Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Look how well that is going in California. (Score 1) 179

In 2030 we might be able to ride between Bakersfield and Merced!

The entire system should have only cost around $28B if executed efficiently. But grift, politics, and contracting inefficiencies basically killed the project. Until the US reforms our civil engineering practices, we will continue to pay more and get less.

Comment Boondoggle (Score 2) 179

Right now, this corridor would struggle to attract 1800 passengers in each direction per day [using pre-pandemic numbers], representing about 2 full Eurostar class trains per day -- and that's assuming that the air routes between SEA-PDX-YVR are discontinued. That's not really enough demand for something that would cost $10B at China HSR prices, or something well over $100B at the probable US HSR pricing.

Would make a lot more sense to add dedicated bus lanes along the entire I-5 corridor to serve this market.

First Person Shooters (Games)

id Software Announces Doom 4 425

spoco2 writes "The id Software site has announced that work has begun on the next sequel to their most famous game, Doom. Will they be able to resurrect the series after what many considered to be a serious misstep with Doom 3? Oh... and they're hiring for the team, so maybe you can steer them in the right direction?"
Role Playing (Games)

WoW Expansion Sells 2.4 Million, New MMOG Planned 161

Computer and Videogames is reporting that 2.4 Million copies of Burning Crusade were sold on the first day of retail sales. Those numbers are just for North American and the EU, too, which totally discounts any sales the box may have had in Asian markets. Even without our eastern brethren, that number pretty much destroys every other launch-day sales number for a PC game. Meanwhile, the same gent that teased us with the next StarCraft game has tossed out this bone as well: Blizzard's next MMOG 'won't be another WoW'. From the article: "'When we announce our next MMORPG it's not going to be another WOW--we're not a company that tends to tread the same ground,' he told British film magazine Empire. 'It'll be something innovative and new that really brings entertainment to another level.' American Blizzard reps declined to expand on Bassat's comments, although the fact that the company began hiring real-time strategy developers last summer might offer a clue." So ... another Blizzard MMOG. Huh.

A New Vulnerability In RSA Cryptography 108

romiz writes, "Branch Prediction Analysis is a recent attack vector against RSA public-key cryptography on personal computers that relies on timing measurements to get information on the bits in the private key. However, the method is not very practical because it requires many attempts to obtain meaningful information, and the current OpenSSL implementation now includes protections against those attacks. However, German cryptographer Jean-Pierre Seifert has announced a new method called Simple Branch Prediction Analysis that is at the same time much more efficient that the previous ones, only needs a single attempt, successfully bypasses the OpenSSL protections, and should prove harder to avoid without a very large execution penalty." From the article: "The successful extraction of almost all secret key bits by our SBPA attack against an openSSL RSA implementation proves that the often recommended blinding or so called randomization techniques to protect RSA against side-channel attacks are, in the context of SBPA attacks, totally useless." Le Monde interviewed Seifert (in French, but Babelfish works well) and claims that the details of the SBPA attack are being withheld; however, a PDF of the paper is linked from the ePrint abstract.

Transec, a Secure Authentication Tag Library 125

Lado Kumsiashvili writes, "Micromata has placed Transec, a secure authentication JSP tag library, under the GPL. While developing the Polyas (German) online voting system, Micromata invented a component for secure PIN/password input via untrusted, insecure browsers. Transec is freely embeddable and redistributable for non-commercial projects; a commercial license is also available. Spyware in the form of Browser Helper Objects and keyloggers can capture user keyboard input even if it is encrypted. Transec enables user authentication using a 100% server-side control — only images and coordinates are transferred to the untrusted browser. The browser sends coordinate information of each click on this imagemap directly back to the server, and the server responds with a new image. If the browser is infected by malware, it can't give up the PIN/password since the browser doesn't know this information. The Java code and a demo application are available at the Transec homepage." I have heard tales of malware that can grab a screen capture in the vicinity of the cursor at any mouse-click. Does anyone know if such a threat actually exists?

GeForce 8800 GTX Recall 84

An anonymous reader writes "From vr-zone.com: 'We have received news that all the 8800GTX cards out in the channel are being recalled due to manufacturing defect. We heard it is probably due to a resistor controlling 2D/3D switching and that leads to 3D corruption. However, the defect doesn't affect the 8800GTS cards.'"

Comment Re:It won't work, and why bother anyway? (Score 1) 521

The question is not whether global warming exists (If it didn't earth would average 33C colder). The real question is: What is the magnitude of human emitted Greenhouse gasses retaliative to natural greenhouse gas emitters (volcanos, meteorites, etc.)?

Colonizing Venus is crazy. Mars has almost everything we need already frozen in its atmosphere to create a successful colony today, even without terraforming. It is also easier to create global warming than it is to reverse it.

Comment Re:Everything can be cleaned manually (Score 1) 155

I'd say with a PE (like BartPE) and some tools it's possible to remove malware that are hiding themselves with rootkit techniques. Booting from read only media is the classic way of preventing execution of hostile code, but sadly it's often overlooked nowadays. It can be very time consuming though to locate and remove malware though, especially when you don't know it's there. It's not something an average user would likely succeed in doing, so I guess you're mostly right when you say it's impossible to remove without fdisk/format.

Slashdot Top Deals

news: gotcha

Working...