HOWTO Commit Corporate Espionage 97

bart_scriv writes "Worried about who might be spying at your company? Businessweek looks at the latest in espionage gadgets and technology in response to the recent HP boardroom scandal. The article looks at devices designed for counter-espionage, which range from mundane confidential email services to sophisticated camera and listening-device detectors. '...for every method of spying, there's a counteroffensive. One of them is the eavesdropping protection kit, manufactured by Dynasound in Norcross, Ga. To secure a room in an office building, devices are placed on ceiling plenums, floors, HVAC ducts, doors, walls or windows — basically anywhere voices can travel.'"

US Population to Top 300 Million 792

An anonymous reader writes "The number of Americans will surpass 300 million this month, a milestone that raises environmental impact questions for the only major industrial nation whose population is increasing substantially. The US census bureau says the 300 million mark will be reached 39 years after US population topped 200 million and 91 years after it exceeded 100 million. That makes US the third most populous country behind china and india. It is noteworthy that sheer number of human beings do not necessarily have the heaviest impact on the environment. Instead environmental impact is a calculation that involves population, affluence and technology. The US consumes nearly 25% of the world's energy though it has only 5% of the world's population and has the highest per capita oil consumption worldwide. Each American produces about 2.3 kg of trash a day, a rate about 5 times that in developing countries."

Illumninatus! Author Needs Our Help 553

Criceratops writes, "Almost every fringe-geek worth their salt has read 'The Illuminatus! Trilogy,' or at least the 'Principia Discordia,' and much of the enlightenment therein came from Robert Anton Wilson. On the eve of 'Xena' being officially named Eris, Douglas Rushkoff's blog reveals that the extremely ill Mr. Wilson can't make his rent. Another testimony to how our society refuses to reward those who enrich it... but not if we can help it!"

To Grid Or Not To Grid? 68

dbgimp writes "In my job at a (large) investment bank I am constantly being pushed to use grid technology. I have many problems with this (not least that our data center is at best 100 Mb/s and our software is actually more data than computation heavy). A typical batch job takes 10-30 minutes consisting of around 10,000 trades. I would far rather spend the time and money on multi-core machines and optimizing the software than on the latest fad technology. I am interested to hear from other people in a similar position and, in particular, why or why not they chose grid software over improving the existing code to leverage better processor technology, and which grid software they chose to use and why. Or, conversely, why they chose not to use grid software."

Network Neutrality Threatened In Norway 110

eirikso writes, "In June 2006 NextGenTel, one of the biggest broadband providers in Norway, decided to deliberately limit the bandwidth from the Norwegian Broadcasting Corporation. The CEO of NextGenTel, Morten Ågnes, told the Norwegian newspaper Aftenposten that they will give priority to the content providers who pay for better bandwidth. The Consumer Council of Norway takes this as a serious threat to network neutrality in Norway and wants to call a meeting with the biggest broadband providers in Norway to find a solution."

Top Ten Geek Wallets 223

twentyxtysix writes, "Productdose.com has a rundown of the the top ten wallets for geeks, including an RFID blocking wallet and a wallet made out of Tyvek designed to look like dot-matrix paper. Its an entertaining read that even includes a DIY illuminating wallet."

Linux Cell Phones Coming Q1 2007 181

eldavojohn writes, "Prepare to salivate. D-Link has announced plans to put an unlocked Linux phone on the market in early 2007. Some features: Dual-mode WiFi and GSM/GPRS. Up to 24 MB of memory for user file storage, such as music and videos. 2-inch, 176 x 220-pixel color display. Opera browser. Email client. 3.4 ounces (95 grams). Tri-band (900/1800/1900) GSM radio — meaning it should work with any GSM-GPRS SIM card, including pre-paid SIM cards as well as those from traditional GSM service providers. Will it really be this easy to wean myself from the Microsoft mobile teat?" The phone is expected to list for $600.

SAT Advice for a Foreign Student? 100

An anonymous reader asks: "I am a student from the UK who is currently in the process of applying to a university in the US. This means that I need to take the SAT Reasoning Test. I have read study guides and seen sample questions, but the more I look around the more I seem to be seeing general 'study skills' information aimed primarily at explaining how to learn rather than what to learn, which results in a lot of pages to work through for seemingly little data. What would help me immensely is any kind of resource aimed at an audience unfamiliar with the tests. Does anyone have a link to a list of exactly what I am expected to know and in what detail I need to know it, as well as anything else that can help me prepare for the exams?"

