Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment pmp (Score 1) 415

I use my android unlocked gti5500 as an ebook reader and for audio books. I've been reading ebooks for close to 10 years on handhelds, started out with Palm. Only issue I have is locating non DRM ebooks and PDF,s . I picked up a $99 HP touchpad and it works ok for reading PDF , except the PDF reader kinda blows. I actually find it easier reading ebooks on a smaller screen as my eyes aren't scanning sideways as much. So I'd recommend a tablet for tech manuals and your phone/pmp for regular books.


Submission + - Mozilla Warns CISPA Is "Alarming" Threat to Privacy (

cpu6502 writes: Tech giant Mozilla has publicly slammed the Cyber Intelligence Sharing and Protection Act (CISPA) saying, "While we wholeheartedly support a more secure Internet, CISPA has a broad and alarming reach that goes far beyond Internet security. The bill infringes on our privacy, includes vague definitions of cybersecurity, and grants immunities to companies and government that are too broad around information misuse."

Other companies Facebook, Microsoft, IBM, Intel, Oracle, Symantec, AT&T and Verizon have all backed the bill. CISPA has been identified as a greater threat to privacy than SOPA, because it would mandate ISPs to share Internet data of users with government, while receiving immunity from civil and criminal liability in court.

Submission + - Funding for a Supercomputer Museum ( 3

TheMitt writes: There is a new project on Indiegogo for a supercomputer museum. The focus is on preserving historical supercomputers, and is requesting funding due to the cost and size of these machines. Per the indigogo site "What most people don't understand is the size of these systems, think 3,000 to 10,000lbs large. That's just the machine, it doesn't include storage that may go with it, or cooling towers.. that just adds to the weight. Then think of the costs to move it all and the space to set these up.

What's worse is they have a high scrap value (often containing tons of aluminum, stainless steel, and sometimes pounds of gold)... so over time people have acquired individual machines and then were faced with moving them to a new house or needing space and they wind up selling them for scrap. They get paid well but that's it, thats one less machine in the world. Some systems are extremely rare to begin with... for example the Cray-2, less than 30 were ever made. Most are held by museums with few on display, only 1 is currently in the hands of a private collector and that one is sitting in storage.

The project is aiming at pre-Y2K computers.

If this funding does go through what cool supercomputer would you like to see in the collection?


Submission + - WTF is CISPA? (

zacharye writes: The United States House of Representatives voted last Thursday to pass a piece of legislation called the Cyber Intelligence Sharing and Protection Act, or CISPA. The controversial bill now sits in the hands of the Senate and faces further modifications if it hopes to gain approval from the White House, which has already gone on record with a veto threat. Legions of Internet users expressed outrage when the bill was passed, and numerous protests are being staged. According to President Obama’s office, the bill would allow “broad sharing of information with governmental entities without establishing requirements for both industry and the government to minimize and protect personally identifiable information,” but what exactly is CISPA?

Android Malware Using Blog As C&C Server 89

wiredmikey writes "Security researchers have discovered a unique feature circulating in some Android-based malware. The malicious application is using a blog in China to act as a Command and Control (C&C) server. On Tuesday, Trend Micro discovered a malicious Android application out of China using the new trick to receive instructions, and appears to be the first time Android malware implemented this kind of technique to communicate with its server."

Security Flaw Bypasses AT&T Samsung Galaxy S II Screen Lock 49

zacharye writes "BGR has uncovered a security flaw on AT&T's version of the Samsung Galaxy S II that renders Android's unlock pattern feature completely useless. Using a simple workaround, the security hole allows anyone to bypass the unlock pattern, which normally denies users access to an Android device unless a preset pattern is drawn on a grid of nine dots spread across the device's lock screen."

Slashdot Top Deals

The opposite of a correct statement is a false statement. But the opposite of a profound truth may well be another profound truth. -- Niels Bohr