Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Facebook

Submission + - Facebook Disables URL Login Shortcut After Google Search Exposes Security Flaw

An anonymous reader writes: security hole has been discovered that allows anyone to see the email addresses corresponding to certain Facebook accounts. Worse yet, some appear to be accessible without even entering a password. However, a Facebook engineer now says that the company has disabled the feature that created the hole.
Cloud

Submission + - US Government Says You Don't Own Your Cloud Data so We Can Access It At Any Time (eff.org) 2

jest3r writes: Yesterday the EFF filed a brief proposing a process for the Court in the Megaupload case to hold the government accountable for the actions it took (and failed to take) when it shut down Megaupload's service and denied third parties access to their property. Many businesses used Megaupload's cloud service to store and share files not related to piracy. The government is calling for a long, drawn-out process that would require individuals or small companies to travel to courts far away and engage in multiple hearings just to get their own property back. The government's argument that you lose all your property rights by storing your data on the cloud could apply to Amazon's S3 or Google Apps or or Apple iCloud services as well.

Submission + - WW2 carrier pigeon and undecoded message found in chimney (bbc.co.uk)

BigBadBus writes: "The BBC is reporting that the remains of a World War 2 carrier pigeon were found during renovation of a chimney in England. What is interesting is that the pigeon's remains still had its message attached to the leg ring; even more interesting, this is the first recorded instance of a code being used rather than plain text. The successor to WW2 code-breaking HQ Bletchley Park, the GCHQ, is trying to decipher this unique code. Maybe a slashdot reader can beat them to it?"
Security

Submission + - Hackers Moving To Target SQL Injection (i-programmer.info)

mikejuk writes: An analysis of hacker forums has found that SQL injection is currently the most discussed topic among forum members. Having inspected a sample of 439,587 threads between September 2011 and September 2012. The researchers found that SQL injection is now tied with DDoS as the most discussed topic. Both topics got 19 percent of discussion by volume. Facebook was the most discussed social media platform, commanding 39 percent of discussions with Twitter a close second at 37 percent.
Power

Submission + - Volcano power plan gets U.S. go-ahead (gizmag.com) 2

cylonlover writes: Having successfully negotiated the challenging regulatory slopes of the U.S. Bureau of Land Management, the U.S. Forest Service, the U.S. Department of Energy, and a host of Oregon state agencies, the Newberry Enhanced Geothermal Systems (EGS) demonstration project is in the process of creating a new geothermal reservoir in central Oregon. The core of the new reservoir is a two mile (2.7 km) deep well drilled about four miles (5.4 km) from the center of Newberry Volcano. The rock surrounding the wellbore reaches temperatures in the order of 600 F (300 C), and is nearly impermeable to water. That, however, is about to change.

Newberry Volcano is one of the largest and youngest volcanoes in the United States. Having last erupted about 1,300 years ago, it consists of over 400 individual volcanic vents, which, when combined, form a broad mounded landform referred to as a shield volcano. The Newberry EGS Demonstration geothermal reservoir is being formed in the high-temperature, low-permeability deep lava of the volcano's northwest flank.

Comment Re:A little thing called trust (Score 1) 446

Um, biometric authentication fails badly when used for remote, non-controlled devices. All it really is then is a long, awkward, very-hard-to-remember password. If I intercept it, I've still got a perfectly usable copy. Biometrics has a place on controlled hardware. For general computing, it is nothing but smoke and mirrors.

How do you know my browser is passing your server an actual retina scan and not a saved value I copied from Bob's PC via my quasi-key-logger attached to Bob's USB eye-scanner?

Comment My preference and a follow-on question (Score 4, Interesting) 359

As an answer, I've used Virtual Dimensions and Dexpot a lot. Last I used one, I preferred Dexpot.

Now, a slight variant of the question. Are there any truly multi-monitor aware virtual desktops. I mainly am looking for the ability to run the two screens as independent virtual desktops and change them independently.

Slashdot Top Deals

"The trouble with doing something right the first time is that nobody appreciates how difficult it was." -- Walt West

Working...