Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Ubuntu

Submission + - Dell Plans A Developer Laptop Running Ubuntu (bartongeorge.net)

jones_supa writes: Barton George, director of marketing for Dell's Web vertical reveals information about "Project Sputnik", a laptop tailored for developer needs in web companies. 'We want to find ways to make the developer experience as powerful and simple as possible. And what better way to do that than beginning with a laptop that is both highly mobile and extremely stylish, running the 12.04 LTS release of Ubuntu Linux', George ponders and, gives a quick list of packages that the default installation could include. The machine will base on the XPS13, assessing a couple of its main hardware deficiencies along the way.
Google

Submission + - Google Patents Using iPhones to Kill 'Free Bird'

theodp writes: At Chicago's Billy Goat Tavern, construction workers found physical threats an effective way to discourage smart-ass Whitney Young High School students from playing annoying jukebox songs over and over again. But with Google's newly-patented technology for the Collaborative Rejection of Media for Physical Establishments, you no longer need to resort to violence to prevent Elton John Songs from being played on jukeboxes in bars. Its invention, boasts Google, 'enables customers of an establishment to collaboratively reject a media file that is currently playing and/or pending to be played within that establishment by entering data into a personal wireless portable computing device on their person, for example a cellular telephone.' But don't get your hopes up too high, kids. Much like Google's dual-tier stock plan, the patent calls for 'customer status levels including a premium status and a standard status,' so a premium customer will be able to veto attempts by lowly standard customers to kill his requests to play MC Hammer's 'Can't Touch This'. The patent comes from a quirky Outland Research IP portfolio acquired by Google; its inventor is Louis B. Rosenberg, a Stanford PhD and professional film maker.
Encryption

Second 3G GSM Cipher Cracked 57

Trailrunner7 writes "A group of cryptographers has developed a new attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless networks. The technique enables them to recover a full key by using a tactic known as a related-key attack, but experts say it is not the end of the world for Kasumi. Kasumi, also known as A5/3, is the standard cipher used to encrypt communications on 3G GSM networks, and it's a modified version of an older algorithm called Misty. In the abstract of their paper, the cryptographers say the attack can be implemented easily on one standard PC. 'In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 214. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full KASUMI by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity.'"
Bug

2010 Bug Plagues Germany 233

krou writes "According the Guardian, some 30 million chip and pin cards in Germany have been affected by a programming failure, which saw the microchips in cards unable to recognize the year change. The bug has left millions of credit and debit card users unable to withdraw money or make purchases, and has stranded many on holiday. French card manufacturer Gemalto accepted responsibility for the fault, 'which it is estimated will cost €300m (£270m) to rectify.' They claim cards in other countries made by Gemalto are unaffected."
Censorship

China Faces Piracy Suit Over Censorship Software 113

angry tapir writes "Web software filtering vendor CyberSitter has filed a $2.2B lawsuit against the Chinese government, two Chinese software makers, and seven major computer manufacturers for their distribution of Green Dam Youth Escort, a controversial Web filtering package the Chinese government had mandated to be installed on computers sold there. Researchers at the University of Michigan found that Green Dam copied code from CyberSitter."
Censorship

Australian Net Filter Protest Site Returns 75

An anonymous reader writes "The Stephen Conroy 'Minister for Fascism' website, whose stephenconroy.com.au domain was forced offline by the Australian Domain Name Administrator, has now reclaimed the name after the initial 14-day injunction expired. During those 14 days, the protesters managed to comply with the Australian domain name registration criteria. However, contrary to auDA's own rules and contrary to public quotes by the auDA CEO, the protesters were continually refused the domain. Now, however, it seems that they have unequivocally shown that they have the right to the domain and have re-registered it."
Hardware Hacking

Open Source Russian Vacuum Fluorescent Tube Clock 155

ptorrone writes "Hacker extraordinaire Ladyada (whose open source hardware projects we have discussed before) has just published a complete how-to, with design document, on making your own open source Russian vacuum fluorescent clock. The vacuum fluorescent tubes aren't as dangerous as (high-voltage) Nixie tubes, and there seem to be more of them available in the world. If you're not interested in building a clock from scratch, you can also pick up a kit version. All the schematics, source code, and files are available on the project's page."
Medicine

A Broken Heart Really Does Hurt, Scientists Claim 220

Death Metal writes "Psychologists at the University of California, Los Angeles say the human body has a gene that connects physical pain sensitivity with social pain sensitivity. The findings back the common theory that rejection 'hurts' by showing that a gene regulating the body's most potent painkillers — mu-opioids — is involved in socially painful experiences too."
Security

