Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - closed (

Ragnarok89 writes: "Yet another streaming website has closed it's doors today. is no more, only a short note remains:

Dear QuickSilverScreen Users,

It is with much regret that we arrived at the decision to close QSS, we'd like to thank all our loyal users for their support, it's been a blast :)

We apologize for this disappointment, but under changed circumstances we feel that we can no longer continue.

Thank you again for all the Support."


Submission + - Samsung Galaxy S III said to launch in April (

zacharye writes: Samsung may launch the successor to its wildly popular Galaxy S II smartphone this coming April according to a new claim. Following the leak of an image depicting what will likely be the first Galaxy-branded smartphone to carry Samsung’s custom user interface atop Android 4.0 Ice Cream Sandwich, industry insider Eldar Murtazin noted on Thursday that he believes the Galaxy S III will launch in April...
Open Source

Submission + - Perl Gets $100,000 From a grateful craigslist (

mikejuk writes: The craigslist Charitable Fund has donated $100,000 to the Perl community for Perl5 maintenance and general use by the Perl Foundation.
craigslist gets more than 30 billion views per month and it is mostly written in Perl. The entire architecture of the system is open source — a proxy array based on Perl and memcache and a backend provided by Apache, memcache, MySQL and, of course Perl.
So you could see this as a successful enterprise giving something back to open source — which is how it should be.


Submission + - Common places for work passwords (

kodiaktau writes: Alan Henry, author on, has posted a nice reminder story that social engineering isn't the only way to gain user account information — physical access to a desk is often the best way to compromise a system. Despite repeated attempts by the engineering community to manage and secure systems the weakest link is the end user and they will use any means to manage passwords that makes their lives easier. Maybe in this common era we should consider alternatives to the long, cryptic passwords to something that helps the end user from compromising the system.

Slashdot Top Deals

"Trust me. I know what I'm doing." -- Sledge Hammer