Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Space

Project M Could Send Every Scientist To the Moon, By Proxy 150

An anonymous reader writes with this interesting bit of speculation: "NASA can put humanoids on the Moon in just 1000 days. They would be controlled by scientists on Earth using motion capture suits, giving them the feeling of being on the lunar surface. If they can achieve this for real, the results for science research of our satellite could be amazing."
Businesses

75% of Enterprises Have Suffered Cyber Attacks, Costing $2M+ On Average 81

coomaria writes "OK, even allowing for the fact this comes from a newly published study (PDF) from a security company, that's still one heck of a statistic. The fact that it's Symantec, and so has access to perhaps more enterprises than most, makes it a double-heck with knobs on. Or how about this one for size: 'every enterprise, yes, 100 percent, experienced cyber losses in 2009.'"

Comment Re:FBI bait? (Score 1) 1127

Maybe you are not aware that the article and discussion you have linked to have no evidence of rick-rolling with the bait.

Right, but even that article acknowledged that the potential for abuse is definitely there:
"Civil libertarians warn that anyone who clicks on a hyperlink advertising something illegal--perhaps found while Web browsing or received through e-mail--could face the same fate."

Show me evidence of 3rd parties deliberately rick-rolling innocents with FBI controlled kiddie porn URLs or go home.

Unlike canajin56, I don't claim that "FBI rolling" has actually happened -- just that it's very possible. No need to be an asshole about it.

Comment Re:The Possibilities (Score 1) 201

As long as we're talking about things that could never even come close to happening to anyone on this site, why bother with the invisibility cloak? You could just as easily jump out the bedroom window, land on your pegasus, which is floating just outside said window, and fly off to your Fortress of Solitude, which is totally not your parents' basement.
Wireless Networking

Unfinished Windows 7 Hotspot Feature Exploited 234

An anonymous reader writes with this excerpt from Engadget: "It wasn't all that long ago that Microsoft was talking up the Virtual WiFi feature developed by Microsoft Research and set for inclusion in Windows 7, but something got lost along the road to release day, and the functionality never officially made it into the OS. As you might expect with anything as big and complicated as an operating system though, some of that code did make it into the final release, and there was apparently enough of it for the folks at Nomadio to exploit into a full fledged feature. That's now become Connectify, a free application from the company that effectively turns any Windows 7 computer into a virtual WiFi hotspot — letting you, for instance, wirelessly tether a number of devices to your laptop at location where only an Ethernet jack is available, or even tether a number of laptops together at a coffee shop that charges for WiFi."

Comment Re:The cool kids don't care (Score 1) 146

If you're talking about single machine SMP, Solaris will go to 256 way SMP on available machines from Sun. Linux can do 1024-way Itanium2. With NUMA architecture things can get even bigger

I'm sorry, are you suggesting there is a 1024-way SMP architecture available, and a 256-way SPARC system is not NUMA?

You're confused, man.

XBox (Games)

Xbox 360 Failure Rate Is 54.2% 607

Colonel Korn writes "The Seattle PI Blog is reporting that a soon to be published Game Informer survey finally shows the failure rate of XBOX 360s: 54%! The survey also shows the rates of failure for the PS3 (11%) and Wii (7%). Impressively, only 4% of respondents said they wouldn't buy a new 360 because of hardware failures."
Security

Submission + - 'Vanish' Makes Sensitive Data Self-Destruct

Hugh Pickens writes: "The NY Times reports on new software called "Vanish" developed by computer scientists at the University of Washington that makes sensitive electronic messages "self destruct" after a certain period of time. The researchers say they have struck upon a unique approach that relies on "shattering" an encryption key that is held by neither party in an e-mail exchange but is widely scattered across a peer-to-peer file sharing system. "Our goal was really to come up with a system where, through a property of nature, the message, or the data, disappears," says Amit Levy who helped create Vanish, released as a free, open-source tool that works with the Firefox browser. To work, both the sender and the recipient must have installed the tool. The sender then highlights any sensitive text entered into the browser and presses the "Vanish" button. The tool encrypts the information with a key unknown even to the sender. That text can be read, for a limited time only, when the recipient highlights the text and presses the "Vanish" button to unscramble it. After eight hours the message will be impossible to unscramble and will remain gibberish forever. Tadayoshi Kohno says Vanish makes it possible to control the "lifetime" of any type of data stored in the cloud, including information on Facebook, Google documents or blogs. "Today many people pick up the phone when they want to talk with a lawyer or have a private conversation," Kohno said. "But more and more communication is happening online. Vanish is designed to give people the same privacy for e-mail and the Web that they expect for a phone conversation.""
Programming

HTML 5 Takes Aim At Flash and Silverlight 500

snydeq writes "While Adobe, Microsoft, and Sun duke it out with proprietary technologies for implementing multimedia on the Web, HTML 5 has the potential to eat these vendors' lunches, offering Web experiences based on an industry standard. In fact, one expressed goal of the standard is to move the Web away from proprietary technologies such as Flash, Silverlight, and JavaFX. 'It would be a terrible step backward if humanity's major development platform [the Web] was controlled by a single vendor the way that previous platforms such as Windows have been,' says HTML 5 co-editor Ian Hickson, a Google employee. But whether HTML 5 and its Canvas technology will displace proprietary plug-ins 'really depends on what developers do,' says Firefox technical lead Vlad Vukicevic. It also depends on Microsoft, the only company involved in the HTML 5 effort that is both a browser developer and an RIA tool developer. 'That's a big elephant in the room for them because you can imagine the Silverlight team [whose] whole existence is to add [this] functionality in. [But] if Internet Explorer puts it already in there, why do we have Silverlight?' asks Mozilla's Dion Almaer." The RIA guys are quoted as saying they're not worried, because HTML 5 + CSS 3 is 10 years out. Are they just whistling in the dark?

Slashdot Top Deals

If it's worth doing, it's worth doing for money.

Working...