Image

Managing Humans Screenshot-sm 87

Kylar writes "For those of you who have already discovered Michael 'Rands' Lopp's blog Rands In Repose, I congratulate you, as you are clearly an intelligent audience. For those of you who haven't, or for the less discerning (or, perhaps less blog-oriented), this book provides an excellent entry into the writings of Rands. Containing edited selections from his blog as well as new material, Rands uses many anecdotes and stories to convey a startling amount of deep wisdom into the facets of the Silicon Valley programmer, and a bevy of tools that are helpful in attempting to herd, er, manage them." Read below for Tom's review.

Is That "Sexting" Pic Illegal? A Scientific Test 711

Frequent Slashdot contributor Bennett Haselton writes " Amid the latest 'sexting' controversy, here is a proposal for a scientifically objective method to determine whether a picture constitutes child pornography. This is a harder problem than it seems, but not for the reasons you'd think. And it raises questions about how the same scientific principles could be applied to other matters of law." Hit the link below to read the sextiest story on Slashdot today.
Image

The Shadow Factory Screenshot-sm 157

brothke writes "The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America is the third of James Bamford's trilogy. Bamford started this with The Puzzle Palace in 1982 and Body of Secrets: Anatomy of the Ultra-Secret National Security Agency in 2001. The Shadow Factory is likely the last book Bamford will find the NSA cooperative to, given his often harsh treatment of the agency and its directors. It is also doubtful that former NSA Director Lt. Gen. Michael Hayden will grant Bamford additional dinner invitations, given his portrayal of Hayden as a weakling who could not stand up to Dick Cheney and other in the Bush administration." Read below for the rest of Ben's review.
Programming

Congress Mulls API For Congressional Data 121

Amerika sends in a Wired blog post on the desire in Congress to make data on lawmaking more easily available to the public. The senator who introduced the language into an omnibus appropriations bill wants feedback on the best way to make (e.g.) the Library of Congress's Thomas data more available — an API or bulk downloads, or both. Some comments on the blog posting call for an authenticated versioning system so we can know unequivocally how any particular language made its way into a bill. "Congress has apparently listened to the public's complaints about lack of convenient access to government data. The new Omnibus Appropriations Bill includes a section, introduced by Rep. Mike Honda (D-Calif.), that would mark the first tangible move toward making federal legislative data available to the public in bulk, so third parties can mash it up and redistribute it in innovative and accessible ways. This would include all the data currently distributed through the Library of Congress's Thomas web site — bill status and summary information, lists of sponsors, tracking timelines, voting records, etc."
Games

Making a Horror Game Scary 129

GameSetWatch has put up an article about the characteristics that give games in the survival-horror genre the ability to unnerve, startle, and scare players in ways that most games don't. The genre has seen a resurgence lately, with titles like Dead Space, F.E.A.R. 2, and Left 4 Dead posting strong sales numbers. What triggers your fight-or-flight impulses in games like these? From the article: "Being visual creatures, humans are most comforted by sight because of our ability to discern objects, action and consequences based on a picture. As a result, cutting visual stimuli and sticking purely to audio or speech is one of the best ways to keep a player on their toes. Even with weapons, it's very hard to find what you cannot see, and what you do not know. Even if visual stimuli is used, limiting or obfuscating the player's view can enhance the horror in a game, especially if the player sees it for an incredible short time. This can hint both at the difficulty of an upcoming encounter, or even allude to matters earlier in the narrative that the player will soon have to face."
First Person Shooters (Games)

Review: F.E.A.R. 2: Project Origin 217

First-person shooters comprise one of the most well-developed video game genres in existence. The number of high-quality games and franchises practically demands that any new entry must have an interesting concept and a rock-solid engine. Otherwise, it will quickly get buried under an avalanche of award-winning titles. When the original F.E.A.R. came out in 2005, a well-crafted horror theme, the AI, and a few gameplay innovations allowed it to succeed despite direct competition from established franchises, such as Quake 4 and Call of Duty 2, among others. F.E.A.R. 2: Project Origin draws on the strengths of its predecessor and adds a few improvements. The question that now remains is whether or not the additions make up for the fact that the game's concept is no longer new and unique. Read on for the rest of my thoughts.
Security

Website Security Without Breaking the Bank? 195

An anonymous reader writes "I do my own Web design and have a few websites — MySQL, PHP, CSS, HTML, that kind of thing. It's simple, amateur stuff, but I would love to have some reasonable ways to assess their security myself and patch the big holes, or possibly enlist someone to do 'white hat' work to assist me. I have absolutely no idea how to proceed. I don't want to get mired in a never-ending paranoia-fueled race to patch holes before the hackers find them, but on the other hand, I don't want my websites to look like Swiss cheese. Right now, I wouldn't know what kind of cheese they look like: Swiss, Havarti, or hard as Parmesan. How can I take reasonable steps to protect these websites myself? What books has the community found useful? What groups (if any) can offer me inexpensive white-hat hacking that won't end up costing me a first-born child? Or am I better off just waiting until a problem arises and then fixing it?"
Image

