Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Lithium Air Batteries Get Boost From IBM and DOE 240

coondoggie writes "The Department of Energy and IBM are serious about developing controversial lithium air batteries capable of powering a car for 500 miles on a single charge – a huge increase over current plug-in batteries that have a range of about 40 to 100 miles, the DOE said. The agency said 24 million hours of supercomputing time out of a total of 1.6 billion available hours at Argonne and Oak Ridge National Laboratories will be used by IBM and a team of researchers from those labs and Vanderbilt University to design new materials required for a lithium air battery."

Newly-Found Windows Bug Affects All Versions Since NT 393

garg0yle writes "A researcher has found a security bug that could allow privilege escalation in Windows. Nothing new there, right? Well, this affects the Virtual DOS Machine, found in every 32-bit version of Windows all the way back to Windows NT. That's 17 years worth of Windows and counting. 'Using code written for the VDM, an unprivileged user can inject code of his choosing directly into the system's kernel, making it possible to make changes to highly sensitive parts of the operating system. ... The vulnerability exists in all 32-bit versions of Microsoft OSes released since 1993, and proof-of-concept code works on the XP, Server 2003, Vista, Server 2008, and 7 versions of Windows, Ormandy reported.'"
United States

Challenge To US Government Over Seized Laptops 246

angry tapir writes "The policy of random laptop searches and seizures by US government agents at border crossings is under attack again: The American Civil Liberties Union is working with the National Association of Criminal Defense Lawyers to find lawyers whose laptops or other electronic devices were searched at US points of entry and exit. The groups argue that the practice of suspicionless laptop searches violates fundamental rights of freedom of speech and protection against unreasonable seizures and searches."

Second 3G GSM Cipher Cracked 57

Trailrunner7 writes "A group of cryptographers has developed a new attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless networks. The technique enables them to recover a full key by using a tactic known as a related-key attack, but experts say it is not the end of the world for Kasumi. Kasumi, also known as A5/3, is the standard cipher used to encrypt communications on 3G GSM networks, and it's a modified version of an older algorithm called Misty. In the abstract of their paper, the cryptographers say the attack can be implemented easily on one standard PC. 'In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 214. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full KASUMI by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity.'"

400 Years Ago, Galileo Discovered Four Jovian Moons 161

krswan writes "OK, the moons themselves are much older, but on January 7, 1610 Galileo first observed '4 fixed stars' surrounding Jupiter. Observations of their changing positions led Galileo to postulate they were really moons orbiting Jupiter, which became further evidence against Aristotelian Cosmology, which led to problems with the Roman Catholic Church, etc... Jupiter will be low in the southwest (in the Northern Hemisphere) after sunset this evening — nothing else around it is as bright, so you can't miss it. Celebrate by pointing binoculars or a telescope at Jupiter and checking out the moons for yourself."

Ideas For Exploiting NASA's SRTM Data 124

MaxTardiveau writes with an excerpt from an article where the pictures are worth clicking through for: "Ten years ago, in February 2000, NASA mapped the entire world in eleven days. It's true: the mission was called the Shuttle Radar Topography Mission (SRTM), and over the course of eleven days, it used a big radar attached to the space shuttle to get elevation data from the vast majority of solid Earth; practically all land between 60 degrees North and 56 degrees South was included, with a resolution of 30 meters (90 feet). Over 9 terabytes of data were captured. It then took two years to process that data and make it usable (and it is still being refined to this day). This data is freely available to anyone, and the number of possible applications is almost infinite. It's been used in GIS, cartography, environmental planning, weather modeling (weather patterns are enormously influenced by the topography), flight simulators, Google Earth, and the list goes on. In this short article, I would like to give you a quick tour of the kinds of things this data can reveal. My hope is to get you thinking about what else could be done with this incredible resource."

Court Orders Shutdown of H-1B Critics' Websites 605

theodp writes "Computerworld reports that a NJ Superior Court Judge ordered hosting firms to shut down three Web sites that oppose the H-1B visa program and seeks information about the identity of anonymous posters. GoDaddy, Network Solutions, Comcast and DiscountASP.Net were ordered to disable,, and Facebook Inc. was also ordered to disable ITgrunt's Facebook page. The judge's order was made in response to a libel lawsuit filed by Apex Technology Group Inc., which is citing its copyright ownership as it seeks the identity of the poster of a since-removed Apex employment agreement on, which drew critical comments on US and India websites."

Web Open Font Format Gets Backing From Mozilla 206

A new format specification has reached consensus among web and type designers and is being backed by Mozilla. Dubbed Web Open Font Format (WOFF), it is an effort to bring advanced typography to the Web in a much better way. Support for the new spec will be included as a part of Firefox 3.6 which just recently hit beta. "WOFF combines the work Leming and Blokland had done on embedding a variety of useful font metadata with the font resource compression that Kew had developed. The end result is a format that includes optimized compression that reduces the download time needed to load font resources while incorporating information about the font's origin and licensing. The format doesn't include any encryption or DRM, so it should be universally accepted by browser vendors — this should also qualify it for adoption by the W3C."

The Interactive Linux Kernel Map 93

Constantine writes "The Linux kernel is one of most complex open source projects. Even though there are a lot of books on the Linux kernel, it is still a difficult subject to comprehend. The interactive Linux kernel map gives you a top-down view of the kernel. You can see the most important layers, functionalities, modules, functions, and calls. Each function on the map is a link to its source code. The map is interactive. You can zoom in and drag around to see details."

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (6) Them bats is smart; they use radar.