Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Just walk away (Score 5, Insightful) 133

I don't think there's much chance of changing the American negotiators views on this, but I'm still going to contact my representatives in Congress. Nothing will likely come out of it. If you are a /.er in a more reasonable country, say New Zealand or Canada, I beg you to contact your MPs and demand transparency in this process. We shouldn't have to find out about the progress of negotiations through leaks.

Submission + - FBI uses man's photo to create Bin Laden (canoe.ca)

innocent_white_lamb writes: The FBI has acknowledged using a photo of a Spanish politician to create an image of Osama Bin Laden that they have posed on their "Wanted -Reward Offered" website. They downloaded a photo of the man from the Internet. He is now afraid to travel to the USA because so many airports use biometrics to identify "terrorists" and he is now Bin Laden!
Networking

Submission + - Facebook's Zuckerberg says forget privacy (eweekeurope.co.uk)

judgecorp writes: Privacy is no longer a social norm, according to the founder of Facebook, Mark Zuckerberg. Speaking at the Crunchie awards in San Francisco, the entrepreneur said that expectations had changed, and people now default to sharing online, not privacy. It's all right for him, but does he mean it's ok for bodies like the UK government to monitor all citizens' Internet use? Or for criminals to use Facebook as a useful listing of good burglary sites?
Microsoft

Submission + - Microsoft Acknowledges Theft of Code from Plurk 1

adeelarshad82 writes: Microsoft acknowledged and took responsibility for the theft of code belonging to Plurk.com, although the company also said it was the work of a Chinese vendor. Plurk had previously filed a blog post with pictures and code that the company had said proved that Microsoft's Chinese microblogging site, Juku, had stolen code and design elements.
Space

Big Dipper "Star" Actually a Sextuplet System 88

Theosis sends word that an astronomer at the University of Rochester and his colleagues have made the surprise discovery that Alcor, one of the brightest stars in the Big Dipper, is actually two stars; and it is apparently gravitationally bound to the four-star Mizar system, making the whole group a sextuplet. This would make the Mizar-Alcor sextuplet the second-nearest such system known. The discovery is especially surprising because Alcor is one of the most studied stars in the sky. The Mizar-Alcor system has been involved in many "firsts" in the history of astronomy: "Benedetto Castelli, Galileo's protege and collaborator, first observed with a telescope that Mizar was not a single star in 1617, and Galileo observed it a week after hearing about this from Castelli, and noted it in his notebooks... Those two stars, called Mizar A and Mizar B, together with Alcor, in 1857 became the first binary stars ever photographed through a telescope. In 1890, Mizar A was discovered to itself be a binary, being the first binary to be discovered using spectroscopy. In 1908, spectroscopy revealed that Mizar B was also a pair of stars, making the group the first-known quintuple star system."

Comment Re:Linux PC (Score 1) 376

The Cisco ASA 5505 is a good choice, but prepared for a bit of a learning curve. For ASA 8.2, the command reference guide weighs in a 3534 pages. If the command-line scares you away, the integrated web management (ASDM) works well for what it is. The 5505 has no fan, provides an 8 port switch (including 2 PoE ports), and is probably slightly greener than an old box running Linux.

Submission + - Ten Things Mobile Phones Will Make Obsolete

An anonymous reader writes: recombu.com has an article examining ten things mobile phones will make obsolete, including phone booths, wristwatches and handheld games consoles. It's interesting to see how many devices have been absorbed into mobile phone technology and it begs the question, are we better off having everything in one device? The author poignantly concludes that while it's great to have so much power at our fingertips it does mean that some of us will rely on mobile phones for even basic mental tasks, which is great until the battery runs out.

Comment Re:Of course there isn't a problem (Score 1) 502

Because the package management system runs as root, may install setuid files, or system daemons which contain vulnerable code; an unprivileged user cannot normally do this.

Sure - only signed packages can be installed - but signing a package won't make those pesky buffer overflow vulnerabilities go away.

Comment Of course there isn't a problem (Score 5, Insightful) 502

Certainly there can't be a problem here, says the Fedora team. According to the release notes, there are 15,000 packages which can be installed by these unprivileged users. That's a lot of fscking code -- surely some of it is poorly written. Consider this scenario: Package X suffers a critical {local, remote} root vulnerability. If the vulnerability isn't public, any local user (and maybe remote ones too!) has root. If the vulnerability is public, there is often a long window between downstream fixes and Fedora fixes. In either case, this is a security issue. The Fedora team really should have put this in the release notes and reconsider this implementation in the first place.

Slashdot Top Deals

Trying to be happy is like trying to build a machine for which the only specification is that it should run noiselessly.

Working...