Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Technology (Apple)

iPhone 3GS Finally Hacked 376

Well, the inevitable hacking of Apple's latest flavor of iPhone has happened. Named "purplera1n," the tool will only allow installation of unauthorized applications instead of a full unlock. "The purplera1n jailbreak will free your iPhone from the limitations imposed on it by AT&T and Apple. After jailbreaking, a user will be able to customize the iPhone with home-screen wallpapers and third-party ringtones. But the biggest advantage of jailbreaking is the support of unapproved apps such as iBlackList (blacklists and whitelists for contacts) and many others."

Comment And a pony (Score 1) 200

If you can squish all the processing power of say an IBM Roadrunner supercomputer inside a 19-inch box and make it run on about 60 kilowatts of electricity, the government wants to talk to you.

Well then. I'm sure people will go with the more traditional routes of terrorism, theft, and tax evasion to get a one on one session with the government. After all, it just seems easier.


The 100 Degree Data Center 472

miller60 writes "Are you ready for the 100-degree data center? Rackable Systems has introduced a new enclosure that it says can run high-density racks safely in environments as hot as 104 degrees (40 degrees C), offering customers the option of saving energy in their data center. Most data centers operate in a range between 68 and 74 degrees. Raising the thermostat can lower the power bill, allowing data centers to use less power for cooling. But higher temperatures can be less forgiving in the event of a cooling failure, and not likely to be welcomed by employees working in the data center."
The Military

US Forgets How To Make Trident Missiles 922

Hugh Pickens writes "The US and the UK are trying to refurbish the aging W76 warheads that tip Trident missiles to prolong their life and ensure they are safe and reliable but plans have been put on hold because US scientists have forgotten how to manufacture a mysterious but very hazardous component of the warhead codenamed Fogbank. 'NNSA had lost knowledge of how to manufacture the material because it had kept few records of the process when the material was made in the 1980s, and almost all staff with expertise on production had retired or left the agency,' says the report by a US congressional committee. Fogbank is thought by some weapons experts to be a foam used between the fission and fusion stages of the thermonuclear bomb on the Trident Missile and US officials say that manufacturing Fogbank requires a solvent cleaning agent which is 'extremely flammable' and 'explosive,' and that the process involves dealing with 'toxic materials' hazardous to workers. 'This is like James Bond destroying his instructions as soon as he has read them,' says John Ainslie, the co-ordinator of the Scottish Campaign for Nuclear Disarmament, adding that 'perhaps the plans for making Fogbank were so secret that no copies were kept.' Thomas D'Agostino, administrator or the US National Nuclear Security Administration, told a congressional committee that the administration was spending 'a lot of money' trying to make 'Fogbank' at Y-12, but 'we're not out of the woods yet.'"

Comment Re:Just rip off the band-aid (Score 1) 496

Your post reeks of troll.

Lose 1: So any permissions based system that requires privilege escalation is "buggy as hell and totally insecure"? I suggest you open a shell in linux and type "reboot". Oh, crap - we need more privileges to do that! Would you want any individual without the correct privileges to restart the system? (Although then again, you may be running as root, in which case I might have to ask - WHY?).

Lose 2: Seriously? Users come first. They want all their stuff to work just as it used to and they (sort of) want to be secure. There's a trade off here that Microsoft is making that is a completely understandable business decision. They are trying (and for the most part, succeeding) to please everyone.

Your position reminds me of this:

In the real world, software development is about trade offs and pleasing your customer base - not perfect algorithms and rms everywhere... Most users can't tell the difference between a secure system or not - but they sure as hell can tell when program XYZ won't run.

Visa Says No New Processor Breach After All 38

Buzz has been building for the last week about what might be a new data breach at a credit-card processor. No, not Heartland, a different one. Now Computerworld is reporting that Visa claims there was no new breach. Whom to believe? "In actuality, Visa said in a statement issued today, alerts that it recently sent to banks and credit unions warning them about a compromise at a payment processor were related to the ongoing investigation of a previously known breach. However, Visa still didn't disclose the identity of the breached company, nor did it say why it is continuing to keep the name under wraps."

Slashdot Top Deals

The goal of science is to build better mousetraps. The goal of nature is to build better mice.