Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Win 7 and Linux (Score 1) 727

Sorry Microsoft. I refuse to pay for another operating system. My next desktop will be built as before by hand and will have Linux. My current laptop has Win 7 but I have Fedora as well. As soon as Steam jumps to Fedora I have less reason to care. Any new laptops will be built by System 76 or some other linux based OEM. Really between smartphone and my Galaxy Tab I am good for now or netbook with Fedora as well

 

Security

Criminals Steal House Thanks To Hacked Email 227

mask.of.sanity writes with this quote from ZDNet: "An international cybercrime investigation is underway into a sophisticated scam network that used email and fax to sell an Australian man's AU$500,000 property without his knowledge. The man was overseas when the Nigerian-based scammers stole his credentials and amazingly sold two houses through his real estate agent. He rushed home and prevented the sale of his second home from being finalized. Australian Federal Police and overseas law enforcement agencies will investigate the complex scam, which is considered the first of its kind in Australia. It is alleged scammers had stolen the man's email account and personal property documents to sell the houses and funnel cash into Chinese bank accounts. Investigating agencies admit the scammers hoodwinked both the selling agents and the government, and said they had enough information to satisfy regulatory requirements. The police did not rule out if the scammers had links to the man."
Crime

Hacker Teaches iPhone Forensics To Police 193

Ponca City, We love you writes "The Mercury News reports that former hacker Jonathan Zdziarski has been tapped by law-enforcement agencies nationwide to teach them just how much information is stored in iPhones — and how to get it. 'These devices are people's companions today,' says Zdziarski. 'They're not mobile phones anymore. They organize people's lives. And if you're doing something criminal, something about it is probably going to go through that phone.' For example, every time an iPhone user closes out of the built-in mapping application, the phone snaps a screenshot and stores it. Savvy law-enforcement agents armed with search warrants can use those snapshots to see if a suspect is lying about whereabouts during a crime."
Security

AT&T Won't Block Black Hat Eavesdropping Demo 126

snydeq writes "AT&T says it won't interfere with a highly anticipated talk on intercepting cell phone calls at the Black Hat conference this week. Hacker Chris Paget last week said that he plans to demonstrate on Saturday how to set up what's essentially a fake cell tower that allows him listen in on nearby mobile calls. But Tuesday, he wrote on his blog that he had 'heard that AT&T may be considering suing me to stop my talk.' AT&T, however, has insisted it has no plans to interfere with the talk."
Government

FCC Dodges Pointed Questions On US Broadband Plan 276

Ars covers a series of questions that US senators put to the FCC chairman following up on his appearance before the Commerce, Science and Transportation Committee in April. The headline question was a blunt one asked by octogenarian Senator Daniel Inouye (D-HI): "The National Broadband Plan (NBP) proposes a goal of having 100 million homes subscribed at 100Mbps by 2020, while the leading nations already have 100Mbps fiber-based services at costs of $30 to $40 per month and beginning rollout of 1Gbps residential services, which the FCC suggests is required only for a single anchor institution in each community by 2020. This appears to suggest that the US should accept a 10- to 12-year lag behind the leading nations. What is the FCC's rationale for a vision that appears to be firmly rooted in the second tier of countries?" In the FCC's formal response (PDF), Chairman Genachowski doesn't rise to the "second tier" bait, and in fact talks about "ensuring that America remains a broadband world leader," as if he believes we currently are. A blogger over at Balloon Juice is a little more forthright on the "What is the FCC's rationale" question: "The rationale is that this is the best they can do with a legislative branch in the pocket of telecom providers."
Crime

Things You Drink Can Be Used To Track You 202

sciencehabit writes with an intriguing story about the potential of figuring out where people have been by examining their hair: "That's because water molecules differ slightly in their isotope ratios depending on the minerals at their source. Researchers found that water samples from 33 cities across the United State could be reliably traced back to their origin based on their isotope ratios. And because the human body breaks down water's constituent atoms of hydrogen and oxygen to construct the proteins that make hair cells, those cells can preserve the record of a person's travels. Such information could help prosecutors place a suspect at the scene of a crime, or prove the innocence of the accused." Or frame someone by slipping them water from every country on the terrorist watchlist.
Security

Hack AT&T Voicemail With Android 242

An anonymous reader writes "It is shockingly easy to gain access to an AT&T customer's voicemail using caller ID spoofing techniques. What's worse is that AT&T knows about it. On your Android phone, download one of the two caller ID spoofing programs. Input the number of your target as the destination number and then enter the same number as the spoofed caller ID. Then connect your call. If the target has not added a voicemail password (the default is no password), you will be dropped into a random menu of their voicemail and eventually can drill up or down to get what you want. You can change greetings, erase messages, send voicemails out of the target account, and much more. How many politicians up in arms about Google Wi-Fi sniffing will want to know more about this?"
Bug

Dell Selling Faulty PCs 484

An anonymous reader writes "PC maker Dell has been accused of selling thousands of desktop PCs despite knowing the machines contained faulty components, according to recently unsealed court documents first reported about on Tuesday by The New York Times."
Communications

