Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Biotech

UK Police Promise Not To Retain DNA Data, But Do Anyway 372

redalien writes "In 2008 I invited two policemen into my home and voluntarily gave them a DNA and fingerprint sample to help with a murder investigation, as they'd promised it would only be used for that investigation. I was never under any suspicion and could just as easily have said no. Almost a year after the investigation closed they have now confirmed that they've retained my samples and at my request have begun an investigation to see if there are sufficient 'exceptional circumstances' to remove them. I'm not the only one who was told samples would be removed, so if you've had such a promise from the police I recommend contacting their data protection registrar immediately."
Earth

Chilean Earthquake Shortened Earth's Day 374

ailnlv writes "Days on Earth just got shorter. The recent earthquake in Chile shifted the planet's axis by about 8 cm and shortened days by 1.26 microseconds 'The changes can be modeled, though they're difficult to detect physically given their small size. ... Some changes may be more obvious, and islands may have shifted. ... Santa Maria Island off the coast near Concepcion, Chile’s second-largest city, may have been raised 2 meters (6 feet) as a result of the latest quake ...'"
Security

Aurora Attack — Resistance Is Futile, Pretty Much 268

eldavojohn writes "Do you have branch offices in China? iSec has published a new report (PDF) outlining the severity of the attacks on Google.cn, allegedly by the Chinese government, dubbed 'Aurora' attacks. Up to 100 companies were victims, and some are speculating that resistance to such attacks is futile. The report lays out the shape of the attacks — which were customized per-company based on installed vulnerable software and antivirus protection: '1. The attacker socially engineers a victim, often in an overseas office, to visit a malicious website. 2. This website uses a browser vulnerability to load custom malware on the initial victim's machine. 3. The malware calls out to a control server, likely identified by a dynamic DNS address. 4. The attacker escalates his privilege on the corporate Windows network, using cached or local administrator credentials. 5. The attacker attempts to access an Active Directory server to obtain the password database, which can be cracked onsite or offsite. 6. The attacker uses cracked credentials to obtain VPN access, or creates a fake user in the VPN access server. 7. At this point, the attack varies based upon the victim. The attacker may steal administrator credentials to access production systems, obtain source code from a source repository, access data hosted at the victim, or explore Intranet sites for valuable intellectual property.' The report also has pages of recommendations as well as lessons learned, which any systems administrator — even those inside the US — should read and take note of."
Government

Another ACTA Leak Discloses Individual Country Data 133

An anonymous reader writes "On the heels of the earlier leak of various country positions on ACTA transparency, today an even bigger leak has hit the Internet. A new European Union document [PDF] prepared several weeks ago canvasses the Internet and Civil Enforcement chapters, disclosing in complete detail the proposals from the US, and the counter-proposals from the EU, Japan, and other ACTA participants. The 44-page document also highlights specific concerns of individual countries on a wide range of issues including ISP liability, anti-circumvention rules, and the scope of the treaty. This is probably the most significant leak to date since it goes beyond the transparency debate to include specific country positions and proposals."
Software

Apple's Trend Away From Tinkering 965

theodp writes "Having cut his programming teeth on an Apple ][e as a ten-year-old, Mark Pilgrim laments that Apple now seems to be doing everything in their power to stop his kids from finding the sense of wonder he did: 'Apple has declared war on the tinkerers of the world. With every software update, the previous generation of "jailbreaks" stop working, and people have to find new ways to break into their own computers. There won't ever be a MacsBug for the iPad. There won't be a ResEdit, or a Copy ][+ sector editor, or an iPad Peeks & Pokes Chart. And that's a real loss. Maybe not to you, but to somebody who doesn't even know it yet.'"
Communications

Pope Urges Priests To Go Forth and Blog 284

Hugh Pickens writes "Pope Benedict XV, whose own presence on the Web has grown in recent years, is urging priests to use all multimedia tools at their disposal to preach the Gospel and to engage in dialogue with people of other religions and cultures. 'The spread of multimedia communications and its rich "menu of options" might make us think it sufficient simply to be present on the Web,' but priests are 'challenged to proclaim the Gospel by employing the latest generation of audiovisual resources,' says the Pope. The message from the Pope, prepared for the World Day of Communications, suggests such possibilities as images, videos, animated features, blogs, and Web sites and adds that young priests should become familiar with new media while still in seminary, though the Pope stresses that the use of new technologies must reflect theological and spiritual principles. Many priests and top prelates already interact with the faithful online, and one of Benedict's advisers has his own Facebook profile. So does the archbishop of Los Angeles. The Pope adds, 'I renew the invitation to make astute use of the unique possibilities offered by modern communications. May the Lord make all of you enthusiastic heralds of the Gospel in the new "agorà" which the current media are opening up.'"
Education

How To Teach a 12-Year-Old To Program? 799

thelordx writes "I've got a much younger brother who I'd like to teach how to program. When I was younger, you'd often start off with something like BASIC or Apple BASIC, maybe move on to Pascal, and eventually get to C and Java. Is something like Pascal still a dominant teaching language? I'd love to get low-level with him, and I firmly believe that C is the best language to eventually learn, but I'm not sure how to get him there. Can anyone recommend a language I can start to teach him that is simple enough to learn quickly, but powerful enough to do interesting things and lead him down a path towards C/C++?"
NASA

