Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:You can reload an M1 Garand mid-clip (Score 2, Insightful) 137

The article doesn't features game with actual weapons like Call of Duty, it instead features weapons that don't actually exist yet as they are portrayed in games. I hope someone else does a comparison with how weapons work in Modern Warfare 2 with their real-life counterparts, kind of like how Top Gear did comparisons with Gran Turismo and real life cars.

Comment Re:Security (Score 2, Insightful) 364

Once upon a time I could have said, have the school buy Apple laptops. Seems that's no longer a deterrent. Oh, I know, how about dumb laptops? They need to be connected to the school's terminal server to provide any applications. Not sure there is such a thing and they are likely more expensive but it would likely make it less interesting for people to steal and also never be obsolete.

Comment Flash means security problems (Score 1) 521

Just about every week we see another major security issue caused by a problem with Flash. Adobe isn't serious about security and doesn't know what to do to fix their products. For example, Javascript should be off by default in Reader, but it isn't. Last quarter something like 80% of serious attacks were through holes in Adobe products and the latest issue is with Downloader. Why allow a company and set of products that have shown themselves to be insecure onto the next generation of device where hackers can steal more personal data, run up changers and the like. Apple is trying to make our mobile devices more reliable and more secure than our PCs. It is time to dump Flash.

Submission + - How to Nurture a Computer Talented 8 Year Old 2

Grampa writes: My grandson is a seven going on 8 year old computer talent. Not only is he fascinated by the computer, but he already helped "fix" a computer issue in his second grade class. I have two questions I'd like the Slashdot community to help me answer: (1) How best to nurture his talent at such a young age? (2) How to protect him from stress injuries inherent in using the keyboard and mouse so much?
Privacy

Submission + - LMSD Response to Webcam Privacy Allegation (tekgoblin.com)

tekgoblin writes: The Lower Merion School District of Pennsylvania was recently accused of privacy invasion per this post. Now the school has released an official response to the allegations. According to the school, the security feature was installed in the laptops as an anti-theft device and was not intended to invade privacy. The software that was installed would take a photo of the person using the laptop after it was stolen to give to the authorities. Now this may be what it was intended for, but it seems that someone did’nt get the memo.

Read the press release below (Source: LMSD.org)

Security

Submission + - How Banker Trojans Steal Millions Every Day (threatpost.com) 1

redsoxh8r writes: Banker trojans have become a serious problem, especially in South America and the U.S. Trojans like Zeus, URLZone and others are the tip of the iceberg. These toolkits are standard-issue weapons for criminals and state-sponsored hackers now. Just like Zeus, URLZone is also created using a toolkit (available in underground markets). What this means is that the buyer of this toolkit can then create customized malware or botnets with different CnCs and configurations but having all the flexibility and power of the original toolkit. Having such a tool kit in the hands of multiple criminal group paints a scary picture. It's simply not enough to eliminate a particular botnet and criminal group to solve this problem.
Security

Submission + - Twitter Hit By BZPharma LOL Phishing Attack (sophos.com)

An anonymous reader writes: Twitter users are being warned not to click on messages saying "lol, this is funny" as they can lead to their account details being stolen.

A widespread attack has hit Twitter this weekend, tricking users into logging into a fake Twitter page — and thus handing their account details over to hackers.

Messages include

Lol. this is me??
lol , this is funny.
ha ha, u look funny on here
Lol. this you??

followed by a link in the form of

http://example/ [dot] com/?rid=http://twitter.verify.bzpharma [dot] net/login

where 'example.com' can vary. Clicking on the link redirects users to the second-half of the link, where the fake login page is hosted.

In a video and blog entry, computer security firm Sophos is warning users that it is not just Twitter direct messages (DMs) that carry the poisoned links, but they are appearing on public profiles due to services such as GroupTweet which republish direct messages.

Sophos also reports that the site being used for the Twitter phishing has also been constructed to steal information from users of the Bebo social network.

Affected users are advised to change their passwords immediately.

Submission + - Android developer being sued by Cequint (threadabort.com) 2

SpiceInvaders writes: The developer of the City Caller ID application for Android is being sued by Ceguint. Apparently "they have a patent on displaying a city name with state on a LCD screen with a limited processor." Doesn't this cover practically every cordless phone? Wonder if their case goes away if you run the application on a core-i7 phone equipped with a OLED screen instead?
Software

Submission + - 6 of the Best Free Linux Disk Cloning Software (linuxlinks.com)

An anonymous reader writes: One of the key responsibilities of a system administrator is to ensure the safety of an organisation's computer data. This is a critical task for any organisation, given that the loss of important data could have profound implications on its future prosperity.

There are a number of different strategies that a system administrator will need to use to ensure that data is preserved. For example, the person will need to maintain the computer system and/or network, by applying operating system updates and patches, by performing regular backups, and ensuring that the system is kept secure at all times. Disk cloning is a highly popular method of performing comprehensive backups of the operating system, installed software, and an organisation's data with the minimum of effort.

However, disk cloning software is not simply helpful for system backups. It has a wide range of other uses such as provisioning new computers in the workplace, restoring computers from a master image, and system recovery.

Read more

Submission + - When do call it quits with Linux? 4

glebovitz writes: The world is going to flash. I am running Linux. The two worlds continue to collide. I can bear with the fact that I can't watch TV on Hulu or Movies on Amazon/VOD. But now I discover my favorite airline, JetBlue is using flash in their on line check in process and I can no longer print my boarding passes. For that, I have to borrow my wife's Macbook. I am against running WIndows 7 on my laptop. So what is left? Buy myself a Macbook? Most of my work these days is done in virtual machines, so VirtualBox and a Macbook is sounding better and better all the time. I don't think Adobe will ever get Flash on Linux right. At least I don't think they will never get the 64 bit version working.

Submission + - How to destroy your community (lwn.net)

mkaehlcke writes: Josh Berkus is well known as a PostgreSQL hacker, but, as it happens, he also picked up some valuable experience during his stint at "The JLaboratory for the Destruction of Communities," otherwise known as Sun Microsystems. That experience has been distilled into a "patented ten-step method" on how to free a project of unwelcome community involvement.

If you are a corporate developer, you're likely to realize early on that free software development communities are a pain. They'll mess up your marketing schemes by, for example, taking the software into countries where you have no presence and no plans. They'll interfere with product roadmaps with unexpected innovation, adding features which you had not planned for the next few years — or, worse, features which were planned for a proprietary version. Free software communities are never satisfied; they are always trying to improve things. They tend to redefine partner and customer relationships, confusing your sales people beyond any help. And they bug you all the time: sending email, expecting you to attend conferences, and so on. Fortunately, there are ways to get rid of this community menace. All that's needed are the following ten steps.

Databases

Submission + - Databases for social networks review (techworld.com)

superapecommando writes: Everyone loves social networks these days. Homeland security wants to track which terrorists know one another. Laundry companies want to know your friends so that they can get you to pass along the good word about the new starch.
At the heart of these problems and dozens of other ideas springing from the forehead of marketing directors everywhere are graph databases. (Computer scientists use the word "graph" to describe collections of objects and the links among them.) Using graph databases instead of traditional relational databases to store social network-type data structures can yield faster answers to important questions, such as what kind of doughnut your friend's friend's friend prefers, or whether someone from your "Labor Day" DVD was in a movie with someone who was in a movie with Kevin Bacon.
I looked at three databases, both graph and relational, that are geared toward social networks: Neo4j, Cassandra, and FluidDB. All three are relatively young but hold promise in helping organisations connect the dots among their user base.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...