Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy

British Police Use Facebook to Gather Evidence 128

Amy Bennett writes "Move over police scanner and most-wanted poster. The Greater Manchester Police force has created a Facebook application to collect leads for investigations. The application delivers a real-time feed of police news and appeals for information. A 'Submit Intelligence' link takes a Facebook user to the police Web site where they can anonymously submit tips. Another link leads to the videos on YouTube featuring information on the police force, ongoing investigations and other advisories." As reader groschke writes, though, "Their access to user data raises significant civil liberties problems. They may be able to see more of your data than your friends or network members can — and you also expose your friends' data when you add the application. All without needing a subpoena or warrant."
Privacy

FBI and Next-Gen P2P Monitoring 122

AHuxley writes "Can the FBI get funding to create a next-generation network monitoring and database system for P2P networks, web sites, and chat rooms? Could the FBI's Regional Information Sharing Systems (RISS) network be opened to more law enforcement agents across the USA? Will the tracking of p2p users via 'unique serial numbers' generated from a person's computer be expanded from its first use in late 2005? Is your p2p application or plug-in sending back your MAC address, firmware revision, manufacture date, GUID or other details?" Could this story submitter pose any more questions in his submission? Won't someone please think of the ... oh, never mind.
Operating Systems

Submission + - Quebec's RRQ being sued for not considering OSS. (cyberpresse.ca)

Quebec writes: "Cyrille Béraud, in charge of Savoir-Faire Linux is suing the Régie des rentes du Québec in the province's highest court. He is contesting the fact that the governement administred office is about to spend 700,000$ to upgrade its workstations to Vista without tenders and without considering alternatives.

The document submitted to the Cour supérieure sustains the fact that Vista is so different from Windows 2000 (the actual operating system in use at the RRQ) that you cannot call it an upgrade but a replacement.

The author of the article is saying that this is a first in North America and that we heard similar stories in Europe."

Security

Man-in-the-Middle Attack on MySpace with Cain 45

Slimjim100 writes "Last year at ChicagoCon 2007, Brian Wilson gave a great talk entitled "Cain & Abel: Windows Can Hack, Too!" Although the presentation and audio recording of the talk can be downloaded from the ChicagoCon site at Library, I had totally forgotten to publish his videos. Just in case things didn't go as planned during the live event or his laptop crapped out on him, Brian made a video of the MITM attack he demonstrated using Cain. You get to see how Myspace and other social networking sites are not designed with security in mind."
Wine

Submission + - SPAM: Flash CS3 and Photoshop CS3 running in Wine 2

twickline writes: "It looks as if Wine might be supporting Adobe's Flash CS3 as well as Photoshop CS3 on Linux in the near future. With the recent help from Google to get Photoshop CS and CS2 working properly in Wine a huge chunk of the underlying architecture work was put in place for CS3 application support. There are still a number of bugs that need to be triangled and fixed before CS3 is properly supported but this is great news none the less. Photoshop CS3 in Wine Louis Lenders posted on bug 8945 that he has got Photoshop CS3 running in Wine, here is his post... with screenshots!"
Link to Original Source
Robotics

Swarm Robot Immune System? 47

schliz writes "Researchers are investigating large swarms of up to 10,000 miniature robots which can work together to form a single, artificial life form. A resulting artificial immune system is expected to be able to detect faults and make recommendations to a high-level control system about corrective action — much like how a person's natural immune system is able to cope with unfamiliar pathogens."

Reznor Follows Radiohead, Offers Free Album 327

An anonymous reader writes "Convinced the current music business infrastructure (requiring artists to rely on labels) is broken, Nine Inch Nails front man, Trent Reznor, released his band's new album, Ghosts I — IV (Ghosts Volumes One though Four), on Sunday at 6 PM via his official site, marking yet another business experiment for this artist in the changing music market."
Businesses

Submission + - SPAM: NICTA technology to quadruple bandwidth on long ha

WirePosted writes: "National ICT Australia (NICTA) has spun out a network monitoring company, Monitoring Division, to commercialise technology that it claims will enable telcos to increase the per wavelength bandwidth on long haul optical fibres from 10Gbps to 40Gbps, by identifying sources of noise and enabling them to improve signal to noise ratios."
Link to Original Source
Medicine

One in Ten Americans Are Chronically Sleep Deprived 329

WirePosted writes "A CDC research study released this past week indicates that the physical and mental health of many Americans is being adversely affected by a lack of sleep. According to the study, a part of the organization's Morbidity and Mortality Weekly Report, one in ten US citizens are consistently failing to get enough sleep every night. Almost 40% of the people surveyed didn't get enough sleep for more than a week every month. The article notes that this trend can have far-ranging implications for health beyond simple fatigue."
The Military

Ask the Air Force Cyber Command General About War in Cyberspace 315

We ran an article about the new Air Force Cyber Command and its recruiting efforts on February 13, 2008. Now Major General William Lord, who is in charge of this effort, has agreed to answer Slashdot users' questions. If you're thinking about joining up -- or just curious -- this is a golden opportunity to learn how our military is changing its command structure and recruiting efforts to deal with "cyberspace as a warfighting domain." Usual Slashdot interview rules apply.

How Open Source Has Influenced Windows Server 2008 145

willdavid writes to tell us that Sam Ramji over at Port25 has a nice succinct list of the major open source principles that have been used while developing Windows Server 2008. "Overall, we've learned and continue to learn from open source development principles. These are making their way into the mindset, development practices, and ultimately into the products we bring to market. I've focused here on 'what Microsoft has learned from Open Source' - and ironically, I've agreed to do a panel at OSBC on 3/25 with Jim Zemlin of the Linux Foundation on 'what Open Source can learn from Microsoft'. As all of the different organizations in IT continue to evolve, we'll learn from each others' best practices and make increasingly better software. As in science, this incremental improvement will move all of us forward."
Security

Digital Picture Frames Infected by Trojan Viruses 174

CR0WTR0B0T writes "The San Francisco Chronicle is running a story on viruses loaded into digital picture frames, similar to the ones we discussed at the end of last year. The difference is in the virus used: 'The authors of the new Trojan Horse are well-funded professionals whose malware has 'specific designs to capture something and not leave traces ... This would be a nuclear bomb of malware.' Apparently, a number of regular folks have hooked them up to their home computer and loaded the virus. And if you think you're too smart to be fooled, apparently the Anti-Virus software makers have not caught up to the threat quite yet."
Security

Multifunction Printers — The Forgotten Security Risk? 153

eweekhickins writes to share an article in eWeek highlighting the forgotten risks that a multifunction printer could possibly offer. Brendan O'Connor first called attention to the vulnerabilities of these new devices at a Black Hat talk in '06 and warns that these are no longer "dumb" machine sitting in the corner and should be treated with their own respective security strategy. "During his Black Hat presentation in 2006, O'Connor picked apart the security model of a Xerox WorkCentre MFP, showing how the device operated more like a low-end server or workstation than a copier or printer--complete with an AMD processor, 256MB of SDRAM and an 80GB hard drive and running Linux, Apache and PostGreSQL. He showed how the authentication on the device's Web interface can be easily bypassed to launch commands to completely hijack a new Xerox WorkCentre machine."

Slashdot Top Deals

MESSAGE ACKNOWLEDGED -- The Pershing II missiles have been launched.

Working...