Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Solaris Telnet 0-day vulnerability 342

philos writes "According to SANS ISC, there's a vulnerability in Solaris 10 and 11 telnet that allows anyone to remotely connect as any account, including root, without authentication. Remote access can be gained with nothing more than a telnet client. More information and a Snort signature can be found at riosec.com. Worse, this is almost identical to a bug in AIX and Linux rlogin from way back in 1994."
Space

Cosmic Rays and Global Warming 548

Overly Critical Guy writes "The former editor of New Scientist has written an article in the TimesOnline suggesting that cosmic rays may affect global climate. The author criticizes the UN's recent global warming report, noting several underreported trends it doesn't account for, such as increasing sea-ice in the Southern Ocean. He describes an experiment by Henrik Svensmark showing a relation between atmospheric cloudiness and atomic particles coming in from exploded stars. In the basement of the Danish National Space Center in 2005, Svensmark's team showed that electrons from cosmic rays caused cloud condensation. Svensmark's scenario apparently predicts several unexplained temperature trends from the warmer trend of the 20th century to the temporary drop in the 1970s, attributed to changes in the sun's magnetic field affecting the amount of cosmic rays entering the atmosphere."
Mars

Mars Camera's Worsening Eye Problems 93

Mr_Foo writes "According to a Nature article, the Mars Reconnaissance Orbiter's HiRISE imager is suffering from a loss of peripheral vision. The problem surfaced less than a month after the orbiter reached Mars. One the camera's four color detectors has completely stopped working, and it is feared that the problems are spreading. Currently seven of the fourteen HiRISE's detectors are sending back corrupted data and although the issue is only creating a 2% loss of signal at this time it is expected to worsen. The lead investigator for the mission is quoted as saying the problem is systemic: 'In the broken detectors, extra peaks and troughs are somehow being introduced, causing... a "ringing" in the signal. "We don't know where the ringing is coming from," [the investigator] says.' Warming the electronics before taking images seems to help the problem. This effect might be one reason why the detectors on the cold periphery of the array were the first to pack up."
Software

Recognizing Scenes Like the Brain Does 115

Roland Piquepaille writes "Researchers at the MIT McGovern Institute for Brain Research have used a biological model to train a computer model to recognize objects, such as cars or people, in busy street scenes. Their innovative approach, which combines neuroscience and artificial intelligence with computer science, mimics how the brain functions to recognize objects in the real world. This versatile model could one day be used for automobile driver's assistance, visual search engines, biomedical imaging analysis, or robots with realistic vision. Here is the researchers' paper in PDF format."
Security

US Planning Response To a Cyber Attack 359

We've all heard of Google bombing; the US Government may be taking the expression rather literally. Planning is now underway across the government for the proper way to respond to a cyber attack, and options on the table include launching a cyber counterattack or even bombing the attack's source. The article makes clear that no settled plan is in place, and quotes one spokesman as saying "the preferred route would be warning the source to shut down the attack before a military response." That's assuming the source could be found. From the article: "If the United States found itself under a major cyberattack aimed at undermining the nations critical information infrastructure, the Department of Defense is prepared, based on the authority of the president, to launch a cyber counterattack or an actual bombing of an attack source."
Biotech

Blood Vessel Shunt May Save Limbs In War 157

The FDA has just approved for military use a shunt that allows partially-severed limbs to continue to get circulation. The FDA approved the device in a fast-track process lasting only a week. The article notes: "For most, it won't be a matter of saving a limb outright but rather salvaging the quality of a wounded leg or arm... The shunt may save injured limbs from amputation, since it can be implanted on the battlefield to maintain blood flow until a wounded soldier undergoes surgery, FDA officials said. Since the start of the Iraq war, more than 500 soldiers have lost limbs, many to injuries suffered in roadside bombings."
Software

The Pirated Software Problem in the 3rd World 252

RockDoctor writes "Dark Reading carries an article by one Nathan Spande who works in Cambodia. Locally he finds that OpenOffice.Org and MS Office are the same price ($2), or $7-20 by downloading. He discusses why the economics of OpenSource don't work in this environment, and how it contributes to global computer security issues through the "little extras" (trojans, spambots and other malware) that typically accompany such "local editions" of software. The economics of software outside the west are very different to what most people are used to."

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...