Forgot your password?
typodupeerror

Comment Re:will there be changes? (Score 1) 146

You're correct about the wiring closets. How many have additional items, such as janitorial and office supplies stored in the same location? As a result, the staff says it's "too hard" to keep the door locked. Not to mention the risk of social engineering. How many employees would really question anyone appearing on site that looked "official" - in retail locations, not just financial.
The Internet

Cuba Getting Internet Upstream Via Venezuela 486

An anonymous reader writes "Seems like Cuba is working around the US internet embargo by teaming up with Venezuela: A confidential contract released yesterday on Wikileaks reveals Cuba's plan to receive internet upstream via an undersea cable to Venezuela, thus circumventing the enduring embargo of the US, denying Cuba access to nearby American undersea cables and overcoming the current limits of satellite-only connectivity. The connection, to be delivered by CVG Telecom of Venezuela, is to be completed by 2010 and will provide data, video as well as voice service for both the public and governmental services."
Communications

HD Radio Recording In the US? 303

unreceivedpacket writes "The public radio stations I listen to have been advertising their conversion to HD Radio format for some time. They advertise multiple channels, their second channel playing all classical, all the time. I am interested in purchasing a receiver so I can listen to this extra content, and was also hoping to find a receiver with a built-in recorder so I could time-shift programs that are not otherwise available as legal pod-casts. My initial queries have returned few models that support any kind of digital recording, and the existing ones seem out of production or sorely lacking features. Is this the state of Digital Radio in the US? Are there any legal recording devices for HD Radio? Any good solutions for recording and time-shifting, perhaps through Linux?"
NASA

NASA Contractor Needs Urine 291

Apparently, NASA sent a memo to its employees at the Johnson Space Center asking for their urine so they, NASA, could use it to test the Orion space capsule. How much urine? 30 liters per day, including weekends. Disposal of urine for up to six months would be required if Orion is to work as planned.

Alert reader nettamere adds a link to story at Discovery.com, excerpting: "Donations will be treated with a chemical that can hold solid particulates in the liquid so they don't clog up the tubing in microgravity, said Leo Makowski, company spokesman for Hamilton Sundstrand, a contractor designing the new spaceship's toilet. ... "It's difficult to come up with a faux urine, explained NASA's Jim Lewis, the systems manager overseeing development of Orion's potty. 'That's why we depend on collections.'"

Mars

Mars Lander's Robot Arm Shuts Down To Save Itself 214

Cowards Anonymous passes along a PCWorld article that begins, "The robotic arm on the Mars Lander found itself in a tough position over the weekend. After receiving instructions for a movement that would have damaged its wrist, the robotic arm recognized the problem, tried to rectify it and then shut down before it could damage itself, according to Ray Arvidson, a co-investigator for the Mars Lander's robotic arm team and a professor at Washington University in St. Louis."
Security

Fallout From the Fall of CAPTCHAs 413

An anonymous reader recommends Computerworld's look at the rise and fall of CAPTCHAs, and at some of the ways bad guys are leveraging broken CAPTCHAs to ply their evil trade. "CAPTCHA used to be an easy and useful way for Web administrators to authenticate users. Now it's an easy and useful way for malware authors and spammers to do their dirty work. By January 2008, Yahoo Mail's CAPTCHA had been cracked. Gmail was ripped open soon thereafter. Hotmail's top got popped in April. And then things got bad. There are now programs available online (no, we will not tell you where) that automate CAPTCHA attacks. You don't need to have any cracking skills. All you need is a desire to spread spam, make anonymous online attacks against your enemies, propagate malware or, in general, be an online jerk. And it's not just free e-mail sites that can be made to suffer..."
Security

Just How Effective is System Hardening? 154

SkiifGeek, pointing to our recent coverage of what the NSA went through to create SELINUX, wants to know just how effective system hardening is at preventing successful attack, and writes "When Jay Beale presented at DefCon 14, he quoted statistics (PDF link) that Bastille protected against every major threat targeting Red Hat 6, before the threats were known. With simple techniques available for the everyday user which can start them on the path towards system hardening, just how effective have you found system and network hardening to be? The NSA does have some excellent guides to help harden not only your OS but also your browser and network equipment."
Earth

