Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Ubuntu to use Wayland by default

An anonymous reader writes: From the school of expected things following its decision to drop Unity, Ubuntu will use Wayland by default for user sessions in Ubuntu 17.10 onwards. Mir had been Canonical’s home-spun alternative to Wayland but was recently put out to pasture.

Submission + - SPAM: Don't change the bulb change the fixture. 2

brainbuz writes: I've been shopping for lighting fixtures because of work I've been doing on my house, I'm amazed at how a great technology (LED lighting) has encouraged terrible design. It seems like most of the lighting fixtures now on sale feature integrated LEDs where the lighting element is part of the fixture. This might be ok for an ultra slim surface mount panel, but a fixture such as a recessed can light can require ripping apart a ceiling to replace. Even where the elements are claimed to be replaceable there aren't standards so you have no guarantee that in 10 years you'll be able to obtain the correct element. With replaceable bulbs you can also easily change your mind about the light output or the color temperature.

In another room I repainted a fixture manufactured between 1910 and 1925. After the paint job, I purchased new ceramic sockets of the same type that had been used to build it a century ago. It will be going back on the ceiling and getting new LED bulbs that look like Edison's MAZDA bulbs from when it was brand new.

Submission + - How the IBM 1403 Printer Hammered Out 1,100 Lines Per Minute (

schwit1 writes: The IBM 1460, which went on sale in 1963, was an upgrade of the 1401. Twice as fast, with a 6-microsecond cycle time, it came with a high-speed 1403 Model 3 line printer.

The 1403 printer was incredibly fast. It had five identical sets of 48 embossed metal characters like the kind you’d find on a typewriter, all connected together on a horizontal chain loop that revolved at 5.2 meters per second behind the face of a continuous ream of paper. Between the paper and the character chain was a strip of ink tape, again just like a typewriter’s. But rather than pressing the character to the paper through the ink tape, the 1403 did it backward, pressing the paper against the high-speed character chain through the ink tape with the aid of tiny hammers.

Over the years, IBM came out with eight models of the 1403. Some versions had 132 hammers, one for each printable column, and each was individually actuated with an electromagnet. When a character on the character chain aligned with a column that was supposed to contain that character, the electromagnetic hammer for that column would actuate, pounding the paper through the ink tape and into the character in 11 microseconds.

With all 132 hammers actuating and the chain blasting along, the 1403 was stupendously noisy, ... The Model 3, which replaced the character chain with slugs sliding in a track driven by gears, took just 55 milliseconds to print a single line. When printing a subset of characters, its speed rose from 1,100 lines per minute to 1,400 lines per minute.

Submission + - Belgian scientists inhibit protein responsible for allergic reactions

lhunath writes: Scientists at the University of Gent exposed the TSLP protein's function in triggering allergic reactions such as asthma and eczema.

The team then developed a protein-based inhibitor used to capture TSLP and prevent its bioactivity as it associates with its natural receptors. Using this method, allergic reactions can be inhibited before they are triggered.

Submission + - US programmer arrested for others misuse of his software! ( 1

Highdude702 writes: This is an outrage, and is a push too far, also in the wrong direction. A programmer from Arkansas was arrested for being an accomplice to a crime committed by people he had never met, let alone knew well enough to commit crimes with. If you will excuse my copy and paste skills because you can tell by now that I suck at writing and the such.

"It’s a dual-use technology case, And you typically don’t get criminal liability in dual-use technology cases unless there’s a pretty clear intent to promote the criminal use instead of the legitimate ones." Was quoted from a Cornell Law Professor.

If you decide to RTFA they do a lot better job at telling the story of a script kiddie gone big time. I don't think it's time to play jury as there are too many cases where items intended for malicious use were used by the general public for havoc and the creators were not held responsible.

Submission + - Tor Browser Will Feature More Rust Code (

An anonymous reader writes: The Tor Browser, a heavily modified version of the Firefox browser with many privacy-enhancing features, will include more code written in the Rust programming language. In a meeting held last week in Amsterdam, Tor developers decided to slowly start using Rust to replace the C++ code. The decision comes after Mozilla started shipping Rust components with Firefox in 2016. Furthermore, Rust is a memory-safe(r) language than C++, the language used for Firefox and the customized Tor code, which means less memory corruption errors. Less of these errors means better privacy for all.

Submission + - Over 14K Let's Encrypt SSL Certificates Issued to PayPal Phishing Sites ( 1

An anonymous reader writes: During the past year, Let's Encrypt has issued a total of 15,270 SSL certificates that contained the word "PayPal" in the domain name or the certificate identity. Of these, approximately 14,766 (96.7%) were issued for domains that hosted phishing sites. Other CAs have issued a combined number of 461 SSL certificates containing the term "PayPal" in the certificate information, which were later used for phishing attacks. This number is far smaller compared to misused Let's Encrypt certs.

Assuming that current trends continue, Let’s Encrypt will issue 20,000 additional “PayPal” certificates by the end of this year, bringing the total up to 35,000 over the past two years. To blame for this situation is Let's Encrypt, who said in a mission statement it doesn't intent to police the Internet. Browser makers are also to blame [1, 2], along with "security experts" who tell people HTTPS is "secure," when they should point out HTTPS means "encrypted communication channel," and not necessarily that the destination website is secure.

Submission + - Former IT Admin Accused of Leaving Backdoor Account, Accessing It 700+ Times (

An anonymous reader writes: An Oregon sportswear company is suing its former IT administrator, alleging he left backdoor accounts on their network and used them more than 700 times to search for information for the benefit of its new employer.

