Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Social Networks

Submission + - Porn & recipes found on Toronto's dead drop 1

rudy_wayne writes: "Whenever I think of people secretly exchanging information, I envision money bags left behind loose bricks and secret documents hidden in a hollowed out book. As it turns out, this method of sharing information has a name — it's called a "dead drop". In October 2010, Berlin-based media artist Aram Bartholl decided to modernize the idea and created five USB dead drops in New York City. The idea is simple: a USB flash drive is embedded into a wall or other public space using cement. After that, anyone can access the drive and leave and take files as they please."

According to Lauren Souch at blogTO, "In early November, a dead drop appeared in Toronto. The drop currently contains twelve recipes, a list of fictional drug use in movies (with hyperlinks!) and a guide on how to make a homemade stun glove using a disposable camera. Of course, there are also a number of pictures loaded on the USB — 45 to be exact — and I was not surprised to find roughly 40% of the pictures are either half-naked women or porn."
KDE

Submission + - KDE SC 4.6 RC1 – Another Look (everydaylht.com)

dmbkiwi writes: A few weeks ago, I put up a post about the first beta release of KDE SC 4.6. Unfortunately, due to a number of bugs, I’ve had to revert back to 4.5 on a couple of machines. One because there seemed to be a regression in graphics performance on the Intel based chipset I had on one machine. The other, because I decided to move from openSuse back to Kubuntu, which I might say was a pleasant surprise in terms of polish and stability. Anyway, back to the story at hand Having now installed KDE SC 4.6 RC1 on my main desktop machine, running Kubuntu, it seems to be playing quite nicely. Here are my impressions of this latest pre-release of KDE SC 4.6.

Submission + - microUSB cellphone charger becomes EU standard (blogtechnical.com)

An anonymous reader writes: The European Commission has put into effect a June 2009 agreement stating that major cellphone manufacturers should standardize their charging/data connection ports to the popular microUSB format. CEN-CENELEC and ETSI provided the standards by which these 14 companies will abide by to make cell phone recharging and data transfer easy.
Apple

Submission + - Apple privacy concerns go to court (cnet.com) 1

An anonymous reader writes: From the article: Apple is being sued for allegedly letting mobile apps on the iPhone and iPad send personal information to ad networks without the consent of users. Some of the apps listed are on the Android market as well, but there is no mention of a similar problem for Google. One wonders if Apple could be persuaded to strip access to the unique phone identifiers from apps.....
Communications

Lessons Learned From Skype’s Outage 278

aabelro writes "On December 22th, 1600 GMT, the Skype services started to become unavailable, in the beginning for a small part of the users, then for more and more, until the network was down for about 24 hours. A week later, Lars Rabbe, CIO at Skype, explained what happened in a post-mortem analysis of the outage."
Sony

Submission + - PS3 hacking without a USB dongle is on the way (myce.com)

Wesociety writes: Some interesting news is beginning to filter out of the 27C3 (Chaos Communication Congress) Hacker Conference 2010. Fail0verflow, a group who is referring to themselves as “a bunch of curious hackers”, put on a demonstration at the 27C3 conference today showing how the discoverer of Sony’s ECDSA code, the PS3 “official signature key”, can be used to allow anyone to sign executable files and run them on any retail PS3 console, undetected. USB dongles will no longer be required for PS3 hacking!
Censorship

Submission + - Amazon Censorship Expands (blogspot.com) 1

Nom du Keyboard writes: Recently word leaked out about Amazon removing titles containing fictional incest. Surprisingly that ban didn't extend to the 10 titles of Science Fiction Grand Master Robert A. Heinlein that incorporate various themes of incest and pedophilia. Now, it seems that the censorship is expanding to m/m gay fiction if it contains the magic word "rape" in the title. Just how far is this going to be allowed to proceed in relative silence, and who is pushing these sudden decisions on Amazon's part?
Transportation

Submission + - South Korea Launches First Electric Bus Fleet (inhabitat.com)

An anonymous reader writes: The Seoul Metropolitan Government just rolled out the world’s first commercial all-electric bus service. The buses were designed to be as efficient as possible — each bus can run up to about 52 miles on a single charge and they have a maximum speed of about 62 miles per hour. The vehicles’ lithium-ion battery packs can be fully charged in less than 30 minutes and they also feature regenerative braking systems that reuse energy from brakes when running downhill.

Submission + - Playstation 3 code signing cracked for good! (ps3news.com) 1

F-3582 writes: The PS3 has finally been cracked wide open! The secret code signing key has finally been discovered. Or as Marcan42 tweets:

“FWIW lightning talks tomorrow are at 11:30-13:45. PS3 demo will be 4 minutes _somewhere_ within that range (to be determined). They can try to whitelist every existing piece of official PS3 code... but good luck with that. IOW they CANNOT change keys or fix this in a new firmware, because stuff we sign is every bit as good as existing official software. Wii fakesigning vs. PS3 epic fail: Wii issue is a BUG in console code (fixable), PS3 issue is a FAIL in THEIR secret signer (not fixable).”

Read more: http://www.ps3news.com/PS3-Hacks/Fail0verflow-27C3-PS3-Exploit-Hacker-Conference-2010-Highlights/#ixzz19WiQ5lIg

Security

Submission + - Threatpost's Five Security Trends to Watch in 2011 (threatpost.com) 1

Gunkerty Jeb writes: It’s the time of year when all of us gaze into the crystal ball and think of what the next 12 months has in store. That’s a tough thing to do. In the IT security business, it’s even tougher, as the big events in the computer security world often turn on what’s not readily discoverable: unknown holes in common software platforms, loosely configured servers holding sensitive data, the dark ruminations of malicious (but normal-seeming) employees. But when you step back a bit from specific events and it gets a bit easier to discern the terrain ahead. Last year, at this time, for example, Threatpost contributor Dino Dai Zovi looked into the mists of 2010 and saw sandboxes – lots of them. And lo and behold, we saw leading vendors including Google and Adobe embracing sandboxing as a way to contain malware this year. Now its Threatpost’s turn to play the oracle: predicting some of the salient security trends that we’re likely to be writing about in 2011. Here’s our list of five security trends you should be watching for.

Submission + - The 10 Best Hacks of 2010 (pcworld.com) 2

Anonymous Coward writes: "from the article...
iPod-Controlled Car
Possibly the ultimate hack of the year, a DIY hacker figured out how to control a car externally using a lowly iPod Touch. With a bit of wireless network modding and the use of RedEye for the remote system, car hacker Dave Phipps made the iPod capable of controlling the windows, closing the doors, and managing other other little subsystems of the car."

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...