An anonymous reader writes "Is there a device to automatically disconnect network or otherwise time limit a physical connection to a network? The why? We are dealing with a production outage of large industrial equipment. The cause? The supplier, with no notice, remotely connected to the process control system and completely botched an update to their system. We are down and the vendor is inept and not likely to have us back to 100% for a few days. Obviously the main issue is that they were able to do this at all, but reality is that IT gets overridden by the Process Control department in a manufacturing business. They were warned about this and told it was a horrible idea to allow remote access all the time. They were warned many times to leave the equipment disconnected from remote access except when they were actively working with the supplier. Either they forgot to disconnect it or they ignored our warnings. The question is, is there a device that will physically disconnect a network connection after a set time? Yes, we could use a Christmas tree light timer hooked up to a switch or something like that but I want something more elegant. Something with two network jacks on it that disconnects the port after a set time, or even something IT would have to login to and enable the connection and set a disconnect timer would be better than nothing. As we know, process control workers and vendors are woefully inept/uneducated about IT systems and risks and repeatedly make blunders like connecting process control systems directly to the internet, use stock passwords for everything, don't install antivirus on windows based control computers, etc. How do others deal with controlling remote access to industrial systems?"
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Help SAVE NET NEUTRALITY! ×
Lauren Weinstein writes "Now, what's really going on with PRISM? The government admits that the program exists, but says it is being 'mischaracterized' in significant ways (always a risk with secret projects sucking up information about your citizens' personal lives). The Internet firms named in the leaked documents are denying that they have provided 'back doors' to the government for data access. Who is telling the truth? Likely both. Based on previous information and the new leaks, we can make some pretty logical guesses about the actual shape of all this. Here's my take."
aarondubrow writes "For more than 50 years, linguists and computer scientists have tried to get computers to understand human language by programming semantics as software, with mixed results. Enabled by supercomputers at the Texas Advanced Computing Center, University of Texas researchers are using new methods to more accurately represent language so computers can interpret it. Recently, they were awarded a grant from DARPA to combine distributional representation of word meanings with Markov logic networks to better capture the human understanding of language."
sciencehabit writes "Nothing, some say, turns an atheist into a believer like the fear of death. 'There are no atheists in foxholes,' the saying goes. But a new study suggests that people in stressful situations don't always turn to a higher power. Sometimes, they turn to science. Both athletes preparing for a big race and students asked to write about their own death showed a 15% stronger belief in science than those under less stressful situations (abstract). 'In stressful situations people are likely to turn to whatever worldviews and beliefs are most meaningful to them,' says study co-author, Anna-Kaisa Newheiser, a psychologist at Yale University. And many people find the scientific worldview more compatible with their own."
An anonymous reader writes "Cyber espionage, crime, and warfare are possible only because of poor application or system design, implementation, and/or configuration,' argues a U.S. Air Force cyber security researcher. 'It is technological vulnerabilities that create the ability for actors to exploit the information system and gain illicit access to sensitive national security secrets, as the previous examples highlight. Yet software and hardware developers are not regulated in the same way as, say, the auto or pharmaceutical industries.' 'The truth is that we should no longer accept a patch/configuration management culture that promotes a laissez-faire approach to cyber security."
storagedude writes "10 Gigabit Ethernet may finally be catching on, some six years later than many predicted. So why did it take so long? Henry Newman offers a few reasons: 10GbE and PCIe 2 were a very promising combination when they appeared in 2007, but the Great Recession hit soon after and IT departments were dumping hardware rather than buying more. The final missing piece is finally arriving: 10GbE support on motherboards. 'What 10 GbE needs to become a commodity is exactly what 1 GbE got and what Fibre Channel failed to get: support on every motherboard,' writes Newman. 'The current landscape looks promising. 10 GbE is starting to appear on motherboards from every major server vendor, and I suspect that in just a few years, we'll start to see it on home PC boards, with the price dropping from the double digits to single digits, and then even down to cents.'"
