety of unexpected ways. Airbus is also testing the use of drones for quality inspections on their commercial aircraft. In Iowa, a drone helped lead first-responders to a man suffering from a heart attack. And the U.S. wildlife service is planning to drop peanut-butter pellets onto northeastern Montana to deliver vaccines to prairie dogs -- so that they can then in turn be eaten by Montana's population of endangered black-footed ferrets. Any predictions about drone news we'll be seeing in the future?
Open Source

OpenStack Juno Released 20

darthcamaro writes The OpenStack Juno release is now generally available. This the 10th major release for the open-source cloud platform and introduces the Sahara Data Processing Service as the major new project. That's not the only new feature in Juno though, with 310 new features in total. The new features include cloud storage policy, improved IPv6 support, a rescue mode and improved multi-cloud federation capabilities."
Canada

Iconic Predator-Prey Study In Peril 84

An anonymous reader writes "Scientists have charted the ebb and flow of moose and wolf populations on Isle Royale in Lake Superior for nearly 50 years. Ice bridges to Canada regularly supplied the genetic stocks for much of that time, but have been rare in recent years leading to inbreeding, dwindling populations and developmental deformity for the wolves that inhabit the island. Now, with the first solid freeze in six years, new wolves could join the mix ... or the remaining island dwellers could leave." If new wolves do not appear, or all of the current wolves leave, the moose would end up destroying the native Fir population. The wildlife service is considering introducing new wolves as part of a genetic rescue, or reintroducing wolves should the population reach zero on its own.
Image

National Park Service Says Tech Is Enabling Stupidity Screenshot-sm 635

theodp writes "The National Park Service is finding technology to be a double-edged sword. While new technologies can and do save lives, the NPS is also finding that unseasoned hikers and campers are now boldly going where they never would have gone before, counting on cellphones, GPS, and SPOT devices to bail them out if they get into trouble. Last fall, a group of hikers in the Grand Canyon called in rescue helicopters three times by pressing the emergency button on their satellite location device. When rangers arrived the second time, the hikers complained that their water supply tasted salty. 'Because of having that electronic device, people have an expectation that they can do something stupid and be rescued,' said a spokeswoman for Grand Teton National Park. 'Every once in a while we get a call from someone who has gone to the top of a peak, the weather has turned and they are confused about how to get down and they want someone to personally escort them. The answer is that you are up there for the night.'"
Image

Search And Rescue Service Stopped After Lawsuit Screenshot-sm 11

British Columbia's Golden and District Search and Rescue Society has stopped its service due to a lawsuit filed by a skier last month. The lawsuit, filed by Gilles Blackburn, claims the society didn't do enough to save him and his wife after they became lost on Feb. 15. Gilles wife died of hypothermia on their seventh day in the wilderness. The society is concerned about the government's lack of legal support in the incident. Chris Duffy, acting executive director of the PEP, said the province will cover volunteers for liability, but the search-and-rescue societies are a separate legal entity, and therefore responsible for getting their own coverage. "There's a lot of concern over this and a lot of focus on it because it is a first and we want to explore what the gaps and risks are out of this and inform the wider search-and-rescue community to make sure that everyone has the coverages that they need," he said. The moral of the story: Don't get lost in British Columbia.
The Almighty Buck

Rescued Banks Sought Foreign Help During Meltdown 749

theodp writes "An AP review of visa applications has found that major US banks sought permission to bring thousands of foreign workers into the country under the H-1B visa program, even as the banking system was melting down and Americans were being laid off. The dozen banks now receiving the biggest rescue packages, totaling more than $150 billion, requested visas for more than 21,800 foreign workers over the past six years. (It's not known how many of these were granted; the article notes 'The actual number is likely a fraction of the... workers the banks sought to hire because the government only grants 85,000 such visas each year among all US employers.') The American Bankers Association blamed the US talent pool for forcing the move, saying they couldn't find enough Americans capable of handling sales, lending, and bank administration. The AP has filed FOIA requests to force the US Customs and Immigration Service to disclose further details on the bailed-out banks' foreign hires."
Role Playing (Games)

EVE Online Answers Your Questions 249

Last week at GDC I had the privilege of sitting down to speak with a representative from CCP, the folks who maintain EVE Online. The week before, we'd asked for questions to pass on. I had the chance to put them directly to Magnus Bergsson, CMO at CCP. He very directly tackles the recent scandal involving a CCP developer, the reason why EVE's hardcore gameplay is so appealing, the balance between casual and hardcore players, and some information on the future of the game. Read on for his answers to your questions in a transcript of the interview, as well as audio live from the GDC Expo floor.

