Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Introduction to HTML 5 ( 1

BradNeuberg writes: "Excited about HTML 5? Check out this Introduction to HTML 5 we put together as part of Google's Developer Programs. In-depth coverage of the Canvas tag, SVG, Web Workers, App Cache, Geolocation, and more, chock full of demos and sample source code."

Comment Tethering (Score 1) 69

I have no problems tethering with my Samsung Galaxy out of the box. No root access required, no special applications. It provides a serial (over USB) interface to its internal modem, just point pppd to the proper device and it works.

(To enable it: Settings -> About phone -> Additional settings -> deselect "Mass storage only")


Submission + - Masten Space Systems fly 1st leg of NGLLC (

Matt_dk writes: Just a few days on from Armadillo Aerospace completing the 2009 Northrop Grumman Lunar Lander Challenge (NGLLC) Level 2, Masten Space Systems have been flying their lunar lander rocket vehicle, todayâ(TM)s flight aiming for the NGLLC Level 1 Prize. Masten flew today in an attempt to win the second prize in the Level 1 competition, the first prize going to Armadillo Aerospace last year. The second place prize totalling $150,000 USD will pave the way for their attempt at the Level 2 competition in October. Today Masten flew their rocket XA-0.1B, also called "Xombie". The team had to complete two successful rocket flights within two hours and 15 minutes, with the rocket rising to 50 meters, translating over to a second landing pad, and remaining in the air for at least 90 seconds on each flight.

Submission + - URL shortener goes community-owned/FOSS (

Death Metal writes: "1. We will renounce all ownership interest in the domain name and donate it to the community. We will work out the legalities of this over the coming weeks, but it will ensure no one is ever able to hijack URLs in the future. They will always exist, period. Everyone can use with confidence.

2. We will release the source code used to implement for anyone to use, help develop, or privately extend as they like. We will release it under the MIT open-source license. It is our sincere hope that every URL shortener becomes as good or better than, or can learn from our architecture and feature set."


Submission + - New battery could change world, 1 house at a time

An anonymous reader writes: In a modest building on the west side of Salt Lake City, a team of specialists in advanced materials and electrochemistry has produced what could be the single most important breakthrough for clean, alternative energy since Socrates first noted solar heating 2,400 years ago. The prize is the culmination of 10 years of research and testing — a new generation of deep-storage battery that's small enough, and safe enough, to sit in your basement and power your home.

Submission + - Microsoft's GPL code because of breach. (

ozmanjusri writes: "While Microsoft presented its recent embrace of the GPL as "a break from the ordinary", and the press spoke of them as going "to great lengths to engage the open source community", as is often the case with Microsoft, it turns out they had an ulterior motive.

According to Stephen Hemminger, an engineer with Vyatta, Microsoft's Hyper-V used open-source components in a network driver and the company released the code to avoid legal action over a GPL violation.

Microsoft's decision to embrace the GPL was welcomed by many in the open source community, but their failure to honestly explain the reason behind the release will have squandered this opportunity to build trust, something which is sadly lacking in most people's dealings with Microsoft."

Comment Re:Serious bug in gcc? (Score 2, Informative) 391

The description given by SANS is a bit misleading. What I believe is happening is:

  1. 1) tun is derefenced during the assignment to sk
  2. 2) if tun were NULL, the dereferencing would blow up the process
  3. 3) so the if (!tun) will always be false if we get there (says the compiler)

Since point 2 is mostly true, the compiler is not completely wrong to assume point 3

As Spengler says, a bigger problem is that loading SELinux (or, it looks like, most other security modules) causes the NULL dereference protection to be disabled.


Submission + - New Linux kernel flaw allows null pointer exploits ( 6

Trailrunner7 writes: A new flaw in the latest release of the Linux kernel gives attackers the ability to exploit NULL pointer dereferences and bypass the protections of SELinux, AppArmor and the Linux Security Module. Brad Spengler discovered the vulnerability and found a reliable way to exploit it, giving him complete control of the remote machine. This is somewhat similar to the magic that Mark Dowd performed last year to exploit Adobe Flash. reports: "The vulnerability is in the 2.6.30 release of the Linux kernel, and in a message to the Daily Dave mailing list Spengler said that he was able to exploit the flaw, which at first glance seemed unexploitable. He said that he was able to defeat the protection against exploiting NULL pointer dereferences on systems running SELinux and those running typical Linux implementations."

