Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Help! My former employer lies to my new employers! 4

An anonymous reader writes: As a relatively new graduate, I was hired at a small startup software company that produced e-commerce websites. (There are thousands of these companies) I did not have many options for employment, and this was better than flipping burgers. The owners/employers were your typical geek squad type without formal training. They did not believe in a business plan, client/employee contracts, or contacting lawyers. The coding was on par with CS 101, 2nd week and was a string of legal liabilities. I did not expect this company to last long, but the paychecks were not bouncing. I kept looking for new jobs, but I could not find any. Finally, I was released since they could not find any work for me to do.

Here is my problem, the company has not completely failed. I have listed this company on my resume, and I have been unintentionally slandered by the owners. I am positive the owners are not aware of slander, nor do I want to pursue legal action. However, it has cost me at least one job already. How do I list this company on my resume? How would I explain the gap in my employment? I am relatively young, so everyone checks my employment history. What do I do? I just want a job and my mom not to be my landlord/roommate!

I'm posting this as AC because I bet my former employers are reading this post while avoiding clients.
Education

Submission + - What to show 7/8 graders in database research? 6

PeterBVolk writes: Every year a magent school in my german home town sends 7 and 8 graders to our university for a week. I am currently employed as a member as academic staff and this year it is my turn to think of something. They have 3 days to "research" something. On the 5th day they have to hold a presentation and explain a poster they prepared on the 4th day. I've talked with other faculties and they typically do something praktical like "measure the tensile strength" of something. What should I let them do as a database research guy? Everything we do needs to much theoretical background. In the past the CS department didn't realy have any offerings at all for that week. So what do you think could be interesting in the field of databases for 7/8 graders that they can manage in 3 days and hold a presentation on?

Submission + - Geek-Friendly Video Cameras for Young Children

Alaren writes: My daughter, almost 7 years old, is fascinated by YouTube and has declared that she wants a video camera. This strikes me as an opportunity to teach about videography and video technology and to show her that computers do more than just play games. Unfortunately, most tech review sites don't deal in technology aimed at children, and most sites that do are uninformative SEO sewage bobbing through the intertubes. I was intrigued by the announced Lego camcorder but it does not appear to have reached production. The Discovery Kids line of video cameras looked promising, but reviews (especially of the software) are in short supply. Most of the other brands I've found are clearly aimed at helping kids feel like they're using a video camera without providing the functionality I want: reasonable quality (VGA or better), expandable storage (like an SD card), easy YouTube uploading, and some straightforward software for trimming and merging video files (and, maybe, audio tracks). Part of me thinks what I'm really looking for is a Flip, but of course with children durability is an added concern, and I'd like to minimize adult interference where possible. So, Slashdot, help me finish my Christmas shopping early: what experience do you have with child-friendly video equipment and software? What brands do you recommend? Or should I just buy the grown-up version and a pack of stickers?
Security

Submission + - Latest practical attacks on AES-256 (blogspot.com)

xizhi.zhu writes: "As blogged by Schneier, there is another new attack against AES-256. This new attack can break AES-256 of 9 rounds at the time 2^39, AES-256 of 10 rounds at time 2^45, and AES-256 of 11 rounds at time 2^70. Note that the full AES-256 has 14 rounds. However, this attack requires the cryptanalyst to have access to plain-texts encrypted with multiple keys that are related in a specific way. Also, Schneier suggests AES-128 at 16 rounds, AES-192 at 20 rounds, and AES-256 at 28 rounds."
The Almighty Buck

Submission + - RIAA: Don't Expect DRMed Music To Work Forever (arstechnica.com)

Oracle Goddess writes: "Buying DRMed content, then having that content stop working later is fair writes Steven Metalitz, the lawyer who represents the MPAA, RIAA in a letter to the top legal advisor at the Copyright Office. "We reject the view that copyright owners and their licensees are required to provide consumers with perpetual access to creative works." In other words, if it stops working, too bad. Not surprisingly, Metalitz also strongly opposes any exemption that would allow users to legally strip DRM from content if a store goes dark and takes down its authentication servers."
Security

Submission + - Null Character Hack Allows SSL Spoofing (wired.com) 3

eldavojohn writes: Two researchers, Dan Kaminsky and Moxie Marlinspike, came up with exact same way to fake being a popular website with authentication from a certificate authority. Wired has the details: 'When an attacker who owns his own domain — badguy.com — requests a certificate from the CA, the CA, using contact information from Whois records, sends him an email asking to confirm his ownership of the site. But an attacker can also request a certificate for a subdomain of his site, such as Paypal.com\0.badguy.com, using the null character \0 in the URL. The CA will issue the certificate for a domain like PayPal.com\0.badguy.com because the hacker legitimately owns the root domain badguy.com. Then, due to a flaw found in the way SSL is implemented in many browsers, Firefox and others theoretically can be fooled into reading his certificate as if it were one that came from the authentic PayPal site. Basically when these vulnerable browsers check the domain name contained in the attacker's certificate, they stop reading any characters that follow the "\0 in the name.'

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...