Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - HTTP Header Survey for the Top 10k Websites (

achillean writes: "A survey of Alexa's top 10,000 websites on the Internet was conducted to measure the usage of security-related HTTP headers, mobile awareness and potential information leakage. A few interesting results: Nikto is the most blocked user agent, followed by Wget and cURL. Sometimes websites forget to obfuscate all of their 'Server' header values (see, and many sites use different servers for different user agents (ex: The full dataset is available for download."

Submission + - Search Engine for Hackers (

achillean writes: SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.

Web search engines, such as Google and Bing, are great for finding websites. But what if you're interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don't let you answer those questions.

The Internet

Submission + - 10 Semantic Apps to Watch (

ReadWriteWeb writes: "Semantic web applications are coming out of the woodwork, due to a combination of Semantic Web technologies and Web 2.0. A key element is that the apps try to determine the meaning of text and other data, and then create connections for users. Nova Spivack of Twine noted at the recent Web 2.0 Summit that data portability and connectibility are also crucial for these new semantic apps — i.e. using the Web as platform. This article profiles 10 Semantic Apps and looks at the approaches they are taking."

Submission + - Swiss DMCA quietly adopted (

roady writes: We have seen a lot of talk about the Canadian DMCA. But few know about the Swiss version recently adopted by law makers, not even the Swiss people. The government and media have been very quiet, probably to avoid a referendum. Indeed, Switzerland is a direct democracy and if 50'000 citizens sign a referendum, the whole country will have a chance to vote against the new copyright law. In this version of the DMCA, sharing a file on P2P networks will land you one year in jail, even though the law mandates a levy on blank media. The history of the law can be read here.
Sun Microsystems

Submission + - Sun used threats to sieze OpenDNS,owner says ( 1

Anonymous Coward writes: "Sun used strong-arm tactics and made threats to the owners of an open-source directory project to wrestle away control, according to one of the former owners and creators of the project.In the process, Sun potentially has torn a gaping hole in the OpenDS (directory service) project, which is creating a free Java-based directory service for large deployments that offers high performance, extensibility and management."
The Courts

Submission + - Court orders Bush admin to disclose telecom ties (

rgiskard01 writes: From Glenn Greenwald at, "The Electronic Frontier Foundation has won another significant legal battle, as a federal judge in California yesterday ordered the Bush administration (.pdf) to comply with EFF's FOIA demand and disclose documents revealing its "communications with telecommunications carriers and members of Congress" regarding efforts to amend FISA and provide amnesty to telecoms."
Court Order:


Submission + - Google plans service to store users' data (

achillean writes: "Google Inc. wants to offer consumers a new way to store their files on its hard drives, in a strategy that could accelerate a shift to Web-based computing and intensify the Internet company's competition with Microsoft Corp. Google is preparing a service that would let users store on its computers essentially all of the files they might keep on their personal-computer hard drives. The service could let users access their files via the Internet from different computers and mobile devices when they sign on with a password, and share them online with friends. It could be released as early as a few months from now, one of the people said. Google's solution will compete with a wide variety of other products, best summed up in the following chart."

Submission + - Bypass an outbound firewall using stunnel (

Anonymous Bastard writes: Ever needed to SSH into a server, but found yourself limited by your employer's firewall/filtering system? Perhaps they have a L7 filter and simply drop outbound SSH traffic? Here I'll provide a simple, safe, and secure solution, so long as you can make outbound SSL connections (typically done on port 443, HTTPS).

Submission + - America Takes Another Look at Maglev Trains (

longacre writes: "With highways and airports steadily grinding to a crawl and fuel prices skyrocketing, city planners are taking a new look at high-speed rail solutions such as maglev to alleviate the nation's transportation bottlenecks. At costs of up to $100 million per track mile, the 300 mph, virtually silent, frictionless trains are a hard sell. In places like Los Angeles, however, where the next 30 years will add 6 million people to the population of an area whose transportation infrastructure is already overwhelmed, new capacity is desperately needed. Includes video of a General Atomics maglev prototype in action."

Submission + - Double your disk read performance with one command (

achillean writes: Under the right conditions (that is, with certain hardware configurations I'll explain later) it is possible to literally double your sequential read performance from disk. That's right, I said double. All with a single command. What is this magic you ask? How can I know the voodoo you do? Read on.

Submission + - Dojo Toolkit Launches New Website (

achillean writes: "Dojo has just launched a new version of their website with: better documentation, more examples and a sleeker look. For the uninitiated, Dojo is an Open Source DHTML toolkit written in JavaScript. It builds on several contributed code bases (nWidgets, Burstlib, f(m)), which is why we refer to it sometimes as a "unified" toolkit. Dojo aims to solve some long-standing historical problems with DHTML which prevented mass adoption of dynamic web application development. To get started with Web 2.0 development, begin by reading The Book of Dojo."

Submission + - The OpenMoko Linux Phone

LinucksGirl writes: This tutorial introduces the OpenEmbedded build environment used to create filesystem images for OpenMoko phones, such as the Neo 1973. The OpenMoko environment provides a completely free development environment for running application and system code on supported phone hardware, eliminating all dependency on proprietary code.

Submission + - Interactive Television using the Java TV API (

achillean writes: For the most part, watching TV is a passive experience. You're at the mercy of content providers and don't really have much to say when it comes to the user experience. That could change with the advent of the Java TV API. Sun is hoping to bring the popular Java language/ platform into the living-room to create an interactive television experience.

Submission + - Pop-up Ad Points to Storm Worm Botnet Members

An anonymous reader writes: If your Windows PC served you with a pop-up ad on Tuesday urging you to buy a particular penny stock (Hemisphere Gold Inc. [HPGI.PK]) there's a good chance it's infected with the Storm worm. The Washington Post's Security Fix blog explains: "Criminal groups that control the pool of Storm-infected computers have traditionally used those systems to pump out junk e-mail ads touting thinly traded penny stocks as part of an elaborate and ongoing series of "pump-and-dump" schemes. But today, according to security researchers, the Storm worm authors went a step further by causing a pop-up ad for a particular penny stock to be shown on all infected machines. According to the story, there are more than 200,000 Storm-infected PCs currently.

Submission + - Wikileaks releases sensitive Guantanamo manual (

James Hardine writes: Wired is reporting that a never-before-seen military manual detailing the day-to-day operations of the U.S. military's Guantánamo Bay detention facility has been leaked to the web, via the whistleblowing site, affording a rare inside glimpse into the institution where the United States has imprisoned hundreds of suspected terrorists since 2002. The 238-page document, "Camp Delta Standard Operating Procedures," is dated March 28, 2003. The disclosure highlights the internet's usefulness to whistle-blowers in anonymously propagating documents the government and others would rather conceal. The Pentagon has been resisting — since October 2003 — a Freedom of Information Act request from the American Civil Liberties Union seeking the very same document. Anonymous open-government activists created Wikileaks in January, hoping to turn it into a clearinghouse for such disclosures. The site uses a Wikipedia-like system to enlist the public in authenticating and analyzing the documents it publishes. The Camp Delta document includes schematics of the camp, detailed checklists of what "comfort items" such as extra toilet paper can be given to detainees as rewards, six pages of instructions on how to process new detainees, instructions on how to psychologically manipulate prisoners, and rules for dealing with hunger strikes.

Slashdot Top Deals

The amount of time between slipping on the peel and landing on the pavement is precisely 1 bananosecond.