Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Easy-To-Exploit Rooting Flaw Puts Linux Computers At Risk (

itwbennett writes: The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability, tracked as CVE-2016-5195, that has has existed in the Linux kernel for the past nine years and is already being exploited in the wild. The Red Hat security team describes the flaw as a 'race' condition, 'in the way the Linux kernel's memory subsystem handles the copy-on-write (COW) breakage of private read-only memory mappings.' This allows an attacker who gains access to a limited user account to obtain root privileges and therefore take complete control over the system. The vulnerability was fixed last week by the Linux kernel developers and patches for Linux distributions, including Red Hat, Debian, Ubuntu, Gentoo and Suse, have been released or are in the process of being released.

Submission + - Banking On Your Cell Phone – Is It Safe?

Lakhsass writes: Tips on Keeping Your Information Safe

There is a fear that using your cell phone to conduct your banking and credit card business may be risky. We would like to dispel any notion of a threat as long as you follow some basic rules which apply to banking on cell phones and as well as on your home computer or laptop.

Use an App Where Possible!

Most of the new smart phones, like the iPhone and the Android, have large application (apps) libraries which are created by the banks, credit card companies, and other parties interested in keeping your information safe. This is a sure way to avoid spoof emails and websites that appear to look like your bank, but are actually duplicates used to steal your information. Using this banking method is secure and usually guaranteed by your bank.

Never Click a Link in an Email!

Ever receive an email saying that your bank account password has been reset, hacked, or they need an update? Most likely, these are spoof emails which are phishing (100% fake) which are committing fraud trying to steal your information (it is a Federal crime). Banks avoid this by sending emails telling you to log into your bank account by typing the banks website address in the browser instead of using a link (in other words – they never put a link in your email). This way you are guaranteed to arrive at the correct website and not a spoof site. Spoofs occur daily all over the Internet, whether on a social network site, eBay, or your financial accounts. Avoid this by always typing in the website address of the site you would like to visit – to save time – use bookmarks.

Avoid Texting Or Emailing Your Information

There are rare instances when you need to send your sensitive bank account information to someone for a transaction, family emergency, and so forth. Either, find a quiet secluded place where no one can overhear you and speak them to the other party or family member. The other way, if necessary, is by sending two emails – never send all the information in one email. Send an account number in one and a routing number in a second email or maybe send it via text. Keeping your sensitive information in one place, whether written down or in a digital file, makes it easy for hackers to steal your information.

The key is to keep the information secret whenever possible and always make it as difficult as possible for a hacker or thief to steal. In the end, it is just knowledge on safe practices – similar to the old days before digital banking and plastic cards. It is 100% safe to bank online – just follow the above steps and preferably have an anti virus program on your computer. Lastly, change your password every few months if not more, if you use the Internet often for banking and purchases.

Comment Re:Wow... (Score 1) 190

So, because Apple is involved, it's ok to pass off shoddy untested and unverified products at the same time as ripping off a company's trade dress and defrauding customers.

These aren't just generic USB chargers you plug into the wall - these are made and advertised to look like genuine Apple products, using Apple logos and everything. Except that they aren't.

Good to know that irrationality still wins the day with both Apple's fans, and detractors.

Speaking of irrational, which ignorant consumer thinks they're actually buying a "genuine" Apple cable from the most infamous fixed-price electronics vendor on the planet, at a fraction of what they charge everywhere else?

Give me a break. Yes, you have a point regarding counterfeiting, but when something is way too good to be true, it probably is.

It just makes me all that more certain that Apple is price gouging on all their products.

There is NOTHING in those cables that should make them cost 26 bucks.

Comment Re:Is that all (Score 1) 598

It's inevitable that a certain fraction of people go off the deep edge. People are irrational, even (or perhaps mostly) people who are convinced they are entirely rational. Rationality is a fragile thing because emotion and confirmation bias are deeply woven into everyone's thinking.

For normal people are few more powerful emotional impulses than the urge to protect children. It should hardly be surprising that children come to harm from it.

Submission + - Razer Buys THX: What This Could Mean for Your Future Man Cave (

Audiofan writes: On Monday THX announced that it was purchased by Razer, a computer gaming hardware company. Razer CEO Min-Liang Tan promises to let THX run independently. Tan added that there will be collaborations bringing together THX audio experience and Razer computer technology. But many see the deal as yet another low point for the once proud THX logo. Will this shape the future of home entertainment and leap forward Virtual Reality technologies or is it just further liquidation of a once sought after brand?

Submission + - Target Passes Walmart As Top US Corporate Installer of Solar Power (

An anonymous reader writes: Target is the top corporate installer of solar power in the USA with 147MW installed on 300 stores. Walmart is close behind with 140MW, while Ikea has installed solar on 90% of its retail locations. The Solar Energy Institute of America (SEIA) report shows over 1,000MW of solar installed in almost 2,000 unique installations by the largest corporate entities in the country. Additionally these groups have more than doubled their installation volume year on year, with 2015 seeing a total of 130MW, while 2016 is projected to be closer to 280MW. Big box retail locations offer some of the best potential spaces for solar power to be installed – on top of square, flat structures and in previously built parking lots. The average size of an installation by a company in this group is about 500kW – 75X the size of an average residential solar installation. The RE100 organization has signed up 81 global corporations (many on the SEIA list) who have pledged 100% renewable energy. “We’re incredibly proud of the progress we’ve made in improving building efficiencies and reducing environmental impact. Our commitment to installing solar panels on 500 stores and distribution centers by 2020 is evidence of that progress” – said John Leisen, vice president of property management at Target. The geographic breakdown of solar installations is based upon three main drivers – good sunlight, expensive electricity and state level renewable mandates, with Southern California having all three. The northeast USA, with its ">expensive electricity and aggressive clean energy push, has been on par with California (50% of total solar) for commercial installations. A report put together by the World Wildlife Fund (WWF) and the World Resources Institute (WRI) breaks down the various state level laws that support corporations going green – and, without surprise, it becomes clear that the legal support of renewable energy is a definite driver.

