Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission + - ChromeOS laptop-smashing ad equation solved

An anonymous reader writes: Google's latest marketing video for Chrome OS is interesting to watch for the laptop-smashing amateurs or the slow motion fans, but the real fun may be at 2:24 in the video where a X=G/(CHROM-3) equation is displayed on a chalkboard. Only 20 hours later, it has already been cracked by Jamendo founder Sylvain Zimmer and his team. Check out the details on how they did it and won a Cr-48 netbook which probably won't be delivered because they are not in the U.S.

Submission + - Backscatter X-Ray Machines Easily Fooled (springerlink.com)

Pinckney writes: A paper by Leon Kaufman and Joseph W. Carlson in the Journal of Transportation Security asserts that x-ray backscatter machines are not very effective even in their intended role. While carelessly placed contraband will be detected, the machines have glaring blind-spots and have difficulty distinguishing explosives from human tissue. As they write, "It is very likely that a large (15–20 cm in diameter), irregularly-shaped, cm-thick pancake [of with beveled edges, taped to the abdomen, would be invisible to this technology... It is also easy to see that an object such as a wire or a boxcutter blade, taped to the side of the body, or even a small gun in the same location, will be invisible."
Open Source

Submission + - Ex-Sun CEO to Ellison: avoid death by open source (theregister.co.uk)

gearystwatcher writes: Former Sun CEO Scott McNealy talks to The Reg on where things went wrong and acquisition by Oracle: "We probably got a little too aggressive near the end and probably open sourced too much and tried too hard to appease the community and tried too hard to share," McNealy said. "You gotta take care of your shareholders or you end up very vulnerable like we got. We were a wonderful acquisition — we got stolen for a song at the bottom of the Dow."

Submission + - Low Level Format using USB Flash Drive? 1

Luyseyal writes: "Hey Slashdot. I unwittingly bought one of these terrible flash cards at Fry's and have managed to nuke two of them, successively. I have a USB flash card reader that will read/write the current one at USB 1.0 speed, but it locks up every Ubuntu and XP machine I've come across in high speed access mode. I have read that if I low-level format it that it could be fixed, though my current one doesn't support it. My Google-fu must be weak because I cannot seem to find a USB flash reader that specifies that it will do low-level formatting. Help me Natalie Portman's grits — you are my only hope!"

Comment Re:Any idea what it is? (Score 0) 685

While the market share explanation is definitely true, it is not the WHOLE truth... Not even the most important. Because of the inherently monolithic nature of Windows (single vendor, closed source, current version), the Windows operating system is much more vulnerable than any open source operating system will ever be. Every user of Windows XP SP3 is running the exact same, binary (bit-for-bit) copy of notepad.exe. This means if you find ONE exploit in the notepad.exe program, you can exploit EVERY Windows user, immediately, just by replacing a specific address in the executable. On the GNU/Linux platform, everything is more modular. While the "current version" of Linux is 2.6.28.7, there are probably no more than a few hundred users running a 2.6.28.7-vanilla kernel, and even so, almost none of those will exhibit binary equivalence because of different modules, drivers and compiler options, as well as different compilers doing the compilation on different hardware. And that's just the kernel! Now consider the fact that there is virtually an infinite number of combinations of operating system tools, daemons and utilities, and versions, even on one specific distribution. If you find a way to exploit one specific ELF, there is no guarantee that exact exploit is even possible on just one more system than tested. In no way am I saying Open Source is inherently more secure. I am just saying that it makes it a heck of a lot less likely to encounter two binary equivalent systems in the wild.

Comment Re:Extremely misleading article (Score 0) 770

I couldn't agree more! This article is EXTREMELY flawed in logic and cogency. ALL of the reported figures in section one pointed to the fact that these emigrants were returning home for personal and family reasons. Their own respondent data says that visas were NOT the problem. Yet somehow the authors have made the leap to: "In summary, if the U.S. Government and the business community could find better ways to offer good jobs in tandem with less restrictiveness in visa policies for talented immigrants, the U.S. might be able to recapture many of these immigrants and their potential to serve as a much needed growth engine for the U.S. economy." The authors used an admittedly unsupported premise as the foundation of their conclusion, "Although visa problems did not surface as the primary factor in losing these talented immigrants, a significant minority of respondents did indicate visa and residency permit issues as having played a role in their decision to return to their home country." This is the most poorly structured argument they could have possibly put together. This is purely political diatribe masquerading as a research paper from prominent institutions. Gosh I miss responsible journalism...
Data Storage

Data Centers Crucial To Lehman Sale 301

miller60 writes "What assets retain value in the midst of a financial panic? Data centers. When assets of bankrupt Lehman Brothers were sold to Barclays Tuesday for $1.75 billion, Lehman's data centers and headquarters accounted for $1.5 billion of the value in the deal. That echoes the JPMorgan-Bear Stearns fire sale, in which Bear's two data centers and HQ represented much of the sale price. Amidst financial turmoil, Wall Street's high-tech data centers become the crown jewels for buyers of distressed assets."
Security

Asus Ships Cracking Software On Recovery DVD 263

Barence writes "Asus is accidentally shipping software crackers and confidential documents on the recovery DVDs that come with its laptops. The startling discovery was made by a PC Pro reader whose antivirus software was triggered by a key cracker for the WinRAR compression software, which was located on the recovery DVD for his Asus laptop. Along with the key cracker the disc also contained confidential Asus documents including a PowerPoint presentation that details 'major problems' identified by the company, including application compatibility issues. The UK reader is not alone, either — several users in the US and Australia have also found suspicious files on Asus discs."

Slashdot Top Deals

1 Mole = 007 Secret Agents

Working...