Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Jackass (Score 1) 722

Electronics engineering relates to timing on traffic lights. Who do you think develops the mechanism to set the timing?

Which sounds impressive to the clueless, who fail to grasp the apples-and-oranges difference between knowing how to develop a timer and knowing the effects of varying settings on the timer. (The folks who work with the latter are called traffic engineers and not electronics engineers for a reason.)

Comment Re:sounds like the mob pay up if you don't want so (Score 1) 29

If it works 1000 times, it sounds like three times my salary.

I'm sorry, maybe work on your LinkedIn profile...

However, what makes you think it will "work" 1000 times? It's a lame DDoS attack aimed at some very large companies. Did you read the article?

Following ridicule from fellow hackers, who made fun of the group for failing to understand how a DDoS extortion works, the group closed their Twitter account earlier today.


The attention they got wasn't the one they expected, as their hosting provider took down their website, located at


Submission + - 10 Ways You Are Being Watched, Monitored And Spied On (

cukic writes: Is this for real? In 2013, the BBC ran a story about the increasing numbers of CCTV cameras being installed and put into operation across the United States, where they were being hailed as crucial in apprehending the culprits of the Boston bombing.

Comment Re:BrickerBot (Score 1) 111

A bad solution is still a bad solution.

Just out of curiosity, what is the good solution to the problem of a vast network of unsecured or insecure IoT devices that have already been deployed? Instead of describing what manufacturers should have done, what good solution do you have for the existing problem?

How would you feel if this was your IoT device that was attacked?

How do you feel when IoT botnets deliver DDOS attacks in the range of hundreds of gigabits per second? Are you still looking for that good solution to the existing problem?

Comment Re:Denial-of-Service? (Score 1) 111

So you have people with no technical skill in coding, or getting into their hardware buying a device, just say baby monitor and it is alright for a person to hack into it because these people do not have the technical knowledge to secure it better?

Right, just like all of those people who have no experience in machining who are all buying that one car where every car opens and starts with the same publicly-known key, and they are getting their cars stolen just because they don't have the experience to manufacture their own lock, ignition system, and key?

Man, it's almost like the burden should be on the manufacturer to deliver a product that can't easily be broken into by default.

Submission + - Leaked NSA hacking tools hit Solaris (

JayGravis writes: Hacker group Angry Shadow Brokers publicly released the password for National Security Agency (NSA) tools – including tools that could access any Solaris-based system – that they had previously tried to sell. The leak also offered details into the organisation’s bank-spying exploits, and included a highly effective compromise for Windows Server – although Microsoft said it had already addressed the compromises in old patches.

Submission + - Why Did Google Really Block A Guerrilla Fighter In The Ad War? (

tedlistens writes: Google's decision to ban the Chrome plug-in AdNauseum due to a violation of its "single purpose policy"—shortly after the app began supporting the EFF's new Do Not Track standard—was only the latest salvo in an ongoing war over online advertising. The ad industry knows that ads are a nuisance, and it's now taking pre-emptive measures to make them more palatable—or, in Google's case, to block the unpalatable ones. But Google's positions also point to a crucial disagreement at the heart of the ad war: What makes ads such a nuisance to begin with?

Ads aren't just ugly, annoying, and bandwidth-sucking: They pose a risk to privacy, as the networks of software behind ads—cookies, trackers, and malware—watch not only where you go on the web but, through your phone and your purchases, what you do in real life. But privacy is largely missing from Google's discussion of problematic ads, says Howe. By avoiding mentioning AdNauseum's actual intent, Google's explanation for banning it echoes the advertising industry's discussion of web ads, which focuses on aesthetics rather than privacy.

Submission + - Gene silencing may treat two fatal neurological disorders

An anonymous reader writes: In studies of mice, scientists discovered a drug, designed to silence a gene called ataxin 2, may be effective at treating ALS and SCA2.NIH/NINDS
In two studies of mice, researchers showed that a drug, engineered to combat the gene that causes spinocerebellar ataxia type 2 (SCA2), might also be used to treat amyotrophic lateral sclerosis (ALS). Both studies were published in the journal Nature with funding from National Institute of Neurological Disorders and Stroke (NINDS), part of the National Institutes of Health.

“Our results provide hope that we may one day be able to treat these devastating disorders,” said Stefan M. Pulst, M.D., Dr. Med., University of Utah, professor and chair of neurology and a senior author of one the studies. In 1996, Dr. Pulst and other researchers discovered that mutations in the ataxin 2 gene cause spinocerebellar ataxia type 2, a fatal inherited disorder that primarily damages a part of the brain called the cerebellum, causing patients to have problems with balance, coordination, walking and eye movements.
Read the full story here:

Submission + - Windows 95 and 98 still power Pentagon's critical systems

SmartAboutThings writes: The Pentagon is set to complete its Windows 10 transition by the end of this year, but nearly 75% of its control system devices still run Windows XP or other older versions, including Windows 95 and 98. A Pentagon official now wants the bug bounty program of the top U.S. defense agency expanded to scan for vulnerabilities in its critical infrastructure.

Submission + - School-Issued Devices and Student Privacy

Presto Vivace writes: Spying on Students: School-Issued Devices and Student Privacy

Student laptops and educational services are often available for a steeply reduced price, and are sometimes even free. However, they come with real costs and unresolved ethical questions.4 Throughout EFF’s investigation over the past two years, we have found that educational technology services often collect far more information on kids than is necessary and store this information indefinitely. This privacy-implicating information goes beyond personally identifying information (PII) like name and date of birth, and can include browsing history, search terms, location data, contact lists, and behavioral information. Some programs upload this student data to the cloud automatically and by default. All of this often happens 'families.

Don't we have laws prohibiting the electronic stalking of children?

Slashdot Top Deals

Economists can certainly disappoint you. One said that the economy would turn up by the last quarter. Well, I'm down to mine and it hasn't. -- Robert Orben