Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Submission + - $2 Million 'Dark Knight' Home Theater is Ultimate Bat Cave (cepro.com)

An anonymous reader writes: "The Dark Knight" themed home theater is being built inside a 12,000-square-foot home in Greenwich, Conn. The goal was to fuse together the cozy elements of Wayne Manor, with the Art Deco styling of Gotham City.

Information on the A/V equipment is limited, but "The Dark Knight" home theater features a 180-inch screen with Batsuits on each side. There are a total of six Batsuits throughout the room. There's also a command and control center and even an authentic Tumbler replica in a secret room hidden behind a bookshelf. Inside the secret room is an exit that was designed as a secret tunnel approximately 30 feet long.


Submission + - 5 pressing questions the Mars Curiosity Rover should answer (societytea.com)

An anonymous reader writes: On Monday, the Mars Curiosity Rover arrived in its entire six legged splendor on the Planet Mars.While scientists at NASA are confident that the Mars Rover will find traces of water and answer one of humanities most pressing questions, “Are we truly alone?”, we bring you 5 pressing questions the Mars Curiosity Rover should answer

Submission + - Facebook Adds App Adverts For Mobile Revenue Boost (techweekeurope.co.uk)

twoheadedboy writes: "Having introduced mobile adverts in March in an effort to monetise its mobile user base, Facebook has now opened the doors for developers to add advertise their apps on users' feeds. The social network will hope the announcement will appease those concerned about advertising revenues. Although more than half of Facebook’s 900 million users access the site through a mobile device, none of its $3.15 billion (£2 billion) in advertising revenue comes from mobile adverts."

Submission + - The unibody iPhone (thetechblock.com)

thetechblock writes: "A note before we get started: These images are of components of what is rumored to be the next iPhone, not of an official Apple-assembled iPhone. To that end, it’s almost like putting together a T-Rex skeleton. We can be pretty sure that T-Rex had tiny arms and a long tail, but I suppose it’s also possible we attached the tail incorrectly and really it’s a unicorn horn. Same thing applies here."

Submission + - No bomb powerful enough to destroy an on-rushing asteroid, sorry Bruce Willis (networkworld.com) 2

coondoggie writes: "Maybe it's the doom predictions some folks are fearing about the end of the Mayan calendar this year or maybe these guys are obsessed with old Bruce Willis movies. Either way a class of physics students from the University of Leicester decided to evaluate whether or not the premise of Willis' 1998 "Armageddon" movie — where a group of oil drillers is sent by NASA to detonate nuclear devices on an asteroid that threatens to destroy Earth — could actually happen."

Submission + - How Samsung modeled the Galaxy S after the iPhone (edibleapple.com)

An anonymous reader writes: Samsung’s copying of Apple’s iPhone runs deep, and recent evidence introduced at the Apple-Samsung trial reveals the breathtaking extent to which Samsung modeled their own smartphones after Apple own designs and features.

The evidence in question is a massively large document compiled by Samsung engineers which shows 126 separate ways the company’s Galaxy S smartphone can be improved. And how might it be improved? By looking at a slew of iPhone features and copying them.


Submission + - This 281-Gigapixel Image Depicts an Entire Animal at the Cellular Level (gizmocrazed.com)

Diggester writes: This picture is made up of 26,000 unique images that total a file size of 281-gigapixels; imagine that upload time! That picture is of a 1.5 millimeter zebrafish embryo, and the photo was captured using virtual nanoscopy. While at first glance the image doesn't that impressive but, at full resolution, you have the ability to zoom in to the most minute detail.

The technique used by the research group at Leiden University Medical Center in the Netherlands, and their project, will published in the Journal of Cellular Biology in the upcoming months. You can try to see the full picture here but it does seem to struggle every once a while because of the enormous file size.


Submission + - Could a Hurricane 5 take down East Coast data centers (slashdot.org)

TheNextCorner writes: "With more data moving into the Cloud, there is an increasing danger of data loss when one of these cloud computing data centers fails. Hurricanes pose a real thread for data centers located in North Virginia and Carolina, where Google, Apple & Facebook have opened large data centers. Could a Hurricane 5 become a problem for these cloud data centers and take down the Internet?"

Submission + - 32-Year Study Shows how Geeky Kids Become Happy Adults | GeekDad | Wired.com (wired.com)

An anonymous reader writes: Scientists mining over 32 years of data from New Zealand followed about 1000 people from birth to adulthood. The factor that most predicted well being as an adult was social connectedness as an adolescent. Academic achievement was a much weaker predictor of adult well-being.
The Internet

Submission + - How to watch Internet TV across international borders (networkworld.com)

colinneagle writes: Living in the U.S., one of my greatest regrets is that I can't watch BBC video with iPlayer. If I were living in the U.K., I'd feel the same away about not being able to watch shows on Hulu. But, with a Web proxy or a virtual private networks (VPN)s and an Internet Protocol (IP) address in a country where the content is available, you can watch these shows.