Ubuntu Hacks 138

Ravi writes "I recently got hold of a very nice book on Ubuntu called Ubuntu Hacks co-authored by three authors - Kyle Rankin, Jonathan Oxer and Bill Childers. This is the latest of the hack series of books published by O'Reilly. They have made available a rough cut version of the book online ahead of schedule which was how I got hold of the book but as of now you can also buy the book in print. Put in a nutshell, this book is a collection of around 100 tips and tricks which the authors choose to call hacks, which explain how to accomplish various tasks in Ubuntu Linux. The so called hacks range from down right ordinary to the other end of the spectrum of doing specialised things." Read on for the rest of Ravi's review.
Games

Review: Ultimate Spider-Man 110

Spider-Man 2 was one of the best movie tie-ins to come along in quite some time when it was released in late Summer 2004. Free-swinging travel through the streets of New York and an entertaining retelling of the movie plot made for a fun, if mindless, title. On that framework Treyarch has spun another tale about the life of Peter Parker. Unlike Spider-Man 2, Ultimate Spider-Man comes directly from the pages of the Marvel comic of the same name, giving players the chance to control both your friendly neighborhood web-head and the fan favorite Venom. There's fun to be had here, and a high quality story to tell. Read on for my impression of Ultimate Spider-Man.
Programming

Expert Delivery Using NAnt and CruiseControl.NET 109

Jim Holmes writes "Marc Holmes's Expert .NET Delivery Using NAnt and CruseControl.NET is an outstanding book for development teams wanting to build a reliable, automated delivery system. The book clearly lays out the case for having a standard delivery process, then dives into specific details of implementing such a process via NAnt and CruiseControl.NET. The book also covers several other tools, both open source/freeware and commercial, including NDoc, FxCop, NUnit, Red Gate's SQL Bundle, and Eric Smith's CodeSmith code generation tool. This book, like Steve Loughran's Java Development with Ant has crucial concepts and patterns which are useful to folks even outside its target .NET audience. This is because the author is so emphatic about the criticality of process and standards, something applicable to anyone developing and delivering software." Read on for the rest of Holmes' review.
Operating Systems

Linux Cookbook 126

norburym (Mary Norbury-Glaser )writes "Carla Schroder's Linux Cookbook (O'Reilly) is an extremely dense volume packed with valuable information. The author writes with precision and detail and with a conversational style that handles the topic with a wry humor making this book a pleasure to read. The Linux Cookbook is command-line based so some familiarity with a Linux system, the inherent power of using the command-line and the dangers of using root are necessary." Read on for the rest of Norbury-Glaser's review.
Books

Point and Click Linux 192

Robin "Roblimo" Miller is well-known in the open-source world for advocating cheap, user-friendly Linux computing and demonstrating that it's not only possible but available, right now. (He's also a writer and editor at NewsForge, and the editor in chief of OSTG, of which Slashdot is a part, and therefore one of my bosses; take that for what it's worth.) Roblimo's new book Point and Click Linux really consists of three things: the book itself, an included copy on CD of the Debian-based SimplyMepis Linux distribution, and a DVD featuring Roblimo's multi-part narrated video guide for getting started with Linux, Mepis and KDE. "Getting started" is key; this book is for the interested beginner, not the power user. Read on for the rest of my review.
Books

Knoppix Hacks 190

norburym writes "The publishers' blurb on the back cover describes Knoppix as 'a veritable Swiss Army knife in CD form.' Knoppix Hacks by Kyle Rankin is no less astounding in revealing the hidden versatility and power inherent in this unassuming tool." Read on for the rest of Norbury-Glaser's review.
Music

iPod & iTunes: The Missing Manual, 2nd Edition 201

emmastory writes "When I mentioned this book to some of my friends, the response was usually either 'Doesn't the iPod come with a manual?' or 'Does the iPod even need a manual?' There is, in fact, a little CD-sized booklet that comes with the iPod, and it's true that you probably don't need much more than that if all you need to know is how to turn the thing on and play a song. But one of the great things about the Missing Manuals series is that while they tell you everything a manual ought to, they also tell you an awful lot that a manual never would." Read on for the rest of emmastory's review of iPod & iTunes: The Missing Manual, Second Edition.
Wireless Networking

Spokane Gets Unwired 103

prostoalex writes "Spokane International Airport is getting wireless connectivity just before the city will expand WiFi coverage to 100 blocks in Spokane downtown. It will be the largest urban Wi-Fi zone in the United States, said Bob Conley, a founder of Vivato, the company that made the antennas for both installations. Vivato's press release mentions the service will be useful not only to casual downloaders. The downtown 'Hot Zone' will improve city services by facilitating intelligent policing, quicker fire and rescue response, and will support e-government initiatives and a more productive mobile workforce."
It's funny.  Laugh.

Two Funnies: BotBOFH and Joy of Tech 74

Craig Maloney and honestpuck contribute two reviews for your almost-the-weekend reading pleasure: read below for their respective impressions of two dead-tree compendiums of online humor: Bride of the Bastard Operator From Hell and The Best of The Joy of Tech.
Security

Exploiting Software 148

prostoalex writes "Why are networked computing environments so insecure? You've heard the story before - early computers were not designed to work in the network environment, and even most software written later was designed to work on benevolent networks. As Bruce Schneier says in the preface to Building Secure Software: How to Break Code, 'We wouldn't have to spend so much time, money and effort on network security if we didn't have such bad software security.'" Read on for prostoalex's review of Exploiting Software, which aims to balance that situation somewhat.

Slashdot Top Deals