Earthquake In China 595

Several readers sent in links on the earthquake that hit 10 hours ago near the Sichuan city of Chengdu in China. The Telegraph focuses on the citizen journalism that got word on the quake out on the Net instantly (the first report was via Twitter). Science magazine speculates that deaths from this event could exceed the 240,000 killed in the Tangshan quake in 1976, though the estimated death toll is below 10,000 at this writing. Hundreds of videos are up on YouTube, including this footage from a security camera — keep your eye on the goldfish.
Data Storage

A Walk Through the Hard Drive Recovery Process 238

Fields writes "It's well known that failed hard drives can be recovered, but few people actually use a recovery service because they're expensive and not always successful. Even fewer people ever get any insights into the process, as recovery companies are secretive about their methods and rarely reveal any more information that is necessary for billing. Geek.com has an article walking through a drive recovery handled by DriveSavers. The recovery team did not give away many secrets, but they did reveal a number of insights into the process. From the article, "'[M]y drive failed in about every way you can imagine. It had electro-mechanical failure resulting in severe media damage. Seagate considered it dead, but I didn't give up. It's actually pretty amazing that they were able to recover nearly all of the data. Of course, they had to do some rebuilding, but that's what you expect when you send it to the ER for hard drives.'" Be sure to visit the Museum of Disk-asters, too.
The Military

USAF Considers Creation of Military Botnet 440

sowjetarschbajazzo writes "Air Force Col. Charles W. Williamson III believes that the United States military should maintain its own botnet, both as a deterrent towards those who would attempt to DDoS government networks, and an offensive weapon to be used against the networks of unfriendly nations, criminal groups, or terrorist organizations. "Some people would fear the possibility of botnet attacks on innocent parties. If the botnet is used in a strictly offensive manner, civilian computers may be attacked, but only if the enemy compels us. The U.S. will perform the same target preparation as for traditional targets and respect the law of armed conflict as Defense Department policy requires by analyzing necessity, proportionality and distinction among military, dual-use or civilian targets. But neither the law of armed conflict nor common sense would allow belligerents to hide behind the skirts of its civilians. If the enemy is using civilian computers in his country so as to cause us harm, then we may attack them." What does Slashdot think of this proposal?"
Data Storage

The File-System Fallout of the Reiser Verdict 605

perlow writes "Yesterday, the Open Source community took an emotional hit when veteran Linux programmer Hans Reiser was convicted of first degree murder in the suspicious disappearing of his wife, Nina. While I won't go into the details of the case, as this has been covered extensively in the press, I would like to talk a little bit about how this verdict will impact the technology in play for file system dominance in our favorite Open Source operating system, Linux."
Windows

Microsoft Helps Police Crack Your Computer 558

IGnatius T Foobar writes "Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that "may have been used in crimes." It basically bypasses all of the Windows security (decrypting passwords, etc.) in order to eliminate all that pesky privacy when the police have physical access to your computer. Just one more reason not to run Windows on your computer."
Printer

How Aftermarket Inkjet Ink Holds Up After a Year 152

An anonymous reader writes "About a year ago I found a link on here for a test of inkjet printer inks. The article compared original manufacturer inks against much cheaper third party stuff and the results were surprisingly in favour of third party products. They've now published the final part of this study, examining the prints produced a year ago. This time the printer manufacturers have come out far better, with some third party prints having disappeared completely! Cartridge World ink still seems worth a try though, if you don't want to pay manufacturers' inflated prices."
Privacy

Lawyers Would Rather Fly Than Download PGP 426

An anonymous reader writes "The NYTimes is running a front-page story about lawyers for suspects in terrorism-related cases fearing government monitoring of privileged conversations. But instead of talking about the technological solutions, the lawyers fly halfway across the world to meet with their clients. In fact, nowhere in the article is encryption even mentioned. Is it possible that lawyers don't even know about PGP?" The New Yorker has a detailed piece centering on the Oregon terrorism case discussed by the Times.

Slashdot Top Deals

How long does it take a DEC field service engineer to change a lightbulb? It depends on how many bad ones he brought with him.

Working...