Technically, it's easy to set your browser up to use a Web proxy or VPN software. With a Web proxy and Windows XP, for example, you just go to Internet Options, click the Connections tab, and then click LAN Settings. Next, under Proxy server you click to select the “Use a proxy server for your LAN” check box. Finally, you enter the IP address of the proxy server and in the Port box, type the IP number that is used by the proxy server for client connections—that's usually 8080. It's usually pretty simple to do that in any browser and operating system. There are also programs, such as Proxy Switchy, for Chrome that makes it easy to switch from one proxy to another in a single session.

When you use a proxy, though, all your traffic is still open to network administrators. If you want to visit another country and watch their TV in privacy, you'll need a VPN.

There are many commercial proxy servers. Two that I've tried, and I can recommend, are AllAnonymity, with proxy servers in, among other countries, Canada, the United States, and the United Kingdom, and HideMyAss, with numerous supported countries.

If you want to use a VPN, you'll need to set yourself up with a private VPN service. These companies, such as Banana VPN, Black Logic, StrongVPN, and Unblock Us, will set you up with their VPN software and connections in other countries. Generally speaking, you'll end up paying a monthly service fee of $10 to $20 a month for either proxy or VPN services.


Submission + - Drexel University Giving UAVs a Hand (and Arms) (gizmag.com)

Zothecula writes: Unmanned aerial vehicles (UAVs) have proven very successful as surveillance, intelligence-gathering and mapping craft, but their ability to interact with the ground has been largely confined to launching missiles. Now, Drexel University in Philadelphia, Pennsylvania is planning to endow them with arms and hands to allow them to work on such tasks as repairing infrastructure and disaster recovery while hovering near the ground.

Submission + - Zeus Trojan Hits Blackberry Devices (securityweek.com)

wiredmikey writes: Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy have been found.

Zitmo, which hit Android devices back in July 2011, refers to a version of the Zeus malware that specifically targets mobile devices.

Denis Maslennikov, a security researcher at Kaspersky Lab, also identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. While previous Android variants have been primitive, the latest.apk dropper, which shows up as an app "Zertifikat," looks "more similar to 'classic'" Zitmo, he said. When executed, it displays a message in German that the installation was successful, along with an activation code. The Android sample also included a self-issued certificate that indicates it was developed less than a month ago.


Submission + - Ga. Tech Launches Security Data-Sharing Program For F500, Government (threatpost.com)

Trailrunner7 writes: One of the more pernicious and as-yet incurable diseases in security is the resistance to sharing data. Organizations large and small collect all sorts of information on attacks, vulnerabilities and threats and, for the most part, it simply sits in databases and is never of any use to anyone outside of the organization. But there's an effort underway at the Georgia Tech Research Institute to change that through the use of a new information-gathering and analysis system called Titan.

Private data-sharing initiatives have been ongoing for a long time now, both formally and informally. Volunteer groups and industry coalitions such as the Shadowserver Foundation, Honeynet Project and many smaller informal working groups pool data on attackers and attacks. Some of that data is made public via reports on especially bad hosting providers or the most frequently exploited platforms or bugs. But data on how specific attacks went down, what the timeline, tactics, techniques and tools were and what was stolen is much harder to come by. It's shared over beers or in hallways at conferences, between former colleagues or through a friend of a friend. And that's the most valuable stuff, the dirt on who stole what from whom and how.

Without that kind of data, it's difficult for organizations to know what they're up against and what to look for at any given time. That's where GTRI's Titan project will attempt to fill the void. The system is built on a collection of data on malware that is growing by about 100,000 samples a day. Participants in the project will contribute their own data on malicious code and attacks and also will be able to see what others have contributed, to glean information about ongoing attacks. The data will be anonymized so no one will know which company was compromised by which malware. Right now, the system is being used by a handful of Fortune 500 companies and government agencies, but that's going to grow.


Submission + - Verizon has five secret data plans you can only get if you know about them (bgr.com)

zacharye writes: Verizon Wireless killed its previous data plan offerings in late June and replaced them with a series of “Share Everything” plans, which give smartphone users unlimited voice minutes and text messages alongside a single bucket of data that can be shared between as many as 10 different phones, tablets and laptop computers. The nation’s top carrier publicizes six data tiers for its new plans, ranging from a base price of $50 a month for 1GB to $100 a month for 10GB. In addition to those plans, however, Verizon on Tuesday confirmed that it has five additional unpublicized tiers available for Share Everything users...

Slashdot Top Deals

Vax Vobiscum