Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Wireless Networking

Verizon FiOS/DSL Customers Get Free Wi-Fi Across US 168

Glenn Fleishman lets us know that Verizon is finally offering nationwide Wi-Fi access to its high-speed Internet customers, long after Cablevision's similar service went live. While Cablevision is building out an in-house network of hotspots, Verizon is relying on a deal with Boingo Wireless — a strategy with both strengths and drawbacks, as Wi-Fi Net News points out. Neither Verizon's nor Boingo's announcement reveals the mechanics of how existing Verizon DSL and FiOS customers will get access, but an AP report spells it out: "To use a hotspot, the customer must install software that works only on computers with Windows Vista or XP installed. Phones, iPods, and Macintosh computers with Wi-Fi can't access the hotspots."
Security

Could Cyber-Terrorists Provoke Nuclear Attacks? 183

Hugh Pickens writes "The Guardian reports that according to a study commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND), a joint initiative of the Australian and Japanese Governments, terrorists could use information warfare techniques to make a nuclear attack more likely — triggering a catastrophic chain of events that may be an easier alternative 'than building or acquiring a nuclear weapon or dirty bomb themselves.' While the possibility of a radical group gaining access to actual launch systems is remote, the study suggests that terrorists could focus on feeding in false information further down the chain — or spreading fake information to officials in a carefully orchestrated strike. According to the study 'Hacking Nuclear Command and Control' [PDF], cyber-terrorists could 'provoke a nuclear launch by spoofing early warning and identification systems or by degrading communications networks.' Since command and control systems are placed at a higher degree of exploitation due to the need for rapid decisions under high pressure with limited intelligence, cyber-terrorists 'would not need deception that could stand up over time; they would only need to be believable in the first 15 minutes or so.'"
Microsoft

Microsoft Uses Human Computing Game To Tune Bing 119

Al writes "Microsoft researchers have come up with a novel way to fine-tune the algorithms behind the company's new search engine, Bing: a game that harnesses human computing power to improve the results. Called Page Hunt, the game (which of course requires Silverlight to run) shows users a web page and asks them to figure out a search query that should produce the page within the first five results. The idea is to better understand user behavior and expectations and ultimately improve its search algorithms. Other human-computing projects have sought to digitize out-of-print text (reCAPTCHA) and image labeling (Google Image Labeler). Can Microsoft use a similar approach to gain the edge over its rival? Or does Google already have the edge with SearchWiki, which lets searchers re-rank its results?"
GNU is Not Unix

New Coalition To Promote OSS To Feds 99

LinuxScribe writes "Red Hat, Mozilla, Novell, Oracle, and Sun are among the 50-plus member Open Source for America coalition that will be officially announced today by Tim O'Reilly at OSCON. The OSA will be a strong advocate for free and open source software, and plans to boost US Federal government support and adoption of FOSS. From their website: 'The mission of OSA is to educate decision makers in the US Federal government about the advantages of using free and open source software; to encourage the Federal agencies to give equal priority to procuring free and open source software in all of their procurement decisions; and generally provide an effective voice to the US Federal government on behalf of the open source software community, private industry, academia, and other non-profits.'"
Portables (Apple)

FOIA Documents Detail iPods Overheating, Catching Fire 314

suraj.sun passes along a report from a Seattle TV station that has been investigating reports of Apple iPods overheating and bursting into flames. "An exclusive KIRO 7 Investigation reveals an alarming number of Apple brand iPod MP3 players have suddenly burst into flames and smoke, injuring people and damaging property. It's an investigation that Apple has apparently been trying to keep out of the public eye. It took more than 7 months for KIRO 7 Consumer Investigator Amy Clancy to get her hands on documents concerning Apple's iPods from the Consumer Product Safety Commission because Apple's lawyers filed exemption after exemption. In the end, the CPSC released more than 800 pages which reveal, for the very first time, a comprehensive look that shows, on a number of occasions, iPods have suddenly burst into flames, started to smoke, and even burned their owners. ... Apple refused to comment, and refused to answer all of the other questions [the reporter] has been asking of the company since November."

