Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Encryption

Submission + - Tools Released at Def Con Cracks PPTP Encryption in under a day (paritynews.com)

hypnosec writes: Defcon is seeing some amazing hacking revelations, the latest one being a new tool that is capable of decrypting any PPTP and WPA2 wireless that use MS-CHAPv2 authentication mechanism. The two tools, ChapCrack developed by Moxie Marlinspike and CloudCracker.com that runs on FPGA cracking box developed by David Hulton of Pico Computing can be used together to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use MS-CHAPv2 for authentication.
Linux

Submission + - ScummVM 1.5.0 "Picnic Basket" Released (scummvm.org)

YokimaSun writes: "Fans of classic graphical point-and-click adventure games, will be happy to learn that a new version of ScummVM has been released with support for new games such as Once Upon A Time: Little Red Riding Hood, Backyard Baseball 2003, Blue Force, Darby the Dragon, Dreamweb, Geisha, Gregory and the Hot Air Balloon, Magic Tales: Liam Finds a Story and more. ScummVM not only supports Windows, Linux and new platforms such as iPhone and Android but also consoles such as Dreamcast, Gamecube and Nintendo 64 and rarer handhelds such as Openpandora and Dingoo."
Security

Submission + - JavaScript Botnet Sheds Light on Criminal Activity (darkreading.com)

CowboyRobot writes: "Informatica64, a security research group, demonstrated the use of cached JavaScript to control computers connecting to a malicious proxy.
"The researchers found a variety of low-level criminals using their proxy server: fraudsters posing as British immigration officials offering work permits in hopes of stealing money and sensitive documents from their victims; a man pretending to be a pretty woman on a number of dating sites to con victims into sending money for a plane ticket; and another fraudster selling nonexistent Yorkshire Terriers.""

Games

Submission + - GameStop Wants To Sell Secondhand Digital Download Video Games (hothardware.com)

MojoKid writes: "GameStop makes a killing selling used videogames, but what happens to that business model when digital distribution platforms run physical media out of town? That's not anything to worry about today, tomorrow, next week, or even next year, but at some point, GameStop will have to deal with the direction the games industry is headed, and it may already have a solution. GameStop CEO Paul Raines recently brought up the possibility of reselling used digital downloads."
Facebook

Submission + - Facebook Abstainers could be labeled Suspicious 2

bs0d3 writes: According to this article printed in tagesspiegel.de, not having a facebook account should be the first sign that you are a mass murderer. As examples they use Norwegian shooter Anders Breivik, who used myspace instead of facebook and the newer Aurora shooter who used adultfriendfinder instead of facebook. They already consider those with facebook accounts, who lack friends to be suspicious, but now they are suggesting that anyone who abstains from facebook altogether may be even more suspicious. While it is already established that sites like facebook and google+ are no good for political activists, abuse survivors, and people in the witness protection program; abuse survivors will have to take a back seat while more and more insane articles like this come out. This line of thinking could sure help facebook's stock value.
Android

Submission + - Apple v. Samsung: Surprising Reveals in Latest Court Documents (wired.com)

Nerdfest writes: "The lawyers behind the upcoming Apple v. Samsung trial have been hard at work filing docket after docket as their court battle looms closer, and many of those dockets have just been released to the public. We’re now seeing a lot of previously secret information about the early days of iPhone and iPad R&D, and what’s happened behind closed doors at both Apple and Samsung."

Surprises include the iPhone design being 'inspired' by Sony product ideas, and that Samsung was warned that it was copying Apple.

Cellphones

Submission + - Fighting the iCrime Wave

theodp writes: 'What's the point of a mobile device,' asks WSJ reporter and iPad-beatdown-victim Rolfe Winkler, 'if people don't feel safe using it while they're mobile?' A lucrative secondhand market for today's electronics devices — a used iPad or iPhone can fetch $400+ — has produced an explosion in 'Apple picking' by thieves. So, how big is the iCrime wave? In New York City alone, there were more than 26,000 incidents of electronics theft in the first 10 months of 2011 — 81% involving mobile phones — according to an internal NYPD document. And plenty of the crimes are violent. The best way to deter theft is to reduce the value of stolen device — the wireless industry is moving to adopt a national registry that would deny service to such devices. A remote kill switch has been discussed as another approach. For its part, Apple says the company 'has led the industry in helping customers protect their lost or stolen devices,' although some are unimpressed. Could the estimated $575 in profit per iOS device be part of the problem?"

