Forgot your password?
typodupeerror
Robotics

Submission + - U. Maryland Team Wins Robot Sub Competition (gorobotics.net)

William Cox writes: "A team from the University of Maryland has won the 11th Annual International Autonomous Underwater Vehicle Competition, held in San Diego, CA, this weekend. Twenty-five teams from around the world (US, Canada, Japan, and India) built autonomous submarines to complete a series of tasks using vision recognition, autonomous navigation, and sonar. Maryland unseated the 3-time record holder, University of Florida, to win first place. University of Texas at Dallas took 2nd, and a Canadian team, École de technologie supérieure, took 3rd."
Movies

Submission + - Lost footage of "Metropolis" found in Arge (reuters.com)

ram.loss writes: According to a Reuters article, a long version of Metropolis has been found at a cinema museum in Argentina, by a newly appointed archivist. The reels have been authenticated by the Murnau foundation at Germany.
Programming

Submission + - Non-Programming Jobs For a Computer Science Major? 5

An anonymous reader writes: I recently graduated from a "major" university in America with a BS degree in Computer Science. I unfortunately must admit that I am not very skilled with programming. I finished with the degree, and I've spent much of my college career working a job doing technical support (fixing laptops, troubleshooting Windows problems, etc). What jobs can I get with a computer science degree that are NOT mainly programming jobs? A little programming wouldn't be bad, but none would be preferred. And what kind of salaries do these jobs typically fetch?
The Courts

Submission + - Judge refuses to sign RIAA 'ex parte' order (blogspot.com)

NewYorkCountryLawyer writes: "The RIAA just can't get enough of going after University of Maine students, but it appears that the judges in Portland, Maine, may be getting wise to the record company lawyers' antics. RIAA counsel submitted yet another ex parte discovery order to the Court ('ex parte' meaning 'without notice'), in BMG v. Does 1-11, but this time the judge refused to sign, pointing out that there is no emergency since there is no evidence that records are about to be destroyed (PDF). This is the same judge who has previously suggested the imposition of Rule 11 sanctions against the RIAA lawyers, accusing them of gamesmanship, all of which prompts one to ask: 'has the stupidity of the RIAA lawyers attained even greater heights?'"

Comment Here's the blog post (Score 5, Informative) 426

I was able to grab the blog post:

As many of you know, Revision3's servers were brought down over the Memorial Day weekend by a denial of service attack. It's an all too common occurrence these days. But this one wasn't your normal cybercrime - there's a chilling twist at the end. Here's what happened, and why we're even more concerned today, after it's over, than we were on Saturday when it started.

It all started with just a simple "hi". Now "hi" can be the sweetest word in the world, breathlessly whispered into your ear by a long-lost lover, or squealed out by your bouncy toddler at the end of the day. But taken to excess - like by a cranky 3-year old-it gets downright annoying. Now imagine a room full of hyperactive toddlers, hot off of a three hour Juicy-Juice bender, incessantly shrieking "hi" over and over again, and you begin to understand what our poor servers went through this past weekend.

On the internet, computers say hi with a special type of packet, called "SYN". A conversation between devices typically requires just one short SYN packet exchange, before moving on to larger messages containing real data. And most of the traffic cops on the internet - routers, firewalls and load balancers - are designed to mostly handle those larger messages. So a flood of SYN packets, just like a room full of hyperactive screaming toddlers, can cause all sorts of problems.

For adults, it's typically an inability to cope, followed either by quickly fleeing the room, or orchestrating a massive Teletubbies intervention. Since they lack both legs and a ready supply of plushies, internet devices usually just shut down.

That's what happened to us. Another device on the internet flooded one of our servers with an overdose of SYN packets, and it shut down - bringing the rest of Revision3 with it. In webspeak it's called a Denial of Service attack - aka DoS - and it happens when one machine overwhelms another with too many packets, or messages, too quickly. The receiving machine attempts to deal with all that traffic, but in the end just gives up. (Note the photo of our server equipment responding to the DoS Attack)

In its coverage Tuesday CNet asked the question, "Now who would want to attack Revision3?" Who indeed? So we set out to find out. Internet attacks leave lots of evidence. In this case it was pretty easy to see exactly what our shadowy attacker was so upset about. It turns out that those zillions of SYN packets were addressed to one particular port, or doorway, on one of our web servers: 20000. Interestingly enough, that's the port we use for our Bittorrent tracking server. It seems that someone was trying to destroy our bittorrent distribution network.

