Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Linux Kernel 4.7 Reaches End of Life, Users Urged to Move to Linux 4.8

prisoninmate writes: The Linux 4.7 kernel branch officially reached end of life, and it has already been marked as EOL on the website, which means that the Linux kernel 4.7.10 maintenance update is the last one that will be released for this branch. It also means that you need to either update your system to the Linux 4.7.10 kernel release or move to a more recent kernel branch, such as Linux 4.8. In related news, Linux kernel 4.8.4 is now the latest stable and most advanced kernel version, which is already available for users of the Solus and Arch Linux operating systems, and it's coming soon to other GNU/Linux distributions powered by a kernel from the Linux 4.8 series. Users are urged to update their systems as soon as possible.

Submission + - AT&T-Time Warner may signal start of new media industry consolidation (

Mr D from 63 writes: The tie-up of AT&T Inc and Time Warner Inc, bringing together one of the country's largest wireless and pay TV providers and cable networks like HBO, CNN and TBS, could kick off a new round of industry consolidation amid massive changes in how people watch TV.

Media content companies are having an increasingly difficult time as standalone entities, creating an opportunity for telecom, satellite and cable providers to make acquisitions, analysts say.

Media firms face pressure to access distribution as more younger viewers cut their cable cords and watch their favorite shows on mobile devices. Distribution companies, meanwhile, see acquiring content as a way to diversify revenue.

Of course, Time Warner and AT&T reps claim this is necessary just to compete. Regulatory scrutiny may not see it that way.

Submission + - How a deftly crafted botnet toppled top internet sites (

tdog17 writes: Attacks that overwhelmed the internet-address lookup service provided by Dyn were well coordinated and carefully plotted to take down data centers all over the globe, preventing customers from reaching more than 1,200 domains Dyn was in charge of.

Submission + - A peek into the future of lithium batteries (

Eloking writes: In a great example of a low-cost research solution that could deliver big results, University of Michigan scientists have created a window for lithium-based batteries in order to film them as they charge and discharge.

The future of lithium-ion batteries is limited, says University of Michigan researcher Neil Dasgupta, because the chemistry cannot be pushed much further than it already has. Next-generation lithium cells will likely use lithium air and lithium sulfur chemistries. One of the big hurdles to be overcome in making these batteries practical is dendrites — tiny branch-like structures of lithium that form on the electrodes.

Submission + - "Most serious" Linux privilege-escalation bug ever is under active exploit (

operator_error writes: Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

By Dan Goodin — 10/20/2016

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

Submission + - Julian Assange Under Investigation For Grooming Of 8-Year-Old Girl? ( 1

An anonymous reader writes: While details are only beginning to trickle out, it appears that Wikileaks founder Julian Assange is accused of (Google Cache) having groomed an 8-year-old girl for sex while her family was on vacation in the Bahamas, sending lewd images of himself performing oral sex on a camera, and sending "unlawful obscenity materials of a child pornographic nature" to her. The case is stated to be under investigation by the Royal Bahamas Police (RBPF Reference: Sgt Ferguson 1705 RBPF Thompson Boulevard), and relayed to the UN by, a dating site running a UN-sponsored project (KATIA) to develop tools for rape screening. Initially having partnered with Assange as a #HeForShe Ambassador, the group severed ties with Assange when the case came to light and filed a brief with the UN requesting that his UNWGAD ruling be overturned (claiming threats of retaliation from Assange for doing so). Days later, the UN site decredentialed So far, Assange has not responded to the claims and no explanation for the delisting has been forthcoming.

Submission + - How We Teach CS Should Be Independent Of Who We Are Teaching

theodp writes: "For many years I have been part of discussions about how to diversify computing," writes CS Prof Valerie Barr over at the ACM, "particularly about how we recruit and retain a more diverse cohort of CS students. I wholeheartedly support this goal, and spend a considerable amount of my effort as chair of ACM-W helping to drive programs that focus on one aspect of this diversification, namely encouraging women students to stay in computing. Of late I have become very concerned about how some elements of the diversity argument are being expressed and then implemented in teaching practices. A shorthand has developed that often comes out as two problematic claims: Problem 1. Women are motivated by social relevance, so when we teach them we have to discuss ways in which computing can contribute to the social good. Problem 2. Students from underrepresented minorities (URM) respond to culturally relevant examples, so when we teach them we have to incorporate these examples into course content. [...] As we continue efforts to diversify computing, we cannot afford to paint any group in a monochromatic way. We have to embrace the richness of today's student population by making what we teach meaningful and relevant to them. There are women who want to geek out about hard-core tech, and there are men who care deeply about computing for the social good. There are students of all genders and ethnic and racial backgrounds who will be happy with an old-fashioned lecture, and those who will thrive on active learning with examples drawn from a range of cultures and application areas. [...] We have to teach everybody differently. If we pretend that all women students are the same, and all URM students are the same, and all Asian and white male students are the same, then we will never adequately address the blind spots and weaknesses in instruction and curriculum development that have led to our current situation."

