Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption

Submission + - Cops Can Crack An iPhone In Under Two Minutes (forbes.com) 2

Sparrowvsrevolution writes: Micro Systemation, a Stockholm-based company, has released a video showing that its software can easily bypass the iPhone's four-digit passcode in a matter of seconds. It can also crack Android phones, and is designed to dump the devices' data to a PC for easy browsing, including messages, GPS locations, web history, calls, contacts and keystroke logs.

The company's director of marketing says it uses an undisclosed vulnerability in the devices it targets to run a program on the phone that brute-forces its passcode. He says the company's business is "booming" and that it's sold the devices to law enforcement and military customers in 60 countries. He says Micro Systemation's biggest customer is the U.S. military.

Graphics

Submission + - AMD FirePro V3900, Pro Graphics on a Budget, Tested (hothardware.com)

MojoKid writes: "The FirePro V3900 is AMD's latest budget solution for the professional graphics market. The card represents the first of AMD's Tahiti-based pro GPU architectures in their ongoing campaign to steal professional market share away from rival Nvidia. Workstation-class GPU sales are overwhelmingly dominated by Team Green, but AMD has slashed its professional prices in an attempt to siphon market share. Professional cards like the FirePro V3900 offer support for 10-bit color, up to five simultaneous displays, and accelerated rendering support for 3D applications like 3ds Max, Maya, Lightwave, and a number of other programs. With a 480 Stream processor core, the AMD FirePro V3900 is significantly faster than its V3800 predecessor. It costs ~$15 more than the V3800, but delivers an average of 20-25% better performance."
Books

Submission + - The Books Programmers Don't Read (itworld.com)

itwbennett writes: "You know those must-read programming books? Turns out most of you haven't actually read them. Skimmed, maybe. Been assigned sections in college courses, sure. Programming blogger Bill the Lizard calls you out, with a plea to 'stop recommending books to others that you haven't read yourself'. What books are on your 'haven't read it, lied about it' list?"

Comment Praise science (Score 1) 155

Dishonesty has become a real problem in science. Some recent cases (Judy Mikovits, Luk Van Parijs, and Dipak K. Das (aka the red-wine researcher)) reveal some serious misconduct from high profile researchers. Certainly, part of this is due to the increased pressure on scientific researchers. The other part of this is generational. Cheating and misconduct are certainly more prevalent .in younger generations (or perhaps its always been this way and they are just not quite as clever).
Botnet

Submission + - Political Party's Leadership Election Attacked by DDoS (www.cbc.ca)

lyran74 writes: Saturday's electronic leadership vote for Canada's New Democratic Party was plagued by delays caused by a botnet DDoS attack, coming from over 10,000 machines. Details are still scarce, but Scytl, who provided electronic voting services, will have to build more robust systems in the future in anticipation of such attacks. Party and company officials say an audit proved the systems and integrity of the vote were not compromised.
China

Submission + - Apple To Replace Google With Baidu For The Chinese Market (itproportal.com)

hypnosec writes: Apple is planning to integrate the search function from Chinese web services giant Baidu into iOS. "Knowledgeable sources," suggest that Apple will release the new feature sometime next month. The sources say that, so far, an agreement has been signed and everything is going according to plan. Confirming these rumors, cloud and mobile chief Li Mingyuan pointed out last week at the launch of WangPan, Baidu's cloud storage services, that the Chinese company and Apple have a healthy cooperation agreement.

Comment Re:Beware what you share. (Score 0) 195

I'd have to agree with you. People need to take some (most) of the blame for this. No one forced your to join Facebook, twitter, flickr, etc. and you had to know that these were not services being sold with the guise of anonymity. Yes companies are using tracking cookies and algorithmic hocus-pocus to profile your habits, but these can be circumvented with little effort. If you want to share everything, fine. But your info is now essentially public.

Comment Beware what you share. (Score 0) 195

If you put your telephone number or address on Facebook, Twitter, Or Google + your not concerned with privacy. If later you decide that this was a bad decision and decide your privacy has been invaded your an idiot for sharing that much in the first place. Think long and hard (Giggity) about what you decide to share with any of these services because it can come back to bite you.

Submission + - High School Student Expelled For Tweeting Profanity; Principal Admits School Tra (techdirt.com)

amiller2571 writes: "Tinker v. Des Moines is considered a key lawsuit in defining the free speech rights of students. While there have been a few cases that limited the ruling, it's still seen as the key case in establishing that students have First Amendment rights and that schools can't just arbitrarily shut them down."
Censorship

Submission + - Microsoft censors The Pirate Bay in Messenger (torrentfreak.com)

Fluffeh writes: "As originally picked up by Torrentfreak, Microsoft Live Messenger now blocks a TPB link via its Live Messenger instant messaging tool. This is somewhat similar to when Facebook started blocking TPB "due to the controversy". This time round, Microsoft is claiming that someone told them TPB was "reported as unsafe." This is troubling on a number of fronts. First of all, a link by itself should never be considered infringing. Second, of course, is the fact that not all TPB content is infringing. Yes, an awful lot of it is almost certainly infringing. But automatically deciding that all of it is and not letting people share such links is extreme and dangerous. Finally, the really scary part is the realization that Microsoft appears to be monitoring content being shared in private communication between two individuals in an instant messenger conversation."
Science

Submission + - Photos: Edison's lightbulb removed from 100 year time capsule....it works (gereports.com)

topshot writes: "Photos of Thomas Edison original lightbulbs working after 100 years of being buried in a time capsule.

“It’s a remarkable testament to the craftsmanship and quality that one of the tungsten filament lamps buried for 100 years showed signs of life,” said Maryrose Sylvester, president and CEO of GE Lighting.

Think Edison was...please excuse the pun....brilliant?"

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...