Forgot your password?
typodupeerror

Comment Missouri S&T (Score 1) 432

Our university uses MAC address filtering to allow people to connect to wireless, so Linux is supported by it (though not officially). I also work with IT here at the Help Desk, we take calls about Linux, go out to help users with it, and support it to the best of our ability. I'm an avid Linux user and most of my coworkers here at least have some experience. Needless to say we don't "laugh" in the faces of people who call with Linux issues.
Games

Cedega Being Replaced By GameTree Linux 124

An anonymous reader writes "TransGaming Cedega, the software forked from Wine that allows running Windows games under Linux, is being discontinued and replaced by GameTree Linux. This new software is also free. From the new website: 'TransGaming is pleased to announce the continued development of Cedega Technology under the GameTree Developer Program. This repositioning of the technology that powered the Cedega Gaming Service will allow the entire Linux community to gain free access going forward. Cedega is a cross-platform enablement technology that allows for Windows-native games to be executed on both the Linux desktop and embedded Linux platforms.'"
Crime

The Golden Hour of Phishing Attacks 59

Orome1 writes "Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims' credentials are harvested by cyber criminals within the first 60 minutes of phishing emails being received. Given that a typical phishing campaign takes at least one hour to be identified by IT security vendors, which doesn't include the time required to take down the phishing Web site, they've dubbed the first 60 minutes of a phishing site's existence is the critical 'golden hour.'"
Emulation (Games)

A JavaScript Gameboy Emulator, Detailed In 8 Parts 62

Two9A writes "JavaScript has shed its image of being a limited language, tied to DOM manipulation in a browser; in recent years, new engines and frameworks have given JS a reputation as a language capable of bigger things. Mix this in with the new elements of HTML5, and you have the capacity to emulate a game console or other system, with full graphical output. This series of articles looks in detail at how an emulator is written in JavaScript, using the example of the Gameboy handheld: starting at the CPU, and (as of part 8) running a copy of Tetris."
Idle

Submission + - Man claims caffeine insanity (yahoo.com)

caffiend666 writes: "A Kentucky man accused of strangling his wife is poised to claim excessive caffeine from sodas, energy drinks and diet pills left him so mentally unstable he couldn't have knowingly killed his wife, his lawyer has notified a court."..."Dr. Roland Griffiths, a professor of behavioral biology at Johns Hopkins University has noted in an unrelated study that there is a diagnosis for "caffeine intoxication," which includes nervousness, excitement, insomnia and possibly rambling speech." Personally, I just blame 'dark roasts'.
The Internet

Submission + - International Internet Treaty proposed by Europe (thinq.co.uk)

Stoobalou writes: Europe has proposed an Internet Treaty to protect the Internet from the political interference which threatens to break it up.

The draft international law has been compared to the 1967 Outer Space Treaty, which sought to prevent space exploration being pursued for anything less than the benefit of all human kind. The Internet Treaty would similarly seek to preserve the Internet as a global system of free communication that transcends national borders.

An early draft of the Treaty has come into the possession of THINQ.co.uk as governments around the world pile pressure on the United Nations to bring the Internet under political control. Their various hare-brained schemes threaten to make communication on the Internet conditional on criteria set by narrow political interests.

Security

Two Unpatched Flaws Show Up In Apple iOS 171

Trailrunner7 writes "The technique that the Jailbreakme.com Web site is using to bypass the iPhone's security mechanisms and enable users to run unapproved apps on their phones involves exploiting two separate vulnerabilities. One of the vulnerabilities is a memory-corruption flaw that affects the way that Apple's mobile devices, including the iPad and iPod Touch, display PDFs. The second weakness is a problem in the Apple iOS kernel that gives an attacker higher privileges once his code is on a targeted device, enabling him to break out of the iOS sandbox. The combination of the two vulnerabilities — both of which are unpatched at the moment — gives an attacker the ability to run remote code on the device and evade the security protections on the iPhone, iPad or iPod Touch. The technique became public earlier this week when the Jailbreakme.com site began hosting a set of specially crafted PDF files designed to help users jailbreak their Apple devices and load apps other than the ones approved by Apple and offered in its official App Store."
Government

Blogetery Shutdown Due To al-Qaeda Info 330

Archness1 writes "Over the weekend we discussed news that blog host Blogetery.com had been shut down at the request of the US government. Now, it appears the site was shut down because some of the blogs it was hosting contained information on al-Qaeda hit lists and bomb making. According to the article, Burst.net shut down Blogetery of its own accord after the FBI made a request to the host for information on the people who made the posts. '[Burst.net CTO Joe Marr] said the FBI contacted Burst.net and sent a Voluntary Emergency Disclosure of Information request. The letter said terrorist material, which presented a threat to American lives, was found on a server hosted by Burst.net and asked for specific information about the people involved. In the FBI's letter, the agency included a clause that says Web hosts and Internet service providers may voluntarily elect to shut down the sites of customers involved in these kinds of situations.'"
Medicine

X Prize Foundation Wants AI Physician On Every Smartphone 245

kkleiner writes "One of the exciting ideas being tossed around recently at the X Prize Foundation is the creation of an Artificial Intelligence physician that you could access from your smartphone. Want to know if that rash on your leg is poison ivy or smallpox? Take a photo of it with your phone and ask the AI. The possibilities are enormous, especially for the billion plus people around the world who live more than a few hours' walk or drive from the nearest doctor." This is one of four X Prizes in planning for the future. The other three are for an AI automobile driver, organ generation through stem cell use, and a deep sea submersible capable of exploring the sea floor.
Wine

Wine 1.2 Release Candidate Announced 165

An anonymous reader writes "After evolving over 15 years to get to 1.0, a mere 2 years later and Wine 1.2 is just about here. There have been many many improvements and plenty of new features added. Listing just a few (doing no justice to the complete change set): many new toolbar icons; support for alpha blending in image lists; much more complete shader assembler; support for Arabic font shaping and joining, and a number of fixes for video rendering; font anti-aliasing configuration through fontconfig; and improved handling of desktop link files. Win64 support is the milestone that marks this release. Please test your favorite applications for problems and regressions and let the Wine team know so fixes can be made before the final release. Find the release candidate here."

Slashdot Top Deals

When we write programs that "learn", it turns out we do and they don't.

Working...