Forgot your password?
typodupeerror
It's funny.  Laugh.

Key EDS Witness Bought Internet Degree 258

An anonymous reader writes "EDS's key witness during the firm's court case against BSkyB was shown to have bought his degree online – but still managed to get a worse mark than a dog. Joe Galloway said he had a degree from Concordia College in the US Virgin Islands and gave detailed evidence on how he took plane journeys between the islands and attended a college there. But while questioning Galloway in court, Mark Howard QC managed to obtain exactly the same degree as Galloway from Concordia College for his dog 'Lulu' with one key difference – the dog got a higher mark."
Math

Man Uses Drake Equation To Explain Girlfriend Woes 538

artemis67 writes "A man studying in London has taken a mathematical equation that predicts the possibility of alien life in the universe to explain why he can't find a girlfriend. Peter Backus, a native of Seattle and PhD candidate and Teaching Fellow in the Department of Economics at the University of Warwick, near London, in his paper, 'Why I don't have a girlfriend: An application of the Drake Equation to love in the UK,' used math to estimate the number of potential girlfriends in the UK. In describing the paper on the university Web site he wrote 'the results are not encouraging. The probability of finding love in the UK is only about 100 times better than the probability of finding intelligent life in our galaxy.'"
Encryption

Second 3G GSM Cipher Cracked 57

Trailrunner7 writes "A group of cryptographers has developed a new attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless networks. The technique enables them to recover a full key by using a tactic known as a related-key attack, but experts say it is not the end of the world for Kasumi. Kasumi, also known as A5/3, is the standard cipher used to encrypt communications on 3G GSM networks, and it's a modified version of an older algorithm called Misty. In the abstract of their paper, the cryptographers say the attack can be implemented easily on one standard PC. 'In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 214. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full KASUMI by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity.'"

An Overview of Virtualization 119

IndioMan writes to point us to an overview of virtualization — its history, an analysis of the techniques used over the years, and a survey of Linux virtualization projects. From the article: "Virtualization is the new big thing, if 'new' can include something over four decades old. It has been used historically in a number of contexts, but a primary focus now is in the virtualization of servers and operating systems. Much like Linux, virtualization provides many options for performance, portability, and flexibility."

Vista Gets Official Release Dates 394

SlinkySausage writes "Five years, three months and five days after Windows XP made its debut, Microsoft will usher its next-generation OS onto the stage. Microsoft has set November 30 as the release date for Vista (and Office 2007) to business customers and January 30, 2007 as the date for the official launch to consumers and The World At Large."

Google Sends Legal Threats to Media Organizations 449

rm69990 writes "Google, becoming more and more concerned about the growing use of the word google as a verb, has fired off warning letters to numerous media organizations warning them against using its name as a verb. This follows google (with a lowercase g) being added to the Merriam-Webster Dictionary in June. According to a Google spokesperson: "We think it's important to make the distinction between using the word Google to describe using Google to search the internet, and using the word Google to describe searching the internet. It has some serious trademark issues.""

Britain's 400 Years of Cyber Law 225

corbettw writes "There's a news piece in The Register this morning about a British high court ruling about email signatures, and whether they constitute binding contracts. Apparently, the 1677 Statute of Frauds dictates what constitutes a contract, so an email with a disclaimer in the sig could qualify under the language of the statute. Since the statute predates the Constitution of the U.S., a clever lawyer could argue it applies here equally. Maybe there's some truth to the Internet joke 'take off every sig for great justice!'"

Under the Hood of AT&T's Monitoring System 416

pkbarbiedoll writes "The recent discovery of AT&T's monitoring program has raised more than a few eyebrows. While the class action suit filed by EFF is pending (as well as a seperate suit filed against the NSA filed by the ACLU), interested parties are taking the time to learn more about the scope of this massive invasion of privacy. Bewert examines the Narus architecture used by AT&T in their previously shadowed (and ongoing) collaboration with the NSA."

Firefox Extension Guide and More 206

Anonymous Coward writes "A comprehensive list of Firefox extensions geared for the average power user and web developer includes description and screenshots of featured extensions. Plus Firefox Hacks and keyboard command guide. Always updated with the latest Firefox extensions, and tweaks."

Cockroaches Make Group Decisions? 212

The Discovery Channel is reporting a recent study indicates that cockroaches govern themselves using simple group consultations before anything that affects the entire group. From the article: " The research determined that cockroach decision-making follows a predictable pattern that could explain group dynamics of other insects and animals, such as ants, spiders, fish and even cows. Cockroaches, Blattella Germanica, are silent creatures, save perhaps for the sound of them scurrying over a counter top. They therefore must communicate without vocalizing.

Unisys Smoking Hot Demo at Linux World Boston 178

This year's LinuxWorld Boston started off with a bang...and a fair amount of smoke. Unisys apparently had a few problems launching their first demo, as our own Robin "Roblimo" Miller reports over at Newsforge (also owned by VA Software). From the article: "Less than an hour after the show floor opened at the 2006 edition of the Boston LinuxWorld Expo today, fire alarms went off and a plume of smoke arose from the server cabinet in the Unisys display. "I knew we had a magician scheduled," said one rattled Unisys employee,"but this isn't what I expected." Indeed, this was an unexpected event. It was a real fire -- or at least a considerable smolder, complete with firemen, evacuation orders (soon rescinded), and other hoopla. Photos and a video clip included."

The Real Purpose of DRM 235

Roberto writes "Gorgeous nerd Annalee Newitz hacked a political interpretation to recent vacuum cleaner cockfights at O'Reilly's ETech: 'Hollywood corporations have finally admitted that the real reason they built digital restriction management (DRM) software into PVRs and DVD players was to stop geeks from turning their recording devices into back-alley combat machines. You haven't seen ugly until you've watched what a DVD player without DRM can do to a TiVo.' Don't try to even think of this at home."

Slashdot Top Deals

The first time, it's a KLUDGE! The second, a trick. Later, it's a well-established technique! -- Mike Broido, Intermetrics

Working...