Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Just plug in the wires (Score 1) 10

"Uploading the mind of a convicted criminal and running it a million times faster than normal would enable the uploaded criminal to serve a 1,000 year sentence in eight-and-a-half hours. This would, obviously, be much cheaper for the taxpayer than extending criminals’ lifespans to enable them to serve 1,000 years in real time." Bullshit bingo somewhere in here?
Encryption

How To Replace FileVault With EncFS 65

agoston.horvath writes "I've written a HOWTO on replacing Mac OS X's built-in encryption (FileVault) with the well-known FUSE-based EncFS. It worked well for me, and most importantly: it is a lot handier than what Apple has put together. This is especially useful if you are using a backup solution like Time Machine. Includes Whys, Why Nots, and step-by-step instructions."
Space

Astronomers Discover the Coolest Known Sub-Stellar Body 60

Hugh Pickens writes "Science Daily reports that using the United Kingdom Infrared Telescope (UKIRT) in Hawaii, astronomers have discovered what may be the coolest sub-stellar body ever found outside our own solar system. Too small to be stars and with insufficient mass to maintain hydrogen-burning nuclear fusion reactions in their cores, 'brown dwarfs' have masses smaller than stars but larger than gas giant planets like Jupiter, with an upper limit in between 75 and 80 Jupiter masses. 'This looks like the fourth time in three years that the UKIRT has made a record breaking discovery of the coolest known brown dwarf, with an estimated temperature not far above 200 degrees Celsius,' says Dr. Philip Lucas at the University of Hertfordshire. Due to their low temperature these objects are very faint in visible light, and are detected by their glow at infrared wavelengths. The object known as SDSS1416+13B is in a wide orbit around a somewhat brighter and warmer brown dwarf, SDSS1416+13A, and the pair is located between 15 and 50 light years from the solar system, which is quite close in astronomical terms."
Games

Palm Pre and WebOS Get Native Gaming 49

rboatright writes "WebOS developers have been waiting, and with the 1.3.5 release, Palm's open source page suddenly listed SDL. Members of the WebOS internals team took that as a challenge and within 24 hours had a working port of Doom running in SDL on the Pre, in a webOS card. 48 hours later, they not only had Quake running, but had found in the latest LunaSysMgr the requirements to launch a native app from the webOS app launcher from an icon just like any other app. At the same time, the team demonstrated openGL apps running. With full native code support, with I/O available via SDL, developers now have a preview into Palm's future intent with regard to native code SDK's, and a hint of what's coming."

Apple Orders 10 Million Tablets? 221

Arvisp writes "According to a blog post by former Google China president Kai-Fu Lee, Apple plans to produce nearly 10 million tablets in the still-unannounced product's first year. If Lee's blog post is to be believed, Apple plans to sell nearly twice as many tablets as it did iPhones in the product's first year."
Privacy

Submission + - Palm Pre reports your location, usage, to Palm (kitenet.net) 1

AceJohnny writes: "Joey Hess found that his Palm Pre was ratting on him. It turns out the Pre periodically uploads detailed information about the user, including installed apps, application usage (and crashes), as well as GPS coordinates to Palm. This, of course, without user consent or control. The only way he found to disable this was to modify system files."
The Courts

Submission + - Man jailed after using LimeWire for ID theft (idg.com.au)

angry tapir writes: "A Seattle man has been sentenced to more than three years in prison for using the Limewire file-sharing service to lift personal information from computers across the U.S. The man, Frederick Wood, typed words like "tax return" and "account" into the Limewire search box. That allowed him to find and access computers on the Limewire network with shared folders that contained tax returns and bank account information."
Privacy

The Electronic Police State 206

gerddie writes "Cryptohippie has published what may be called a first attempt to describe the 'electronic police state' (PDF). Based on information available from different organizations such as Electronic Privacy Information Center, Reporters Without Borders, and Freedom House, countries were rated on 17 criteria with regard to how close they are already to an electronic police state. The rankings are for 2008. Not too surprisingly, one finds China, North Korea, Belarus, and Russia at the top of the list. But the next slots are occupied by the UK (England and Wales), the US, Singapore, Israel, France, and Germany." This is a good start, but it would be good to see details of their methodology. They do provide the raw data (in XLS format), but no indication of the weightings they apply to the elements of "electronic police state" behavior they are scoring.
Security

3,800 Vulnerabilities Detected In FAA's Web Apps 88

ausekilis sends us to DarkReading for the news that auditors have identified thousands of vulnerabilities in the FAA's Web-based air traffic control applications — 763 of them high-risk. Here is the report on the Department of Transportation site (PDF). "And the FAA's Air Traffic Organization, which heads up ATC operations, received more than 800 security incident alerts in fiscal 2008, but still had not fixed 17 percent of the flaws that caused them, 'including critical incidents in which hackers may have taken over control of ATO computers,' the report says. ... While the number of serious flaws in the FAA's apps appears to be staggering, Jeremiah Grossman, CTO of WhiteHat Security, says the rate is actually in line with the average number of bugs his security firm finds in most Web applications. ... Auditors were able to hack their way through the Web apps to get to data on the Web application and ATC servers, including the FAA's Traffic Flow Management Infrastructure system, Juneau Aviation Weather System, and the Albuquerque Air Traffic Control Tower. They also were able to gain entry into an ATC system that monitors power, according to the report. Another vulnerability in the FAA's Traffic Flow Management Infrastructure leaves related applications open to malware injection."
It's funny.  Laugh.