Court papers reveal the IT admin left to be the CTO at one of the sportswear company's IT suppliers after working for 14 years at his previous employer. For more than two years, he's been using an account he created before he left to access his former colleague's emails and gather information about the IT services they might need in the future. The IT admin was fired from his CTO job after his new employer found out what he was doing.

Submission + - Firefox 52 forces pulseaudio, dev claims that telemetry is essential ( 3

jbernardo writes: While trying to justify breaking audio on firefox for several linux users by making it depend on pulseaudio (and not even mentioning it in the release notes), Anthony Jones, who claims, among other proud achievements, to be "responsible for bringing Widevine DRM to Linux, Windows and Mac OSX", informs users that disabling telemetry will have consequences — "Telemetry informs our decisions. Turning it off is not without disadvantage."
The latest one is, as documented on the mentioned bug, that firefox no long has audio unless you have pulseaudio installed. Many bug reporters suggest that firefox telemetry is disabled by default on many distributions, and also that power users, who are the ones more likely to remove pulseaudio, are also the ones more likely to disable telemetry.
As for the pulseaudio dependence, apparently there was a "public" discussion on google groups, and it can be seen that the decision was indeed based on telemetry.
So, if for any reason you still use firefox, and want to have some hope it won't be broken for you in the future, enable all the spyware/telemetry.

Submission + - Critical Information for Aviators Bogged Down In 'Ridiculous' 1920s NOTAM System 2

Freshly Exhumed writes: Mark Zee of OpsGroup, an entity that provides airlines and aircraft operators worldwide with critical flight information, has had enough of the NOTAM system of critical information notices to aviators, decrying that it has become 'absolutely ridiculous. We communicate the most critical flight information, using a system invented in 1920, with a format unchanged since 1924, burying essential information that will lose a pilot their job, an airline their aircraft, and passengers their lives, in a mountain of unreadable, irrelevant bullshit.'

Submission + - CIA Developed 24 Decoy Applications to Spy on Targets (

An anonymous reader writes: According to documents from the recent WikiLeaks dump, the CIA has developed a collection of 24 "decoy" applications for usage in field missions. Named "Fine Dining," these decoy applications are infected with malware that can operate from under a victim's nose.

Just like in the movies, while the agent is using the app, let's say to show a slideshow presentation in Prezi or LibreOffice, the decoy Prezi/LibreOffice app also runs malicious code that scans the victim's storage space and steals a list of selected file types.

The types of decoy applications range from browsers (Opera, Chrome, Firefox) to office tools, movie players, and text editors. Before each mission, CIA agents are suppose to fill in a survey, and a case operator generates a custom decoy app for their needs.

Similarly, the WikiLeaks Vault 7 dump also revealed the CIA was capable of bypassing at least 21 security products, including all the major antivirus vendors, such as Bitdefender, Kaspersky, Avast, AVG, Avira, ESET, F-Secure, Symantec, and others.

Comment Re:Cost savings bullshit from a fool... (Score 1) 88

Way to troll. How do you even know what the "Office Expenses" in a "Budget at a glance" head contains? FYI, it is just that - "office" expenses and no, that does not include software/hardware for schools. Kerala's expenditure on education is around Rs.15,000 crore in 2016-17 - refer page 25 of the detailed financial statement straight from Finance dept. You are either a fool or far removed from India and reality if you think just Rs.220 crore includes entire Kerala's education spend. You are two magnitudes off - in future, do a favor and do not comment authoritatively on things you know zilch about.

The 150k value per machine includes not just Office software but FOSS replacements for other highly valuable ones like Matlab, Animation software, Molecular modelling, Interactive geometric sketching etc.

Finally, what's with the ad hominem argument? I'll just leave this here.

Submission + - Malaysian Police: VX nerve gas killed N Korea leader's brother in airport attack (

An anonymous reader writes: Malaysian police have announced their finding that Kim Jong Nam, half-brother of North Korean leader Kim Jon Un, was killed by assassins using VX nerve gas in an attack in the busy Kuala Lumpur airport. Malaysian authorities plan to decontaminate the airport and other sites visited by the attackers. Police are holding the two female attackers, one of whom was affected by the chemical agent, as well as two other men. They are seeking seven more North Koreans connected to the case. VX is the most toxic of the nerve gasses and the UN has declared it a weapon of mass destruction. The manufacture and stockpiling of more than 100 grams of VX per year is prohibited by the Chemical Weapons Convention of 1993. It has no commercial uses. The Malaysian police are trying to discover if it was smuggled into their country, or manufactured there. The Malaysian government has recalled its ambassador to North Korea for consultation. North Korea is blaming the death of Kim Jong Nam on Malaysia. North Korea is believed to have major stockpiles of chemical weapons, and is alleged to conduct experiments on prisoners and social undesirables.

Submission + - Software Vendor Who Hid Supply Chain Breach Outed (

tsu doh nimh writes: Researchers at RSA released a startling report last week that detailed a so-called "supply chain" malware campaign that piggybacked on a popular piece of software used by system administrators at some of the nation's largest companies. This intrusion would probably not be that notable if the software vendor didn't have a long list of Fortune 500 customers, and if the attackers hadn't also compromised the company's update servers — essentially guaranteeing that customers who downloaded the software prior to the breach were infected as well. Incredibly, the report did not name the affected software, and the vendor in question has apparently chosen to bury its breach disclosure as a page inside of its site — not linking to it anywhere. Brian Krebs went and digged it up.

Slashdot Top Deals

FORTUNE'S FUN FACTS TO KNOW AND TELL: A giant panda bear is really a member of the racoon family.