Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy

Submission + - Cameras Help Cops Capture Cold-blooded Killer

CrazedWalrus writes: Philadelphia police recently captured a serial killer using a combination of Homeland Security and private surveillance cameras. Police pieced together relevant video from twelve different cameras, and eventually were able to identify the murderer. Once caught, he confessed to several other murders spanning the past eight years. Without these cameras, this killer would probably be lurking the streets of Philadelphia today. With results like that, is there really a good basis for argument against these cameras?
Microsoft

Submission + - A Microsoft-speak timeline: From Altair to Zune

netbuzz writes: "No company has had more to say about software over the past 30 years than Microsoft (for better or worse). How they've said it — the actual language used — reveals a lot about the company's evolution and is the focus of a new timeline-like "tag cloud" provided by the Seattle P-I. In addition to analyzing the linguistics of about 90 documents, there are also links to such gems as Bill Gates' Playboy interview and his famous "Open Letters to Hobbyists."

Blog item about it:
http://www.networkworld.com/community/?q=node/1017 7

Link to P-I tool:
http://blog.seattlepi.nwsource.com/microsoft/tags/ "
Music

Submission + - Apple's New Ipod Pea

An anonymous reader writes: With the new iPod Pea, Apple has finally managed to reduce their popular MP3 player to a size that barely accommodates its own headphone jack.
XBox (Games)

Submission + - Microsoft's Xbox 360 to Run Linux Soon?

An anonymous reader writes: In a very short presentation during the Lightning Talks at the 23rd Chaos Communication Congress in Germany an anonymous masked 'hacker' showed what could be an exploit in Microsoft's new console that will allow to boot Linux or other unsigned code. After booting and loading a game of King Kong the Xbox 360 displayed a logo of Xbox360, Tux and the old MacOS with the words "coming soon...". His retail 'Core' Xbox360 unit has a small custom PCB hanging out of the case and he's using a Apple Macbook pro to proceed with his hack. Discussions on community sites suggest he might have found an exploit in the vector shaders of King Kong which aren't signed or checked for validity by the Xbox 360.
Mozilla

Submission + - Open formats save the day

Amnl4ixoye writes: "This evening, I had the unfortunate experience of shift-deleting my entire Inbox for one of my accounts in Thunderbird. However, thanks in part to their openness of formats and standards, I was able to save the day by making some simple changes. Thank you open and clear formats!"
It's funny.  Laugh.

Submission + - UFO Above Chicago O'Hare International Airport

Aglassis writes: On Nov 7, 2006 at about 4:30 p.m. several United Airlines employees including several pilots observed a 6 to 24 ft diameter flying saucer-like object above Chicago's O'Hare International Airport. After hovering for several minutes without displaying any lights it then shot straight up and punched a hole in the 1,900 ft cloud ceiling. No explanation has been given nor did the air traffic control tower detect the purported craft on radar. One controller did note that "to fly 7 million light years to O'Hare and then have to turn around and go home because your gate was occupied is simply unacceptable."
Security

Submission + - QuickTime Exploit Kicks Off Month of Apple Bugs

An anonymous reader writes: A previously undocumented security hole in Apple's QuickTime media player could expose Windows and Mac users alike to having unwanted software installed on their machines if they view a specially-crafted streaming media file, according to the first entry over at the controversial Month of Apple Bugs project. The problem apparently resides in the way QuickTime handles URLs that begin with "rtsp://". The Washington Post's Security Fix blog notes that while Safari and Internet Explorer will happily load such links, Firefox 2.0 does not. From the piece: "If the advisory is correct, this vulnerability does not strictly rely on tricking the would-be victim into clicking on a maliciously-crafted hyperlink. The exploit could be inserted into a video embedded in a Web page, one that loads automatically when the user visits the site. It also can be invoked inside of Macromedia Flash code or through Javascript commands.

Slashdot Top Deals

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...