Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Piracy

Call of Duty: Black Ops the Most Pirated Game of the Year 5

Torrentfreak reports that after calculating download frequency for pirated copies of popular video games, Call of Duty: Black Ops has won the dubious honor of being the most pirated game of 2010. The PC version of the game was torrented roughly 4,270,000 times, and the Xbox 360 version was downloaded an additional 930,000 times. (The most pirated Wii game was Super Mario Galaxy 2, and Dante's Inferno somehow managed to accrue the most downloads of Xbox 360 games.) Fortunately for Activision, the game has still made over $1 billion in sales, and its 20,000,000+ players have racked up over 600,000,000 man-hours of play time since the game's launch in early November.
Emulation (Games)

A JavaScript Gameboy Emulator, Detailed In 8 Parts 62

Two9A writes "JavaScript has shed its image of being a limited language, tied to DOM manipulation in a browser; in recent years, new engines and frameworks have given JS a reputation as a language capable of bigger things. Mix this in with the new elements of HTML5, and you have the capacity to emulate a game console or other system, with full graphical output. This series of articles looks in detail at how an emulator is written in JavaScript, using the example of the Gameboy handheld: starting at the CPU, and (as of part 8) running a copy of Tetris."
The Internet

AT&T Begins a Trial To Cap, Meter Internet Usage 421

An anonymous reader writes "On the heels of Comcast's decision to implement a 250-GB monthly cap, and Time Warner Cable's exploration of caps and overage fees, DSL Reports notes that AT&T is launching a metered billing trial of their own in Reno, Nevada. According to a filing with the FCC (PDF), AT&T's existing tiers, which range from 768 kbps to 6 Mbps, would see caps ranging from 20 GB to 150 GB per month. Users who exceed those caps would pay an additional $1 per gigabyte, per month."
Science

New Type of Particle May Have Been Found 281

An anonymous reader writes "The LHC is out of commission, but the Tevatron collider at Fermilab is still chugging along, and may have just discovered a new type of particle that would signal new physics. New Scientist reports that the Tevatron's CDF detector has found muons that seem to have been created outside of the beam pipe that confines the protons and anti-protons being smashed together. The standard model can't explain the muons, and some speculate that 'an unknown particle with a lifetime of about 20 picoseconds was produced in the collision, traveled about 1 centimeter, through the side of the beam pipe, and then decayed into muons.' The hypothetical particle even seems to have the right mass to account for one theory of dark matter."
Software

Wayland, a New X Server For Linux 487

An anonymous reader writes "Phoronix has a new article out on Wayland: A New X Server For Linux. One of Red Hat's engineers has started writing a new X11 server around today's needs and to eliminate the cruft that has been in this critical piece of free software for more than a decade. This new server is called Wayland and it is designed with newer hardware features like kernel mode-setting and a kernel memory manager for graphics. Wayland is also dramatically simpler to target for in development. A compositing manager is embedded into the Wayland server and ensures 'every frame is perfect' according to the project's leader."
Space

Cassini Could Find Signs of Life on Enceladus 126

New Scientist reviews the possibility that the Cassini probe might be repurposed to look for signs of life on Saturn's enigmatic moon Enceladus. "[Enceladus' water vapor] plume's origin is still being debated, but some models suggest the moon holds an ocean of liquid water beneath its surface. This ocean could be a potential habitat for extraterrestrial life. ... Though the probe was never designed to look for life, it could do so by studying organic chemicals such as methane in the plume, the team says."
The Internet

Air Force To Rewrite the Rules of the Internet 547

meridiangod writes "The Air Force is fed up with a seemingly endless barrage of attacks on its computer networks from stealthy adversaries whose motives and even locations are unclear. So now the service is looking to restore its advantage on the virtual battlefield by doing nothing less than the rewriting the 'laws of cyberspace.'" I'm sure that'll work out really well for them.
Image

Programming .NET 3.5 224

lamaditx writes "The world of the .NET framework is taken to the next level by the release of .NET 3.5. The intended audience of this book are experienced .NET programmers. There are no sections that tell you details about C#, SQL servers or anything like that. I don't recommend this book if you never worked on a .NET project and don't know how to set up a SQL database. You should be aware that the code is written in C#. You might use one of the software code converters if you prefer Visual Basic instead. I think the code is still readable even if you do not know C#. I appreciate the fact that the authors decided to use one language only because it keeps the book smaller. The authors assume you are using Visual Studio 2008. You don't necessarily need to update to 2008 if you are working with an older edition because you can use the free Express Edition to get started." Keep reading for the rest of Adrian's review.
Privacy