Comment Re:That is your job. (Score 1) 474

I'm a programmer, but I used to be a help desk for about a year (I got my degree right when the bubble exploded).
I had a load of stupid stuff to do, like unjamming printers, changing dot-matrix printers ribbons, rebooting frozen terminals / PCs and other stuff only highly qualified people can do.</sarcasm>
I've cut that load by more than half by educating people with quick-fix guides and "not to do" lists. With the time it saved I automated some other tasks (report production, verifications, etc...). I ended up with 2-3 hours a day worth of job and 5-6 hours to code data analysis tools to saved some of my boss time.
So if you can, focus on prevention, even if it means working harder during a short while.
The Courts

FTC Shuts Down Calif. ISP For Botnets, Child Porn 224

An anonymous reader writes "The Federal Trade Commission has convinced a federal judge to pull the plug on a 3FN.net, a.k.a. 'Pricewert LLC,' a Northern California based hosting provider. The FTC alleges that 3FN/Pricewert was directly involved in setting up spam-spewing botnets, among other illegal activities, the Washington Post's Security Fix Blog writes. From the story: 'Pricewert hosts very little legitimate content and vast quantities of illegal, malicious, and harmful content, including child pornography, botnet command and control servers, spyware, viruses, trojans, phishing related sites, illegal online pharmacies, investment and other Web-based scams, and pornography featuring violence, bestiality, and incest.' The story quotes a former Justice Dept. expert saying the FTC action may be a smoke screen for a larger criminal investigation by the federal government in 3FN's activities."
Businesses

Buying a Domain From a Cybersquatter 800

Nevo writes "A partner and I are in the planning stages of a business. We've decided on a name that we'd like to use but the domain name is already registered. The owner has a single 'search' page up (similar to the one at www.goggle.com)... clearly not a legitimate business interest, but since we don't own a trademark on this name it doesn't qualify as bad faith, I don't think. Does anyone have any experience buying domains from these operators? Do you have any advice on how to approach the owners of these domains to get them at a reasonable cost?"
Communications

Palm Pre To Sync Seamlessly With iTunes 178

Wired is reporting that Palm's new handheld device, the Pre, will be able to sync automagically with Apple's iTunes. Thanks to a team of ex-Apple engineers the Pre will sync everything but iPhone applications and some of the older Fairplay DRM music. "It does it by faking out iTunes, making the jukebox software think that it is connected to a real iPod. Hook it up and you'll be given three options: USB mass storage device, charging only or iTunes sync. This is a ballsy move from Palm, and we totally love it: a big fat middle finger at Apple. Apple will, we are sure, be readying its legal attack dogs as I write, and don't be at all surprised if an iTunes update pops up around June 6th. This fight just got a lot more interesting."
Security

What a Hacked PC Can Be Used For 364

An anonymous reader points out that the Security Fix blog is running a feature looking at the different ways hacked/cracked computers can be abused by cyber scammers. "Computer users often dismiss Internet security best practices because they find them inconvenient, or because they think the rules don't apply to them. Many cling to the misguided belief that because they don't bank or shop online, that bad guys won't target them. The next time you hear this claim, please refer the misguided person to this blog post, which attempts to examine some of the more common — yet often overlooked — ways that cyber crooks can put your PC to criminal use."
Cellphones

18 Android Phones, In 3 Flavors, By Year's End 152

Hugh Pickens writes "Andy Rubin, senior director for Mobile Platforms for Google, has announced that by the end of the year there will be 18 to 20 phones using the Android OS made by 8 or 9 different manufacturers. Google will offer three different versions of Android OS: a completely free and generic flavor with no pre-loaded Google applications; a slightly customized version that comes pre-loaded with Google apps like Gmail and Google Calendar; and a completely 'Google-fied' Android OS bearing all sorts of Google branding and integration with Google's services. Will Park reports that the expectation is that 12 to 14 of the upcoming Android phones will use the slightly-customized version of Google's Android OS requiring the manufacturer to agree to a distribution deal with Google that would allow the handsets to come pre-installed with Google-ware. The remaining 5 or 6 Android phones will come to market completely decked out with 'The Google Experience' and a Google logo on the phone. This third option provides risk and reward opportunities because the openness of the store could be a hit with consumers, but could also lead to poorly constructed or offensive applications that could give Google a taint. When it comes to apps, Rubin says: 'We want to abide by the law, but not rule with an open fist.'" Yes, it seems he really said "open fist," though he probably meant "iron fist."

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...