Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Linux

Botnet Takes Over Twitch Install and Partially Installs Gentoo 101

WarJolt writes: The plug was pulled on the attempt to crowd-source an Arch Linux install after a botnet threatened to take over the process. Twitch Installs has been rebooted by the twitchintheshell community and Twitch Installs users managed to reinstall Arch only to be thwarted by the botnet. The botnet managed to partially install Gentoo. Users are currently in the process of reinstalling Arch.
Security

UK Police Make Third Arrest Over TalkTalk Cyber Attack (reuters.com) 61

An anonymous reader writes: British police have made a third arrest in connection with a cyber attack this month on telecoms company TalkTalk, in which the company said bank details of more than 20,000 customers were hacked. We mentioned the first of the three arrests on Monday; a second arrest took place Thursday, as related by Ars Technica, of a 16-year-old from west London. The latest arrest is of a 20-year-old from Staffordshire.
Programming

Bad Programming Habits We Secretly Love (infoworld.com) 497

snydeq writes: Breaking the rules can bring a little thrill — and sometimes produce better, more efficient code. From the article: 'The rules are more often guidelines or stylistic suggestions, not hard-and-fast rules that must be obeyed or code death will follow. Sure, your code might be ridiculed, possibly even publicly, but the fact that you're bucking conventions adds a little bit of the thrill to subverting, even inadvertently, what amounts more often than not to the social mores of pleasant code. To make matters more complex, sometimes it's better to break the rules. (Shhhh!) The code comes out cleaner. It may even be faster and simpler.' What bad programming habits can't you (or won't you) break?
Open Source

Ask Slashdot: Is There Space For Open Hardware In Networking? 121

New submitter beda writes: Open hardware has got much attention with the advent of Raspberry Pi, Arduino and their respective clones. But most of the devices are focused either on tinkerers (Arduino) or most notably multimedia (Raspberry Pi). However, there is not much happening in other areas such as home routers where openness might help improve security and drive progress. Our company (non-profit) is trying to change this with Turris Omnia but we still wander if there is in fact demand for such devices. Is the market large enough and the area cool enough? Are there enough people who would value open hardware running open software even with a higher price tag? Any feedback would be most valued.
Displays

The Story of Oculus Rift 80

An anonymous reader writes: A lengthy new article details the history of the Oculus Rift, from the VR headset's stereotypical beginnings in a hacker's parents' garage to its $2 billion acquisition by Facebook. "Luckey got into VR by way of computer games, which he was obsessed with for a time. After building what he recalls as a "beautiful six-monitor setup," for extreme visual saturation, he wondered, Why not just put a small screen directly on your face?" At just 19 years old, Luckey built a prototype good enough to impress John Carmack, which brought him all sorts of further attention. Investors came running, and eventually Mark Zuckerberg took an interest. "When Zuckerberg arrived, Luckey introduced himself and then quickly walked away. 'I'm a big fan,' he said, 'but I actually have to get back to work.' ... Zuckerberg seemed taken aback by Luckey's brusqueness but also charmed. 'They definitely have the hacker culture that we have,' he says." As the device approaches release, they're all wondering how much VR will change the world.
Handhelds

Ask Slashdot: Best Tablet In 2015? 283

An anonymous reader writes: My 2012 Nexus 7 tablet is showing its age. The battery drains quickly, the storage problem that plagued all the Nexus 7s persists even after rooting and re-imaging, and the CPU/RAM can't keep up with the later Android versions. When it came out, it was fantastic — good specs, solid build quality, Nexus line, and a good size. Is there anything on the market today that stands out as much as the Nexus 7 did? I tend to prefer the smaller tablets over the bigger ones, but I'm not entirely averse to an 8" or 9" device. There seem to be some really nice devices in the $3-400 range, but I'm not sure if there's a huge benefit to those over the ~$200 models. I don't do any serious gaming on my tablet, but I also want the apps I do use to be snappy. Those of you who have bought or used tablets made in the past year or so, what has your experience been? Any brands or models that stand out from the crowd? Any to avoid?
Games

