Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Submission + - Sarah Palin says 'Bill Nye is as much a scientist as I am' (cnn.com)

ClickOnThis writes: From this story on CNN: 'Former Alaska Gov. Sarah Palin mocked Bill Nye on Thursday, using the premier of a film that criticizes climate change scientists to call into question Nye's credentials. "Bill Nye is as much a scientist as I am," the 2008 Republican vice presidential nominee said, according to The Hill. "He's a kids' show actor, he's not a scientist." Palin, who was speaking at the Washington premiere of the anti-climate change film "Climate Hustle," targeted Nye during a rant against the "alarmism" of climate change activists.'
Bug

'Hack The Pentagon' Bug Bounty Program Opens For Registration (securityweek.com) 36

wiredmikey writes: Starting today, security researchers can register to test their hacking skills against the Department of Defense (DoD) through "Hack the Pentagon," a new bug bounty program that will award security researchers who discover vulnerabilities on the Pentagon's public web pages. The initiative, run through a partnership with bug bounty platform provider HackerOne, is the first of its kind in the history of the federal government. The Hack the Pentagon bug bounty pilot will start on Monday, April 18 and end by Thursday, May 12. "Critical, mission-facing computer systems will not be involved in the program," the DoD stated.

Submission + - OpenSSH 7.0 released (mindrot.org)

An anonymous reader writes: Today the OpenSSH project maintainers announced the release of version 7.0. This release is focusing on deprecating weak and unsafe cryptographic methods, though some of the work won't be complete until 7.1. This release removes support for the following: the legacy SSH v1 protocol, the 1024-bit diffie-hellman-group1-sha1 key exchange, ssh-dss, ssh-dss-cert-* host and user keys, and legacy v00 cert format. There were also several bug fixes, security tweaks, and new features. In the next release, they plan to retire more legacy cryptography. This includes refusing RSA keys smaller than 1024 bits, disabling MD5-based HMAC algorithms, and disabling these ciphers: blowfish-cbc, cast128-cbc, all arcfour variants and the rijndael-cbc aliases for AES.
Wikipedia

Submission + - Let The Campaign Edit Wars Begin

Hugh Pickens writes writes: "Megan Garber writes that in high school, Paul Ryan's classmates voted him as his class's "biggest brown noser," a juicy tidbit that is a source of delight for his political opponents but considered an irrelevant piece of youthful trivia to his supporters. "But it's also a tension that will play out, repeatedly, in the most comprehensive narrative we have about Paul Ryan as a person and a politician and a policy-maker: his Wikipedia page," writes Garber. Late last night, just as news of the Ryan choice leaked in the political press — the first substantial edit to that page removed the "brown noser" mention which had been on the page since June 16. The Wikipedia deletion has given rise to a whole discussion of whether the mention is a partisan attack, whether "brown noser" is a pejorative, and whether an old high school opinion survey is notable or relevant. As of this writing, "brown noser" stands as does a maybe-mitigating piece of Ryan-as-high-schooler trivia: that he was also voted prom king. But that equilibrium could change, again, in an instant. "Today is the glory day for the Paul Ryan Wikipedia page," writes Garber. "Yesterday, it saw just 10 [edits]. Today, however — early on a Saturday morning, East Coast time — it's already received hundreds of revisions. And the official news of the Ryan selection, of course, is just over an hour old." Now Ryan's page is ready to host debates about biographical details and their epistemological relevance. "Like so many before it, will be a place of debate and dissent and derision. But it will also be a place where people can come together to discuss information and policy and the intersection between the two — a town square for the digital age.""
Privacy

Submission + - Anonymous Cowards, Deanonymized (33bits.org) 1

mbstone writes: Arvind Narayanan writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their "fists," Naryanan posits that an author's habitual choices of words, such as, for example, the frequency with which the author uses "since" as opposed to "because," can be processed through an algorithm to identify the author's writing. Fortunately, and for now, manually altering one's writing style is effective as a countermeasure.

Comment Article is trolling for page hits (Score 5, Interesting) 146

I'm typing this on a TouchPad now, and follow webOS news pretty regularly hoping for positive news. However, the original source that this article supposedly refers to (http://www.webosnation.com/review-hp-touchpad-go) specifically states that:

... the fact that this tablet will never see the light of day puts a rather large damper on the party.

P.S. The only one of these ever sold was on eBay a month or so ago for over $700

Transportation

MIT Electric Car May Outperform Rival Gas Models 457

alphadogg writes "Inside a plain-looking garage on the Massachusetts Institute of Technology's campus, undergraduate Radu Gogoana and his team of fellow students are working on a project that could rival what major automobile manufacturers are doing. The team's goal is to build an all-electric car with similar performance capabilities of gasoline-only counterparts, which includes a top speed of about 161 kph, a family sedan capacity, a range of about 320 kilometers and the ability to recharge in about 10 minutes. They hope to complete the project, which they chronicle on their blog, by the third quarter of 2010. Each member of MIT's Electric Vehicle Team works almost 100 hours a week on the project they call elEVen. 'Right now the thing that differentiates us is that we're exploring rapid recharge,' Gogoana said during an interview. He said that many of today's electric vehicles take between two to 12 hours to recharge and he doesn't know of any commercially available, rapidly recharging vehicles."
Moon

NASA To Trigger Massive Explosion On the Moon In Search of Ice 376

Hugh Pickens writes "NASA is preparing to launch the Lunar Crater Observation and Sensing Satellite, which will fly a Centaur rocket booster into the moon, triggering a six-mile-high explosion that scientists hope will confirm whether water is frozen in the perpetual darkness of craters near the moon's south pole. If the spacecraft launches on schedule at 12:51 p.m. Wednesday, it will hit the moon in the early morning hours of October 8 after an 86-day Lunar Gravity-Assist, Lunar Return Orbit that will allow the spacecraft time to complete its two-month commissioning phase and conduct nearly a month of science data collection of polar crater measurements before colliding with the moon just 10 minutes behind the Centaur." (Continues, below.)
Portables

7-inch Android Netbook From GNB 150

An anonymous reader writes "Netbooknews.com has scored a video of a 7-inch Google Android netbook from a company called GNB during Computex. The device is powered by a Freescale iMX31 CPU. The design might not be to everyone's taste, but it could turn out to be a super cheap Android netbook."
Hardware

PC's Waste Heat Could Add To Processing Power 134

Urchin writes to tell us that physicists working in a new field called "phononics" claim that waste heat from a processor could actually be used to add to its power. "Crunching data coded using photons — photonic computing — is one example, and in 2007 researchers built the first workable optical transistor. But now the idea of computing using heat flow is gaining popularity among applied physicists. Heat travels through solid materials by means of phonons — ripples of vibration passing through a series of atoms. Those ripples can be used to send and store data in digital form: one temperature is read as 0 or 'off' while a second, higher temperature is interpreted as 1 or 'on.' Provided that the thermal memory is well insulated, it can keep its temperature — and data — intact for a long time."

Slashdot Top Deals

Almost anything derogatory you could say about today's software design would be accurate. -- K.E. Iverson

Working...