Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment mod points (Score 0) 238

I got 15 points just a couple of days ago, and I've almost finished using them.

It's a good thing that I didn't need to log on to Beta, because Beta won't even let me log on. I click the "Sign on" button and that whole black left side of the window closes up again.

What do you call that thingie that's square shaped and consists of four horizontal lines, anyway?


Submission + - Richard Buckland's UNSW Computing 1 - PuzzleQuest and the Art of Programming

dncsky1530 writes: UNSW professor Richard Buckland, lecturer of the famous Computing 1 course on YouTube, is now running a large scale open online Computer Science course for the world. UNSW Computing 1 — PuzzleQuest and the Art of Programming starts off with microprocessors and works it way through C with interactive activities while taking students on an adventure of hacking, cracking and problem solving. It's based around a three month long PuzzleQuest with grand and suspiciously unspecified prizes as well as fame and glory for the intrepid. Join a global community of learners and help people you've never met in this one of a kind online course on

Submission + - Accuweather app update hijacks phone lock screens (

willyg writes: Accuweather pushed out an update to their paid Android phone app earlier today. One of the new "features" of the update was to replace the lock screen on your phone with their own lockscreen. To the casual glance, there is little indication on the lockscreen as to which app is responsible for the new lockscreen.

The Google play store has been reporting nothing but one star reviews today as users discover who is responsible for the new lock screen, installed with no apparent warning to them.

Accuweather has been responding, and promises to fix the issue as soon as possible.

Anyone feel like trusting their "fix"???


Submission + - Some Windows 8 hardware already not compatible with Windows 7 (

Billly Gates writes: This will make many Windows 7 users upset who expect to buy a new Windows 8 tablet or netbook to put Windows 7 on it. The problem is Intel's new clover Trail chipsets. Computers affected include our the Asus EEE line and some Fujitsu tablets so far.

In addition some Cedar Trail chipsets have the opposite problems of not being Windows 8 compatible. Intel executives mentioned users need to pick one or the other Intel Atom chipsets and stick with that OS. Many are blaming intel for the lack of drivers. Or could this be related to TPM 2.0 which is secretly on some new Windows 8 machines that refuse to run unsigned operating systems?


Submission + - Algorithm Sniffs Out Source of Malware Attacks (

itwbennett writes: "Swiss scientists have developed an algorithm that can find the specific computer that sent a spam email as well as the first computer where a virus was injected by analyzing just 10-20% of the nodes in a network. The workings of the algorithm were detailed in a paper (PDF) entitled 'Locating the source of diffusion in large-scale networks' that was published in the Physical Review Letters journal on Friday."
Open Source

Submission + - The open source technology behind Twitter (

caseyb89 writes: If it weren't for open source technology, you wouldn't be able to tweet. Chris Aniszczyk, Open Source Manager at Twitter, shares how open source is vital to Twitter's success. He states that using open source is a "no-brainer" for Twitter because it "allows us to customize and tweak code to meet our fast-paced engineering needs as our service and community grows." Twitter also established an open source office about a year ago to support a variety of open source organizations that are important to them. Aniszczyk will discuss Twitters open source usage in his keynote at LinuxCon.

Submission + - Monitoring weapons bans with social media (

__aaqpaq9254 writes: Kirk Bansak has a great article outlining a coming revolution in non-proliferation of nuclear, chemical, and bio-weapons, courtesy of smart phones and social media. Early theory on arms control foresaw "inspection by the people" as a promising method for preventing evasion of arms control and disarmament obligations and serves as a starting point for understanding "social verification." As Rose Gottemoeller recently stated: "[Cell phone-based] sensors would allow citizens to contribute to detecting potential treaty violations, and could build a bridge to a stronger private-public partnership in the realm of treaty verification." Exciting stuff for techies and activists.

Submission + - Anonymizer owned by Abraxas parent company Cubics (

killfixx writes: Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it’s possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists.

Submission + - 9 Popular IT Security Practices That Don't Work As Advertised (

snydeq writes: "When it comes to IT security, FUD is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the shortcomings of traditional approaches to securing IT systems and data. The truth is most common IT security products and techniques don't work as advertised, leaving us far more exposed to malicious code than we know. That's because traditional IT security takes a whack-a-mole approach to threats, leaving us to catch up with the next wave of innovative malware. From the truth about antivirus scanners to the failings of PKI, here are nine popular IT security practices that don't work and 10 nontraditional IT security tricks that do."

Slashdot Top Deals

The amount of time between slipping on the peel and landing on the pavement is precisely 1 bananosecond.