Submission + - SPAM: How to Protect Your Google Gmail from Russia's Putin and WikiLeaks

Lauren Weinstein writes: Word is out from multiple intelligence sources and security researchers that Hillary Clinton campaign chairman John Podesta’s Gmail account was hacked by (you guessed it!) Russian hackers under the direction of the Russian government (aka Vladimir Putin), for public distribution of Podesta’s email messages via Putin’s propaganda publishing arm: Julian Assange’s WikiLeaks. All of this in furtherance of Putin’s “Get Ignorant Puppet Trump Elected U.S. President!” project.

Apparently Podesta fell victim to a typical “spear phishing” attack, typing his Google Gmail credentials into a convincing (but fake) Google login page.

People fall for this kind of thing every day.

Link to Original Source

Submission + - Ask Slashdot: Secure methods for baby monitoring

Szeraax writes: Big time nerd, first time father (well, first and second since I just had twins!). Ideally, I can track temperature and heart rate of my new family members without causing a security nightmare on my home network. I see lots of arm bands from China that claim security, but even their documentation pictures are pure chinese screen shots. That makes me immediately leary of the device. I can use a private WLAN on my router for the devices if needed. I can connect via bluetooth on phone or computer. Is my best bet to check vitals manually and plot results in LibreOffice calc? Are there monitoring devices that totally avoid the cloud rush of today? Should I just not even waste my time with the data?

Slashdot, what advice do you have for me?

Submission + - Cryptographic proof Wikileak podesta emails have been modified? (

An anonymous reader writes: Downloading the raw email from wikileaks directly and running it through opendkim-msgtest will on a suprising number of "raw" emails from wikileaks indicate that the DKIM signature is incorrect. eg.

curl | opendkim-testmsg


curl | opendkim-testmsg

There is a list of modified emails posted on a pastebin right now

Because the DKIM header contains the checksum of the message body and is signed with the servers public key it would seem to be irrefutable proof of email tampering before the emails were given to wikileaks.

Submission + - First New US Nuclear Reactor In 20 Years Goes Live (

An anonymous reader writes: The Tennessee Valley Authority is celebrating an event 43 years in the making: the completion of the Watts Bar Nuclear Plant. In 1973, the TVA, one of the nation's largest public power providers, began building two reactors that combined promised to generate enough power to light up 1.3 million homes. The first reactor, delayed by design flaws, eventually went live in 1996. Now, after billions of dollars in budget overruns, the second reactor has finally started sending power to homes and businesses. Standing in front of both reactors Wednesday, TVA President Bill Johnson said Watts Bar 2, the first US reactor to enter commercial operation in 20 years, would offer clean, cheap and reliable energy to residents of several southern states for at least another generation. Before Watts Bar 2, the last time an American reactor had fired up was in 1996. It was Watts Bar 1--and according to the Atlanta Journal-Constitution, it cost $6.8 billion, far greater than the original price tag at $370 million. In the 2000s, some American power companies, faced with growing environmental regulations, eyed nuclear power again as a top alternative to fossil fuels such as coal and oil. A handful of companies, taking advantage of federal loan guarantees from the Bush administration, revived nuclear reactor proposals in a period now known as the so-called "nuclear renaissance." Eventually, nuclear regulators started to green light new reactors, including ones in Georgia and South Carolina. In 2007, the TVA resumed construction on Watts Bar 2, according to the International Atomic Energy Agency. The TVA originally said it would take five years to complete. The TVA, which today serves seven different southern states, relies on nuclear power to light up approximately 4.5 million homes. Watts Bar 2, the company's seventh operating reactor, reaffirms its commitment to nukes for at least four more decades, Johnson said Wednesday. In the end, TVA required more than five years to build the project. The final cost, far exceeding its initial budget, stood at $4.7 billion.

Submission + - Wired says Google's Pixel is the best phone on the market

swillden writes: The reviews on Google's Pixel phones are coming in, and they're overwhelmingly positive. Most call them the best Android phones available, and at least one says they're the best phones available, period.

Wired's reviewer says he used to recommend the iPhone to people, but now he says "You should get a Pixel." The Verge, says "these are easily the best Android phones you can buy." The Wall Street Journal calls the Pixel "the Android iPhone you've been waiting for." ComputerWorld says "It's Android at its best."

AndroidPolice is more restrained, calling it "A very good phone by Google." The NY Times broke from the rest, saying "the Pixel is, relatively speaking, mediocre", but I'm a little skeptical of a reviewer who can't figure out how to use a rear-mounted fingerprint scanner without using both hands. It makes me wonder if he's actually held one.

Comment Re:DCMA Fair Use / Parody (Score 1) 218

Ah, but is it a parody of the copyrighted elements? That's the tack I'd take if I were Samsung's lawyer: this is not parodying Samsung's IP, it is quoting Samsung's IP in a literal, non-transformative way that is not actually parody.

Of course in my heart I'd hope to lose, but that argument is no more ridiculous than many others that have become established case law. Issues like privacy and IP are where fundamental values we have as a society cut against each other and generate innumerable weird corner cases.

Comment Re:So it appears . . . (Score 1) 184

It's not just how hard you check, but how incisively. It's easy to satisfy yourself that software's anticipated failure modes won't happen. What's tough is discovering ways of screwing up that have never happened before.

That's why there's no substitute for experience. This gets back to the very roots of rocket science: the path to success passes through many, many failures.

Slashdot Top Deals

grep me no patterns and I'll tell you no lines.