Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Idle

Growing A House From Meat 133

baosol writes "From the boundary-pushing team of archi-visionaries who brought us the fabulous Fab Tree Hab comes a new (and somewhat disgusting) way to grow a structure — using animal flesh! The In Vitro Meat Habitat is a futuristic concept home composed of meat cells grown in a lab. The creator of the concept, Mitchell Joachim, is a futurist with a twist– he says he is actually developing the concept in a lab."
Wireless Networking

WPA Encryption Cracked In 60 Seconds 322

carusoj writes "Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the attack to a new level. The earlier attack worked on a smaller range of WPA devices and took between 12 and 15 minutes to work. Both attacks work only on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm. They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm."

Comment Re:Adobe Flash security is extremely disappointing (Score 1) 286

> Can you explain how installing a second separate program improves security in the first? For intranet applications, it may make sense.
If your intranet does not use Flash, you can avoid rolling out Flash in your corporate network in the first place, thus reducing potential attack surface.
Of course, there is still YouTube, news sites, etc., so this is only applicable in highly restricted workplaces where users aren't supposed to complain about that.

Comment Adobe Flash security is extremely disappointing (Score 3, Informative) 286

Flash is now among the top attack vectors for Windows, and it isn't even covered by Windows Update.
There were 23 reported security issues in the last 2 years, including at least 4 browse-and-get-owned vulnerabilities.
In comparison, Silverlight has had no security bulletins since its 1.0 release (it's now at 3.0).
This may be just yet another reason to migrate to Silverlight, especially for intranet applications.
Portables

Jim Zemlin Pitches Linux App Stores For Telcos 83

angry tapir writes "Mobile carriers may start giving away netbooks for free, and Linux-based application stores could help them profit by doing so, the Linux Foundation's Jim Zemlin argued at a recent forum in Beijing. 'Selling discounted netbooks to users who buy a mobile data subscription would extend a sales strategy widely used for mobile phones. Carriers often sell phones for below retail price and let a user's subscription fees make up for the loss. AT&T already sells subsidized 3G netbooks in the US, and China Mobile has announced similar plans. Carriers worldwide are likely considering the option, which lets them charge for added services like downloads of music, videos and software, said [analyst Jack Gold]. Those downloads could come from platforms like the iPhone App Store that target mainly mobile phones today. Competition could push netbook prices down as more carriers subsidize them, which would make putting Linux on the laptops an attractive way to cut costs, said Zemlin.'"
The Almighty Buck

Pirate Bay Announces Sale to Swedish Company For $7.8 Million 406

paulraps writes "The Pirate Bay is to be bought for $7.8 million by Global Gaming Factory X, a Swedish company specializing in internet café management software, the company has announced. As well as taking over the controversial brand, GGF has also bought Peerialism, a small IT company with roots at Sweden's Royal Institute of Technology, which has developed a new file sharing technology. The acquisitions mean that GGF will be at the heart of 'the international digital distribution market,' allowing it to introduce a new pay model for file sharing." Reader pyzondar adds "However, the press statement also states that the deal will only go through 'if GGF and its Board of Directors can use the asset in a legal and appropriate way.'"
GNU is Not Unix

Richard Stallman Says No To Mono 1008

twitter writes "There's been a lot of fuss about mono lately. After SCO and MS suing over FAT patents, you would think avoiding anything MS would be a matter of common sense. RMS now steps into the fray to warn against a serious mistake: 'Debian's decision to include Mono in the default installation, for the sake of Tomboy which is an application written in C#, leads the community in a risky direction. It is dangerous to depend on C#, so we need to discourage its use. .... This is not to say that implementing C# is a bad thing. ... [writing and using applications in mono] is taking a gratuitous risk.'" Update: 06/27 20:22 GMT by T : Read on below for one Mono-eschewing attempt at getting the (excellent) Tomboy's functionality, via a similar program called Gnote. Update: 06/27 21:07 GMT by T: On the other side of the coin, reader im_thatoneguy writes "Jo Shields, a Mono Developer, has published an article on 'Why Mono Doesn't Suck,' why it is not a threat to FOSS, why it is desirable to developers and why it should be included in Ubuntu by default."

Comment Re:Time Warner is already doing this in Brooklyn/N (Score 1) 281

Anything from an 6to4 address typically gets routed to 192.88.99.1 (IPv4, protocol number 41), unless IPv6 is configured in a really weird way.
Since your ISP does not have their own router with the 192.88.99.1 anycast address, *all* IPv6 traffic goes through one of their peers who advertises their route to 192.88.99.1.
The actual destination IPv6 address doesn't matter (unless the destination is also a 6to4 address, in which case, the traffic is typically routed directly to the encoded IPv4 address instead of 192.88.99.1).

Comment Re:Time Warner is already doing this in Brooklyn/N (Score 3, Informative) 281

That's because you are using an IPv6 address in the 6to4 address space, not a native IPv6 address.
And according to trace, your ISP doesn't have their own 6to4 router deployed, so the traffic gets sent to whoever announces the shortest route to 192.88.99.1 route via BGP.
(192.88.99.1 is a special IP which means 'any 6to4 router')

Comment Re:Potential data recovery problems (Score 1) 196

This will only work if the drive doesn't do background 'scrubbing' to improve future write performance.
Or, even if the drive didn't erase physical Flash cells yet, it could already mangle the mapping between the logical and physical blocks.
In fact, I have a cheap CompactFlash card that does exactly that when you yank power from it while writing - the drive appears completely scrambled (with blocks reordered) when you restore power to it.

Comment Potential data recovery problems (Score 2, Interesting) 196

Something as simple as deleting the wrong partition becomes an irreversible operation if you do it using a tool that supports TRIM on TRIM-enabled hardware.
Even if you restore the partition table from a backup, you will likely suffer silent file system corruption, which may even not be apparent until it's too late.
If TRIM support is actually implemented on the device, the device is free to 'lose' data on TRIMmed blocks until they are written at least once.

Slashdot Top Deals

Refreshed by a brief blackout, I got to my feet and went next door. -- Martin Amis, _Money_

Working...