Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Apple Makes Life Easier for iPhone App Developers (

waderoush writes: While the iPhone ecosystem, with its 100,000+ apps, has been a huge boon for mobile application developers, third-party app builders have complained from the beginning about Apple's seemingly arbitrary rejection policies and long waits for app approval (weeks and in some cases months), making iteration difficult or impossible. Now that may be changing. After a post-holiday reboot, iTunes App Store reviewers are approving some apps in as little as 1 to 2 days, according to developers. Whether Apple is reacting to potential competition from Google's Android platform, rationalizing its process in advance of the expected debut of an Apple tablet device, or just trying to repair relations with developers, the change is generating great relief among many programmers.

Submission + - Group Says TSA Scanners Can Store, Send Images

Hugh Pickens writes: "CNN reports that the Washington-based Electronic Privacy Information Center (EPIC) says that the TSA is misleading the public with claims that full-body scanners at airports cannot store or send their graphic images. In documents obtained by EPIC, the TSA specifies that the body scanners it purchases must have the ability to store and send images when in "test mode" leaving open the possibility the machines — which can see beneath people's clothing — can be abused by TSA insiders and hacked by outsiders. "I don't think the TSA has been forthcoming with the American public about the true capability of these devices," says EPIC Executive Director Marc Rotenberg. "They've done a bunch of very slick promotions where they show people — including journalists — going through the devices. And then they reassure people, based on the images that have been produced, that there's not any privacy concerns." A TSA official who spoke on condition of anonymity says all full-body scanners have "strong privacy protections in place" and are delivered to airports "without the capability to store, print or transmit images." "There is no way for someone in the airport environment to put the machine into the test mode," the official says, adding that test mode can be enabled only in TSA test facilities. But the official declined to say whether activating test mode requires additional hardware, software or simply additional knowledge of how the machines operate."

Submission + - Firm to Drop 0day in Database, Web Server Apps (

krebsonsecurity writes: January promises to be a busy month for Web server and database administrators alike: A security research firm in Russia says it plans to release information about a slew of previously undocumented vulnerabilities in several widely-used commercial software products, including Mysql, Tivoli, IBM DB2, Sun Directory, and a host of others, writes From the blog: “After working with the vendors long enough, we’ve come to conclusion that, to put it simply, it is a waste of time. Now, we do not contact with vendors and do not support so-called ‘responsible disclosure’ policy,” Legerov said.

Submission + - Wiimote finding new use as sensors for scientists (

garg0yle writes: Scientists are repurposing Wiimotes (the controllers for the Nintendo Wii console) as scientific sensors to help measure wind speed or evaporation from lakes, among other things. At about $40 per unit, the controller is much cheaper than specialized sensors. The scientists are still considering how to add storage and extend the battery life.

Submission + - SPAM: Adobe warns of Reader, Acrobat attack in the wild

alphadogg writes: Adobe is investigating new reports that hackers are attacking a previously unknown bug in the latest version of the company's Reader and Acrobat software. "This afternoon, Adobe received reports of a vulnerability in Adobe Reader and Acrobat 9.2 and earlier versions being exploited in the wild," Adobe wrote in a post to its Product Security Incident Response Team blog [spam URL stripped] Monday afternoon. "We are currently investigating this issue and assessing the risk to our customers." Adobe heard of the vulnerability from "partners in the security community," she said, adding that she had seen no public reports of the issue apart from Adobe's own blog posting.
Link to Original Source

Submission + - 4G/LTE network launched in Sweden today (

mattias800 writes: The worlds first public LTE network was launched in Stockholm, Sweden today. Telia (the Swedish operator) are planning to launch in the 25 biggest cities in Sweden within a year. Only a limited supply of one modem model is available and it only supports 4G, not 3G or earlier, but early customers can switch this modem for a newer one which supports all networks once it has been released. The monthly price is 599 SEK (about $80) for a 12 month contract, but the first half year is free and the modem is included. Current download speeds are around 52 Mbit but will be increased to about 80 Mbit in phase two according to Telia.

For more information, check out this article (in Swedish):


External Airbag Designed to Protect Pedestrians Screenshot-sm 253

Thanks to researchers at Cranfield University, you don't have to feel bad when you plow into a group of pedestrians who are crossing the street too slowly. They have designed an external airbag that mounts to your hood at the base of the windshield. Research shows that this is the area where a pedestrian's head is most likely to hit in an accident. "Test results indicate that the system works extremely well. When fitted to a demonstrator vehicle not originally designed with pedestrian protection in mind, the results were well inside all current legal criteria for pedestrian protection currently in force in Europe," Roger Hardy of the university's Cranfield Impact Centre said.