Let me take a step back and describe how Revision3 uses Bittorrent, aka BT. The BT protocol is a peer to peer scheme for sharing large files like music, programs and video. By harnessing the peer power of many computers, we can easily and cheaply distribute our huge HD-quality video shows for a lot less money. To get started, the person sharing that large file first creates a small file called a "torrent", which contains metadata, along with which server will act as the conductor, coordinating the sharing. That server is called the tracking server, or "tracker". You can read much more about Bittorrent at Wikipedia, if you really want to understand how it works.

Revision3 runs a tracker expressly designed to coordinate the sharing and downloading of our shows. It's a completely legitimate business practice, similar to how ESPN puts out a guide that tells viewers how to tune into its network on DirecTV, Dish, Comcast and Time Warner, or a mall might publish a map of its stores.

But someone, or some company, apparently took offense to Revision3 using Bittorrent to distribute its own slate of shows. Who could that be?

Along with where it's bound, every internet packet has a return address. Often, particularly in cases like this, it's forged - or spoofed. But interestingly enough, whoever was sending these SYN packets wasn't shy. Far from it: it's as if they wanted us to know who they were.

A bit of address translation, and we'd discovered our nemesis. But instead of some shadowy underground criminal syndicate, the packets were coming from right in our home state of California. In fact, we traced the vast majority of those packets to a public company called Artistdirect (ARTD.OB). Once we were able to get their internet provider on the line, they verified that yes, indeed, that internet address belonged to a subsidiary of Artist Direct, called MediaDefender.

Now why would MediaDefender be trying to put Revision3 out of business? Heck, we're one of the biggest defenders of media around. So I stopped by their website and found that MediaDefender provides "anti-piracy solutions in the emerging Internet-Piracy-Prevention industry." The company aims to "stop the spread of illegally traded copyrighted material over the internet and peer-to-peer networks." Hmm. We use the internet and peer-to-peer networks to accelerate the spread of legally traded materials that we own. That's sort of directly opposite to what Media Defender is supposed to be doing.

Who pays MediaDefender to disrupt peer to peer networks? I don't know who's ponying up today, but in the past their clients have included Sony, Universal Music, and the central industry groups for both music and movies - the RIAA and MPAA. According to an article by Ars Technica, the company uses "its array of 2,000 servers and a 9GBps dedicated connection to propagate fake files and launch denial of service attacks against distributors." Another Ars Technica story claims that MediaDefender used a similar denial of service attack to bring down a group critical of its actions.

Hmm. Now this could have been just a huge misunderstanding. Someone could have incorrectly configured a server on Friday, and left it to flood us mercilessly with SYN packets over the long Memorial Day weekend. If so, luckily it was pointed at us, and not, say, at the intensive care unit at Northwest Hospital and Medical Center But Occam's razor leads to an entirely different conclusion.

So I picked up the phone and tried to get in touch with ArtistDirect interim CEO Dimitri Villard. I eventually had a fascinating phone call with both Dimitri Villard and Ben Grodsky, Vice President of Operations at Media Defender.

First, they willingly admitted to abusing Revision3's network, over a period of months, by injecting a broad array of torrents into our tracking server. They were able to do this because we configured the server to track hashes only - to improve performance and stability. That, in turn, opened up a back door which allowed their networking experts to exploit its capabilities for their own personal profit.

Second, and here's where the chain of events come into focus, although not the motive. We'd noticed some unauthorized use of our tracking server, and took steps to de-authorize torrents pointing to non-Revision3 files. That, as it turns out, was exactly the wrong thing to do. MediaDefender's servers, at that point, initiated a flood of SYN packets attempting to reconnect to the files stored on our server. And that torrential cascade of "Hi"s brought down our network.

Grodsky admits that his computers sent those SYN packets to Revision3, but claims that their servers were each only trying to contact us every three hours. Our own logs show upwards of 8,000 packets a second.

"Media Defender did not do anything specific, targeted at Revision3â, claims Grodsky. "We didn't do anything to increase the traffic" - beyond what they'd normally be sending us due to the fact that Revision3 was hosting thousands of MediaDefender torrents improperly injected into our corporate server. His claim: that once we turned off MediaDefender's back-door access to the server, "traffic piled up (to Revision3 from MediaDefender servers because) it didn't get any acknowledgment back."