Submission + - 6 IT Projects are $8 Billion Over Budget at the Dept of Defense (federaltimes.com)

McGruber writes: The Federal Times has the stunning but not surprising news (http://www.federaltimes.com/article/20120723/DEPARTMENTS01/307230001/At-DoD-6-projects-8-billion-over-budget) that a new audit has found that Six Defense Department modernization projects are a combined $8 Billion — or 110 percent — over budget. The projects are also suffering from years-long schedule delays.

In 1998, work began on the Army’s Logistics Modernization Program (LMP). In April 2010, the General Accounting Office (GAO) issued their report "Actions Needed to Improve Implementation of the Army Logistics Modernization Program" (http://www.gao.gov/products/GAO-10-461) about the status of LMP. LMP is now scheduled to be fully deployed in September 2016, 12 years later than originally scheduled, and 18 years after development first began! (Development of the often-maligned Duke Nukem Forever (http://en.wikipedia.org/wiki/Duke_Nukem_Forever) only took 15 years.)

Prime contractors Computer Sciences Corp, Accenture, IBM and CACI obviously have learned the "If you're not a part of the solution, there's good money to be made in prolonging the problem" lesson! (http://www.despair.com/consulting.html)

Games

Submission + - Games could predict whether you're color blind, a gambler, or have ADD (venturebeat.com)

An anonymous reader writes: Lukasz Twardowski, a young Polish entrepreneur, recently made an unexpected discovery. By analyzing data from video games, he thinks he’ll be able to predict whether players are color blind, have Alzheimer’s disease, or suffer from various learning and development disorders. He can already use this data to tell whether players are gamblers, cheaters, or minors, so the profiling of medical conditions is not that distant, Twardowski claims.

“Games are the richest and the most meaningful form of human computer interaction,” said Twardowski in an interview with VentureBeat. “We can use [them] to build a full user behavioral profile.”

Encryption

Submission + - Sudoku Inspired Algorithm used for Encrypting Images (paritynews.com)

hypnosec writes: Sudoku puzzles, solved the world over by millions of users every day, have managed to grab attention of mathematicians allowing them to use the underlying mathematics as a means for scrambling or encrypting images. Yue Wu at Tufts University in Medford along with a couple of friends has used Sudoku’s 9x9 grid to formulate a completely new type of matrix mathematics. For readers who are not so mathematics savvy, a matrix is a rectangular array of numbers wherein each element can uniquely identified by its row and column number – in other words, its grid reference. As Sudoku is the reference for new technique, according to Wu and co it is possible to identify elements in an array such that each of the elements contains a digit from 1 to 9 and that it satisfies the rules of Sudoku. This means that each element can now be identified by a row reference, a column reference and a digit. According to the team there are a total of six different ways of representing each element according to Wu. Through the use of simple mathematical functions [PDF], the co-ordinates in one system can be converted to that of the other. When we consider encryption, these simple conversion functions are the key to scrambling images. So, how to go about it? One can start with an image made up of 9x9 pixels. Next, superimpose a Sudoku solution onto this grid such that each of the pixels can now be represented by the new coordinate systems. Now using any one of the conversion functions swap the position of pixels. This will effectively scramble the image.
Businesses

Submission + - Mark Zuckerberg's Big Facebook Mistake

Hugh Pickens writes writes: "Nathan Vardi writes in Forbes that in the last two months, Mark Zuckerberg has had a rude introduction to the capital markets and with Facebook’s stock in free-fall, down more than 40% from its IPO price, Zuckerberg has a big problem. "Zuckerberg did not want to deal with the pressures of being a public company. Like many entrepreneurs these days he viewed the capital markets with suspicion," writes Vardi. "So Zuckerberg made a fateful decision, he decided to keep Facebook a privately-held company for much longer than other success stories like Google or Amazon." But waiting eight years to conduct an IPO has turned out to be an impossible problem to manage. The bankers at Morgan Stanley applied all the lessons of the last 15 years and priced the IPO at $38, which was very aggressive, in an attempt to avoid leaving any money on the table and the embarrassment that a huge IPO pop would represent. With such a big valuation at IPO time, Facebook had to show some results but the numbers that Facebook announced in its first quarterly earnings report were underwhelming and the trading hordes drove Facebook’s stock down by 15% in Friday morning trading. Now the early institutional investors are heading for the exits and it's hard to imagine morale at Facebook won’t take a hit that correlates with the loss in value of the shares belonging to the employees. "The lesson of the Facebook fiasco for Silicon Valley is clear. Start-up entrepreneurs cannot evade the discipline of the capital markets any more than can the prime ministers of Spain and Italy.""
Google