Submission + - BGP Hijacking

sebedoaq writes: I help manage a small ISP out of Ohio. About 2 weeks ago we began getting hit with an unusually large amount of SPAM. At first we had chalked it up to a variant of the Conficker virus, but I was using some external BGP tools (specifically UCLA's Cyclops) and noticed that they had an unknown Autonoumous System listed as one of our peers. This particular AS has been difficult to pinpoint exact information on. Some lookups reveal that the AS is located and managed out of Tokyo, Japan, while others indicate it is based out of Washington State. I checked our BGP announcements and we don't have any reference to this AS (meaning that our system is declaring the correct peers). If this is what I think it is (BGP Hijack), what steps do I take to remedy this obvious MITM attack?

Submission + - Apple sues Wiki, Wiki sues back ( 1

Random BedHead Ed writes: "When BlueWiki posted documents about reverse engineering the iTunesDB format used on iPods late last year, Apple demanded that the content be removed, citing the DMCA's prohibition on circumventing copy protection. BlueWiki removed the content, but yesterday they filed suit against Apple seeking a declaratory judgment that the discussions did not violate the DMCA. ZDNet quotes EFF's Fred von Lohmann, who says that this is an issue of censorship. "Wikis and other community sites are home to many vibrant discussions among hobbyists and tinkerers. It's legal to engage in reverse engineering in order to create a competing product, it's legal to talk about reverse engineering, and it's legal for a public wiki to host those discussions." More info on the EFF's website."
The Internet

Submission + - Usability Study: Men Need Speed (

Andy King writes: "In a recent usability survey, researchers from Southern Illinois University found that after ease of use, men prefer fast download speed to easy navigation. Women prefer ease of use, easy navigation, and accessibility. The researchers hypothesize that these different usability criteria are due to differences in how men and women use the Web."

Submission + - Get more from access control solutions (

Kiran Washindkar writes: "If it's been a while since you last looked at access control systems, be prepared for a surprise, says Matt Haynes of Siemens Building Technologies. For very little extra cost, the latest systems deliver a whole lot more functionality than their older counterparts. Let's be honest, even the most basic of access control systems are likely to perform some useful functions, such as IP connectivity featured in the latest access control products provides extra flexibility providing a degree of protection against unauthorised access and providing a roll call of those who might be present in a building or even printing a photo ID card. There's no doubt, however, that there are many things that basic systems can't do.

For the complete article click here."


Submission + - AMD Launches 40nm Radeon HD 4770 For $99 (

NinjaKicks writes: AMD is launching yet another new ATI Radeon graphics card today and this card brings solid performance for around $99 mark. The new Radeon HD 4770 is AMD's first desktop GPU manufactured using a 40nm process for a smaller die size that consumes less power and allows decent performance at a more reasonable price point. The 40nm RV740 GPU at the heart of the card is comprised of 826M transistors and its reference specifications call for a 750MHz engine clock. The GPU is outfitted with 640 stream processors that accesses its 512MB GDDR5 frame buffer memory over a 128-bit interface running at 800MHz. The 4770's benchmark numbers are very respectable for a card in its class and its power consumption is low enough to require only a single supplemental 6-pin PCIe power connector.

Submission + - MI6 scrapped major drug operation after data loss (

pnorth writes: MI6 had to abandon a multimillion pound covert anti-drugs operation after it lost a memory stick containing the project's top secret information. The data was lost in 2006 by a female agent, known only as 'T', but was only confirmed by the Serious Organised Crime Agency (Soca) on Saturday. 'T' had been carrying the storage device in her handbag, which she left on a transit coach in Columbia. The loss put dozens of agents' and informants' lives at risk, and Soca had to relocate the individuals in case the device fell into the wrong hands.

Submission + - Are you a "Network Engineer?"

ilec_geek writes: "I'm a Network Engineer!" Oh Really? What accredited university did you obtain your "Network Engineering" diploma from? I hear this official-sounding title get thrown around so much I decided to do some research. Actually, there is no such field of engineering. The nearest one I could find was "Computer Engineering" which is a combination of Electrical Engineering and Computer Science. See Wiki link So the next time someone throws a statement like this in your face: "I'm a Network Engineer, and you don't know what you're doing and you need to listen to me because I'm the real expert! Blah blah blah...." ...take it with a grain of salt knowing in the back of your mind there really is no such field of study. Most likely this person has a rudimentary skill set that might include installing a linux server, configuring a router, and fixing PCs for their relatives. They might actually have a vendor "certification" like CNA or MCSE and upon receiving such a certification, viola; they dubbed themselves "Network Engineer." They might have even smooth-talked their pointy-haired boss to make it their official job title. I snicker, sometimes uncontrollably, at anyone who actually had the lugnuts to have this printed on their business card. Most real "Computer Engineers" are most likely members of the IEEE and all of the ones I actually know are quite humble about it. They rarely throw it in your face with such arrogance as the many self-appointed fake "engineers" we encounter so often.

Slashdot Top Deals

If God had not given us sticky tape, it would have been necessary to invent it.