Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Supposed Battery Breakthrough. 70% charge in 2mins, 20yr life. (ntu.edu.sg)

chaosdivine69 writes: According to Scientists at Nanyang Technology University (NTU), they have developed ultra-fast charging batteries that can be recharged up to 70 per cent in only two minutes and have a 20 yr lifespan (10,000 charges). The impact of this is potentially a game changer for a lot of industries reliant on lithium ion batteries.

In the car industry for example, consumers will save huge on costs for battery replacement and manufacturers will save on material construction since they're using a nanotube structure of Titanium dioxide which is an abundant, cheap and safe material found in soil. Titanium dioxide is commonly used as a food additive or in sunscreen lotions to absorb harmful ultraviolet rays. It is believed that charging an electric car can be achieved in as little as 5 minutes making it comparable to filling up a gasoline based automobile.

Submission + - Analysis of Linux backdoor used in freenode hack

An anonymous reader writes: A detailed analysis has been done of the Linux backdoor used in the freenode hack. It employed port knocking and crypto to provide security of the backdoor against others using it.. This seems a little more sophisticated than your average jane hacker.. Criminal? Government?

Submission + - Remote exploit vulnerability found in bash (csoonline.com)

kdryer39 writes: A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271. This affects Debian as well as other Linux distributions.

The major attack vectors that have been identified in this case are HTTP requests and CGI scripts. Another attack surface is OpenSSH through the use of AcceptEnv variables. As well through TERM and SSH_ORIGINAL_COMMAND. An environmental variable with an arbitrary name can carry a nefarious function which can enable network exploitation.

Windows

Submission + - WINDOWS 8 PREVIEW REVEALS MAJOR UI METAMORPHOSIS (blogspot.com)

martty writes: "Microsoft began its Windows 8 publicity blitz in earnest Wednesday, previewing an operating system that appears to break from the norm in more ways than one.
It has a tile interface similar to that of Windows Phone 7, it will run on PCs and tablets, and it will support both touchscreen and mouse-and-keyboard interactions."

Microsoft

Submission + - 8 rumored features in Windows 8 (networkworld.com)

stinkymountain writes: Microsoft recently allowed select OEM partners to download updated preview builds of Windows 8. Since then, there have been several leaked images of supposedly new features that you might see in the next version of Windows when it launches (perhaps in early 2012). And Microsoft showed off some features in a preview last week. Here's a compilation...
The Internet

EU Telecom Deal Finished — No Three Strikes 109

a_n_d_e_r_s writes "The battle was hard, but the final text of the agreement ensures that people in the EU are not disconnected from the Internet without a chance to get a fair and impartial hearing beforehand. The important part is: 'Accordingly, these measures may only be taken with due respect for the principle of presumption of innocence and the right to privacy. A prior fair and impartial procedure shall be guaranteed, including the right to be heard of the person or persons concerned, subject to the need for appropriate conditions and procedural arrangements in duly substantiated cases of urgency in conformity with European Convention for the Protection of Human Rights and Fundamental Freedoms. The right to an effective and timely judicial review shall be guaranteed.' This means that if someone is accused of copyright infringement, they can't just be disconnected from Internet. It lets the accused get a chance to disagree and take it to court first. The urgency clause means that a computer can be disconnected if it is part of an ongoing DDoS attack. Next, this has to be implemented into the EU nations' own laws, so the final ruling on how this will be implemented is not out yet. But, overall, it looks like a great success in stopping informal three-strikes disconnections."
Space

Submission + - The tech aboard the International Space Station (cnet.co.uk)

CNETNate writes: With its own file server for uploaded Hollywood blockbusters, a 10Mbps Internet connection to Earth and a stock of IBM ThinkPad notebooks for sending emails, the amount of consumer technology aboard the $150 billion International Space Station is impressive. Yet it's the responsibility of just two guys to maintain the uptime of the Space Station's IT, and they have given an in-depth interview with CNET to explain what tech's aboard, how it works and whether Windows viruses are a threat to the astronauts. In a related feature, the Space Station's internal network (which operates over just bandwidth of just1Mbps) and its connected array of Lenovo notebooks is explained, along with the future tech we could see aboard the traveling colony as it traverses the future.
Spam

Submission + - Facebook on Spammer Rampage (cnet.com)

An anonymous reader writes: Facebook is on a never before seen legal rampage against high profile internet spammers. Today Facebook was awarded yet another 9 figure settlement, this time for over $700 million dollars. Facebook also has a criminal contempt case on Wallace, which means a high likelihood of prison, a big win for the internet and a milestone in cyber law.

From the courts:
"The record demonstrates that Wallace willfully violated the statutes in question with blatant disregard for the rights of Facebook and the thousands of Facebook users whose accounts were compromised by his conduct," Fogel wrote in his judgment order, which permanently prohibits Wallace from accessing the Facebook Web site or creating a Facebook account, among other restrictions.

Software

Submission + - Software That Fixes Itself (technologyreview.com) 1

shreshtha writes: Martin Rinard, a professor of computer science at MIT, is unabashed about the ultimate goal of his group's research: "delivering an immortal, invulnerable program." In work presented this month at the ACM Symposium on Operating Systems Principles in Big Sky, MT, his group has developed software that can find and fix certain types of software bugs within a matter of minutes.
Music

Singer In Grocery Store Ordered To Pay Royalties 645

yog writes "An assistant at a grocery store in Clackmannanshire, Scotland, was ordered by the Performing Right Society (PRS) to obtain a performer's license and to pay royalties because she was informally singing popular songs while stocking groceries. The PRS later backed down and apologized. This after the same store had turned off the radio after a warning from the PRS. We have entered an era where music is no longer an art for all to enjoy, but rather a form of private property that must be regulated and taxed like alcohol. 'Music to the ears' has become 'dollars in the bank'."
Google

Google To Take On iTunes? 277

An anonymous reader writes 'Multiple sources say Google is preparing to launch Google Audio. According to people familiar with the matter, Google has been securing content from record companies. Is Google about to go head-to-head with Apple's iTunes?'

Comment Re: Licensed books (Score 4, Interesting) 488

A friend who sells books on eBay often sells used copies of the Jane's books (Jane's All the World's Aircraft, Jane's Fighting Ships, etc.), the annual editions of which sell new for $900+. He's listed many of these over the years, but recently out of nowhere he gets an inquisitory e-mail from Jane's, demanding that he inform them of the source from which he obtained the books, and strongly suggesting that he not list them anymore because the reduced prices he gets for resale are "diminishing the perceived value of our products." He was tempted to tell them what to stick where, but as he put it, "the next step may be legal, and right or wrong, I don't want to get into a transatlantic pissing match over this."

(So now, he sends any Jane's books he finds to me, I list them, and we split the profits. And no nastygrams from across the pond yet. Yay for me.)

A good example, though, of how even a legally misguided implied threat can intimidate someone. If my friend sold nothing but Jane's books, he'd be more inclined to fight, but he does a decent business without them, and just figures he'll avoid getting into something that he has neither the time or money to deal with.

Image

Beautiful Security 81

brothke writes "Books that collect chapters from numerous expert authors often fail to do more than be a collection of disjointed ideas. Simply combining expert essays does not always make for an interesting, cohesive read. Beautiful Security: Leading Security Experts Explain How They Think is an exception to that and is definitely worth a read. The book's 16 chapters provide an interesting overview to the current and future states of security, risk and privacy. Each chapter is written by an established expert in the field and each author brings their own unique insights and approach to information security." Keep reading for the rest of Ben's review.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...