Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Schoolkids' bullet-shaped mini racer rockets to 48 mph (gizmag.com)

carketys writes: A team of schoolkids from the UK has built a rocket-powered mini racing car capable of reaching speeds of over 48 mph (77.2 km/h). Slim Jim won the inaugural BBC micro:bit Model Rocket Car Competition, for which participants had to use foam, solid fuel rockets and BBC micro:bit computers to build their cars...
Continue Reading Schoolkids' bullet-shaped mini racer rockets to 48 mph





Category: Children





Tags:

Related Articles:


Submission + - New OS X Backdoor Emerges With Tor C&C

Trailrunner7 writes: Researchers have discovered a new backdoor for Mac OS X that gives attackers essentially complete control over an infected machine. The malware is disguised as a common file converter utility and uses Tor for some communication functions.

Known as Eleanor, the backdoor has a wide range of functionality, including the ability for the attacker to remotely control the infected machine, steal data, take pictures from the machine’s camera, and take many other actions. The infection routine starts when the user downloads and runs the malicious app, called EasyDoc Converter, which looks like a drag-and-drop conversion utility. Once on a new machine, the app executes a script that serves as an installer for the rest of the malware’s functionality, including a Tor component, a Web service agent, and a Pastebin agent.

Submission + - Hacked Smart Watch Can Reveal the Wearer's ATM Pin (ieee.org)

the_newsbeagle writes: By gaining access to the sensors in someone's smart watch, hackers could track the person's hand movements at an ATM and figure out his/her pin. The hacker needn't be anywhere near the ATM; data can be lifted from the smart watch by either a discreet wireless sniffer or by malware on the watch that sends info to a server. This is hardly the first demonstration of the security flaws in smart watches. Last year, a research group showed that a watch's sensors can reveal keystrokes on a computer keyboard.

Submission + - Architecture/engineering 5th highest suicide rate, computers/tech 8th highest (cdc.gov)

afeeney writes: The CDC reported on the suicide rates from 2012, across 17 of the United States. The highest rates are in farming, fishing, and forestry, the lowest in education, training, and library. Architects and engineers had the 5th highest rate, and computers and technology had the 8th highest. Male engineers were far more likely to kill themselves (32.8 suicides per 100,000) than females (12.5).

Do you perceive this as based on the characteristics of the population (including the fact that jobs focused on precision might make suicide attempts more successful, higher proportion of males) or the characteristics of the jobs (stress, complexity)?

If you've ever been there or know somebody who has, what helped?

Help is available at the National Suicide Prevention Hotline if you or somebody you care about is considering suicide.

Comment Re:Switch tasks when you are stuck (Score 1) 106

I've heard the same thing, described as "Pile A" and "Pile B". (I think it was a famous science fiction writer, who had two piles of manuscripts he was working on -- but I can't remember which one. Maybe Robert Heinlein?)

Yeah, RAH really had the knack for plausible-sounding BS. We miss ya, Bob!

Submission + - Why Are Hackers Increasingly Targeting The Healthcare Industry? (helpnetsecurity.com)

Orome1 writes: Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. Cybercriminals have found medical data to be far more valuable than credit card fraud or other online scams. This is because medical information contains everything from a patient’s medical history to their medical prescriptions, and hackers are able to access this data via network-connected medical devices, now standard in hi-tech hospitals. This is opening up new possibilities for attackers to breach a hospital or a pharmaceutical company’s perimeter defences. If a device is connected to the internet and left vulnerable to attack, an attacker could remotely connect to it and use it as gateways for attacking network security.

Submission + - Update Latest Version Of Java To Prevent Attackers From Your Application Or Web (joomla.com)

An anonymous reader writes: Updating latest version of Java or disabling it if you are unable to recognize the time when you used it on the web is the recent declaration made by officials. They have fixed 25 vulnerabilities in the Java platform, including the one that has been misused in attacks.

Submission + - Slashdot Poll: Enough already? (census.gov)

LeadSongDog writes: Sometime early Friday this planet will hit 7-1/3 billion people. Is it time to stop the population clock?
A) Soon
B) Never
C) Overdue
D) As soon as I'm finished my Soylent Green
E) If Cowboy Neal ever finds a breeding Partner
F) I for one want to make serfs for my new robot overlords

Submission + - Fujitsu picks 64-bit ARM for Post-K supercomputer (theregister.co.uk)

An anonymous reader writes: Today, at the International Supercomputing Conference 2016 in Frankfurt, Germany, Fujitsu revealed its Post-K machine will run on ARMv8 architecture. The Post-K machine is supposed to have 100 times more application performance than the K Supercomputer – which would make it a 1,000 PFLOPS beast – and is due to go live in 2020. The K machine is the fifth fastest known super in the world, it crunches 10.5 PFLOPS, needs 12MW of power, and is built out of 705,000 Sparc64 VIIIfx cores.

Slashdot Top Deals

What good is a ticket to the good life, if you can't find the entrance?

Working...