Submission + - SPAM: Retired four-star general admits leaking top-secret info to media

Okian Warrior writes: Former vice chairman of the US Joint Chiefs of Staff Gen. James Cartwright pled guilty in federal court Monday, admitting he lied to the FBI when questioned about whether he provided two journalists with top secret information in 2012.

While the charge of making false statements to federal investigators carries a five-year maximum sentence, Cartwright's plea agreement states that he should face no more than six months in prison.

Link to Original Source

Submission + - Feds Walk Into A Building, Demand Everyone's Fingerprints To Open Phones

An anonymous reader writes: Forbes reports that the Department of Justice was issued a search warrant to gather the fingerprints of all the people present at a California residence, including residents and visitors.
The memorandum included "authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES during the execution of the search and who is reasonably believed by law enforcement to be the user of a fingerprint sensor-enabled device that is located at the SUBJECT PREMISES and falls within the scope of the warrant."

Submission + - The death of dark matter? (

slew writes: A team led by Case Western Reserve University researchers has found a significant new relationship in spiral and irregular galaxies: the acceleration observed in rotation curves tightly correlates with the gravitational acceleration expected from the visible mass only.

This correlation appears to be true of galaxies that would be apparently dominated by "halos" of dark matter in the current standard models which include dark matter to explain the mass/rotational anomalies in such galaxies.

The observations that enabled this result are the infrared measurements by the Spitzer space telescope which are considered more accurate indicators of stellar mass.

Unfortunately this new result does nothing to explain the observation of galactic expansion or apparent dark energy. So it is probably premature to throw in the towel, but hey settled science is too boring ;^)

Submission + - At the World's First Cybathlon, Proud Cyborg Athletes Raced for the Gold (

the_newsbeagle writes: In a stadium in Zurich last Saturday, a new athletic competition showcased the possibilities when machine and muscle work in tandem. The Cybathlon, billed as the world's first cyborg Olympics, starred paraplegic people racing in robotic exoskeleton suits and amputees completing race courses with motorized prosthetic limbs. While the competitors struggled with mundane tasks like climbing stairs, those exertions underlined the point:

"Like the XPrize Foundation, the Cybathlon’s organizers wanted to harness the motivating power of competition to spur technology development. By filling the races with everyday activities, they hoped to encourage inventors to make devices that can eventually provide winning moves beyond the arena."

Submission + - 25 women in robotics you need to know about (

Hallie Siegel writes: For the past four years, in celebration of Ada Lovelace Day, we've been publishing a list '25 women in robotics you need to know about' to help raise the visibility of women working in STEM and robotics. Now with 100 alumni and current listees, we've reached a critical mass. These are change-makers at various stages in their robotics careers and who come from various disciplines, from research and academia, startup, policy and industry, and who are redefining not only what it means to be a woman working in tech, but also what it means to be a robotics expert. Check these talented women out.

Submission + - Identifying Criminal Types - And Potential Employees - With Neural Networks

An anonymous reader writes: Researchers at Tomsk University have devised an Artificial Neural Network system which has 80% effectiveness in deducing what type of crimes a convict has convicted, based on a questionnaire, and suggest that similar ANN analysis would be effective in classifying employment candidates. The team was able to divide survey respondents into classifications based on the ANN program’s analysis of dominant personality characteristics, which were correlated to the type of crime they had been jailed for in 80% of cases. A survey was distributed to 180 prisoners jailed for offenses including murder, grievous bodily harm, theft, and drug-related crimes. Completed surveys were then analyzed using two different artificial neural network (ANN) programs, to measure personality characteristics in an attempt to classify prisoners based on their predilection for a certain type of crime. The survey attempted to cover a large set of personality characteristics, while the Artificial Neural Network divided responses into two separate, scaled two-factor classifications. The first measured respondents on a scale of domination to subordination and the second, friendliness to hostility.

Project lead Prof. Michael Golovchiner said, “We are interested in the problem of predicting behavior, which is primarily determined by the individual’s temperament and character.” He continued, “The question of whether there is a set of characteristics that distinguish criminals convicted of various crimes is a task well-suited to ANN, because this is an issue of classification.”

Submission + - Trade Of Online Gaming Currencies Fuels Cybercrime (

Orome1 writes: Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro researchers, the money that cybercriminals earn through it is used to mount DoS attacks, spam campaigns, perpetrate identity theft and financial fraud against a variety of business and organizations, and so on. Until players stop trying to buy in-game currencies, cybercriminals will try to get it and sell it. The worst thing that criminals selling/trading in-game currencies can be hit with is the suspension or termination of their gaming accounts – and they can easily open new ones and continue with the scheme.

Submission + - .onion Debian services now available

alfino writes: Long-time Debian System Administrator Peter "weasel" Palfrader announced today that a number of Debian services / web sites are now also available via Tor .onion domains.

Yay for privacy. We don't care about where you come from, and now you don't even have to tell anyone that you're using Debian.

The archive at is already in the list. Support for more redundant Debian archive access is expected to come When It's Ready.

Slashdot Top Deals

Unix will self-destruct in five seconds... 4... 3... 2... 1...