Critics Call For NASA TV To "Liven Up" 305

An article in the LA Times calls NASA out for failing to make broadcasts on their dedicated television network as entertaining as they can be. The author, David Ferrell, complains that fascinating subject matter is often fraught with boring commentary and frequent, extended silences, making most people quickly lose interest. Quoting: "Witness one recent segment about the recovery of a Soyuz capsule upon its return to Earth. The dark, bullet-like object landed in the featureless steppes of Kazakhstan, about 50 miles outside the unheard-of town of Arkalyk. Coverage consisted of video shot from an all-terrain vehicle approaching it — mostly soundless footage of tall grass going by — with an occasional word by an unnamed commentator. 'You can see the antenna that deployed shortly after landing,' the commentator said in that deadpan tone shared by scientists and golf announcers. The camera chronicled the tedious extraction of three crew members weakened by spending six months in orbit; they were loaded one by one onto stretchers. 'Again, a rather methodical process,' the commentator noted, as if grasping for something — anything — to say. Later: 'The official landing time has been revised to 1:15 and 34 seconds a.m., Central Time. The official time was recorded at the Russian Mission Control Center . . . by the Russian flight-control team.' ... Where is Carl Sagan when you need him?"

Comment Thievery (Score 1) 346

When I played Oblivion on my roommates XBox 360, I started out following the story for a while, but after completing several quests I got bored and made it my personal undertaking to steal all the silver longswords from all the guards in the Imperial City and pile them by one of the gates. It became especially amusing when you would anger a guard in the city, as none of them had anything left to beat you down with but their two fists.
The Internet

Harvard Study Questions "Long Tail" Theory 177

mjasay writes "Remember 'the long tail?' That was the idea that there was gobs of money to be made in the more obscure tastes of any given market, enabled by the web. In recent research highlighted in the Harvard Business Review, however, the long tail theory comes under withering criticism. Not only is a hits-based business more profitable for vendors according to the new research, but the research suggests that consumers also derive more enjoyment from the hits, rather than the tail. In short, the researchers find that 'the tail is long and flat, and therefore that content providers will find it hard to profit much from it.'" Long Tail advocate Chris Anderson defends his theory, and it seems that most of the debate centers around how you define "head" and "tail."
Biotech

Scientists Create Synthesized DNA Bases 125

Iddo Genuth writes to tell us that researchers at the Scripps Research Institute in San Diego have created two artificial DNA bases in an effort to "expand biology's potential." "In the future, [chemist Floyd] Romesberg envisions manipulating the genetic code of bacteria in order to assemble better drugs or even man-made proteins. Until now, the bases only work in bacteria, so human augmentation is currently not possible. Another option is to use alpha and beta to help construct nanomachines to be used for drug delivery. 'This is like jumping from the Stone Age to the Bronze Age,' Romesberg says. 'It takes time to figure out how best to use metal.'" Update 18:10 GMT by SM: Roger writes to share the NewScientist link with a bit more information. There is also the original release text for consideration.
Mozilla

Firefox 3 Already Rules the Roost 591

Barence writes in with a data point on Firefox 3 adoption: it's been available for 10 days, and already one site is seeing 55% of its Firefox-using visitors on version 3. "Microsoft still has three out of ten people running an old version of its browser more than 18 months after Internet Explorer 7 launched, while Firefox has converted more than half of its users to the latest version in just over a week. That should set a few alarm bells ringing in Redmond."
Security

Gaining System-Level Access To Vista 412

An anonymous reader writes "This video shows a method by which a user can use a Linux distro called BackTrack to gain system access to Windows Vista without logging into Windows or knowing the username or password for any accounts. To accomplish this, the user renames cmd.exe to Utilman.exe — this is the program that brings up the Accessibility options for users without sight or with limited vision. The attack takes advantage of the fact that the Utility Manager can be invoked before the user logs into the system. The user gains System access, which is a level higher than Administrator. The person who discovered this security hole claims that XP, 2000, 2003 and NT are not vulnerable to it; only Windows Vista is."
Mozilla

Mozilla Dev Team On Firefox's Success 184

Titus Germanicus writes "If you're thinking about open sourcing a project in the near future, Mozilla might be the perfect blueprint to follow. At last week's Mesh 2008 conference in Canada, Mike Shaver, chief technology evangelist and founding member at Mozilla, and John Resig, a JavaScript evangelist at Mozilla — two of the key figures behind the success of Mozilla's Firefox Web browser — listed inclusivity and transparency as two of the top cornerstones of any community-built project. Shaver said in this interview that because the Web is intended for everybody, the level same openness should be shared with Firefox's open source contributors."
Hardware Hacking

Unofficial Homebrew Channel For the Wii 150

marcan writes "The Homebrew Channel is a tool that can be installed on any Wii (no hardware mods required) that lets you run unsigned homebrew software from an SD card, or upload executables via WiFi or a USBGecko. We've tried to make it friendly for users with a simple GUI, and powerful for developers with direct upload features and reloading which we hope will make testing less painful. The channel can be installed using a DVD if you have a modchip, or using an exploit in Zelda: Twilight Princess which only requires an SD card (or any future hack or booting method). Once installed, it simply shows up as a Channel on the Wii Menu, just like any official channel. Hopefully, this and other recent developments (such as the upcoming devkitPPC r15 toolchain, much improved and with many bugs fixed) will help make the Wii an appealing platform for DIY software. And yes, it also runs Linux."

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...