Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - John McAfee denied Libertarian Party nomination for President (

SonicSpike writes: In a decisive rout for pragmatism over purity, the Libertarian Party has nominated former New Mexico Republican Governor and 2012 nominee Gary Johnson for president. Johnson came within an eyelash of winning on the first ballot, pulling 49.5 percent of the vote, just short of the required majority. (Libertarian activist Austin Petersen and software magnate John McAfee came in second and third, respectively, with 21.3 percent and 14.1 percent.) With sixth-place finisher Kevin McCormick (and his 0.973 percent of the vote) booted from the second ballot, Johnson sailed through with 55.8 percent.

Submission + - Oracle, chat & raw code found in Mossack Fonseca offshore web portal (

HongPong writes: The PanamaPapers law firm Mossack Fonseca exposed most of their customer service portal's backend, unpatched Drupal code through misconfiguring an Oracle server, also revealing a "portfolio" content type & possible local chat server. These vulnerabilities provide clues as to how the PanamaPapers might have been extracted remotely. This extends stories in Forbes & Wired UK about their security problems.

Submission + - Porn Clicker Android Malware Hits Google Play Hard

An anonymous reader writes: In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google Play. The “Porn Clicker,” as ESET researchers have dubbed the threat, does not steal user information or download additional malware – it simply clicks on ads generated by the attackers’ servers and shown on pornographic websites. The user is none the wiser, as the malicious app does so covertly.

Submission + - IEEE launches anti-malware services to improve security

Aryeh Goretsky writes: The IEEE Standards Assocation has launched an Anti-Malware Support Service (AMSS) to help the computer security industry respond more quickly to malware.

The first two services available are a Clean file Metadata Exchange [PDF], to help prevent false positives in anti-malware software, and a Taggant System [PDF] to help prevent software packers from being abused.

Official announcement is here.

Submission + - Worlds biggest library system wants website advise (

pulitzer writes: The Toronto Public Library (the worlds largest library system) is redesigning its website and wants your ideas and opinions. This is our opportunity to ask for RSS feeds, RESTful API's, social networking features, etc. Libraries and librarians can be a conservative bunch when it comes to technology, they've been using the same one for centuries, the book, and now they need a bit of a push into the 21st century . The library as a place can be the center of a community and a place for information sharing and communal learning, we need to let the Toronto Public Library that the library web site can serve the same functions. Even if your not a Toronto resident this is important as just like most profession libraries and librarians share information and experiences and TPL as the largest of library systems has quite a voice in the community. So come on Slashdot lets give them a piece of our mind and tell them what we'd like to see. The survey is very short with ample opportunity to add fee text info.

Submission + - What is the best ebookstore and ebookreader?

kai6novice writes: I am a newly graduated computer science student. I am looking for some computer ebooks to read when I have free time. I want to ask slashdot reader, where is the best computer ebook store? (that have a large selection of computer ebook, and sell them in pdf format). What is the best ebook reader? Amazon kindle? 7'- 10' UMPC? 12' tablet PC? Sony ebook reader? I would like to find something that has a long battery life. So that I only need to recharge them 1 time every 2 weeks or 1.5 weeks.
Operating Systems

Submission + - Would open sourcing the OS/2 code benfit OSS? (

Jose R Rodriguez writes: "The OS/2 World Foundation is sponsoring a second request to IBM for the latter to consider open sourcing the OS/2 source code. The December 2007 signature list petitioning IBM to open source (at the very least) the unencumbered OS/2 source code is expected to surpass the 11,000+ signatures of the past 2006 petition. CIO's editor Esther Schindler has elaborated on the potential issues that IBM might come against in considering seriously that request. Do Slashdot think, as I Jose R Rodriguez from Metztli IT do, that open sourcing the OS/2 code might enrich any of the many current open source projects, including the successful creation and/or advancement of a hybrid components operating system project code named Voyager?"

