Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Prominent Drupal and PHP dev kicked from the Drupal project over Gor beliefs (techcrunch.com)

An anonymous reader writes: Last week the Drupal community erupted in anger after its leader, Dries Buytaert, asked Larry Garfield, a prominent Drupal contributor and long-time member of the Drupal and PHP communities, “to leave the Drupal project.” Buytaert claims he did this "because it came to my attention that he holds views that are in opposition with the values of the Drupal project.". A huge furor has erupted in response — not least because the reason clearly has much to do with Garfield’s unconventional sex life. Buytaert made his post in response after Larry went public, outing himself to public opinion.

Comment Change the name to "Crash Supersonic"? (Score 3, Insightful) 115

"... marketing geniuses..."

Apparently a lot of technically-knowledgeable people don't have social ability. Boom Supersonic!!! "Boom" is what you hear when there is a crash.

There are many more like that. For example, Malwarebytes is software named after the problem it is supposed to cure. Doesn't anyone at BOOM have a mother?

Son: Mom, what do you think of the name BOOM for our company?

Mom: No, son, that's not a good name.

Son: Why not?

Mom: You're only 3 years old. You'll understand when you are 4.

Submission + - An Unexpected New Lung Function Has Been Found - They Make Blood (sciencealert.com) 1

schwit1 writes: Researchers have discovered that the lungs play a far more complex role in mammalian bodies than we thought, with new evidence revealing that they don't just facilitate respiration — they also play a key role in blood production.

In experiments involving mice, the team found that they produce more than 10 million platelets (tiny blood cells) per hour, equating to the majority of platelets in the animals' circulation. This goes against the decades-long assumption that bone marrow produces all of our blood components.

Researchers from the University of California, San Francisco also discovered a previously unknown pool of blood stem cells that makes this happen inside the lung tissue — cells that were incorrectly assumed to mainly reside in bone marrow.

"This finding definitely suggests a more sophisticated view of the lungs — that they're not just for respiration, but also a key partner in formation of crucial aspects of the blood," says one of the researchers, Mark R. Looney.

Submission + - Call for the security of the Electronic Voting Machine (EVM) to be tested

An anonymous reader writes: The IT minister of the Indian state of Karnataka has called for a hackathon for testing the electronic voting machines (EVMs) used in the recent elections in India.

In the elections in the Indian state of Uttar Pradesh, BJP, the party which is presently in power in the centre, won with a huge majority. Some from the opposition parties have argued that the EVMs may have been tampered with.

Narendra Modi, the present Prime Minister of India, was accused of using non-authoirzed EVMs in 2010 during the local elections in the state of Gujarat while he was a chief minister there. The EVMs were shown to be giving incorrect results.

In an earlier research done in 2010 by researchers from NetIndia, University of Michigan and a non-profit in Netherlands specializing in electronic voting related issues, the security of the electronic voting machines was found to be inadequate.

Submission + - Call for the security of the Electronic Voting Machine (EVM) to be tested

An anonymous reader writes: The IT minister of the Indian state of Karnataka has called for a hackathon for testing the electronic voting machines (EVMs) used in the recent elections in India.

In the elections in the Indian state of Uttar Pradesh, BJP, the party which is presently in power in the centre, won with a huge majority. Some from the opposition parties have argued that the EVMs may have been tampered with.

Narendra Modi, the present Prime Minister of India, was accused of using non-authoirzed EVMs in 2010 during the local elections in the state of Gujarat while he was a chief minister there. The EVMs were shown to be giving incorrect results.

In an earlier research done in 2010 by researchers from NetIndia, University of Michigan and a non-profit in Netherlands specializing in electronic voting related issues, the security of the electronic voting machines was found to be inadequate.

Submission + - Windows 10 forced upgrades spark legal action

AmiMoJo writes: Three people in Illinois have filed a lawsuit against Microsoft, claiming that its Windows 10 update destroyed their data and damaged their computers. The complaint, filed in Chicago's US District Court on Thursday, charges that Microsoft Windows 10 is a defective product and that its maker failed to provide adequate warning about the potential risks posed by Windows 10 installation – specifically system stability and data loss. The attorneys representing the trio are seeking to have the case certified as a class action that includes every person in the US who upgraded to Windows 10 from Windows 7 and suffered data loss or damage to software or hardware within 30 days of installation. They claim there are hundreds or thousands of affected individuals. Last June, a California woman won $10,000 after a Windows 10 update disabled her PC.

Submission + - Windows 10 forced upgrades spark legal action

AmiMoJo writes: Three people in Illinois have filed a lawsuit against Microsoft, claiming that its Windows 10 update destroyed their data and damaged their computers. The complaint, filed in Chicago's US District Court on Thursday, charges that Microsoft Windows 10 is a defective product and that its maker failed to provide adequate warning about the potential risks posed by Windows 10 installation – specifically system stability and data loss. The attorneys representing the trio are seeking to have the case certified as a class action that includes every person in the US who upgraded to Windows 10 from Windows 7 and suffered data loss or damage to software or hardware within 30 days of installation. They claim there are hundreds or thousands of affected individuals. Last June, a California woman won $10,000 after a Windows 10 update disabled her PC.

Submission + - Latest Leaked WikiLeaks Reveals How the CIA Collapse Apple Products (techdach.com)

An anonymous reader writes: WikiLeaks document to re-issue a new leak on Thursday. According to the latest documents that disclosed non-profit institutions leaker confidential data, the United States Intelligence Agency (CIA) has developed tools to break into Apple products, like the iPhone and MacBook.

The document describes the CIA attempt to hack some device that had been considered impenetrable. They use methods of hacking to access the product directly. Since it was developed in 2009 and 2013, the device was no possibility of infecting the latest Apple devices.

In a news conference, WikiLeaks revealed that the CIA had access to Apple products to sabotage their shipments (opened, infects, and sends back) will come out or into the United States.

However, CNET were not able to verify the authenticity of documents related to this. As of March, the CIA again declined to comment on the authenticity of the document. At that time, WikiLeaks disseminate information about the kinds of devices that hackers can attack the operating system from a variety of popular devices, including the Samsung SmartTV that require physical access to his hack.

"It is the duty of the CIA to be the most innovative, advanced and forward-thinking in order to protect the country from threats that come," said CIA. "Americans deserve it."

Apple states that employees vulnerable infected is a type of 3G in the iPhone series, which was launched in 2009. While the Mac series, cracks vulnerable have been addressed to any device that is released after the year 2013.

"We will never negotiate with WikiLeaks for any information," said Apple. "We have given instructions to keep them informed of any information through a standard procedure that we've applied. So far we have received no information that is not public domain. "

The device targeted Apple firmware, which is software that play a role in fundamental processes. One of the devices that were outlined in the CIA document was "Sonic Screwdriver" that can infect MacBook firmware via the Thunderbolt port.

Processes for its outbreak using the same loophole to the problems described by security researcher Trammel Hudson in 2015. They developed a hacking tool called "Thunderstrike 2" that infects Macbook firmware through the Thunderbolt port is a new gap anticipated Apple in 2015.

Another device described is used to infect Apple is a cache that could infect iPhones in 2008, according to Wikileaks exposure. They noted that these devices have been developed up to version 1.2. "The CIA has plagued the supply chain iPhones since 2008," said Wikileaks.

Slashdot Top Deals

You may call me by my name, Wirth, or by my value, Worth. - Nicklaus Wirth

Working...