Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Submission + - Cicadas and Prime Numbers (joshuasalvi.com)

An anonymous reader writes: Why do cicadas operate on 13 and 17 year cycles? Why do they come out all at once? This blog delves into the answers.

Submission + - 10 Star Trek Technologies That Are Almost Here 1

snydeq writes: 'The 23rd century may seem a long way off, but you'd be surprised by how much of the future predicted by Star Trek is already here. We already have handheld communicators (smartphones), sassy voice-driven computers (Siri), Geordi La Forge-like vision (Google Glass), and at least 4.5 billion Earth-like planets to choose from. (Whether any of them contain green-skinned alien babes in gold bikinis is still to be determined.) As for warp drives, transporters, phasers, and the rest? It will be here sooner than you think. Join us as we boldly go on a tour of Trek tech.'

Submission + - North Carolina May Ban Tesla Sales To Prevent "Unfair Competition" (slate.com) 7

nametaken writes: From the state that brought you the nation’s first ban on climate science comes another legislative gem: a bill that would prohibit automakers from selling their cars in the state.

The proposal, which the Raleigh News & Observer reports was unanimously approved by the state’s Senate Commerce Committee on Thursday, would apply to all car manufacturers, but the intended target is clear. It’s aimed at Tesla, the only U.S. automaker whose business model relies on selling cars directly to consumers, rather than through a network of third-party dealerships.

[The article adds] it’s easy to understand why some car dealers might feel a little threatened: Tesla’s Model S outsold the Mercedes S-Class, BMW 7 Series, and Audi A8 last quarter without any help from them. If its business model were to catch on, consumers might find that they don’t need the middle-men as much as they thought.

Submission + - Hacking the Xbox author releases free PDF of book in honor of Aaron Swartz (nostarch.com)

An anonymous reader writes: No Starch Press and I have decided to release this free ebook version of Hacking the Xbox in honor of Aaron Swartz. As you read this book, I hope that youâ(TM)ll be reminded of how important freedom is to the hacking community and that youâ(TM)ll be inclined to support the causes that Aaron believed in.

Submission + - Hijacking Airplanes with an Android Phone

An anonymous reader writes: Until today, hacking and hijacking planes by pressing a few buttons on an Android mobile app has been the stuff of over-the-top blockbuster movies, but the talk that security researcher and commercial airplane pilot Hugo Teso delivered today at the Hack in the Box conference in Amsterdam has brought it crashingly into the realm of reality and has given us one more thing to worry about and fear.

Submission + - Germany Quadruples Energy Surplus in Past Two Years (inhabitat.com)

MikeChino writes: Germany's Federal Statistics Office just reported a surplus of 22.8 billion kilowatt hours over the last two years. While 46 percent of Germany’s power still comes from coal, in 2012 nearly 22 percent of the country’s electricity came from renewables — and the government has set a goal to source 80 percent of its electricity from green technology by 2050. Holland, Austria and Switzerland were the country’s main customers for the extra energy.

Submission + - Serious Vulnerabilities Found in Popular Cisco Home Wireless Routers

Trailrunner7 writes: A handful of vulnerabilities have been identified in the Cisco Linksys EA2700 Network Manager N600 Wireless-N routers, which has been on the market a little more than a year, and is a popular choice not only for home users, but for small businesses.

Pen-tester and researcher Phil Purviance, who has presented similar research at security industry events, reported his findings to Cisco on March 5. No patches are available yet.

His research looked at the administration features on the embedded management website. The vulnerabilities he found range in severity and simplicity to exploit.

A cross-site scripting bug was found on the router’s apply.cgi that works regardless of authentication and would allow an attacker to access the device, change settings or upload modified firmware.

Slashdot Top Deals

Technological progress has merely provided us with more efficient means for going backwards. -- Aldous Huxley

Working...