Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Data Storage

A Walk Through the Hard Drive Recovery Process 238

Fields writes "It's well known that failed hard drives can be recovered, but few people actually use a recovery service because they're expensive and not always successful. Even fewer people ever get any insights into the process, as recovery companies are secretive about their methods and rarely reveal any more information that is necessary for billing. Geek.com has an article walking through a drive recovery handled by DriveSavers. The recovery team did not give away many secrets, but they did reveal a number of insights into the process. From the article, "'[M]y drive failed in about every way you can imagine. It had electro-mechanical failure resulting in severe media damage. Seagate considered it dead, but I didn't give up. It's actually pretty amazing that they were able to recover nearly all of the data. Of course, they had to do some rebuilding, but that's what you expect when you send it to the ER for hard drives.'" Be sure to visit the Museum of Disk-asters, too.
Science

Nanotubes Form The Darkest Material Yet Created 324

toxcspdrmn writes "Bad news for Spinal Tap fans. The BBC reports that researchers at Rensselaer Polytechnic Institute in Troy, New York, have produced the darkest known material by manufacturing "forests" of carbon nanotubes. This forms a surface that absorbs or scatters 99.9% of all incidental light."
Security

The World's Biggest Botnets 243

ancientribe writes "There's a new peer-to-peer based botnet emerging that could blow the notorious Storm away in size and sophistication, according to researchers, and it's a direct result of how Storm has changed the botnet game, with more powerful and wily botnets on the horizon. This article provides a peek at the 'new Storm' and reveals the three biggest botnets in the world (including Storm) — and what makes them tick and what they are after."
PC Games (Games)

Another Man Dies After Marathon Gaming Session 486

loserMcloser writes "Another Chinese man has died after spending three days in an internet cafe for an online gaming marathon session. He apparently fainted and died at the cafe from exhaustion. 'The report did not say what the man, whose name was not given, was playing. The report said that about 100 other Web surfers "left the cafe in fear after witnessing the man's death."'"
Security

Submission + - Explosion on the CERN due to mathematical mistakes

javipas writes: "The Large Hadron Collider at the CERN has suffered a big explosion deep inside that has caused a leak of hellium gas and the quick evacuation of everyone working there. The reason: a mathematical mistake that affected the design of the giant superconductive magnets made by Fermilab. Now the company will have to repair and upgrade the 24 magnets that are installed on the 27 km. circunference of one of the most important research centers on Earth."
United States

Submission + - Daylight Saving change: no power savings

Brett writes: Results from energy companies are coming in, and the word is that moving Daylight Saving Time forward three weeks had "no measurable impact" on power consumption. The attempt by the US Congress to make it look like they were doing something about the US energy crisis has been exposed as the waste it is, but the new DST is probably here to stay. Letting the bill expire would mean re-patching a lot of systems again next year. So much for saving energy.
Security

Submission + - Breaking 104 bit WEP in less then 60 Seconds

collin.m writes: "Erik Tews with the help of two others published a new attack on WEP called: Breaking 104 bit WEP in less then 60 Seconds.

Like the older attacks on WEP this attack uses sniffed IVs in order to break/compute/crack the WEP key. The nice thing about this attack is that it only needs between 40.000 and 85.000 unique IVs (older attacks needed between 250.000 and 1.000.000 in order to succeed). This all ready reduces the overall attack time since one needs to capture less packages. But the attack also uses a new/other attack on RC4 that further improves the speed. The paper gives an average of 3 seconds (crack time) on 1.7Ghz Pentium-M. The attack even works with 5000 keys so it should be usable on a PDA or SmartPhone.

Paper
The Tool and more Information"

Feed Net Effect Of Energy-Saving Early Switch To Daylight Savings Time: Nothing (techdirt.com)

While the early switch to daylight savings didn't cause many real problems, it was something of a nuisance. Part of the supposed rationale for the early switch -- in addition to reduced crime, less traffic accidents and increased economic activity was to save energy, because there will be more light in the evening and people will use less lighting. Of course, there's less light in the morning, so people's power needs then will increase. So what was the end effect of this early shift? Essentially nothing, as several large utilities say they haven't seen any noticeable change in their customers' power consumption. But don't let that detract from the warm, fuzzy feeling you get knowing American politicians are serious in their hunt for ways to conserve energy.

How to Become Invisible 336

mdm42 writes "Looks like a theoretical physicist at St. Andrews University in Scotland believes that invisibility may be possible. And its not going to be a potion or a cloak, but will come in the form of a device. " Let's just hope that when the invisible woman arrives, she's played more convincingly than Jessica Alba.

Using Laptops to Steal Cars 455

Ant writes "Thieves are using laptops/notebooks to steal the most expensive luxury cars. Many of these cars have completely keyless ignitions and door locks, meaning it can all be done wirelessly. Thieves often follow a car until it gets left in a quiet area, and they can steal it in about 20 minutes..."

Slashdot Top Deals

"Survey says..." -- Richard Dawson, weenie, on "Family Feud"

Working...