New submitter einar2 writes "German hoster Hetzner informed customers that login data for their admin surface might have been compromised (Google translation of German original). At the end of last week, a backdoor in a monitoring server was found. Closer examination led to the discovery of a rootkit residing in memory. The rootkit does not touch files on storage but patches running processes in memory. Malicious code is directly injected into running processes. According to Hetzner the attack is surprisingly sophisticated."
An anonymous reader writes "In clearing up common misconceptions about Wayland (e.g. it breaking compatibility with the Linux desktop and it not supporting remote desktops like X), Eric Griffith (a Linux developer) and Daniel Stone (a veteran X.Org developer) have written The Wayland Situation in which they clearly explain the facts about the shortcomings of X, the corrections made by Wayland, and the advantages to this alternative to Canonical's in-development Mir."
theodp writes "It was the best of movies; it was the worst of movies. GeekWire reports that The Internship — the new comedy starring Vince Vaughn and Owen Wilson as two 40-something guys who get internships at Google — is getting high praise from Googlers but low marks from movie critics. Google CEO Larry Page called the movie 'a lot of fun' in his Google+ post, while fellow Google exec Vic Gundotra gushed, 'I laughed a lot while watching this movie!' After screening a sneak preview with Google companions, Wired's Steven Levy wrote, 'From Google's point of view, the movie could not possibly be better.' USA Today's take, on the other hand, is that 'Google has never looked lamer thanks to The Internship.' And the NY Daily News calls the movie 'an unfunny valentine to Google.' But perhaps the unkindest cut of all comes from the NY Post, who suggests that 'maybe The Internship was secretly funded by Bing.' Ouch." Update: 06/07 20:02 GMT by T : Peter Wayner saw the movie (a "harmless bit of summer fluff"), and his full-length take below takes on some of the tech-company misconceptions that the film-makers gleefully adopted as script material.
An anonymous reader writes "Interesting behind the scenes interview with the creator of Paper Sorcerer, the stunning hand drawn RPG video game that was successfully Kickstarted last year and is now nearing launch. Jesse Gallagher, the artist single-handedly creating the game in Unity, has painstakingly drawn out each character and environment across all 50 dungeons. He estimates he's gone through at least 600 pages of drawings in his notebooks in the process, and had to scan them all in — but he says it's worth it to give artists more control over the games they work on. 'I was disappointed with how little input the artists had into the overall game design, so I decided to go the solo dev route,' he says. 'Now I'd like to just continue making indie games until I fall over dead at the keyboard.'"
benrothke writes "Phil Lapsley calls his book 'the untold story of the teenagers and outlaws who hacked Ma Bell.' The story is an old one, going back to the early 1960's. Lapsley was able to track down many of the original phone phreaks and get their story. Many of them, even though the years have passed, asked Lapsley not to use their real names." Read below for the rest of Ben's review.
Lucas123 writes "As consumerization of IT and self-service trends becomes part and parcel of everyone's work in the enterprise, the corporate data center may be left behind and IT departments may be given over to business units as consultants and integrators. 'The business itself will be the IT department. [Technologists] will simply be the enabler,' said Brandon Porco, chief technologist & solutions architect at Northrop Grumman. Porco was part of a four-person panel of technologists who participated at a town hall-style meeting at the CITE Conference and Expo in San Francisco this week. The panel was united on the topic of the future of IT shops. Others said they are not sure how to address a growing generation gap between young and veteran workers, each of whom are comfortable with different technologies. Nathan McBride, vice president of IT & chief cloud architect at AMAG Pharmaceuticals, said he's often forced to deal with older IT workers coming on board who expect his company to support traditional email like Outlook when it uses Google Apps.' Sooner or later, IT departments are going to change. When do you think that will happen, and how will they be different?"
kthreadd writes "The FreeBSD project has released version 8.4 of the free operating system with the same name. Highlights of this version include GNOME 2.32.1, KDE 4.10.1. In this release, focus has been put on improving stability and storage capability. The ZFS filesystem has been updated to support feature flags for ZFS pools, asynchronous destruction of ZFS datasets, LZ4 compression and ZIO NOP-write optimization. Also, support has been added for all shipping LSI storage controllers."