Sandia Studies Botnets In 1M OS Digital Petri Dish 161

Ponca City, We love you writes "The NY Times has the story of researchers at Sandia National Laboratories creating what is in effect a vast digital petri dish able to hold one million operating systems at once in an effort to study the behavior of botnets. Sandia scientist Ron Minnich, the inventor of LinuxBIOS, and his colleague Don Rudish have converted a Dell supercomputer to simulate a mini-Internet of one million computers. The researchers say they hope to be able to infect their digital petri dish with a botnet and then gather data on how the system behaves. 'When a forest is on fire you can fly over it, but with a cyber-attack you have no clear idea of what it looks like,' says Minnich. 'It's an extremely difficult task to get a global picture.' The Dell Thunderbird supercomputer, named MegaTux, has 4,480 Intel microprocessors running Linux virtual machines with Wine, making it possible to run 1 million copies of a Windows environment without paying licensing fees to Microsoft. MegaTux is an example of a new kind of computational science, in which computers are used to simulate scientific instruments that were once used in physical world laboratories. In the past, the researchers said, no one has tried to program a computer to simulate more than tens of thousands of operating systems."
Security

iPhone 3Gs Encryption Cracked In Two Minutes 179

An anonymous reader writes "In a Wired news article, iPhone Forensics expert Jonathan Zdziarski explains how the much-touted hardware encryption of the iPhone 3Gs is but a farce, and demonstrates how both the passcode and backup encryption can be bypassed in about two minutes. Zdziarski also goes on to say that all data on the iPhone — including deleted data — is automatically decrypted by the iPhone when it's copied, allowing hackers and law enforcement agencies alike access the device's raw disk as if no encryption were present. A second demonstration features the recovery of the iPhone's entire disk while the device is still passcode-locked. According to a similar article in Ars Technica, Zdziarski describes the iPhone's hardware encryption by saying it's 'like putting privacy glass on half your shower door.' With the iPhone being sold into 20% of Fortune-100s and into the military, just how worried should we be with such shoddy security?"
Censorship

Australian Web Filter To Censor Downloaded Games 200

Xiroth writes "The Australian Federal Communications Ministry has confirmed that they intend to use the planned filter to block the download of games that have been refused by Australia's classification authority, the OFLC. As an Electronic Frontiers Australia spokesman noted, 'This is confirmation that the scope of the mandatory censorship scheme will keep on creeping.'"
Security

Google Chrome Developers On Browser Security 61

CowboyRobot writes "Developers of Google's Chrome browser have spoken up in an article describing their approach to keeping the browser secure, focusing on minimizing the frequency, duration, and severity of exposure. One tool Chrome uses is a recently open-sourced update distribution application called 'Omaha.' 'Omaha automatically checks for software updates every five hours. When a new update is available, a fraction of clients are told about it, based on a probability set by the team. This probability lets the team verify the quality of the release before informing all clients.'"
Security

Researchers Build a Browser-Based Darknet 163

ancientribe writes "At Black Hat USA next month, researchers will demonstrate a way to use modern browsers to more easily build darknets — underground private Internet communities where users can share content and ideas securely and anonymously. HP's Billy Hoffman and Matt Wood have created Veiled, a proof-of-concept darknet that only requires participants have an HTML 5-based browser to join. No special software or configuration is necessary, unlike with darknets such as Tor. Veiled is basically a 'zero footprint' network, in which groups can rapidly form and disappear without a trace. The researchers admit darknets are attractive to bad guys, too, but they say they think these more easily set-up and dismantled nets will be more popular for mainstream (and legit) users." In somewhat related news, reader cheesethegreat informs us that version 0.7.5 of FreeNet has hit the tubes.
Data Storage

A Visual Expedition Inside the Linux File Systems 85

RazvanM writes "This is an attempt to visualize the relationships among the Linux File Systems through the lens of the external symbols their kernel modules use. We took an initial look a few months back but this time the scope is much broader. This analysis was done on 1377 kernel modules from 2.6.0 to 2.6.29, but there is also a small dip into the BSD world. The most thorough analysis was done on Daniel Phillips's tree, which contains the latest two disk-based file systems for Linux: tux3 and btrfs. The main techniques used to establish relationships among file systems are hierarchical clustering and phylogenetic trees. Also presented are a set of rankings based on various properties related to the evolution of the external symbols from one release to another, and complete timelines of the kernel releases for Linux, FreeBSD, NetBSD, and OpenBSD. In all there are 78 figures and 10 animations."
Security

Should Auditors Be Liable For Certifications? 209

dasButcher writes "Enterprises and mid-size business rely on auditors and service providers to certify their systems as compliant with such security regs and standards as PCI-DSS or SOX. But, as Larry Walsh speculates, a lawsuit filed by a bank against an auditor/managed service provider could change that. The bank wants to hold the auditor liable for a breach at its credit card processor because the auditor certified the processor as PCI compliant. If the bank wins, it could change the standards and liabilities of auditors and service providers in the delivery of security services."

Slashdot Top Deals

The best things in life are for a fee.

Working...