Submission + - Google didn't delete all Street View Wi-Fi data (pcpro.co.uk)

nk497 writes: "Google is in more trouble over the Street View Wi-Fi data slurping incident. Two years ago Google admitted it had collected snippets of personal data while sniffing for Wi-Fi connections. The UK's data watchdog, the ICO, didn't fine Google, but did demand it delete the collected data. Following the FCC's investigation, the ICO double-checked with Google that the data was deleted, receiving confirmation that it had. Except... it hadn't all been deleted, Google has now admitted. That breaches the deal between the ICO and Google, and the watchdog has said it's in talks with other regulators about what to do next."
Medicine

Submission + - Two more men with HIV now virus-free (msn.com)

Diggester writes: Two men unlucky enough to get both HIV and cancer have been seemingly cleared of the virus, raising hope that science may yet find a way to cure for the infection that causes AIDS, 30 years into the epidemic.

The researchers are cautious in declaring the two men cured, but more than two years after receiving bone marrow transplants, HIV can't be detected anywhere in their bodies. These two new cases are reminiscent of the so-called "Berlin patient," the only person known to have been cured of infection from the human immunodeficiency virus.

Comment In the Archival Trenches... (Score 5, Informative) 186

As a professional historian who has worked in the National Archives in College Park, MD and at four different presidential libraries, which incidentally are also managed by NARA, I need to interject that this is an immense costly but valuable project.

Remember "the warehouse" from the Indiana Jones movies? NARA is a little like that in terms of size but are better organized. Aisle upon aisle, shelf upon shelf, row upon row, room upon room, floor upon floor, building upon building of neatly indexed banker's boxes with labelled folders of documents. The labels may have been checked by the archivists at NARA, but they may also simply be the labels affixed to the records by the source federal agency. The individual documents in folders are almost never labelled. In the course of my work, I gathered 30k digital pictures of documents over the course of two months. The acquisition process sounds deceptively easy. Look in the index, find key words and request boxes from the archivist. Then you look through folders to locate individual documents. In point of fact, I probably visually scanned 3M pages to see if they were "interesting" and photo worthy for future research, usually taking only a few seconds per page to make a snap judgement. My decisions on which boxes of documents to request were far more time consuming. What is the right keyword for talking about computers in government in 1970? If you said "information automation" then you would be right. A few presidential (Ford especially) libraries have updated electronic files for indexing which is a huge advantage.

On my trips to the archives, it was interesting to see both professionals and amateurs using a range of technologies. I saw really old school researchers using 3x5 note cards and taking notes on legal pads. They sometimes supplemented their work by photocopying really important documents at $.75/copy. Some researchers avoided this cost by using flat bed scanners which they carried in with them. Still other researchers brought in high end digital cameras and tripods. I used a digital camera freehanded. All of these people still need to find a way to actually get to physical proximity with the records. Digitalization would open up a new era in research.

On the metadata issue, most of these records already have copious amounts of metadata recorded in well-established fields that are used by NARA.

On the OCR issue, some documents have hand-written notes on them which would not be machine readable and sometimes are not human readable. It is likely that the documents will have to be digitally scanned and flagged if handwriting is detected.

Making these records available to the general public would be a huge advantage to anyone interested in government and US history. Come to think of it, in terms of size and complexity, it would be a worthy challenge for Google. U.S. government documents run back to the founding of the country and the number of documents only increases over time.

Government

Iran Launches Cyber-Police Units 45

Khopesh writes "Iran is implementing a cyber police force to combat social networks and similar sources of 'espionage and riots.' This will likely result in more control over internet access than efforts that might hinder attacks like Stuxnet. 'Ahmadi Moghaddam said that Iran's cyber police will take on the "anti-revolutionary" dissident groups that used online social networks to organize protests against President Mahmoud Ahmadinejad following disputed elections held in 2009. "Through these very social networks in our country, anti-revolutionary groups and dissidents found each other and contacted foreign countries and triggered riots," said Ahmadi Moghaddam, referring to the protests that took place at the time.'"

Slashdot Top Deals

"You tweachewous miscweant!" -- Elmer Fudd

Working...