An anonymous reader writes "The next time a bear hits a car on a Russian highway, the video might be in high definition. A new wave of dashcams, on show at this week's Computex expo in Taipei, feature multiple enhancements on first-generation models that will probably be welcomed by law enforcement, insurance companies and the millions of people who browse YouTube looking at some of the amazing scenes captured from the front of a car. One of the current popular videos is of a May 2013 collision between a bear and a car (video). The accident, reportedly in Russia, sees the bear hit the front of the car and bounce off the car's windscreen before rolling several times to the side of the road. The video, and thousands of others like it, are typically shot in 480-line 'standard resolution,' but most of the new dashcams on show in Taipei this week offer 720 and 1080-line high definition." It's also becoming more common to repurpose old smartphones as dashcams using software like DailyRoads Voyager. If you've done so, what's your setup?
Bennett Haselton writes with his take on a case going back and forth in U.S. courts right now about whether a defendant can be ordered to decrypt his own hard drives when they may incriminate him. "A Wisconsin defendant in a criminal child-pornography case recently invoked his Fifth Amendment right to avoid giving the FBI the password to decrypt his hard drive. At the risk of alienating fellow civil-libertarians, I admit I've never seen the particular value of the Fifth Amendment right against self-incrimination. So I pose this logical puzzle: come up with a specific, precisely defined scenario, where the Fifth Amendment makes a positive difference." Read on for the rest of Bennett's thoughts.
JonZittrain writes "Projects like the New American Foundation's Commotion are designing ad hoc mesh networking to keep communications open when governments want to censor. Former FCC Chairman Julius Genachowski and I argue that mutual-aid-based networks can be helpful for public safety, too, after attacks or natural disasters. There should be easy practices for anyone to open up an otherwise-closed Wi-Fi access point if it's still connected to broadband and is near people in trouble, and separately, to develop delay- and fault-tolerant fallback ad hoc networks so users' devices can communicate directly with one another and in a mesh. This can happen even while full packet-based ad hoc mesh is being figured out. The ideas have been developed a little in workshops at Harvard's Berkman Center and the FCC. Why not bring the human rights and public safety communities together towards a common goal?"
Nerval's Lobster writes "James R. Clapper, the nation's Director of National Intelligence, claimed that recent reports about the NSA monitoring Americans' Internet and phone communications are inaccurate. 'The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act,' he wrote in a June 6 statement. 'They contain numerous inaccuracies.' While the statement didn't detail the supposed inaccuracies, it explained why the monitoring described in those articles would, at least in theory, violate the law. 'Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States,' it read. 'It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.' Those newspaper articles describe an NSA project codenamed Prism, which allegedly taps into the internal databases of nine major technology companies: Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. Both publications drew their information from an internal PowerPoint presentation used to train intelligence operatives. Speaking to Slashdot, Google, Microsoft and Facebook all again denied knowledge of Prism; the Google spokesperson suggested he didn't 'have any insight' into why Google would have appeared in the NSA's alleged PowerPoint presentation. But many, many questions remain."
