Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Red Hat Software

Submission + - User space memory access from the Linux kernel

IndioMan writes: As the kernel and user space exist in different virtual address spaces, there are special considerations for moving data between them. Explore the ideas behind virtual address spaces and the kernel APIs for data movement to and from user space, and learn some of the other mapping techniques used to map memory.

Submission + - anonymous web browsing (anonymizer.com)

An anonymous reader writes: In light of the story just posed about the ISP owner that fought the FBI, I think it makes sense to ask the /. crown what is the best method/service to use to anonymize your web browsing.

Submission + - Google Warns The Pirate Bay is a Malicious Site

An anonymous reader writes: Slyck news is reporting that Google is warning users that The Pirate Bay is a malicious site. If you do a search on The Pirate Bay, it gives you the following warning:

Of the 1136 pages we tested on the site over the past 90 days, 2 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2010-08-12, and the last time suspicious content was found on this site was on 2010-08-12.
Games

Submission + - In game behavior a small subset of possibilities (blogspot.com) 1

derek_farn writes: "A group of physics grad students at Cornell have found that some players of a game with over 10^100 combinations can successfully predict the behavior of other players well enough to beat the majority of them. With such a huge number of possibilities it is surprising that people use such a small number of playing strategies.

Colonel Blotto is a game in which players assign soldiers to fields. In this implementation there are 10 fields and 100 soldiers. You must specify how many soldiers to send to each of the 10 fields. You don't know what the opposing general will do. Then, in each field, the soldiers face off: whoever has more soldiers wins the battle. Whoever wins more battles wins the war.

For example, a one strategy is "10 10 10 10 10 10 10 10 10 10" and another is "1 11 11 11 11 11 11 11 11 11". The second strategy will lose in the first field, but win the other 9, and therefore win the war."

Submission + - Wikileaks to publish remaining Afghan documents (google.com) 1

Albanach writes: WikiLeaks spokesman Julian Assange has been quoted by the Associated Press as stating "the organization is preparing to release the remaining secret Afghan war documents". According to Assange, they are halfway through processing the remaining 15,000 files as they 'comb through' the files to ensure lives are not placed at risk.

Submission + - Poll

lirel writes: Have you ever tried an SQL-Injection?

No

Yes, bit with no success

Yeah! with little success '-)

alert("just some XSS") lately

%20barAnswer=-1'/**/UNioN/**/Select/**/1,2,3,ConCat(db.auth.login,0x3A,db.auth.password),5%20--

cowboyn:832cae184c7b7c14436c0515adbaed75:xy
Science

Submission + - First discovery by an @Home project (sciencemag.org)

pq writes: In a paper published today in Science, astronomers are reporting the discovery of a radio pulsar in data acquired at the world's largest radio telescope and analyzed by hundreds of thousands of volunteers in 192 countries for the Einstein@Home project. This is the first scientific discovery by a distributed computing project, and specific credit is being given to Chris and Helen Colvin of Ames, Iowa, and Daniel Gebhardt of Germany. More at MSNBC etc.
Microsoft

Submission + - New Hotmail clashes with fellow Microsoft products (infoworld.com)

tsamsoniw writes: Hotmail users have inundated the Microsoft support forums with complaints about the new version of Hotmail, and Microsoft has created a summary page of fixes to the most commonly reported issues. A theme among these fixes: Turn off a particular Microsoft product or feature, be it Internet Explorer, Web-based Messenger, or the High Contrast display in Windows 7. Oh — and the Microsoft Live Team is working on all these issues.
Privacy

Submission + - Android Market, Breeding Ground for Mobile Malware (securityweek.com)

wiredmikey writes: Mobile Virus Authors Expected to see Android Systems as a Growing Target

Google's Android mobile OS has been declared the fastest growing mobile platform according to recent reports, with over 160,000 Android devices being activated every day. This astronomical growth is credited to a friendly user interface and openness of the platform. Approximately 18,600 Android-based applications were created in July 2010 alone.

However, Android's openness has turned its online app store, Android Market, into a breeding ground for malicious applications capable of stealing sensitive user information from the mobile phones.

Businesses

Submission + - Delta opens "ticket window" on Facebook (skunkpost.com)

crimeandpunishment writes: Forget using Facebook to promote ticket sales....Delta Airlines is now using the site to sell tickets. Delta has become the first airline to allow customers to reserve flights on Facebook. The airline plans to expand the ticket window to other sites. This move comes on the heels of a redesign of Delta's own site earlier this week.
Iphone

Submission + - Jailbroken iPhone Exploit Code Goes Public (computerworld.com)

CWmike writes: Minutes after Apple issued an iOS security update on Wednesday, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads. 'Comex,' the developer of JailbreakMe 2.0, posted the source code for the hacks that leverages two vulnerabilities in iOS and allows iPhone owners to install unauthorized apps.
Programming

Submission + - The Risks of Entering Programming Prizes (infoworld.com)

snydeq writes: "Fatal Exception's Neil McAllister warns developers of the hidden risks of entering programming prizes, which are on the rise since NetFlix awared $1 million to BellKor's Pragmatic Chaos in 2009. 'Web and software companies offer prizes for a variety of reasons. Chief among them is simply to raise awareness, interest, and participation in a given software platform or service,' McAllister writes. But the practice of offering and entering software prizes is not without concerns. Privacy implications, class-action lawsuits — many of the prizes leave participants vulnerable to prosecution. Worse is the possibility of handing hard work over to a company without reward. 'Contests like the Netflix Prize are sponsored by commercial entities that stand to profit from the innovations produced by the entrants. Those who participate invest valuable time toward winning the prize, but if they fail to meet the deadline (or to produce the leading results) their efforts could go completely unrewarded. Depending on the terms of the contest, however, the sponsor might still be able to make use of the runners-up's innovations — which, of course, would be a whole lot cheaper than hiring developers.'"
Idle

Submission + - Rupert Murdoch claims to own the "Sky" in "Skype" (independent.co.uk) 1

Crudely_Indecent writes: Not content to own just the news stories, Rupert Murdoch is now going after individual words!

Rupert Murdoch’s BSkyB is fighting a legal battle with the internet telecommunications pioneer Skype, claiming that it owns the “Sky” in “Skype”.


Slashdot Top Deals

With your bare hands?!?

Working...