Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Linux

Submission + - Wayland 1.0 Released, Not Yet Ready To Replace X11 (phoronix.com)

An anonymous reader writes: After being talked about for four years, Wayland 1.0 was released today. The Wayland 1.0 release doesn't mark it yet as being ready for Linux desktop usage but just being API/protocol stable for future expansion. Wayland will now maintain backwards compatibility going forward, but how much longer will it take to replace X11 on the Linux desktop? Quite a while seems likely.

Submission + - US helps Sweden with its IP problems (falkvinge.net)

seezer writes: Rick FalkvingeAmong the treasure troves of recently released WikiLeaks cables, we find one whose significance has bypassed Swedish media. In short: every law proposal, every ordinance, and every governmental report hostile to the net, youth, and civil liberties here in Sweden in recent years have been commissioned by the US government and industry interests.
Emulation (Games)

A JavaScript Gameboy Emulator, Detailed In 8 Parts 62

Two9A writes "JavaScript has shed its image of being a limited language, tied to DOM manipulation in a browser; in recent years, new engines and frameworks have given JS a reputation as a language capable of bigger things. Mix this in with the new elements of HTML5, and you have the capacity to emulate a game console or other system, with full graphical output. This series of articles looks in detail at how an emulator is written in JavaScript, using the example of the Gameboy handheld: starting at the CPU, and (as of part 8) running a copy of Tetris."
Privacy

Net Users In Belarus May Soon Have To Register 89

Cwix writes "A new law proposed in Belarus would require all net users and online publications to register with the state: 'Belarus' authoritarian leader is promising to toughen regulation of the Internet and its users in an apparent effort to exert control over the last fully free medium in the former Soviet state. He told journalists that a new Internet bill, proposed Tuesday, would require the registration and identification of all online publications and of each Web user, including visitors to Internet cafes. Web service providers would have to report this information to police, courts, and special services.'"
Graphics

Intel Kills Consumer Larrabee Plans 166

An anonymous reader tips news that Intel has canceled plans for a consumer version of their long-awaited and oft-delayed Larrabee chip, opting instead to use it as a development platform product. From VentureBeat: "'Larrabee silicon and software development are behind where we had hoped to be at this point in the project,' said Nick Knuppfler, a spokesman for Intel in Santa Clara, Calif. 'Larrabee will not be a consumer product.' In other words, it’s not entirely dead. It’s mostly dead. Instead of launching the chip in the consumer market, it will make it available as a software development platform for both internal and external developers. Those developers can use it to develop software that can run in high-performance computers. But Knuppfler said that Intel will continue to work on stand-alone graphics chip designs. He said the company would have more to say about that in 2010."
PC Games (Games)

Is Cataclysm the Next World of Warcraft Expansion? 259

ajs writes "There has been no official announcement yet, but a number of moves by Blizzard Entertainment seem to indicate that the next expansion for World of Warcraft could be titled Cataclysm. Speculation began when Blizzard trademarked Cataclysm recently, and then later when a test server briefly popped up with the word 'Maelstrom' in its name. If true, the name would fall neatly into the WoW lore and expected expansion list. The Cataclysm is another name for the Great Sundering, an event that created a swirling vortex of water and mystical energies (the 'Maelstrom') that has appeared on the world map in-game since release. There are also indications that early design work included some of the islands in this area, which has long fueled anticipation of a Maelstrom-based expansion involving the former Night Elf noble, Azshara, queen of the Naga and the Goblins whose main city is in the south seas."

Comment TFA didn't tell... (Score 1) 65

Now TFA might show many things.
What it doesn't: TFG just isn't fixed at all.

There are unbefuckinglievable many ways to crash the game and even the servers crash at least once a week. The real server-crash-amount is probably only known to Stardock since everyone else doesn't try to play such a buggy game too often..

But:
Although I do think it's mostly a marketing thing, I still prefer Stardocks openness over "The problem is known and we're doing our best to fix it." type of answers which most other companies feed us with.
The Courts

Submission + - Pirate Bay trial ends in jail sentences. 1

myvirtualid writes: "The Globe and Mail reports that the Pirate Bay defendants were each sentenced Friday to one year in jail. According to the article, "Judge Tomas Norstrom told reporters that the court took into account that the site was 'commercially driven' when it made the ruling. The defendants have denied any commercial motives behind the site." The defendants said before the verdict that they would appeal if they were found guilty. "Stay calm — Nothing will happen to TPB, us personally or file sharing whatsoever. This is just a theater for the media," Mr. Sunde said Friday in a posting on social networking site Twitter."
Censorship

Chinese Subvert Censorship With a Popular Pun 272

Anonymusing writes "In spoken Chinese, 'grass-mud horse' sounds virtually identical to an obscenity (hint: it begins with "mother-") — and as a cartoon character, it has become an amazing phenomenon. Meant as a subversive attack on censors, the alpaca-like mythical creature has led to a cuddly stuffed animal — selling over 180,000 in a few weeks — and a wildly popular YouTube video with children's voices singing words that are either completely benign or incredibly offensive, depending on how you listen." Update: 03/13 09:29 GMT by T : Since this story was set up, the originally linked video seems to have been pulled. Searching YouTube reveals that there are some alternatives available, at least for now.
GNU is Not Unix

TomTom Can License FAT Without Violating the GPL 261

dp619 writes "Capped per-unit royalties make FAT licensing agreements permissible under the GPL, and SD Times has found that Microsoft's public license policy caps royalties at $250k. If the royalties are capped — as they seem to be — TomTom should be able to license FAT without violating the GPL. And if that is the case ... TomTom needs some serious explaining to do as to why they aren't licensing FAT. That said, Microsoft still needs to explain why it just cannot say that folks won't violate the GPL if they license FAT under its terms."
Privacy

ASCII Art Steganography 120

bigearcow writes "ASCII art is nothing new, but this site takes it one step further by allowing you to embed another data file within the image. The resulting ASCII art remains printable (i.e. no special unicode symbols) — this means you can print the image out, hang it on your wall, and have it look like an innocent ASCII art when it's hiding a secret document of your choice." You'll need a small (200x200 pixel max) base image from which the ASCII art will be built.
Security

Storm Worm Botnet "Cracked Wide Open" 301

Heise Security reports that a 'team of researchers from Bonn University and RWTH Aachen University have analysed the notorious Storm Worm botnet, and concluded it certainly isn't as invulnerable as it once seemed. Quite the reverse, for in theory it can be rapidly eliminated using software developed and at least partially disclosed by Georg Wicherski, Tillmann Werner, Felix Leder and Mark Schlösser. However it seems in practice the elimination process would fall foul of the law.'
Security

Researchers Hack Intel's VPro 105

snydeq writes "Security researchers from Invisible Things Lab have created software that can 'compromise the integrity' of software loaded using Intel's vPro Trusted Execution Technology, which is supposed to help protect software from being seen or tampered with by other programs on the machine. The researchers say they have created a two-stage attack, with the first stage exploiting a bug in Intel's system software. The second stage relies on a design flaw in the TXT technology itself (PDF). The researchers plan to give more details on their work at the Black Hat DC security conference next month."
Security

Cold Reboot Attacks on Disk Encryption 398

jcrouthamel writes "Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them."

Slashdot Top Deals

Is your job running? You'd better go catch it!

Working...