GeV Acceleration In 3 Centimeters 151

ZonkerWilliam writes, "Here is a very interesting article, for the scientific community at least, on an advancement in laser wakefield particle accelerators. Being able to accelerate electrons to 1 Gev in the space of 3.3 cm calls up visions of portable devices that can be used anywhere: think of portable cancer therapies, if they can do the same for positrons, portable PET scans, possible use in compact fusion devices, capturing the dearly departed, etc. The uses are mind boggling." From the article: "By comparison, SLAC, the Stanford Linear Accelerator Center, boosts electrons to 50 GeV over a distance of two miles... The Berkeley Lab group and their Oxford collaborators... achieve a 50th of SLAC's beam energy in just one-100,000th of SLAC's length." I doubt that this tech will fit on a table top anytime soon. The article quotes the Berkeley researcher: "We believe we can [get to 10 GB] with an accelerator less than a meter long — although we'll probably need 30 meters' worth of laser path."

Burger King's Disturbing Games 200

Gamespot reports on Burger King's disturbing foray into gaming. From the article: "Finally, Sneak King takes the stealth action genre and puts it to a friendlier use than usual. Instead of tiptoeing behind enemy guards to silently snap their necks, players will sneak up on hungry people to surprise them with offerings of Burger King food. Gamers will have to sneak up on people in a logging yard, a construction site, downtown, and the suburbs, and they will be graded on their performance 'based on how elaborate the delivery is executed.' This is not the King's first visit to the world of gaming. The genuinely off-putting monarch of meat appeared in Electronic Arts' Fight Night Round 3 as an unlockable manager character to accompany your boxer to the ring. " Some screenshots will assist you in understanding how deeply distressing these games are.

The First Robotic Musician 128

eldavojohn writes, "A new robot named Haile (pronounced hi-lee), which 'listens' to what musicians are playing and play along with them, has been developed at the [corrected] Georgia Institute of Technology. There are some videos at the GATech site. From the article: "If the musicians change the beat or rhythm, Haile is right there with them. 'With Haile there are two levels of musical knowledge... The basic level is to teach it to learn to identify music, to imitate,' Weinberg said. 'The higher level is stability of rhythm, to be able to distinguish between similar rhythms. In essence, Haile has the ability to recognize if a rhythm is more chaotic or stable, and can adjust its playing accordingly.' I don't know about the rest of Slashdot, but I can't wait for the day when I have my very own Robo Puente to play along with."

ASUS Guarantees Draft-N Upgradability 58

Glenn Fleishman writes, "One of the most irritating things about draft-n wireless gear being released this year is that there have been no guarantees from any chipmaker or manufacturer that today's devices — loosely based on the IEEE 802.11n Draft 1.0 — will be upgradeable through firmware to the final standard. Several computer makers now bake draft-n adapters into their laptops as an option, which is even more troublesome. Today ASUS, which uses the Broadcom chipset, said that they will swap out hardware if necessary for any draft-n gateways and adapters they ship until the end of 2006. If firmware upgrades aren't enough, they'll replace your hardware, with you paying just the shipping. Of course, they're guaranteeing compatibility with the March 2008 expected ratified version of 802.11n, but it still means that you won't be left with equipment that only works well with itself."

IE Used To Launch Yahoo IM Clickfraud 76

An anonymous reader writes, "There's a new Instant Messaging worm in the wild that is taking the idea of Botnet clickfraud up a level. It trades in automated drones (prone to malfunction and detection) for real live people who (of course) have the option of not actually clicking anything, thus theoretically making their clicks harder to identify as 'fraudulent.' This IM attack doesn't even need a victim to physically run anything to become infected — simply visiting a certain site in Internet Explorer will cause the files to download and start sending infection messages. At this point, their homepage is changed to a site using Mesothelioma (a rare form of cancer) to ring up high-paying results on the perpetrators' Google ads. As the researcher who discovered the infection notes, 'It's way, way harder to trace some random boob who has a ton of (partially) unconnected people shunting IM links all over the place. Try staying anonymous as a Botnet owner who just had the entire details of his server splattered across the net by Shadowserver. What will be interesting to see is if some of the smaller Botnet guys ditch their technical woes and jump on the much-easier-to-maintain IM bandwagon to get their clickfraud kicks.'"

Weakness In Linux Kernel's Binary Format 281

Goodfellas writes, "This document aims to demonstrate a design weakness found in the handling of simply linked lists used to register binary formats handled by the Linux kernel. It affects all the kernel families (2.0/2.2/2.4/2.6), allowing the insertion of infection modules in kernel space that can be used by malicious users to create infection tools, for example rootkits. Proof of concept, details, and proposed solution (in PDF form): English, Spanish.

Slashdot Top Deals