Beginning iPhone Development Screenshot-sm 216

Cory Foy writes "When my wife got a Touch several months back, the first thing I wanted to do was build some applications for it. Who wouldn't want to play with a device that has accelerometers, position sensors and multi-touch gestures? But being new to the Mac world, I needed something to help guide me along. Beginning iPhone Development aims to be that guide. But does it live up to the challenge of teaching a newbie Mac and iPhone developer?" Read below for the rest of Cory's review.
Lord of the Rings

Review: Lord of the Rings: Conquest 68

Pandemic Studios, having enjoyed some success with their release of Star Wars: Battlefront II, sought to bring their style of action game to the Lord of the Rings universe as well. Since both Star Wars and LotR are widely regarded as classics in their respective genres, and both have a rich, deep fan base, the task would appear to be similar in scope. Many were expecting Lord of the Rings: Conquest to be, if nothing else, a playground for Tolkien fans to revel in the environments so vividly brought to life by the movies. Unfortunately, between the short, simplistic campaign and the shallow, uninspired combat, LotR: Conquest merely relies on its name for success, failing to bring the innovation or cleverness that the franchise deserves. Read on for the rest of my thoughts.
Education

Followup To "When Teachers Are Obstacles To Linux" 626

An couple of anonymous readers wrote in to let us know about a followup to last Wednesday's story of the teacher who didn't believe in free software. The Linux advocate who posted the original piece has cooled off and graciously apologized for going off half-cocked (even though the teacher had done the same), and provided a little more background which, while not excusing the teacher's ignorance, does make her actions somewhat more understandable. Ken Starks has talked with the teacher, who has received a crash education in technology over the last few days — Starks is installing Linux on her computer tomorrow. He retracts his insinuations about Microsoft money and the NEA. All in all he demonstrates what a little honest communication can do, a lesson that all of us who advocate for free software can take to heart. "The student did get his Linux disks back after the class. The lad was being disruptive, but that wasn't mentioned. Neither was the obvious fact that when she saw a gaggle of giggling 8th grade boys gathered around a laptop, the last thing she expected to see on that screen was a spinning cube. She didn't know what was on those disks he was handing out. It could have been porn, viral .exe's...any number of things for all she knew. When she heard that an adult had given him some of the disks to hand out, her spidey-senses started tingling. Coupled with the fact that she truly was ignorant of honest-to-goodness free software, and you have some fairly impressive conclusion-jumping. In a couple of ways, I am guilty of it too."
Image

Nmap Network Scanning Screenshot-sm 125

brothke writes "The 1962 song Wipe Out, with its energetic drum solo started, was the impetus for many people to take up playing the drums. Similarly, Nmap, the legendary network scanner, likely interested many in the art of hacking, and for some, started a career for security professionals and hackers. Nmap and its creator Fyodor need no introduction to anyone on Slashdot. With that, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, is a most useful guide to anyone interested in fully utilizing Nmap." Read on for the rest of Ben's review.
Role Playing (Games)

Review: Wrath of the Lich King 545

Since shortly after its release in late 2004, World of Warcraft has held the position of the most popular MMO, quickly outstripping predecessors such as Everquest and Ultima Online, and continuing to hold the lead despite competition from contemporaries and newer offerings, like Warhammer Online. When World of Warcraft's first expansion, The Burning Crusade, was released, it built on an already rich world by using feedback from players and two extra years of design experience to work on condensing the game to focus more on the best parts. Now, with the release of Wrath of the Lich King, Blizzard seems to have gotten themselves ahead of the curve; in addition to the many changes intended to remove the "grind" aspect that is so prevalent in this genre, they've gone on to effectively put themselves in the player's shoes and ask, "What would make this more fun? Wouldn't it be cool if..?" Read on for the rest of my thoughts.
Medicine

Visual Hallucinations Are a Normal Grief Reaction 550

Hugh Pickens writes "Vaughn Bell has written an interesting essay at Scientific American about grief hallucinations. This phenomenon is a normal reaction to bereavement that is rarely discussed, although researchers now know that hallucinations are more likely during times of stress. Mourning seems to be a time when hallucinations are particularly common, to the point where feeling the presence of the deceased is the norm rather than the exception. A study by Agneta Grimby at the University of Goteborg found that over 80 percent of elderly people experience hallucinations associated with their dead partner one month after bereavement, as if their perception had yet to catch up with the knowledge of their beloved's passing. It's not unusual for people who have lost a partner to clearly see or hear the person about the house, and sometimes even converse with them at length. 'Despite the fact that hallucinations are one of the most common reactions to loss, they have barely been investigated and we know little more about them. Like sorrow itself, we seem a little uncomfortable with it, unwilling to broach the subject,' writes Bell. 'We often fall back on the cultural catch all of the "ghost" while the reality is, in many ways, more profound.' "

Censorship By Glut 391

Frequent Slashdot contributor Bennett Haselton writes "A 2006 paper by Matthew Salganik, Peter Dodds and Duncan Watts, about the patterns that users follow in choosing and recommending songs to each other on a music download site, may be the key to understanding the most effective form of "censorship" that still exists in mostly-free countries like the US It also explains why your great ideas haven't made you famous, while lower-wattage bulbs always seem to find a platform to spout off their ideas (and you can keep your smart remarks to yourself)." Read on for the rest of Bennett's take on why the effects of peer ratings on a music download site go a long way towards explaining how good ideas can effectively be "censored" even in a country with no formal political censorship.
GUI