The Pirate Bay Seeks Interesting Route To "Pay" Fine 545

Drivintin is one of many who have written to tell us about how The Pirate Bay has taken an interesting approach to the 30 million SEK fine levied in their recent court case (which they said they wont pay). "The bill inspired anakata to devise a plan involving sending money to Danowsky's law firm, but not to pay the fine of course which they say will never be paid. Anakata's clever plan is called internet-avgift, internet-fee in English. Anakata encourages all Internet users to pay extremely small sums around 1 SEK (0.13 USD) to Danowsky's law firm, which represented the music companies at the Pirate Bay trial. The music companies will not benefit from this, instead it will cost them money to handle and process all the money."
The Almighty Buck

Submission + - Mininova starts filtering torrents (torrentfreak.com)

Dreen writes: "Just a few days before their court appearance, Mininova, the largest BitTorrent site on the Internet, has started to filter content. The site is using a third party content recognition system that will detect and remove torrent files that link to copyright infringing files."

Comment Just a few principles I try to adhere to (Score 1) 195

Just a few things that pop into mind... (a) I second one of the above posters - try to move more content into the "static" section. This should be just a basic design principle of the site. For example: is there content that doesn't refresh more often than each 5 minutes? If so, don't let a PHP page pull it out of MySQL; instead, write a stand-alone PHP or Perl script that accesses the database and pre-cooks an HTML page. I'm often surprised how many sites build dynamic content using a CMS (or ~like) approach while this is totally unnecessary and bad for performance too. (b) On the database access layer: of course stored procedures and prepared SQL statements. (c) In general, when e.g. validating user input, or remote IP addresses, or just about anything: Use whitelists, never blacklists - meaning: have a set of allowed inputs which are accepted, and all else is denied (instead of the other way 'round). Test extensively for e.g. Javascript injection in input fields. (d) On PHP coding: Try to abstract all operations into layers / classes. It will save you tons of headaches later. Never "take a shortcut" in coding, by which I mean that you do the quick 'n' dirty thing because "this code will only be used on this page" or "this code will be here just for testing". Quick 'n' dirty code tends to boomerang back to you. (e) During coding, prepare your regression tests, which are preferably automatically run every time you update the site. Regression tests can e.g. include a fancy PHP class and call its methods, and compare the outcome with what the test expects. Always have regression tests for the "good" outcome (no errors) AND for the error conditions that your class should be able to handle. Here too, never take the quick 'n' dirty approach by postponing the writing of tests until you have more time. (f) Whichever technology you choose, follow the forums or mailing lists about that technology. There will be security-related posts or questions that may apply to your site. (g) Strip data that you don't need. For example: Maybe your site stores your visitor's IP addresses so you can cave trolls. Good practice, but the address will probably be only valid for a week or so. Ergo.. delete IP addresses that are older than a week. In the unfortunate case of a database disclosure there will be simply less exposed data. In a similar vein, try not to store plain text data at all. If your site stores something like the answer to a secret question ("what is your pet's name"), then store a hashed value of the answer instead of the plaintext version. Again, in the case of exposure, there will be less data. (h) Take a look at frameworks that protect from e.g. cross site request forgery. If you don't find anything useful, consider coding your own protection against CSRF (by having a hidden form field in each form with a random value, and by having the same value in the user's session. Upon submission of the form, the two values must match. (i) Other than the above I'm sure that there is a ton of good advice.. It's a bit of a lengthy post but I hope that it provides you with a few valid pointers.

Comment What a stupid article (Score 1) 406

How did this get past reviews? A correlation is NOT a cause-and-effect relationship. What were the other factors in the study? Did the cat-owners live in the countryside, enjoying a laid back life, while the non-cat-owners lived in large cities, engrossed in their rat races? Were the two groups compared to such factors at all? The study claims a CORRELATION, the article claims CAUSE AND EFFECT. Bad article.

Incase you're in to such mindless headlines:

  • Make your kids listen to Mozart. They will get better grades.
  • Don't live in the slums, you're more likely to get schizophrenic if you do.
  • Get more money. The richer you are, the smarter you are.
  • Get straight black hair, a yellowish complexion, change your name into Li, and you'll have better math grades.
And so on...

Slashdot Top Deals

... though his invention worked superbly -- his theory was a crock of sewage from beginning to end. -- Vernor Vinge, "The Peace War"

Working...