Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Android

Submission + - Android security practices? 1

Soft writes: Smartphone security recommendations seem to boil down to Windows-like practices: install an antivirus, run updates, and don't execute apps from untrusted sources. On my own computers, running Linux, I choose to only install (signed) packages from the distribution's or well-known repositories, or programs I can check and compile myself, or run them as a dedicated user--and I don't bother with an antivirus.

What rules should I adopt on my soon-to-be-bought Android device? Can I use it purely with open-source apps and still make the most of it? Are Android's fine-grained permissions (accessing the network, contacts...) reliable? Can apps be trusted not to scan your files and keyboard for passwords and emails? What precautions do security-conscious Slashdotters take to keep control of their phones?
Security

Submission + - EduHookUps.com Rebooting, Security an Issue (edenfantasys.com) 1

jabberwock writes: "EduHookUps.com, a sex-dating site started at the University of Chicago that has been spreading to campuses across the U.S. since March, is under new management and will effectively be starting over. News on the site indicates that the site, which has prided itself on providing anonymity, may not have been secure. “ all user data generated to date (posts, private messages, etc.) will be reset in the interest of privacy and security. The registration system will be re-enabled, and all current members will need to re-register.” SexIs magazine reports that the domain name was sold for $1,000."
Iphone

Submission + - iPhone Explosion: 5M iOS Games Downloaded Per Day (industrygamers.com)

donniebaseball23 writes: iPhone gaming has certainly accelerated in the last year or so, and iOS in general has seen a boost from iPod Touch and iPad as well. The numbers are impressive, as new research from Newzoo and Distimo (an App Store analytics firm) shows that games now represent the largest single App-category on Apple App Stores, and account for half of the downloads of both free and paid Apps. Newzoo said that more than five million games were downloaded per day in the U.S. and six major European territories combined during March 2011. There are 63 million iOS gamers in these countries who downloaded an average of 2.5 games per month.
Open Source

Submission + - Teagueduino: Arduino without the soldering (teague.com)

An anonymous reader writes: Teagueduino makes Arduino a whole lot easier.

1. There's no soldering required. Inputs and outputs simply snap into place.
2. Realtime programming and feedback shows the effects of changes as they are made.
3. Simple, always-valid code creation means programs always runs (coding by dropdown menus).

And of course, Teagueduino is completely open source.

Nintendo

Submission + - Gameboy Color And Linux Emulated in JavaScript (conceivablytech.com)

An anonymous reader writes: Nintendo's Gameboy Color may never have been better: You can now play Gameboy games in your web browser and on some smartphones. You can run Linux as well: a French developer emulates Linux (2.6.20 kernel) complete with a 32-bit x86 CPU, an interrupt controller, interrupt timer as well as serial interface — all within 90 KB.
Education

Submission + - Woz, Chambers, Ballmer deliver commencement talks (networkworld.com) 1

alphadogg writes: So far this month Cisco CEO John Chambers has delivered a commencement speech at Duke, while Apple co-founder Steve Wozniak did the same at Michigan State and Microsoft CEO Steve Ballmer did likewise at USC. They were among a slew of tech bigshots in demand at 2011 commencement ceremonies. Among Chambers' advice: Go to the bathroom before you make important decisions. The Woz advised being nice to people to get anywhere in life, and that once a jerk, always a jerk...(videos)
Botnet

Submission + - Coreflood Botnet Shows How ISPs are Clueless (securityweek.com)

wiredmikey writes: Internet Service Providers are maintaining environments in which malicious networks can thrive.

For Example — Coreflood is one of the oldest botnets in operation. It has gained fame due to the intervention the Justice Department recently took to seize control of the expansive botnet. But its impact has been documented for years in various exploits resulting in millions of infected computers and unique bots, stolen banking, credit card, email, and social site passwords.

Coreflood was able to operate continuously due to the lack of accountability of Service Providers and lack of visibility into their networks.

The FBI complaint lists some of the major ISPs that the botnet operators used in their C&C (Command and Control) infrastructure, including: 2 ASNs (Autonomous Systems), 24 domain names (60, including tertiary), 15 DNS Providers, and 18 Registrars.

