Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

Submission + - Scientist make quantum encryption breakthrough

Madas writes: "Scientists working in Cambridge, England have managed to make quantum encryption completely secure by putting decoy pulses in the key transmission stream. According to the story this paves the way for safe, encrypted high-speed data links. Could this allow completely private transmission of data away from snooping eyes and ears? Or will it mean film studios can stop movies from being copied when travelling on the internet?"
Software

Submission + - Lightroom vs. Aperture

Nonu writes: Adobe has officially released its Aperture killer, Lightroom, and the reviews are starting to pop up. Ars looks at Lightroom and concludes that it's a better choice for those without bleeding-edge hardware. 'Aperture's main drawback is still performance as it was designed for bleeding edge machines. On a quad Core 2 Duo Xeon, it is very usable but Lightroom just feels faster for everything regardless of hardware. Since Aperture relies on Core Image and a fast video card to do its adjustments (RAW decoding is done by the CPU), it's limited to what the single 3-D card can do. Lightroom does everything with the CPU and so it is likely to gain more speed as multicore systems get faster.'
Microsoft

Journal Journal: Gates announce AIDS vaccine initiative

From the article:

Canada will be the site of a new facility to manufacture and test vaccines to fight HIV/AIDS, Prime Minister Stephen Harper and billionaire philanthropist Bill Gates announced Tuesday in Ottawa. Ottawa will contribute up to $111 million toward the new Canadian HIV Vaccine Initiative, while the Microsoft founder, through the Bill and Melinda Gates Foundation, will donate up to $28 million.

Security

Who Pays For Credit Card Breaches? 313

PetManimal writes "A scheme to steal customers' credit and debit card information at a New England supermarket chain highlights a little-understood fact about credit card security: Customers still think that the credit-card companies have to eat fraudulent charges, but since the PCI DSS standards were adopted, it's actually the merchant banks and merchants who have to pay up. And, according to the blogger writing in the latter article, it's a good thing." "The main reason PCI exists is that there are tens of thousands of merchants who don't understand the basics of information security and weren't even taking the very minimum steps to secure their networks and the credit card information they stored... PCI pushes that burden downstream and forces merchants to... put in a properly configured firewall, encrypt sensitive information and maintain a minimum security stance or be fined by their merchant banks... [T]he credit card companies have taken the bulk of the financial burden off of themselves and placed it on the merchants, which is where much of it belongs...'"
Security

Submission + - Remote Code Execution Hole Found in Snort

Palljon1123 writes: A stack-based buffer overflow in the Snort IDS (intrusion detection system) could leave government and enterprise installations vulnerable to remote unauthenticated code execution attacks. The flaw, found by researchers at IBM's ISS X-Force, affects the Snort DCE/RPC preprocessor and could be used to execute code with the same privileges (usually root or SYSTEM) as the Snort binary. No user action is required.
Science

Australia Outlaws Incandescent Light Bulb 944

passthecrackpipe writes "The Australian Government is planning on making the incandescent light bulb a thing of the past. In three years time, standard light bulbs will no longer be available for sale in the shops in Australia (expect a roaring grey market) and everybody will be forced to switch to more energy efficient Fluorescent bulbs. In this move to try and curb emissions, the incandescent bulb — which converts the majority of used energy to heat rather then light — will be phased out. Environmental groups have given this plan a lukewarm reception. They feel Australia should sign on to the Kyoto protocol first. A similar plan was created together with Phillips, one of the worlds largest lighting manufacturers."
United States

U.S. Copyright Lobby Out of Touch 293

Ontheright writes "The BBC is featuring a story on how the U.S. copyright lobby is increasingly out of touch with the rest of the world. The article focuses on a recent report designed to highlight the inadequacies of IP protection around the world by arguing for a global expansion of the DMCA and elimination of copyright exceptions. Michael Geist penned the article, which specifically calls out the United States for expecting the world at large to adopt its non-standard standards for copyright law."
Television

Viacom Turns to Joost, Spurns YouTube 139

Vincenzo writes "Viacom has signed a deal with Joost that will see content from MTVI, Comedy Central, and CBS distributed on the new P2P distribution service. The move comes just two weeks after demanding YouTube pull over 100,000 videos offline. 'Joost's promise to protect their copyrights was a major factor in Viacom's decision, and also a stumbling block in their discussions with YouTube/Google. At the moment is it quite easy to download and store video content from YouTube, but no such exploit for Joost is known to exist.' It's also a 'secure' distribution medium in the eyes of many in the entertainment industry, since users can't upload content themselves.'"
Technology

