Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Seriously? (Score 0) 382

For a school known for basically "creating" and making hackers, It's kind of sickening that they would take legal action against him. If he got into their network just like that, they should have talked to him about his reccomendations for better security. And this is extremely strange from the school that does Open CourseWare. What he did was justified. Scholarly articles should remain free, not stay hoarded on JSOR and other databases.
Wine

Submission + - ReactOS Presented to Russian President Putin (reactos.org) 2

An anonymous reader writes: While President Putin was touring the area of Seliger Youth Forum, Marat Karatov demonstrated what can only be described as a fair amount of daring when he called out to the president and requested to present ReactOS to him. Putin agreed, and the project has now presented ReactOS to two successive Russian presidents. Putin responded to the presentation by stating he would think on it.
Science

Submission + - Shark Sex is So Vicious that Researchers Avoid Discussing It

derekmead writes: How violent, really, is shark sex? It’s so rough that to many shark scientists, it’s taboo. Researchers fear that talking about it, writes Juliet Eilperin in Demon Fish: Travels through the Hidden World of Sharks, would only “reinforce the popular perception that these creatures are brutish and unrelenting." With barbed penetration, near drowning, uterine cannibalism and copious amounts of biting, shark sex isn't exactly romantic. And, sure, some killjoy scientists think all this bloody sex will reinforce negative stereotypes about sharks. Don’t judge, though; for sharks it’s been a proven technique for 150 million years. If shark researchers really want to change our perception of the shark and make them more relatable, maybe they should play up the hot nights of the great white and not stop until all the world knows how the mako makes love.
Twitter

Submission + - Anonymous helps turn in hacker who targeted charity (networkworld.com)

netbuzz writes: "A hacker who defaced and disabled the website of a New Zealand film company known for helping poor children could find himself in legal hot water in his home country of Spain after his attack spurred a Facebook/Twitter posse that included members of Anonymous, who the hacker may have been trying to impress. "Apparently, one of the (Anonymous) rules is you don't hack charity sites, you don't hack sites of people trying to help kids,” says the owner of the damaged site. “This guy was trying to impress them, to try and get into their group and boasting about what he'd done — but they turned on him, they chased him.""

Submission + - Peter Jackson to Film Third Hobbit Film (ew.com)

An anonymous reader writes: Today Peter Jackson announced that the upcoming two-film Hobbit series will now be a trilogy. Apparently he felt that there was enough peripheral material related to the Hobbit (the Lord of the Rings appendices, Tolkien's notes) that a justification exists for a third film. So far reactions have been mixed but it's safe to say that this announcement will only serve to increase the buzz surrounding this certain-to-be-a-blockbuster franchise.
Microsoft

Submission + - Microsoft Wants To Hide Which Patents Android, Linux Violate (muktware.com)

sfcrazy writes: The court battle between Apple and Samsung has created the possibility of disclosing the cross patent agreement between Microsoft and Samsung. Microsoft is suddenly scared and has filed a motion asking the court to seal the cross license agreement. I would like to remind that the Judge has asked both parties to makee all the filings in this dispute available to the public for free.
Piracy

Submission + - Why Readers Pirate eBooks (mediabistro.com) 1

rhyder128k writes: "From the article (on a site concerned with book publishing industry news and information):

"One confessed eBook pirate asked the Reddit community an important question: “eBook pirates, how do you justify what you do?”

We’ve collected seven responses below, complete with links to the comments thread. Publishers, authors and readers should all pay attention to these rationalizations–they will play an important role in the future of publishing.""

Security

Submission + - How do you provide secure wireless network connectivity to 6,000 hackers? (esecurityplanet.com)

kongshem writes: "Denial of Service attacks and spoofed access points are just some of the challenges faced by the folks entrusted with provisioning and defending the Wi-Fi network at the Black Hat conference. This behind-the-scenes video from eSecurity Planet takes a look at what it takes to keep 6,000 hackers safely connected at the show."
Desktops (Apple)

Submission + - Apple in trouble with developers (marco.org)

geek writes: According to Marco Arment, the creator of Instapaper, Apple may be in trouble with developers. According to Arment, the new sandboxing guidelines from Apple are pushing developers away in droves. Arment also comments on the "our way or the highway" attitude Apple often takes in these situations and how it may be backfiring this time around.
Security

Submission + - Linux Patches Intel Flaw 6 Years Ahead of Windows (esecurityplanet.com)

kongshem writes: "Unknown to tens of millions of users, a hidden security vulnerability has been lurking on many Intel-based Windows PCs for the past six years.

The vulnerability involves the unsafe use of an Intel CPU instruction called 'sysret' which would have allowed an attacker to execute a user-to-kernel privilege escalation. In such an attack, the attacker could potentially get system access and then execute arbitrary code.

A fix for the vulnerability landed in the Linux kernel in 2006 and has remained in place ever since — but users of Windows 7 (as well as the open source FreeBSD and NetBSD operating system) didn't get a patch until just six weeks ago.

While the flaw has been present for six years, it's not clear if it was every actively exploited — but at least one penetration testing framework now has a working exploit for the Intel flaw."

Slashdot Top Deals

The best way to accelerate a Macintoy is at 9.8 meters per second per second.

Working...