Anonymous Anger Rampant On the Web 399

the4thdimension writes "In a story that may bring out the 'duh' in you, CNN has a story about how anonymous anger is rampant on the Internet. Citing various reasons, it attempts to explain why sites like MyBiggestComplaint and Just Rage exist and why anger via the web seems to be everywhere. Various reasons include: anonymity, lack of rules, and lack of immediate consequences. Whatever the reason, they describe that online anger has resulted in real-life violence and suggest methods for parents and teens to cope with e-aggression and to learn to be aware of it." I can't figure out what makes me angrier: my habit of anonymously trolling web forums, or my video game playing.
Security

Students Learn To Write Viruses 276

snocrossgjd writes "In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers. Thomas Fynan floods a bulletin board with huge messages from fake users. Yet Joy and Fynan aren't hackers — they're students in a computer-security class at Sonoma State University. Their professor, George Ledin, has showed them how to penetrate even the best antivirus software."
Spam

Faux-CNN Spam Blitz Delivers Malicious Flash 213

CWmike writes "More than a thousand hacked Web sites are serving up fake Flash Player software to users duped into clicking on links in mail that's part of a massive spam attack masquerading as CNN.com news notifications, security researchers said today. The bogus messages, which claim to be from the CNN.com news Web site, include links to what are supposedly the day's Top 10 news stories and Top 10 news video clips from the cable network. Clicking on any of those links, however, brings up a dialog that says an incorrect version of Flash Player has been detected and that tells users they needed to update to a fake newer edition, which delivers a Trojan horse — identified by multiple names, including Cbeplay.a — that 'phones home' to a malicious server to grab and install additional malware."
Education

$12 MIT Computer Based On NES, Not Apple II 308

ericatcw writes "The $12 computer that a bunch of designers and grad students are talking up at an MIT conference this month as a potential, cheaper alternative to the One Laptop Per Child (OLPC) for Third World students is actually a knockoff of the original Nintendo Entertainment System gaming console released in the mid-1980s, reports Computerworld, and confirmed in a comment by the project's spokesman, Derek Lomas. According to Lomas' account and pictures, the Victor-70 is an 8-bit NES clone that accepts its cartridges and is wholly contained in the keyboard. It is also likely to be an unlicensed clone made in China, according to Lomas, though he notes that may not matter patent-wise in the US, due to the length of time that has passed."
Patents

IBM Granted "Paper-or-Plastic?" Patent 517

theodp writes "On Tuesday, IBM was granted US Patent No. 7,407,089 for storing a preference for paper or plastic grocery bags on customer cards and displaying a picture of said preference after a card is scanned. The invention, Big Blue explains, eliminates the 'unnecessary inconvenience for both the customer and the cashier' that results when 'Paper or Plastic?' must be asked. The patent claims also cover affixing a cute sticker of a paper or plastic bag to a customer card to indicate packaging preferences. So does this pass the 'significant technical content' test, IBM'ers?"
Censorship

Lessig Predicts Cyber 9/11 Event, Restrictive Laws 479

A number of readers are sending in links to a video from the Fortune Brainstorm Tech conference last month, in which Lawrence Lessig recounts a conversation over dinner with Richard Clarke, the former government counter-terrorism czar. Remembering that the Patriot Act was dropped on Congress just 20 days after 9/11 — the Department of Justice had had it sitting in a drawer for years — Lessig asked Clarke if DoJ had a similar proposed law, an "i-Patriot Act," to drop in the event of a "cyber-9/11." Clarke responded, "Of course they do. And Vint Cerf won't like it." Lessig's anecdote begins at about 4:30 in the video.
Security

Online Crime Seen as Growing Threat to Business, Politics 89

BobB passed us a link to a NetworkWorld article, exploring the ongoing realization in business circles of the dangers online criminals pose. The piece raises the possibility that criminal elements are gaining access to US research labs in an effort to ferret out corporate and governmental information. One institute referred to in the article states: "Economic espionage will be increasingly common as nation-states use cyber theft of data to gain economic advantage in multinational deals. The attack of choice involves targeted spear phishing with attachments, using well-researched social engineering methods to make the victim believe that an attachment comes from a trusted source." We just recently discussed possible hacker involvement in several municipal blackouts.

Slashdot Top Deals

"Ignorance is the soil in which belief in miracles grows." -- Robert G. Ingersoll

Working...