12 Crackpot Ideas That Could Transform Tech 213

InfoWorldMike passed us a link to an entertaining article with a sort of 'top 12' innovative technologies that could change the world. Some of the techs include solid-state drives, holographic and phase-change storage, artificial intelligence, e-books, desktop web apps, and quantum computing/cryptography. For each of these technologies, expert observers weigh in on the potentials and pitfalls of these disciplines. Here are Esther Lim's comments on e-books: "Another issue, besides the prohibitive cost and cumbersome nature of e-documents, concerns the vast portion of the contracts that were signed and agreed upon before e-books came onto the scene ... That raises questions not just in terms of what rights the user has, but what rights the publisher has vis-à-vis the copyright holder." We've discussed almost all of these technologies on the site at one point or another. Which is the most important? Which one do you think we'll never 'get right'?
AMD

AMD Athlon 64 6000+ Launched And Tested 156

Spinnerbait writes "AMD officially launched their next speed bump in the Athlon 64 product line, in the form of a new 3GHz part branded the Athlon 64 6000+. This new dual-core Athlon 64 sports 1MB of on-chip cache per core and is designed for AMD's Socket AM2 platform. This chip is still built on AMD's 90nm fab node and is comprised of some 227 million transistors. It also carries a thermal power profile of about 125Watts. Unfortunately, in all the benchmarks seen here, it was still unable to catch Intel's Core 2 Duo E6700 chip at 2.66GHz."
Communications

UK Taps 439,000 Phones, Now Wants To Monitor MPs 290

JPMH writes "With the largest density of CCTV cameras in the world, and an increasing network of automatic number-plate recognition cameras on main roads, Britain has long been a pioneer for the surveillance society. Now new official figures reveal that UK agencies monitored 439,000 telephones and email addresses in a 15 month period between 2005 and 2006. The Interception of Communications Commissioner is seeking the right for agencies to be allowed to monitor the communications of Members of Parliament as well, something which has been forbidden since the 1960s. It must be that it is bringing their numbers down: on the law of averages they should be monitoring at least 5 of the MPs."
PHP

March To Be Month of PHP Bugs 292

PHP writes "Stefan Esser is the founder of both the Hardened-PHP Project and the PHP Security Response Team (which he recently left). During an interview with SecurityFocus he announced the upcoming Month of PHP bugs initiative in March." Quoting: "We will disclose different types of bugs, mainly buffer overflows or double free (/destruction) vulnerabilities, some only local, but some remotely triggerable... Additionally there are some trivial bypass vulnerabilities in PHP's own protection features... As a vulnerability reporter you feel kinda puzzled how people among the PHP Security Response Team can claim in public that they do not know about any security vulnerability in PHP, when you disclosed about 20 holes to them in the two weeks before. At this point you stop bothering whether anyone considers the disclosure of unreported vulnerabilities unethical. Additionally a few of the reported bugs have been known for years among the PHP developers and will most probably never be fixed. In total we have more than 31 bugs to disclose, and therefore there will be days when more than one vulnerability will be disclosed."
Movies

MPAA and FBI Help To Train Swedish Police 165

Several readers let us know about a program in which a US FBI agent and employees of the MPAA led a seminar for Swedish police officers in methods of finding and stopping illegal downloading from the Internet. The writer at zeropaid.com says, "I bet the Swedish people are going to love to find out that the US government and a US lobbying group now have a hand in training their police personnel. So much for the notion of national sovereignty." Reader Oxygen provided a bit of translation from an article in Swedish on IDG.se: "According to Bertil Ramsell, responsible for the course, the purpose of the visit was to give the invited speakers a chance to explain to the students what their organization's purpose was. But in a report from the IIPA, the purpose was to educate students in anti-piracy."
Privacy

UK's Blair Dismisses Online Anti ID-Card Petition 377

An anonymous reader writes "Prime Minister Tony Blair has responded personally via email to 28,000 online petitioners opposing the UK's planned identity card scheme, and has closed the online petition. The email reads: 'We live in a world in which people, money and information are more mobile than ever before. Terrorists and international criminal gangs increasingly exploit this to move undetected across borders and to disappear within countries. Terrorists routinely use multiple identities — up to 50 at a time... ID cards which contain biometric recognition details and which are linked to a National Identity Register will make this much more difficult.'"

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...