Suggestions For Cheap Metrics Eye Candy Software? 201

Banquo writes "I have a friend who has a small datacenter (SQL/Mail/IIS/File Repository ... 5 or 10 servers) and he was saying that his boss wants to see some kind of 'visual display of changing metrics' — Net/server/sql stats with moving lines and graphs and pretty colors. Basically they want something to display on a big LCD panel that will give a tiny bit of 'Wow' factor to customer visits. Back in my datacenter days I saw a million packages to do this stuff, but I was always blessed with an IT budget for metrics/monitoring. Can anyone suggest a free/cheap package that will make pretty moving pictures, moving lines, graphs, etc. from server/net stats? There's no worry about actually using this for real data tracking or metrics purposes. He has a pretty robust log/alert/metrics setup, but command line is a little too dry for marketing purposes. I jokingly suggested he just use a looped flash animation but he actually does want stats that are coming from and reflect his environment. Anyone know of any cheap or free data center stats/metrics 'Eye Candy' software out there?" Better yet, can you think of any particularly interesting ways to display that sort of information?
Image

Googling Security Screenshot-sm 142

brothke writes "It has been suggested that if one was somehow able to change history so that aspirin had never been discovered until now, it would have died in the lab and stand no chance of FDA approval. Similarly, if we knew the power that Google would have in 2008 with its ability to aggregate and correlate personal data, it is arguable that various regulatory and privacy bodies would never allow it to exist given the extensive privacy issues." Read below for the rest of Ben's review.
Data Storage

Good Freeware System Snapshot Tool For Windows? 219

Khyber writes "I'm doing a little personal research into a project that tracks what changes get made to your system every time you install a program. I know there are ways of checking through Windows Restore Points, but that's not what I'm trying to do. Instead, I'm going to start with an absolutely fresh Windows XP install, take a full snapshot of the entire installation on the hard drive, and burn that to a DVD (somewhat like a backup disc with an entire snapshot of my hard drive's current contents.) With every program I install, I'm going to take another snapshot, burn to DVD, and repeat the process until I have recreated every step taken to get to my current system state (all programs installed on a separate hard drive, all registry entries etc on the OS drive, with only snapshots of the OS drive being recorded.) The purpose for all of this I'm not legally allowed to talk about, due to confidentiality requirements. Does anybody know of such a program, preferably freeware, that will accomplish my objective, and are there tools that can be used to compare the difference in drive images?"

Blizzard Answers Your Questions, From Blizzcon 402

Last week we asked you to submit questions for several Blizzard employees on a wide range of issues. Since we undertook the pilgrimage to Blizzcon in person this year, we decided to use the question ideas as a guide rather than an absolute, so that it could be a little more conversational in tone. Below we have included the responses from Chris Sigaty, lead producer on StarCraft II; Jeffrey Kaplan (aka Tigole), game director for World of Warcraft; Leonard Boyarsky, lead world designer on Diablo III; and Paul Sams, Blizzard's COO. One interesting point: Paul Sams indicated in his interview that, with enough interest, Blizzard would be willing to entertain the idea of open sourcing some of their older games. He suggested that if you are interested in this to contact them directly (please be at least semi-coherent and polite). Update 19:00 by SM: Bob Colayco from Blizzard just contacted us to mention that if users wish to leave feedback about open sourcing games, support for Linux, or anything else you would like to express to them, you should do so in the comments section of this story. They plan on perusing the comments below for user feedback and interest, so don't be shy.
Image

Nagios 3 Enterprise Network Monitoring Screenshot-sm 147

jgoguen writes "Nagios, originally known as Netsaint, has been a long-time favourite for network and device monitoring due to its flexibility, ease of use, and efficiency. Nagios provided, and still provides today, a low-cost, versatile alternative to commercial network monitoring applications. Nagios 3 takes a huge step forward compared to Nagios 2, providing improved flexibility, ease of use and extensibility, all while also making significant performance enhancements. Due to its extensibility and ease of use, no device or situation has yet been found that cannot be monitored using Nagios and a pre-made or custom script, plug-in or enhancement." Read on for the rest of jgoguen's review.

Virginia High Court Wrong About IP Addresses 174

Frequent Slashdot contributor Bennett Haselton writes "The Virginia Supreme Court has ruled that the state's anti-spam law, which prohibits the sending of bulk e-mail using falsified or forged headers, violates the First Amendment because it also applies to non-commercial political or religious speech. I agree that an anti-spam law should not outlaw anonymous non-commercial speech. But the decision contains statements about IP addresses, domain names, and anonymity that are rather basically wrong, and which may enable the state to win on appeal. The two basic errors are: concluding that anonymous speech on the Internet requires forged headers or other falsified information (and therefore that a ban on forged headers is an unconstitutional ban on anonymous speech), and assuming that use of forged headers actually does conceal the IP address that the message was sent from, which it does not." Click that magical little link below to read the rest of his story.

Slashdot Top Deals