Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Science

Aussie Scientists Find Coconut-Carrying Octopus 205

An anonymous reader writes with this excerpt from an AP report: "Australian scientists have discovered an octopus in Indonesia that collects coconut shells for shelter — unusually sophisticated behavior that the researchers believe is the first evidence of tool use in an invertebrate animal. The scientists filmed the veined octopus, Amphioctopus marginatus, selecting halved coconut shells from the sea floor, emptying them out, carrying them under their bodies up to 65 feet (20 meters), and assembling two shells together to make a spherical hiding spot. ... 'I was gobsmacked,' said Finn, a research biologist at the museum who specializes in cephalopods. 'I mean, I've seen a lot of octopuses hiding in shells, but I've never seen one that grabs it up and jogs across the sea floor. I was trying hard not to laugh.'"
Privacy

Submission + - US indicts three for theft of 130 million accounts

ngrier writes: A federal grand jury in Newark, NJ indicted three men today for the theft of over 130 million credit and debit card account numbers. One of the men lives in Miami while the other two live 'in or near Russia'. The Justice Dept is calling this the largest such prosecution in history.

The hackers stole 130 million card numbers from Heartland, a bank-card payment processor, starting in December 2007, by using malicious computer software, according to the 14-page indictment. An undetermined number of card numbers were stolen from 7-Eleven and 4.2 million from Hannaford, a regional supermarket chain, according to the indictment.

We previously discussed the Heartland breach here.

Comment Re:rsync should do the trick (Score 1) 536

You also have to be careful because the IO overhead of Cygwin can become a bottleneck, particularly if using them over mapped network drives. We'd been using cygwin/rsync to do corporate backups of several hundred GB. Time slowly grew to over a day as the backup size increased. Switched to robocopy and it completes in a few hours.

Comment Re:Automated transaction tax (Score 1) 913

Well there is also the other problem: the very wealthy would have no problem executing trades on foreign exchanges. And unless you somehow managed to work with banks to secretly tag all the assets before they flooded out of the country once the new system had been announced, there would be no way to track them.

And, it would probably have the side benefit of getting the government to get its act together to fix social security in the US because this would potentially hit private retirement accounts and plans somewhat hard.

Earth

Ancient Ecosystem Found In Ice Pocket 49

ApharmdB writes "Beneath a glacier in Antarctica, scientists have discovered a community of microbes growing in frigid pools of salty water. It's a particularly tough environment, with no light, no oxygen, and extremely cold temperatures. But the microbes appear to live — and thrive — off a combination of iron and sulfur, according to a new study. The result of that strange metabolism is a brilliant red streak of cascading ice called Blood Falls."

Comment Re:hibernate instead of shutting down... (Score 1) 241

I had problems on Win2000 hibernating repeatedly (though hopefully most folks aren't using 2k any more!). Seems there was a problem with NTFS/MFT/write cache so that fairly reliably after a few months of intermingled shutdowns and hibernates the filesystem would get sufficiently mucked up that it wouldn't boot. Once I stopped hibernating (after the 3rd time or so this happened and I figured it wasn't my dumb luck) I never had the problem again. Thankfully no longer dealing with 2k (though there were many aspects I still prefer to XP).

Comment Well it won't be transportation infrastructure (Score 1) 1026

To be clear, less than 10% of the economic recovery act will be for transportation infrastructure. Much of it is going to school infrastructure and roughly half is proposed to be tax cuts.

The one bright side is that ratio of transit to rail funding would be about 1:3 or better, compared with the 1:4 at best it's enjoyed for many years.

One of the problems is that, despite all the backlog of maintenance, many are concerned that the states will take the money and use it to build new roads willy-nilly without any regard for some of the large-scale planning that many are clamoring for: things such as impacts on energy usage, greenhouse gases, land use, etc.

The Internet

Nationwide Domain Name/Yard Sign Conspiracy 324

robertjmoore writes "Everywhere I go lately, I see these lawn signs that say "Single?" and then give a URL with my town's name in it. Being a huge business intelligence geek with too much time on my hands, I decided to track down who was behind them and wound up uncovering ten thousand domain names, a massively coordinated and well-funded guerilla marketing machine, and the $45 Million revenue business hiding behind it all. Hot off the presses, these are my findings."
Censorship

Debunking the Google Earth Censorship Myth 294

waderoush writes "There's a persistent Web meme to the effect that Google obscures sensitive or top-secret locations in Google Maps and Google Earth at the insistence of national governments. A July IT Security article promoted on Digg, 'Blurred Out: 51 Things You Aren't Allowed to See on Google Maps,' revived this notion. But the article has been widely criticized, and I did some fact-checking this week on the six Boston-area locations mentioned in the IT Security list. As it turns out, not one of the allegedly blurred locations has degraded imagery in Google Maps, as my screen shots demonstrate. My post looks into the sources of the misleading IT Security piece, and of other mistaken rumors about Google Maps."
Security

Submission + - Crooked Exec Wrestles to Retrieve Smoking Laptop

darkreadingman writes: "First-person account of how a penetration testing company caught an executive stealing data from his company. After discovering that the pen testers were making off with his laptop, this executive attacked two security experts, wrestled his laptop away, and tried to delete the incriminating data before the guards arrived. A real lesson in what happens when insiders are caught red-handed, with the smoking gun (or in this case, a smoking laptop) in their hands. http://www.darkreading.com/document.asp?doc_id=117 531&WT.svl=column1_1"

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...