Putting aside the company's outrageous use of our servers for their own profit, and the large difference between one connection every three hours and 8,000 packets a second, I'm still left to wonder why they didn't just tell us our basement window was unlocked. A quick call or email and we'd have locked it up tighter than a drum.

It's as if McGruff the Crime Dog snuck into our basement, enlisted an army of cellar rats to eat up all of our cheese, and then burned the house down when we finally locked him out - instead of just knocking on the front door to tell us the window was open.

In the end, here's what I know:

* A torrential flood of SYN packets rained down on Revision3's network over Memorial Day weekend.

* Those packets - up to 8,000 a second - came primarily from computers controlled by MediaDefender, who is in the business of shutting down illegal torrent sites.

* Revision3 suffered measurable harm to its business due to that flood of packets, as the attacks on our legitimate and legal Torrent Tracking server spilled over into our entire internet infrastructure. Thus we were unable to serve videos and advertising through much of the weekend, and into Tuesday - and even our internal email servers were brought down.

* Denial of service attacks are illegal in the US under 12 different statutes, including the Economic Espionage Act and the Computer Fraud and Abuse Act.

Although I can only guess, here's what I think really happened. Media Defender was abusing one of Revision3's servers for their own purposes - quite without our approval. When we closed off their backdoor access, MediaDefender's servers freaked out, and went into attack mode - much like how a petulant toddler will throw an epic tantrum if you take away an ill-gotten Oreo.

That tantrum threw upwards of 8,000 SYN packets a second at our servers. And that was enough to bring down both our public facing site, our RSS server, and even our internal corporate email - basically the entire Revision3 business. Smashing the cookie jar, as it were, so that no one else could have any Oreos either.

Was it malicious? Intentional? Negligent? Spoofed? I can't say. But what I do know is that the FBI is looking into the matter - and it's far more serious than toddlers squabbling over broken toys and lost cookies.

MediaDefender claims that they have taken steps to ensure this won't happen again. "We've added a policy that will investigate open public trackers to see if they are associated with other companies", promised Grodsky, "and first will make a communication that says, hey are you aware of this."

In the end, I don't think Media Defender deliberately targeted Revision3 specifically. However, the company has a history of using their servers to, as Ars Technica said, "launch denial of service attacks against distributors." They saw us as a "distributor" - even though we were using Bittorrent for legitimate reasons. Once we shut them out, their vast network of servers were automatically programmed to implement a scorched earth policy, and shut us down in turn. The long Memorial Day weekend holiday made it impossible for us to contact either Media Defender or their ISP, which only exacerbated the problem.

All I want, for Revision3, is to get our weekend back - both the countless hours spent by our heroic tech staff attempting to unravel the mess, and the revenue, traffic and entertainment that we didn't deliver.

If it can happen to Revision3, it could happen to your business too. We're simply in the business of delivering entertainment and information - that's not life or death stuff. But what if MediaDefender discovers a tracker inside a hospital, fire department or 911 center? If it happened to us, it could happen to them too. In my opinion, Media Defender practices risky business, and needs to overhaul how it operates. Because in this country, as far as I know, we're still innocent until proven guilty - not drawn, quartered and executed simply because someone thinks you're an outlaw.

- Jim Louderback CEO - Revision3
Input Devices

Submission + - Product Review of the Unicomp Customizer Keyboard (wordpress.com)

ThousandStars writes: "I wrote a review of the Unicomp Customizer Keyboard, which is a modern version of the IBM and then Lexmark Model M much beloved by nerds and hackers. The pros of the Customizer: it's sturdy, remarkably similar to the Model M, has great tech support, and uses a USB interface. Oh, and it's Mac-friendly. The cons: at $69 it's somewhat expensive and its noise won't be music to your cubemate's ears."
Government

Submission + - Net neutrality bill tabled in Canadian parliament (www.cbc.ca)

FeatherBoa writes: A Canadian opposition party has followed through with its promise to introduce legislation that seeks to keep the internet democratic, open and free from control by service providers. This bill is about fairness to consumers. It seeks to amend the Telecommunications Act and prohibit network operators from engaging in network management practices that favour, degrade or prioritize any content, application or service transmitted over a broadband network based on its source, ownership or destination.
Power