Submission + - SPAM: Physical reality of string theory demonstrated

FiReaNGeL writes: "String theory has come under fire in recent years. Promises have been made that have not been lived up to. Leiden theoretical physicists have now for the first time used string theory to describe a physical phenomenon. Their discovery has been reported in Science Express. 'This is superb. I have never experienced such euphoria.' Jan Zaanen makes no attempt to hide his enthusiasm. Together with Mihailo Cubrovic and Koenraad Schalm, he has successfully managed to shed light on a previously unexplained natural phenomeon using the mathematics of string theory: the quantum-critical state of electrons. This special state occurs in a material just before it becomes super-conductive at high temperature. Zaanen describes the quantum-critical state as a 'quantum soup', whereby the electrons form a collective independent of distances, where the electrons exhibit the same behaviour at small quantum mechanical scale or at macroscopic human scale."
Link to Original Source
The Internet

Submission + - British Library Puts Oldest Surviving Bible Online

Peace Corps Library writes: "BBC reports that about 800 pages of the earliest surviving Christian Bible, the 1,600-year-old Codex Sinaiticus manuscript, have been recovered and put on the internet. "The Codex Sinaiticus is one of the world's greatest written treasures," says Dr Scot McKendrick, head of Western manuscripts at the British Library. ""This 1,600-year-old manuscript offers a window into the development of early Christianity and first-hand evidence of how the text of the Bible was transmitted from generation to generation." The New Testament of the Codex Sinaiticus appears in Koine Greek, the original vernacular language and the Old Testament in the version, known as the Septuagint, that was adopted by early Greek-speaking Christians. For 1,500 years, the Codex Sinaiticus lay undisturbed in a Sinai monastery until it was found in 1844 and split between Egypt, Russia, Germany and Britain and is is thought to have survived because the desert air was ideal for preservation and because the monastery, on a Christian island in a Muslim sea, remained untouched, its walls unconquered. The British Library is marking the online launch of the manuscript with an exhibition which includes a range of historic items and artefacts linked to the document. "The availability of the virtual manuscript for study by scholars around the world creates opportunities for collaborative research that would not have been possible just a few years ago.""

Submission + - Breakthru Allows Calculations on Encrypted Data 2

BBCWatcher writes: Can data be encrypted in a way that allows any calculation to be performed on the scrambled information without unscrambling it? It's a simple concept that sounds impossible, but if it were possible businesses and individuals could then protect their secrets yet still perform Web searches, medical studies, financial risk assessments, and many other tasks. Computer scientists call this idea "fully homomorphic encryption," and it was first envisioned 30 years ago by Ronald Rivest, one of RSA's coinventors. Rivest and two coauthors thought it was probably impossible. However, Craig Gentry at IBM Research recently discovered a solution, although at present the solution requires too much computing horsepower for common adoption. Nonetheless, Rivest now predicts the remaining engineering problems will be solved, yielding fully homomorphic encryption products and services. Crypto experts believe this breakthrough will make encryption much more convenient and more widespread.

Submission + - Right Story, Wrong Pic for Neda

arizwebfoot writes: In this article, "The Speed At Which Wrong Information Flows", comes a bit of interesting info. "If you've been following the news of the protests in Iran over the past few days, you've no doubt heard about the story of "Neda Soltani, who was shot and killed on video, and has become, as some news reports have noted, "the face of Iran's struggle." Not to get into the politics of it all, what is quite fascinating is the news that the photo that many individuals and news sources are using for Soltani isn't just of a different Neda Soltani, but it's due to confusion over how Facebook works (found via Mathew Ingram)
Operating Systems

Submission + - How Do You Manage Your Home Directories? 1

digitalderbs writes: A problem plaguing most people with multiple computers is the arduous task of synchronizing files between them : documents, pictures, code, or data. Every one seems to have their own strategies, whether they involve usb drives, emailed attachments, rsync or a distributed management system, all of which have varying degrees of success in implementing fast synchronization, interoperability, redundancy and versioning, and encryption. Myself, I've used unison for file synchronization and rsnapshot for backups between two linux servers and a Mac OS X laptop. I've recently considered adding some sophistication by implementing a version control system like subversion, git or bazaar, but have found some shortcomings in automating commits and pushing updates to all systems. What system do you use to manage your home directories, and how have they worked for you for managing small files (dot config files) and large (gigabyte binaries of data) together?

Submission + - Why Parrot is Important (

Martin Streicher writes: "Parrot lead developer Allison Randal explains why Parrot, the open source virtual machine for dynamic programming languages, is a fundamental advance in programming language research and development. With Parrot, a language developer need not reinvent the wheel. Parrot provides garbage collection, objects, a parser, abstract syntax trees, and all the tools necessary to create a rich programming language in weeks not years. Further, because Parrot can mix libraries from multiple languages, one can combine the best of every language that runs on Parrot. Parrot 1.0 is available now."

Submission + - Evolution can happen in just 10 years ( 1

Death Metal writes: "Gordon and her colleagues studied guppies — small fresh-water fish biologists have studied for long — from the Yarra River, Trinidad. They introduced the guppies into the nearby Damier River, in a section above a barrier waterfall that excluded all predators. The guppies and their descendents also colonized the lower portion of the stream, below the barrier waterfall, that contained natural predators.

Eight years later (less than 30 guppy generations), the researchers found that the guppies in the low-predation environment above the barrier waterfall had adapted to their new environment by producing larger and fewer offspring with each reproductive cycle. No such adaptation was seen in the guppies that colonized the high-predation environment below the barrier waterfall."

Slashdot Top Deals

Too many people are thinking of security instead of opportunity. They seem more afraid of life than death. -- James F. Byrnes