Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition (nist.gov)

dsinc writes: The National Institute of Standards and Technology (NIST) today announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security.

The winning algorithm, Keccak (pronounced “catch-ack”), was created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors. The team’s entry beat out 63 other submissions that NIST received after its open call for candidate algorithms in 2007, when it was thought that SHA-2, the standard secure hash algorithm, might be threatened. Keccak will now become NIST’s SHA-3 hash algorithm.

Science

Submission + - Super Bacteria Creates Gold (sciencedaily.com)

SchrodingerZ writes: "With the price of gold skyrocketing in today's market, Michigan State University researchers have discovered a bacterium that can withstand high toxicity levels that are necessary to create natural gold. ''Microbial alchemy is what we're doing — transforming gold from something that has no value into a solid, precious metal that's valuable,' said Kazem Kashefi, assistant professor of microbiology and molecular genetics.' The bacteria is Cupriavidus metallidurans ; which is conditioned to be tolerant to heavy, toxic metals and be 25 times strong than most bacteria. When put into Gold-chloride (a natural forming toxic liquid), the bacteria reproduces and converts the liquid into a gold nugget. The complete process takes about a week to preform. This experiment is currently on tour as an art exhibit called 'The Great Work of the Metal Lover .'"

Comment Not a big surprise (Score 1) 497

Like other people already said before me, Hotmail NEVER accepted passwords longer than 16 characters. It would simply truncate it in silence. This is really a crap security policy and is notoriously known to be one of the worst security practices ever for password storage. Giving everyone awareness of the max password length, sounds to me like they REALLY want people to stop thinking of Hotmail is the place to be... I mean, think about it... technically, all this does is it makes Hotmail sound outdated and insecure. This might just be one more step they are taking towards forcing users to migrate to their new Outlook.com mail service.
GNOME

Submission + - Gnome Favour Of Ubuntu Confirmed, Coming This October (muktware.com) 1

sfcrazy writes: Jeremy Bicha of Ubuntu has confirmed to this site that they are in fact working on a Gnome version of Ubuntu. However, there was some issues about the name between the Gnome foundation and Ubuntu teams. Gnome Foundation did not want Ubuntu to use the name GNOMEbuntu for the flavour. Jeremy also confirmed that they wilk try to keep it as pure as possible.

Submission + - World record as message in bottle found after 98 years near Shetland (bbc.co.uk)

An anonymous reader writes: 'The drift bottle — containing a postcard which promised a reward of six pence to the finder — was released in June 1914 by Captain CH Brown of the Glasgow School of Navigation.

It was in a batch of 1,890 scientific research bottles which were specially designed to sink to help map the currents of the seas around Scotland when they were returned. Only 315 of them have been found.'

Network

Submission + - Where to report script kiddies and other system attacks 3

tomscott writes: So I've been using using Linux for over ten years now and I'm sure like most Linux users I've got SSH running on my box and port 22 open on my cable modem so that I can access my system no matter where I am. Over the years I've seen people try to gain access to my system but knock on wood I've never had a breach. What I am wondering is there a website where I can report these attempts and even supply the details of where the break-in attempt originated from?

Comment Do they use the word "cookies" (Score 1) 208

Creating laws specific to the technology at hand seems like a complete nonsense to me. Today we use cookies in plain text headers of HTTP. Who knows what's going to be used as a standard in the future! If they use something else other than cookies, then it's OK to be tracked according to this law?

Comment Re:Implied consent is now ok (Score 1) 208

"and the user has a good understanding of what cookies are and how they are used" That just means anyone without some sort of official academic degree on (like computer science or any IT course) can legally claim in court he has no knowledge of what cookies are or how they are used. If you're not an expert on the technology used, you have no obligation to assess anything about how it works.

Comment Let's get real (Score 2, Insightful) 527

Sorry to hear about your situation, but you must be certain that death is an inevitable part of life. It is certainly sad that some people may go away earlier than expected, and we have this notion that a person may somewhat "live a while longer" as we keep their memories alive with us. After a loved one dies, mourning certainly is an important period to help us get over this fact. No matter how many pictures, videos or journals you make of a person while he/she is alive, nothing will replace the fact that this person is really gone. Fading memories are part of an essential process where we leave them behind and move on with our lives. We will certainly remember and honor our loved ones at their best and most marking moments. But holding on to so many specific details about their lives takes an incredible unnatural effort. The longer we try, the more difficult it becomes to remember specific details. And this is natural! The more we strongly hold on to a person after he/she is gone, the more difficult it will become to keep living. Please, don't understand me wrong. Unfortunately, that's how life goes on. It's hard, but inevitable. I hope you make the best or your time together. And my suggestion is "stop trying to record every detail of her life and spent more time with her as a family". Your own memories of this time together should be well enough to help you get over the hard period when she's gone. In the future, when you look back, anything else will just make you seem like "the guy behind the camera".
Windows

Behind the 4GB Memory Limit In 32-Bit Windows 756

An anonymous reader points us to a very detailed post by Geoff Chappell, first put up early this year, explaining how the 4GB memory limit commonly bandied about for 32-bit Windows (he is writing mainly about Vista) is more of a licensing preference than an architectural limit. The article outlines how Chappell unlocked his system to use all the memory that is present, but cautions that such hackery is ill-advised for several reasons, including legal ones. "If you want [to be able to use more than 4GB in Vista] without contrivance, then pester Microsoft for an upgrade of the license data or at least for a credible, detailed reasoning of its policy for licensing your use of your computer's memory. ... [C]onsider Windows Server 2008. For the loader and kernel in Windows Vista SP1 (and, by the way, for the overwhelming majority of all executables), the corresponding executable in Windows Server 2008 is exactly the same, byte for byte. Yet Microsoft sells 32-bit Windows Server 2008 for use with as much as 64GB of memory. Does Microsoft really mean to say that when it re-badges these same executables as Windows Vista SP1, they suddenly acquire an architectural limit of 4GB? Or is it that a driver for Windows Server 2008 is safe for using with memory above 4GB as long as you don't let it interact with the identical executables from Windows Vista SP1?"

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...