Forgot your password?
typodupeerror
Politics

Submission + - Texas Textbooks Battle is Actually an American War (nytimes.com) 1

ideonexus writes: I've been lackadaisical when it comes to following stories about Texas schoolboard attempts to slip creationism into Biology textbooks, dismissing the stories as just "dumbass Texans," but what I didn't realize is that Texas schoolbooks set the standard for the rest of the country, and it's not just Creationism that this Christian coalition is attempting to bring into schoolbooks, but a full frontal assault on history, politics, and the humanities that exploits the fact that final decisions are being made by a school board completely academically unqualified to make informed evaluations of the changes these lobbyists propose. This evangelical lobby has successfully had references to the American Constitution as a "living document," as textbooks have defined it since the 1950s, removed in favor of an "enduring Constitution" not subject to change, as well as attempting to over-emphasize the role Christianity played in the founding of America. The leaders of these efforts outright admit they are attempting to redefine the way our children understand the political landscape so that, when they grow up, they will have preconceived notions of the American political system that favor their evangelical Christian goals.

Comment Re:dumb idea (Score 1) 344

Well it depends, there are many smart people in Pittsburgh (Lifelong resident here) just the people in power seem to be corrupt criminals trying to make money for their stooges. Also, Pittsburgh's significant elderly population tends to favor criminal idiots over any real reform. This city is trying to hard to make a come back but it seems that the powers that be are hell bent on making sure youth culture is oppressed. (See independant G-20 converage for recent examples). I don't necessarily dissagree with the tax on principle, however it's just another lump tax to be redistributed to Pittburgh politians.
Real Time Strategy (Games)

Submission + - Emergent AI in an indie RTS game. (blogspot.com)

x4000 writes: "My recent RTS game uses a new style of AI that hybridizes rules-based AI with emergent AI logic. As a disclaimer, I'm really not an AI programmer at all — my background is in databases, financial modeling, etc. But it just so happens that database experience, which often involved distilling data points from multiple sources and then combining them into suggested decisions for executives, also makes a great foundation for certain styles of AI. The approach I came up with leans heavily on my database background, and what concepts I am familiar with from reading a bit about AI theory (emergent behavior, fuzzy logic, etc). The results are startlingly good.

Total development time on the AI was less than 3 months, and its use of tactics is some of the best in the RTS genre. I'm very open to talking about anything and everything to do with the design I used, as I think it's a viable new approach to AI to explore in games, and I'd like to see other developers potentially carry it even further. Here's an overview of how the AI in AI War: Fleet Command works."

Comment Some of these issues... (Score 1) 1365

Maybe I'm just lucky with Linux and unlucky with windows but.. 1. Over the last year I've done quite a few OS installs, so far Linux, especially Ubuntu has worked better out of the box than Windows XP. I have had to open my computer and look for model numbers to track down drivers for most computers when installing Windows XP. 2. Overall It takes less time and knowledge to get a binary Linux distro up and running then it does for windows (at least in my experience) I definitely agree that Linux still has a nice handful of significant problems, but honestly I think Windows has just as many, most people are just more familiar/ used to Windows problems than linux problems.

Comment Re:From TFA (Score 1) 303

But it's also harder to spread worms and such to less popular systems , it's one of those things where a mac would have to be connected to at least one other mac, which would have to be connected to another mac. I mean that could account for a least a portion of the ratio.
Displays

Submission + - Microsoft Engineers Invent Energy-Efficient LCD Co (ieee.org)

MechEMark writes: "From the article ( http://spectrum.ieee.org/jul08/6466 ):
"Researchers from Microsoft say they've built a prototype of a display screen using a technology that essentially mimics the optics in a telescope but at the scale of individual display pixels. The result is a display that is faster and more energy efficient than a liquid crystal display, or LCD, according to research reported yesterday in Nature Photonics...
The design greatly increases the amount of backlight that reaches the screen. The researchers were able to get about 36 percent of the backlight out of a pixel, more than three times as much light as an LCD can deliver. But Microsoft senior research engineer Michael Sinclair says that through design improvements, he expects that number to go up — theoretically, as high as 75 percent. ""

Feed Wired: NSA Attacks West Point! Relax, It's a Cyberwar Game (wired.com)

Five hours into their assault on West Point, the hackers got serious.

The SQL [structured query language] inserts that came earlier were just pablum intended to lull the Army cadets into a false sense of security. But then the bad guys unleashed a stealthy kernel-level rootkit that burrowed into one workstation, started scraping data and "calling home."

It was a highly sophisticated attack, but this time the bad guys were really good guys in wolves' clothing.

For four days in late April, the National Security Agency -- the nation's most secretive repository of spooks, snoops and electronic eavesdroppers -- directed coordinated assaults on custom-built networks at seven of the nation's military academies, including West Point, the Army university 50 miles north of New York City.

It was all part of the seventh annual Cyber Defense Exercise, a training event for future military IT specialists. The exercise offered a rare window into the NSA's toolkit for infiltrating, corrupting or destroying computer networks.

The 34 Army cadets comprising the West Point IT team operated in a different kind of battlefield, but their combat skills and instincts need to be every bit as sharp. Like George Washington said: "There is nothing so likely to produce peace as to be well prepared to meet the enemy."

The SQL injections, targeting their Fedora Core 8 Web server, were a piece of cake for these IT combatants. Each injection tried to smuggle malicious code inside the seemingly harmless language used by the network’s MySQL software. The cadets handily defended with open source Apache web server modules, plus some manual tweaking of the SQL database to "avoid any surprises," in the words of Lt Col. Joe Adams, a West Point instructor who helped coach the team.