Submission + - Avalanche Effect Demonstrated In Solar Cells (physorg.com)

esocid writes: Researchers at TU Delft (Netherlands) and the FOM (Foundation for Fundamental Research on Matter) have found irrefutable proof that the so-called avalanche effect by electrons occurs in specific, very small semiconducting crystals. This physical effect could pave the way for cheap, high-output solar cells. Solar cells currently have a relatively low output, typically 15%, and high manufacturing costs. One possible improvement could derive from a new type of solar cell made of semiconducting nanocrystals (crystals with dimensions in the nanometre size range) and could theoretically lead to a maximum output of 44%, with the added benefit of reducing manufacturing costs.
In conventional solar cells, one photon can release precisely one electron, however, in some semiconducting nanocrystals, one photon can release two or three electrons, hence the term avalanche effect. This effect was first measured by researchers at the Los Alamos National Laboratories in 2004, and since then the scientific world had raised doubts about the value of these measurements. This current research does in fact demonstrate that the avalanche effect can occur.

Power

Submission + - Inside look at Iran's nuclear program 2

NotBornYesterday writes: On April 8, Iranian President Mahmoud Ahmadinejad visited his country's secretive nuclear enrichment plant at Natanz for a photo op. What came out of this visit is a series of photos which have caused a fair amount of interest among western scientists. Shown in the photos are not only some of the inner workings of the plant and current generation of enrichment centrifuges, but also key components to newer generations of more effective centrifuges. Analysts are "intrigued" not only by the technical revelations in the pictures, but also because Iran's Defense Minister Mostafa Mohammad Najjar accompanied Ahmadinejad through the facility. In the words of one analyst, "This is intel to die for."
User Journal

Journal Journal: China's New Secret Naval Base

In not-so-secret arms race news, the Federation of American Scientists details, with recent satellite imagery, the new Chinese secret naval base on Hainan Island. What's interesting is China's new capabilities, such as a demagnetization facility. What's not that much interesting is so many resources spent worldwide for military defense, but hopefully, it's harder and harder to hide such

Power

Submission + - Hobbyist renewable energy 2

vossman77 writes: "I was looking into renewable energy from a hobbyist perspective, maybe generating a few watts of solar or wind power, just to reduce my electric bill. But upon further review, I found out that I need a special grid tie AC inverter that shuts off when the grid turns off (for worker safety reasons) and makes the current in-phase with the grid. These two additional features over the cheap inverters sold at department store, makes the cost upwards of $2000, but support more watts than I need. While this is fine for large scale projects, it is out of range for a small scale hobbyist. A Google search came with some home brew hacks at best. So, are there any slashdotters out doing small scale renewable energy projects with grid tie systems? What are other options for the hobbyist to play around with renewable energy, other than charging a cell phone?"
Space

Submission + - Why Soyuz Re-entered Off Course (universetoday.com)

fyc writes: "Universe Today has posted the facts about what really happened when Soyuz TMA-1 had to make an emergency landing 300 miles off course last week. The craft, carrying South Korea's first astronaut, appears to have suffered a technical fault when the descent module carrying the crew and the Soyuz propulsion module failed to separate in time for the re-entry."
Google

Submission + - Google funds work for Photoshop on Linux (blogspot.com)

S point 2 writes: "Googlehas announced that they have hired Codeweaers, maker of the popular Wine software to make Photoshop run better on Linux.
http://asia.cnet.com/reviews/digitalcameras/0,39001469,62037989,00.htm

"We hired CodeWeavers to make Photoshop CS and CS2 work better under Wine," Dan Kegel, of Google's software engineering team and the Wine 1.0 release manager, said on Google's open-source blog. "Photoshop is one of those applications that desktop Linux users are constantly clamoring for, and we're happy to say they work pretty well now...We look forward to further improvements in this area."

It is unknown whether or not the entire Creative Suite will be funded for support, but for the time being it seems Photoshop-on-Linux development is getting a new priority under Google."

Enlightenment

Submission + - Ethics in I.T. 3

chiefloko writes: I am presently taking a "Business Ethics" class while earning my MBA. I am posed with a final paper topic on "Ethics within the Information Technology realm." Over the past 13 years I have worked for three corporations and have scene everything from the typical B.O.F.H. to un-godly pirated software use. I also bore witness to a remote user logging in to a poorly administrated Sun station, finding out s/he was root, and then reading co-workers emails. I am interested in what the "norm" goes for ethics in the I.T. world and some of the outcomes and stories.

Slashdot Top Deals

IBM Advanced Systems Group -- a bunch of mindless jerks, who'll be first against the wall when the revolution comes... -- with regrets to D. Adams

Working...