Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Military

US Army Develops Tooth Cleaning Gum 160

pryoplasm writes "To help deal with some of the hygiene issues on the battlefield, the US Army worked on a gum to take the place of brushing your teeth. This might be eventually released and marketed to the public. While there are many gums out there that aren't so detrimental to your teeth, this one promises actually to help them out."
Security

UK Terror Chief Blocked From Boarding Aircraft 237

Jeremiah Cornelius writes "Two days before toner cartridges threatened western civilization, Britain's Home Office minister Baroness Neville-Jones was en route to a Washington summit when she was found to have an over-sized aerosol can in her bag. While being questioned by airport security staff for transporting a container with more than 100ml of liquid, the Baroness seemingly took offense at being lectured on the importance of security procedure: 'Of course I know how important it is,' she said, 'I'm the Security Minister.' The Baroness is also former head of the British Joint Intelligence Committee, and was traveling at the time to discuss the war on terror with US security chiefs. According to a Home Office spokesman, trained in the use of the passive voice, 'Liquids were inadvertently left in a bag. The item was removed and the Minister fully complied with subsequent checks.'"
Security

Research Inches Toward Processor-Specific Malware 155

chicksdaddy writes "The Windows/Office/IE monoculture is disappearing faster than equatorial glaciers — Mac OS X and iOS, Linux and Android ... and whole new application ecosystems to go with each. That's bad news for malware authors and other bad guys, who count on 9.5 out of 10 systems running Windows and Microsoft applications to do their magic. What's the solution? Why, hardware specific hacks, of course! After all, the list of companies making CPUs is far smaller than, say, the list of companies making iPhone applications. Malware targeting one or more of those processors would work regardless of what OS or applications were installed. There's just one problem: its not easy to figure out what kind of CPU a device is running. But researchers at France's Ecole Superiore d'Informatique, Electronique, Automatique (ESIEA) are working on that problem. Threatpost.com reports on a research paper that lays out a strategy for fingerprinting processors by observing subtle differences in the way they perform complex floating point calculations. The method allows them to distinguish broad subsets of processor types by manufacturer, and researchers plan to refine their methods and release a tool that can make specific processor fingerprinting a snap."
Red Hat Software

Red Hat Releases RHEL 6 228

alphadogg writes "Red Hat on Wednesday released version 6 of its Red Hat Enterprise Linux (RHEL) distribution. 'RHEL 6 is the culmination of 10 years of learning and partnering,' said Paul Cormier, Red Hat's president of products and technologies, in a webcast announcing the launch. Cormier positioned the OS both as a foundation for cloud deployments and a potential replacement for Windows Server. 'We want to drive Linux deeper into every single IT organization. It is a great product to erode the Microsoft Server ecosystem,' he said. Overall, RHEL 6 has more than 2,000 packages, and an 85 percent increase in the amount of code from the previous version, said Jim Totton, vice president of Red Hat's platform business unit. The company has added 1,800 features to the OS and resolved more than 14,000 bug issues."
Input Devices

Kinect Hacked, Adafruit Bounty Won 262

scharkalvin writes "Adafruit has announced a winner to their bounty for an open source driver for the MS Kinect. From the article: 'We have verified that it works and have a screenshot from another member in the hacking community (thanks qdot!) who was also able to use the code. Congrats to Hector! He's running all this on a Linux laptop (his code works with OpenGL) and doesn't even have an Xbox!'" We talked about Adafruit's bounty yesterday.
Earth

Gold Nanoparticles Turn Trees Into Streetlights 348

An anonymous reader writes "Street lights are an important part of our urban infrastructure — they light our way home and make the roads safe at night. But what if we could create natural street lights that don't need electricity to power them? A group of scientists in Taiwan recently discovered that placing gold nanoparticles within the leaves of trees causes them to give off a luminous reddish glow. The idea of using trees to replace street lights is an ingenious one — not only would it save on electricity costs and cut CO2 emissions, but it could also greatly reduce light pollution in major cities."
Privacy

Big Brother In the School Cafeteria? 425

AustinSlacker writes "An Iowa school district's lunch program asks children as young as 5 years old to memorize a four-digit PIN code so it can monitor what they eat in the school cafeteria - prompting some parents to claim it's an unhealthy case of 'Big Brother.' An over reaction by parents or an unnecessary invasion of privacy?"
Networking

Bandwidth Caps May Be Critical Error For Broadband Companies 317

Technical Writing Geek writes "An Ars Technica article argues that after many years of stagnation, the US broadband landscape is finally 'primed for change'. Companies like Time Warner that decide to cap bandwidth risk being relegated to a 'broadband ghetto. Alternatives to the standard cable modem vs. DSL conundrum will come from technologies like WiMax and (eventually) the 'white space' broadband that might be offered by whoever wins the 700mhz auction. 'All of that is to say that cable and DSL won't always be the only games in town. If wireless solutions are able to deliver on their promises of high speeds with no usage limits, capped cable broadband service like Time Warner has planned is likely to be unattractive, to say the least. Instead of developing plans designed to discourage consumers from feeding at the bandwidth trough, cable companies would be better served in the long run by making investments in new technologies like DOCSIS 3.0 and the kind of infrastructure improvements necessary to meet bandwidth demands.'"

Slashdot Top Deals

Where there's a will, there's a relative.

Working...