But the kernel-level rootkit was much more dangerous. This stealthy operating-system hijacker can open unseen "back doors" into even highly protected networks. When they detected the rootkit's "calls home" the cadets launched Sysinternal's security software to find the hijacker, then they manually scoured the workstation to find the unwelcome executable file.

Then they terminated it. With extreme prejudice.

"This was probably the most challenging part of the exercise, since it required them to use some advanced techniques to find the rootkit," Adams says. And rooting it out helped boost the West Point team to the top of the pile when, in the aftermath of the exercise, the referees rated all the universities' network defenses.

For the second year in a row, the Army placed first over the Navy, Air Force, Coast Guard and others, winning geek bragging rights and the privilege of holding onto a gaudy, 60-pound brass trophy festooned with bald eagles and American flags. Adams credits the team’s thorough preparation and their excellent teamwork despite the round-the-clock schedule.

At the network control room on the second floor of West Point’s 200-year-old engineering building (which once was an indoor horse corral and still smells like it in some remote corners, according to one instructor), the IT team set up cots and, just for the hell of it, camouflaged netting. They worked in shifts, with one team member always monitoring incoming and outgoing traffic. He or she would alert other cadets -- "router guys" -- to block any suspicious addresses. Meanwhile, off-shift cadets would make food and coffee runs to keep everyone fueled up and alert. Together, the team was "faster than anyone else," Adams says.

But the way the cadets designed their network was a big factor in their victory, too. The NSA dictated some terms: All networks had to be capable of e-mail, chat and other services and had to be up and running at all times despite any attacks or defensive measures. Beyond that, the teams were free to come up with their own designs.

West Point's took three weeks to build. The cadets settled on a fairly standard Linux and FreeBSD-based network with advanced routing techniques for steering incoming traffic in directions of the IT team's choosing.

The choices in software tools for responding to any attack really boiled down to "automatic" versus "custom," says Eric Dean, a civilian programmer and instructor. He adds that while automatic tools that do most of their own work are certainly easier, custom tools that allow more manual tweaking are more effective. "I expect one of the 'lessons learned' will be the use of custom tools instead of automatics."

Even with a solid network design and passable software choices, there was an element of intuitiveness required to defend against the NSA, especially once it became clear the agency was using minor, and perhaps somewhat obvious, attacks to screen for sneakier, more serious ones.

"One of the challenges was when they see a scan, deciding if this is it, or if it’s a cover," says Dean. Spotting "cover" attacks meant thinking like the NSA -- something Dean says the cadets did quite well. "I was surprised at their creativity."

Legal limitations were a surprising obstacle to a realistic exercise. Ideally, the teams would be allowed to attack other schools' networks while also defending their own. But only the NSA, with its arsenal of waivers, loopholes, special authorizations (and heaven knows what else) is allowed to take down a U.S. network.

And despite the relative sophistication of the NSA's assaults, the agency told Wired.com that it had tailored its attacks to be just "a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones."

In other words, grasshopper, nice work -- but the NSA is capable of much craftier network take-downs.



Operating Systems

Submission + - How the NSA took Linux to the next level

An anonymous reader writes: You know SELinux is built to be virtually attack-proof, but do you know how the National Security Agency (NSA) accomplish it? Take a closer look at the SELinux kernel architecture, why this is important, and what makes SELinux one of the most secure implementations of Linux available.
Music

Who Runs RIAA's Settlement Information Center? 172

eatonwood writes "Who is behind the RIAA's collections efforts? This comment at CallFerret says it is a company called PSC and lists a bunch of websites and contact information for them, but the connection to RIAA is still not completely clear (aside from the presence of a couple of clearly RIAA sites on the same server as PSC's). Anyone know anything more about who is doing RIAA's dirty work?"
Power

Consumer Ethanol Appliance Promised By Year's End 365

Newscloud brings us news of a startup called E-Fuel promising to ship a home-brew ethanol plant, the size of a washer-dryer, for under $10,000 by the end of this year. We've had plenty of discussions about $1/gal. fuel — these guys want to let you make it at home. The company says it plans to develop a NAFTA-enabled distribution network for inedible sugar from Mexico at 1/8th the cost of trade-protected sugar, to use as raw material for making ethanol. A renewable energy expert from UC Berkeley is quoted: "There's a lot of hurdles you have to overcome. It's entirely possible that they've done it, but skepticism is a virtue."
Privacy

California Expands DNA Identification Policies 42

The Los Angeles Times is reporting on a new California policy to match the DNA of suspected criminals to the criminal's family members in order to use them as investigative leads. Use of partial DNA matching is drawing fire over privacy concerns from citizens and law experts. FBI officials are hesitating as well, though their concern is that the courts will not accept such techniques. Quoting: "The policy, which takes effect immediately, is designed to work like this: The state's crime lab will tell police about DNA profiles that come up during routine searches of California's offender database and closely resemble, but do not match, the DNA left at a crime scene. (Previously, the state refused to tell police about these partial matches.) When such partial matches do not surface or fail to produce a lead, a more customized familial search can be done in which computer software scans the database proactively for possible relatives. The software measures the chance of two people being related based on the rarity of the markers they share."

Slashdot Top Deals

The only way to learn a new programming language is by writing programs in it. - Brian Kernighan

Working...