Cliff Bleszinski's Boss Key Productions Unveils LawBreakers Game Trailer 36

MojoKid writes: Boss Key Productions has posted its first trailer of LawBreakers (formerly Project Bluestreak), a futuristic game title that's set to release on multiple platforms in 2016. The trailer shows off some of the characters and classes that you'll have access to on both sides of the law — yes, you'll have to decide whether you're fighting for the law or the lawbreakers. The game's setting is Earth, though not as you know it now. This is a future version of Earth where gravity is busted. The government, in its infinite wisdom, screwed up some testing on the moon and managed to split its surface, an event that came to be known as "The Shattering." Gears of War creator Cliff Bleszinski is one of the co-founders of Boss Key Productions, the other of which is Arjan Brussee, the main coder behind Jazz Jackrabbit games and a co-founder Guerrilla Games.
Security

Abusing Symbolic Links Like It's 1999 54

An anonymous reader writes with this snippet from James Forshaw's recent post at Google's Project Zero, which begins For the past couple of years I've been researching Windows elevation of privilege attacks. This might be escaping sandboxing or gaining system privileges. One of the techniques I've used multiple times is abusing the symbolic link facilities of the Windows operating system to redirect privileged code to create files or registry keys to escape the restrictive execution context. Symbolic links in themselves are not vulnerabilities, instead they're useful primitives for exploiting different classes of vulnerabilities such as resource planting or time-of-check time-of-use. Click through that link to see examples of this abuse in action, but also information about how the underlying risks have been (or can be) mitigated.
Biotech

Mice Brainpower Boosted With Alteration of a Single Gene 105

Zothecula writes: By altering a single gene to inhibit the activity of an enzyme called phosphodiesterase (PDE4B), researchers have given mice the opportunity to see what an increase in intelligence is like. "They tended to learn faster, remember events longer and solve complex exercises better than ordinary mice. For example, the “brainy mice” showed a better ability than ordinary mice to recognize another mouse that they had been introduced to the day before (abstract). They were also quicker at learning the location of a hidden escape platform in a test called the Morris water maze. However, the PDE4B-inhibited mice also showed less recall of a fearful event after several days than ordinary mice." While many people would welcome such a treatment, the scientists say their research could lead to new treatments for those with cognitive disorders and age-related cognitive decline.
Google

Google Fi: Simple Until It's Not 51

An anonymous reader writes: When Google started Project Fi, one of their big goals was to make cell phone calling simple and predictable. By combining Wi-Fi calling with cellular networks and flat $10/GB pricing, they're trying to put together a service that "just works." But as Dieter Bohn writes, things can get a lot more complicated when you try to integrate it with other Google services, like Voice. He says, "Precisely what happens when you port your number from Voice to Fi (which are kind of the same thing — but not really!) is clear as mud. ... You won't lose your Google Voice number, and it will still do most of the stuff it did before, but you may have to wend your way back to the 2011-era Google Voice site to manage it. Your texts no longer forward via SMS but they're available in the Hangouts App. You can't call people from Google Voice on the web but you can from Hangouts. Oh, and on Android there's a Hangouts dialer app you can use, sometimes, just because."
China

Chinese Consumers Can Now Buy Formerly Banned Consoles, Nationwide 39

PC Magazine reports that China has entered a new phase in its liberalization of game console sales. Restrictions amounting to a nationwide ban were loosened recently, so that manufacturers which produced (and sold) consoles in Shanghai's free trade zone were allowed to also sell their wares elsewhere in China. The newest change is to remove that geographic requirement, so Chinese buyers are expected to be able to buy whatever consoles they'd like. Games to play on those consoles, though, are a different story.
Google

Google Will Block Access To Its Autocomplete API On August 10 59

An anonymous reader writes with news reported by VentureBeat that Google will be discontinuing developer access to its unofficial Autocomplete API, as of August 10 of this year. A snippet from the article: Google currently supports more than 80 APIs that developers can use to integrate Google services and data into their applications. The company also has unsupported and unpublished APIs which people outside the company have discovered and leveraged. One of those is the Autocomplete API. The company says it is making this move "in the interest of maintaining the integrity of autocomplete as part of Search," that it wants to "ensure that users experience autocomplete as it was designed to be used," and finally that "this provides the best user experience for both services." I'm sure many will disagree.

Slashdot Top Deals

Comparing information and knowledge is like asking whether the fatness of a pig is more or less green than the designated hitter rule." -- David Guaspari

Working...