An anonymous reader writes "Old school meets business school. From the New Republic: 'The Amish interpretation of the Christian bible prohibits the use of the courts: Except in rare circumstances, the Amish do not sue. This has created a unique problem in the region. Home to the largest Amish community in the world, Eastern Ohio sits squarely on top of the Utica and Marcellus Shale formations, which contain billions in oil and gas recoverable through advances in hydraulic fracturing technology, or fracking ... When it comes to the oil and gas industry, this means that any agreement an Amish farmer makes with a company is, for the farmer, practically unenforceable. A rare case in which the plaintiffs were Amish suggests that Ohio's oil and gas companies know this and have been willing to take advantage.'"
sciencehabit writes "The mushroom clouds produced by more than 500 nuclear bomb tests during the Cold War may have had a silver lining, after all. More than 50 years later, scientists have found a way to use radioactive carbon isotopes released into the atmosphere by nuclear testing to settle a long-standing debate in neuroscience: Does the adult human brain produce new neurons? After working to hone their technique for more than a decade, the researchers report that a small region of the human brain involved in memory makes new neurons throughout our lives — a continuous process of self-renewal that may aid learning."
Following the confusion surrounding Microsoft's announcement of the Xbox One, the company has now clarified many of the hot-button issues in a set of posts on their official site. First, they confirmed that the console will need to phone home in order to continue playing games. On your primary console, you'd need to connect to the internet and check in once every 24 hours. They also announced that you'll be able to access and play any of your games by logging in on somebody else's console, but the internet connection will be required every hour to keep playing that way. Other media don't require the connection. Microsoft also explained how game licensing will work. On the upside, anyone using your console will be able to play your games, and you can share your games with up to 10 members of your family for free. The downside is the news about used games; Microsoft says they've "designed Xbox One so game publishers can enable you to trade in your games at participating retailers." The key word there is can, which implies that you can't without the publisher's express permission. Finally, the company made a set of statements about how Kinect's audio and video sensors will collect and share your data. "When Xbox One is on and you're simply having a conversation in your living room, your conversation is not being recorded or uploaded." They also say data gathered during normal use won't leave the console without your explicit permission.
darthcamaro writes "One year ago today was the the official 'Launch Day' of IPv6. The idea was that IPv6 would get turned on and stay on at major carriers and website. So where are we now? Only 1.27% of Google traffic comes from IPv6 and barely 12 percent of the Alexa Top 1000 sites are even accessible via IPv6. In general though, the Internet Society is pleased with the progress over the last year. '"The good news is that almost everywhere we look, IPv6 is increasing," Phil Roberts,technology program manager at the Internet Society said. "It seems to be me that it's now at the groundswell stage and it all looks like everything is up and to the right."'"
angry tapir writes "Hackers would face up to two years or more in prison no matter where they live in the European Union under a new draft law approved by the European Parliament's civil liberties committee. The proposed rule would prevent E.U. countries from capping sentences for any type of hacking at less than two years. Meanwhile the maximum sentence possible for cyberattacks against 'critical infrastructure,' such as power plants, transport networks and government networks would be at least five years in jail. The draft directive, which updates rules that have been in place since 2005, would also introduce a maximum penalty of at least three years' imprisonment for creating botnets."
An anonymous reader writes "Deep beneath the ocean's waves, strange creatures such as rockfish and gorgonian coral thrive in the icy depths. Yet there's something else you'll find if you go searching beneath the sea: trash, and lots of it. Researchers have discovered that our trash is accumulating in the deep sea, particularly in Monterey Canyon off of the coast of California. Scientists knew that trash was affecting shallower depths--about 1,000 feet beneath the water. Yet they were unsure whether the effects extended to the truly deep parts of the ocean that reached up to 13,000 feet. They decided that there was only one way to find out: look for themselves."
savuporo writes "The National Highway Traffic Safety Administration and the Department of Transportation are considering technological solutions for people to stop using their cellphones while driving. Proximity detectors or requiring physical link with the car are the solutions under the scope. From the article: 'NHTSA wants automakers to make it impossible to enter text for messaging and internet browsing while the car is in motion, disable any kind of video functionality and prevent text-based information such as social media content or text messages from being displayed.' Obviously these regulations would need to go beyond cellphones, as laptop, tablet or any other gadget with a 3G data connection or even on a wi-fi hotspot made by your phone would be equally distracting."