Submission + - Holiday software for kids?

n1_111 writes: "I bought my 8 year old boy a laptop for Holidays. He is also going to be sharring it with a 5 year old girl. Looking for recommendations on software that is both fun and educational, preferably open-source, and that runs on Vista, yes Vista. Thanks everyone."

Submission + - How do you handle abuse ?

Hafnia writes: I have an older machine running Debian to serve my Squeezebox and FTP. It's open to the internet for ssh and ftp. I don't really care or worry about it, but every once in a while i check the authlog and every time it's crowded with failed attempts to get in ! What do you do? Ignore it ? Report it ? Attack it ? And what should i do ? I'm fairly competent with computers , but not a pro sysadmin. Does it make sense at all to report it ?

Submission + - Difference between System/Network Administrator 1

sr8outtalotech writes: I earn my living as a Systems Administrator. Recently, I submitted my resume to several jobsites; Monster, Dice, Careerbuilder and Hotjobs to see what was out there. What I find appalling is the overwhelming ignorance of most so called technical recruiters. I've dealt with over 25 recruiters so far and I don't think a single one could tell me the difference between a systems administrator and a network administrator. How does the slashdot community see the difference between a network and systems administrator? In my own opinion a network administrator works with Layers 1-3 of the OSI Model and a system administrator works with Layers 4-7 with some Layer 3/4 overlap in both positions. How do you deal with recruiters and human resources people that don't know the difference? Educate them? Politely ignore them? Tell them to stop wasting your time?

What's the Best Way to Recycle Old Tech in the US? 255

Tim Danhamn writes ", a green-focused Web site, has put up an article about the best way to recycle your old tech, including local recycling centers and reusing old technology in other ways. I'm about to upgrade to a new PC and I have a lot of old radios, MP3 players and other electronic goods lying around the house. The article though is mostly about solutions in the UK, so I want to know - what is the best way to recycle old tech in the US?"

Submission + - WellsFargo using js from to log on

AllBut6 writes: I attempted to log in to my Wells Fargo online account last night and the initial page displayed a field for my username, but no field to enter my password. After calls to Online Services I discovered that
1. They were sourcing javascript from servers at
2. I was only allowing javascript from WellsFargo only. (I block others with the noscript plugin).

Does anyone else think that Wells Fargo should be hosting all the components on their own site. Especially code related to collecting user signon information?

Submission + - Locking your workstation ( 1

Z80xxc! writes: I was recently reading a Coding Horror post about locking your workstation. It mentions playing tricks on users who neglect to lock their computers when they leave. As someone who always locks their workstation, I was wondering what others here think about this — do you lock your workstations? Do you force users of your systems to lock theirs? And, most importantly, what kinds of pranks do you pull to give them that little reminder to lock up?

Submission + - Blacklist cowboys ride again

adaviel writes: "We have been having trouble with an anti-spam vendor of the genus Sphyraena. They say they are "an unsung hero of open source" but their reputation list RBL is anything but.

While SpamHaus and NJABL give a reason for listing, and often show spam samples, this piscine provider does not. And while CBL (which we use) offers immediate delisting, our fishy foe takes "2 business days".

It's not the RBL I'm complaining about — our filter chain is very similar to theirs, with spamtraps, rejection and blacklists. It's the secrecy. If you hit our spamtraps, the DNS entry tells you and you can delist in real time, or call us and we'll help. But with no information from these guys beyond a vague "we saw you spam", we can only guess. Is a user account forwarded to a spamtrap ? Is a mailing list recipient flagging newsletters as spam instead of unsubscribing ? Who knows ? They may have good evidence, but if they won't show it to us, they are acting like cowboys.

So, the questions (as this is ask/.)
  • Have others had a bad experience trying to get off a commercial blacklist ?
  • Do you think it reasonable to use a secret blacklist with 2-day-if-we-like-you delisting for up-front total rejection of all mail ?

Slashdot Top Deals

U X e dUdX, e dX, cosine, secant, tangent, sine, 3.14159...