This information is knowable and can be managed and secured. It’s well past time for ISP scorecards.....[CONTINUED]

Submission + - NSA CS man: My algorithm was 'twisted' by Bush (newyorker.com)

decora writes: "Crypto-mathematician Bill Binney worked in the Signals Intelligence Automation Research Center at the NSA. There, he worked on NSA's ThinThread program; a way to monitor the flood of internet data from outside the US while protecting the privacy of US citizens. In a new interview with Jane Mayer, he says his program "Got twisted. . . I should apologize to the American people. It's violated everyone's rights. It can be used to eavesdrop on the whole world. . . . my people were brought in, and they told me, 'Can you believe they're doing this? They're getting billing records on U.S. citizens! They're putting pen registers on everyone in the country!'""
Security

Submission + - US Congress Tries to Cut Body Scanner Funding (epic.org) 1

OverTheGeicoE writes: The Electronic Privacy Information Center reports that the US House of Representatives is trying to cut funding for new airport body scanners from next year's budget. This would prevent TSA from installing 275 new scanners in airports in FY 2012, at a cost of $76 million.
Education

Submission + - The Finch - saves computer education? (i-programmer.info)

mikejuk writes: The Finch is a $99 robot created by researchers at Carnegie Mellon University that attempts to make programming look like having fun. It has lots of sensors, sound, LEDs in its "beak" and can be programmed in Java and a growing range of other languages.
Is is stylish enough to be attractive?
To my eye at least, the Finch just doesn't quite look cool enough. It has the air of a baby's toy rather than an iPhone. That said at $99 I want to play with one...

Networking

Submission + - How Windows 7 knows about your internet connection (superuser.com) 1

An anonymous reader writes: In Windows 7, any time you connect to a network, Windows tells you if you have full internet access or just a local network connection. It also knows if a WiFi access point requires in-browser authentication. How? It turns out, a service automatically requests a file from a Microsoft website every time you connect to any network, and the result of this attempt tells it whether the connection is successful. This feature is useful, but some may have privacy concerns with sending their IP address to Microsoft (which the site logs, according to documentation) every single time they connect to the internet. As it turns out, not only can you disable the service, you can even tell it to check your own server instead.
The Courts

Submission + - Court Denies Opposition to P2P Subpoenas (uscourts.gov)

ShannonBrown writes: In a Memorandum Opinion, the United States District Court for the District of Columbia denied all 119 persons opposing the release of personally identifying information by ISPs. The motions were filed by persons who apparently received notices from their respective ISPs indicating that the ISP was subpoenaed for identifying information based on the IP address purportedly assigned to the individual by the ISP. The plaintiff, Voltage Pictures, alleges that the IP addresses were implicated in BitTorrent P2P file sharing of copyrighted material.

The court denied all motions including motions to quash the subpoenas, lack of personal jurisdiction claims, motions to dismiss, protective orders, etc. In general, the court stated that such motions are premature. This gets legally technical, but essentially, the subpoenas for additional information are aimed at the ISP and not the individual persons who apparently filed the motions at issue in this opinion. Thus, according to the court, since the persons are not yet named parties (they are legally unidentified as Does), and thus cannot oppose the release of their personally identifying information at this time. Thus, the persons apparently need to wait until identified and then take action.

Two notes:
1) The opinion relies, in part, on the claim that BitTorrent is a unique type of P2P file sharing by being a distributed file share, and thus all purported defendants are properly part of the potential claims for copyright infringement. Moreover, the opinion apparently assumes, without discussion, that the identified IP address equals a specific person/infringer.
2) The opinion lists the names of many of the persons who opposed the subpoenas.

   

Displays

Submission + - 3D-like Algorithm Sidesteps Glasses (smartertechnology.com)

An anonymous reader writes: Paul Darbee, the inventor of the universal remote control, has a new technology that he says will become just as wideapread--an algorithm that converts normal images into 'almost' 3D. Later this summer his new company, DarbeeVision, will be marketing an HDMI cable with an Alterna FPGA inside that OEMs can use to evaluate the automatic 2D-to-3D (like) conversion. Its not true 3D, but looks almost as good without requiring a special display or the dorky glasses :)

Slashdot Top Deals

Happiness is twin floppies.

Working...