Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Partly useful (Score 2, Insightful) 227

Indeed, very often the thing about good science is that what they discover may seem obvious in retrospect; in this case the notion that in social situations or warfare men treat enemies or strangers differently than friends and family is directly correlated to testosterone levels. Certainly the concept of social cooperation and distinctions are made between different groups of people is not new. However, coming up with data to show a cause for why this is so can be very useful, it can provide a model for making predictions, and can perhaps be applied to other areas of research. I think it's interesting that the video gamer's social interactions through the digital medium were just as 'real' to their bodies as it would have been to someone in a physical setting.

Graphics

Linux Port For id's Tech 5 Graphics Engine Unlikely 461

DesiVideoGamer writes "John Carmack, the lead developer for id's Tech 5 graphics engine, does not plan on making a Linux port for the new engine. From his e-mail: 'It isn't out of the question, but I don't think we will be able to justify the work. If there are hundreds of thousands of Linux users playing Quake Live when we are done with Rage, that would certainly influence our decision.' One of the reasons for not making a Linux port was due to the fact that the new engine 'pushes a lot of paths that are not usually optimized' and that the Linux port would have to use the binary blob graphics driver in order to work."
Security

Real-Time Keyloggers 205

The NY Times has a story and a blog backgrounder focusing on a weapon now being wielded by bad guys (most likely in Eastern Europe, according to the Times): Trojan horse keyloggers that report back in real-time. The capability came to light in a court filing (PDF) by Project Honey Pot against "John Doe" thieves. The case was filed in order to compel the banks — which are almost as secretive as the cyber-crooks — to reveal information such as IP addresses that could lead back to the miscreants. Or at least allow victims to be notified. Real-time keyloggers were first discovered in the wild last year, but the court filing and the Times article should bring new attention to the threat. The technique menaces the 2-factor authentication that some banks have instituted: "By going real time, hackers now can get around some of the roadblocks that companies have put in their way. Most significantly, they are now undeterred by systems that create temporary passwords, such as RSA's SecurID system, which involves a small gadget that displays a six-digit number that changes every minute based on a complex formula. If [your] computer is infected, the Trojan zaps your temporary password back to the waiting hacker who immediately uses it to log onto your account. Sometimes, the hacker logs on from his own computer, probably using tricks to hide its location. Other times, the Trojan allows the hacker to control your computer, opening a browser session that you can't see."
Biotech

Submission + - The physics of beer bubbles

Roland Piquepaille writes: "Yesterday, I told you about virtual beer. Today, let's follow two North America researchers who are studying the physics of real beer bubbles. 'Singly scattered waves form the basis of many imaging techniques such as radar or seismic exploration.' But pouring beer in a mug involves multiply scattered acoustic waves. They are more complex to study, but they can be used to look at various phenomena, such as predicting volcanic eruptions or understanding the movement of particles in fluids like beer. They also could be used to monitor the structural health of bridges and buildings or the stability of food products over time. Read more for additional references and a photo showing how the researchers monitor beer bubbles."
Security

Submission + - The Physical Hacks at DefCon (physorg.com)

eldavojohn writes: "As we all know, DefCon is occurring in Vegas this weekend but Saturday held a room that focused on possibly the oldest form of hacking — lockpicking. That's right, as software security becomes better and better, the focus may instead shift towards simple hacking tips like looking over someone's shoulder for their password, faking employment or just picking the locks to gain access to the building where machines are left on overnight. This is nothing to sneeze at, "Medeco deadbolt locks relied on worldwide at embassies, banks and other tempting targets for thieves, spies or terrorists can be opened in seconds with a strip of metal and a thin screw driver, Marc Tobias of Security.org demonstrated for AFP ... Tobias says he refuses to publish details of 'defeating' the locks because they are used in places ranging from homes, banks and jewelers to the White House and the Pentagon. He asked AFP not to disclose how it is done." I'm sure all Slashdot readers are savvy enough to use firewall(s) but do you know and trust what locks 'physically' protect your data from hacks like these?"

Slashdot Top Deals

The world is not octal despite DEC.

Working...