Forgot your password?
typodupeerror
Government

California Sec. of State Wants Open Source E-Voting Systems 112

Lucas123 writes "California's Secretary of State, Debra Bowen, was among a group of e-voting experts at MIT yesterday who said the nation's electronic voting systems are still not secure and many run on faulty software. Among the suggestions offered to fix the problem: use open source software, stop delivering e-voting machines to polling places weeks in advance of an election, and keep a paper trail for auditing purposes. Bowen also believes that a ubiquitous Internet voting system could not work without the use of a national ID card system."
Music

After 3 Years, Rockbox 3.0 Released 248

DarkkOne writes "Rockbox version 3.0 is out. Three years in development, it marks the introduction of many new players since the 2.5 release and offers software-based playback allowing audio of nearly any commonly (or uncommonly) used format on a list of MP3 players by Apple, iRiver, Cowon, Archos, Toshiba and Sandisk. Beyond this it is FLOSS, under the GPL v2 license (or later), and includes a variety of plugins such as games and simple apps. 3.0 is the first official release for any players not made by Archos and more or less marks the beginning of a much more regular release cycle for the software."
Privacy

UK Gov't To Require ID Cards For Some Foreign Residents 216

craigavonite, writing "It's looking like the UK is in for biometric ID cards within the next few years, despite widespread protest from groups such as 'NO2ID,'" excerpts from an article at the BBC describing a UK identify card to be issued starting later this year: "The biometric card will be issued from November, initially to non-EU students and marriage visa holders. Home Secretary Jacqui Smith said the cards would allow people to 'easily and securely prove their identity.' Critics say the roll-out to some immigrants is a 'softening up' exercise for the introduction of identity cards for everyone."
Input Devices

Use Your Cellphone as a 3D Mouse 77

Roland Piquepaille writes "In recent years, we've started to use our cellphones not only for placing calls or exchanging messages. Now, we take pictures, read our e-mails, listen to music or watch TV. But, according to New Scientist, UK researchers are going further with a prototype software that turns your cellphone into a 3-D mouse. The phone is connected to your computer via Bluetooth. And you control the image on the screen by rotating or moving your phone. As says one of the researchers, 'it feels like a much more natural way to interact and exchange data.' The technology might first be used in shopping malls to buy movie tickets or to interact with advertising displays."
The Courts

LANCOR v. OLPC Case Continues In Nigerian Court 281

drewmoney writes "According to an article on Groklaw: It's begun in a Nigerian court. LANCOR has actually done it. Guess what the Nigerian keyboard makers want from the One Laptop Per Child charitable organization trying to make the world a better place? $20 million dollars in 'damages,' and an injunction blocking OLPC from distribution in Nigeria."
It's funny.  Laugh.

Computer Glitch Halts Seattle New Year's Fireworks 202

supersat writes "At the stroke of midnight New Year's Eve, Seattle's fireworks show ground to a halt. The source of the problem is reported to be a corrupted file that wasn't checked until the last minute. After two reboots, the fireworks had to be detonated manually. And yes ... one blog commenter, claiming to have worked on prior shows, said that the shows run on Windows."
KDE

KDE 4 Uses 40% Less Memory Than 3 Despite Eye-Candy 566

An anonymous reader writes "Pro-Linux reports that KDE 4, scheduled to be released in January 2008, consumes almost 40% less memory than KDE 3.5, despite the fact that version 4 of the Free and Open Source desktop system includes a composited window manager and a revamped menu and applet interface. KDE developer Will Stephenson showcased KDE 4's 3D eye-candy on a 256Mb laptop with 1Ghz CPU and run-of-the-mill integrated graphics, pointing out that mini-optimizations haven't even yet been started." Update: 12/14 22:40 GMT by Z : Or, not so much. An anonymous reader writes "The author of the original KDE 3.5 vs KDE 4.0 memory comparison has come out with a more accurate benchmark. In reality, KDE 4.0 uses 110 MB more memory than KDE 3.5.8.
Encryption

First Use of RIPA to Demand Encryption Keys 645

kylehase writes "The Regulation of Investigatory Powers Act (RIPA) is being used for the first time to force an animal activist to reveal encryption keys for encrypted files she claims to have no knowledge of. According to the article, she could face up to two years if she doesn't comply."
Encryption

Loophole in Windows Random Number Generator 305

Invisible Pink Unicorn writes "A security loophole in the pseudo-random number generator used by Windows was recently detailed in a paper presented by researchers at the University of Haifa. The team found a way to decipher how the number generator works, and thus compute previous and future encryption keys used by the computer, and eavesdrop on private communication. Their conclusion is that Microsoft needs to improve the way it encodes information. They recommend that Microsoft publish the code of their random number generators as well as of other elements of the Windows security system to enable computer security experts outside Microsoft to evaluate their effectiveness. Although they only checked Windows 2000, they assume that XP and Vista use similar random number generators and may also be vulnerable. The full text of the paper is available in PDF format."
Security

Qmail At 10 Years — Reflections On Security 304

os2man writes "Qmail is one of the most widely used MTAs on the Net and has a solid reputation for its level of security. In 'Some thoughts on security after ten years of qmail 1.0' (PDF), Daniel J. Bernstein, reviews the history and security-relevant architecture of qmail; articulates partitioning standards that qmail fails to meet; analyzes the engineering that has allowed qmail to survive this failure; and draws various conclusions regarding the future of secure programming. A good read for anyone involved in secure development."
The Military

The Real Mother of All Bombs, 46 Years Ago 526

vaporland writes "Tsar Bomba is the Western name for the RDS-220, the largest, most powerful weapon ever detonated. The bomb was tested on October 30, 1961, in an archipelago in the Arctic Sea. Developed by the Soviet Union, the bomb had a yield of about 50 megatons. Its detonation released energy equivalent to approximately 1% of the power output of the Sun for 39 nanoseconds of its detonation. The device was scaled down from its original design of 100 megatons to reduce the resulting nuclear fallout. The Tsar Bomba qualifies as the single most powerful device ever utilized throughout the history of humanity."

Another Look at 1930's Cyclogyro Plane Design 142

trogador writes to mention that a group of researchers is taking another swing at the idea of a cyclogyro design for a UAV. Even though the cyclogyro design was invented in the 1930's there are no records of a successful flight. "Cyclogyros have the potential to be highly maneuverable flying robots due to their method of operation, making them potentially more suitable for complex tasks than helicopters and other micro air vehicles (MAVs) with less maneuverability. The biggest challenge in designing the cyclogyros is varying the angle of attack of the rotating wings. This ability would enable the plan to change altitude, hover, and fly in reverse. To achieve this quick angle variation, the researchers introduced an eccentric (rotational) point in addition to a rotational point connected to a motor."

Slashdot Top Deals

Mr. Cole's Axiom: The sum of the intelligence on the planet is a constant; the population is growing.

Working...