Verizon Hints At Scrapping Unlimited Data Plans 319

BusinessWeek reports that Verizon may be preparing to follow AT&T's example by eliminating unlimited data plans later this year. Quoting: "'We will probably need to change the design of our pricing where it will not be totally unlimited, flat rate,' John Killian, chief financial officer of Verizon Communications Inc., the wireless unit’s parent, said in an interview at Bloomberg’s headquarters in New York today. The company anticipates 'explosions in data traffic' over wireless networks as new phones on 4G networks incorporate data-heavy applications, such as video downloads, he said. Verizon is working to keep its network running smoothly as more of its customers switch to smartphones that connect to the Internet. ... 'The more bandwidth that you make available, the faster it will be consumed,' said Craig Moffett, analyst at Sanford C. Bernstein & Co. in New York. 'From Verizon’s perspective, the last thing you want is for another generation of consumers to be conditioned to the idea that data is always going to be uncapped.'"
NASA

NASA Warns of Potential "Huge Space Storm" In 2013 464

Low Ranked Craig writes "Senior space agency scientists believe the Earth will be hit with unprecedented levels of magnetic energy from solar flares after the Sun wakes 'from a deep slumber' sometime around 2013. In a new warning, NASA said the super storm could hit like 'a bolt of lightning' and could cause catastrophic consequences for the world's health, emergency services, and national security — unless precautions are taken. Scientists believe damage could extend to everyday items such as home computers, iPods, and sat navs. 'We know it is coming but we don't know how bad it is going to be,' said Dr. Richard Fisher, the director of NASA's Heliophysics division. 'I believe we're on the threshold of a new era in which space weather can be as influential in our daily lives as ordinary terrestrial weather.' Fisher concludes. 'We take this very seriously indeed.'"
Programming

Kaminsky Offers Injection Antidote 244

ancientribe passes along this excerpt from DarkReading.com: "Life's too short to defend broken code. That's the reason renowned researcher Dan Kaminsky says he came up with a brand-new way to prevent pervasive SQL injection, cross-site scripting, and other injection-type flaws in software — a framework that lets developers continue to write code the way they always have, but with a tool that helps prevent them from inadvertently leaving these flaws in their apps. The tool, which he released today for input from the development and security community, basically takes the security responsibility off the shoulders of developers. Putting the onus on them hasn't worked well thus far, he says. Kaminsky's new tool is part of his new startup, Recursive Ventures."
Toys

Brick Shooting Shotgun Built From Lego By 15-Year-Old 70

Lanxon writes "A mildly terrifying young Brit named Jack Streat has managed to build a series of working guns, including a Lee Enfield bolt-action sniper rifle, entirely out of Lego and rubber bands, reports Wired. Streat, who lists himself as 15 years old on his profile, has constructed an enormous and diverse armory of weaponry that fire either rubber bands or Lego bricks. Most are based on real-life guns, including a Steyr AUG, a Tommygun, an AK-47, a belt-fed M429 PARA, an Arctic Warfare sniper rifle, a Glock 17, a pair of semi-automatic TEC-9s, a SPAS 12 pump-action shotgun and a minigun that he calls the Obliterator."
Facebook

Mark Zuckerberg, In It To Change the World? 268

schmidt349 submitted a story about Zuckerberg that might fly in the face of what you've heard of the guy in the past. "Award-winning New York Times journalist David Kirkpatrick's new book The Facebook Effect presents readers with a complex view of Facebook's founder and CEO. Primed by hours of conversation and research deep into the history of the social network, Kirkpatrick reaches the conclusion that money isn't a primary motivation for Zuckerberg, 'a coder more than a CEO, a philosopher more than a businessman, a 26-year-old who has consistently avoided selling out because he sees Facebook as his way to change the world.' Kirkpatrick deftly handles the controversy surrounding Facebook's sometimes cavalier attitude toward user privacy, and the result is a much more balanced and less sensationalist account of Facebook's past, present, and future."
Programming

How Many Hours a Week Can You Program? 547

An anonymous reader writes "How many hours a week should a full-time programmer program? Trying to program anywhere near 40 wears me out. On a good week, I can do 20. Often, it is around 10 or 15. I'm talking about your programming session at the console, typing — including, of course, stopping and thinking for a minute, but not meetings, reading programming books, notes, specifications, etc., which by comparison feel like lunch breaks. I rarely get called to meetings (which is good) but that means to keep my brain from overheating I spend several hours a week surfing the web (usually reading tech news but also a few stops on Facebook, email, etc.). I should add that I am interrupted a few times per day. Me and another guy maintain an intranet site of a couple dozen web apps for an IT department, so we work on a few different things: phone calls, bug fixes, feature adds, as well as writing new web apps from the ground up, all in a day's work. And I know that wears a person out more than if they had just one project to work on. I wonder if programming is like mental sprinting, not walking, so you can only do it in bursts. Am I normal or stealing?"

Slashdot Top Deals

Old programmers never die, they just branch to a new address.

Working...