Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - SPAM: Satellite Abandoned In 1967 Mysteriously Comes Back Online

schwit1 writes: An American satellite abandoned in 1967 suddenly came back online and began transmitting again for the first time in 50 years.

Amateur astronomers first suspected that they’d found the satellite in 2013, but needed years to confirm that it was still occasionally transmitting. The satellite, dubbed LES1, was built by the Massachusetts Institute of Technology (MIT) and launched into space in 1965.

A mistake in the satellite’s circuitry caused it to never leave its circular orbit, and it eventually stop transmitting in 1967. The satellite’s signal now fluctuates widely in strength, meaning that it’s likely only transmitting when its solar panels are in direct sunlight. Scientists expect that the satellite’s onboard batteries have disintegrated.

Link to Original Source

Comment No Way (Score 1) 40

In no way is this a good idea. No software is perfect, doubly so for security software. That includes the microcode this hardware is based on. Go ahead, implement it in hardware, which by definition cannot be upgraded or patched. Soon enough someone will find a vulnerability, and then an exploit, and there's nothing you can do to mitigate it beyond just buying newer hardware.

Submission + - Groundbreaking Paper on arXiv derives Gravity from Holographic Principle (arxiv.org)

vikingpower writes: Dutch prodigy and Amsterdam University Professor Erik Verlinde published a paper on arXiv, yesterday November 7, titled "Emergent Gravity and the Dark Universe". In the paper, Verlinde derives gravity from the so-called Holographic Principle, which — simply put — states that gravity emerges from the interplay between and entropy re-arrangement of sub-atomic "strings" that live in a negatively curved space-time. At that level, "...spacetime and gravity are emergent from an underlying microscopic description in which they have no a priori meaning" . Most importantly, Verlinde's paper has as a consequence that Dark Matter, nemesis of many an astronomer, is nothing more than an illusion. Verlinde, who was awarded the Dutch national Spinoza science prize in the recent past, already completed the tour de force of deriving Newtonian gravity from the same principles in a 2010 paper, also on arXiv. We are probably looking at Nobel-prize material here, as Verlinde is acknowledged by his peers to "go one better than Einstein's General Theory of Relativity".

Submission + - NSA Front Equation Group May In Fact Be Russian (blogspot.com)

badger.foo writes: The well-known NSA front or hackers-for-hire The Equation Group may in fact be Russian, or at least operating out of a 'forward base' close to Russian networks, if Peter Hansteen reads subtle hints in the recent Shadow Brokers data dump correctly. The clue: Several Russian hosts identified by RFC1918 local net addresses. You can read the whole story, with links to the data, here.

Submission + - The City That Was Saved By the Internet

Jason Koebler writes: At a time when small cities, towns, and rural areas are seeing an exodus of young people to large cities and a precipitous decline in solidly middle class jobs, Chattanooga's government-built fiber network has helped it thrive and create a new identity for itself.

Chattanooga's success is beginning to open eyes around the country: If we start treating the internet not as a product sold by a company but as a necessary utility, can the economic prospects of rural America be saved?

Submission + - SPAM: AT&T Is Spying on Americans for Profit, New Documents Reveal

schwit1 writes: The telecom giant is doing NSA-style work for law enforcement—without a warrant—and earning millions of dollars a year from taxpayers.

Hemisphere isn’t a “partnership” but rather a product AT&T developed, marketed, and sold at a cost of millions of dollars per year to taxpayers. No warrant is required to make use of the company’s massive trove of data, according to AT&T documents, only a promise from law enforcement to not disclose Hemisphere if an investigation using it becomes public.

Hemisphere is used far beyond the war on drugs to include everything from investigations of homicide to Medicaid fraud.

Link to Original Source

Submission + - Rowhammer Attack Can Now Root Android Devices (softpedia.com)

An anonymous reader writes: Researchers have discovered a method to use the Rowhammer RAM attack for rooting Android devices. For their research paper, called Drammer: Deterministic Rowhammer Attacks on Mobile Platforms, researchers tested and found multiple smartphone models to be vulnerable to their attack.

The list includes LG Nexus (4, 5, 5X), LG G4, Motorola Moto G (2013 and 2014), One Plus One, HTC Desire 510, Lenovo K3 Note, Xiaomi Mi 4i, and Samsung Galaxy (S4, S5, and S6) devices. Researchers estimate that millions of Android users might be vulnerable. The research team says the Drammer attack has far more wide-reaching implications than just Android, being able to exploit any device running on ARM chips.

In the past, researchers have tested the Rowhammer attack against DDR3 and DDR4 memory cards, weaponized it via JavaScript, took over PCs via Microsoft Edge, and hijacked Linux virtual machines. There's an app to test if your phone is vulnerable to this attack.

Submission + - Clinton Foundation works with Big Pharma to keep the price of US AIDS drugs high (reddit.com)

Okian Warrior writes: A newly released Podesta E-mail explains how the Clinton Health Access Initiative (CHAI) works to keep the price of AIDS medicines high in the US.

CHAI contracted with Big Pharma companies for AIDS drugs to be distributed in developing countries. In return, the group agreed to resist efforts to bring similarly lower cost and generic drugs to the US.

The email is a reaction to "comments President Clinton made on lowering domestic AIDS drugs prices at the World AIDS day event":

We have always told the drug companies that we would not pressure them and create a slippery slope where prices they negotiate with us for poor countries would inevitably lead to similar prices in rich countries.

[...] If we do try to do something in this area, we suggest that we approach the innovator companies that can currently sell products in the US with the idea of making donations to help clear the ADAP lists. For a variety of reasons, the companies will likely favor a donation approach rather than one that erodes prices across the board.

[...] I would guess that they would also likely favor a solution that involved their drugs rather than an approach that allowed generic drugs from India to flood the US market at low prices or one that set a precedent of waiving patent laws on drugs. ... We can go to war with the US drug companies if President Clinton would like to do so, but we would not suggest it.


Submission + - 'Calibration error' changes GOP votes to Dem in Illinois (foxnews.com) 1

Okian Warrior writes: Early voting in Illinois got off to a rocky start Monday, as votes being cast for Republican candidates were transformed into votes for Democrats.

Republican state representative candidate Jim Moynihan: “I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”

The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.

Submission + - "Most serious" Linux privilege-escalation bug ever is under active exploit (arstechnica.com)

operator_error writes: Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

By Dan Goodin — 10/20/2016

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

Submission + - ICANN recommends TLDs like .txt -- and .exe (icann.org) 1

fyngyrz writes: ICANN says, in part:

Given preliminary feedback that there is not a technical need to prevent file extensions as TLDs, as well as the lack of an authoritative source of common file extensions to draw from, staff determined that it is not workable to prevent common file extensions from being used as TLDs.

To summarize, it is the recommendation of the ICANN technical staff to allow applications for TLD strings that may also be commonly used for file extensions.

But will ICANN approve such applications? If so, we can all look forward to opportunities to click on...

http://iamnotavirus-wink.exe

Submission + - Filmmaker Arrested At Pipeline Protest Facing 45 Years In Felony Charges (huffingtonpost.com)

walterbyrd writes: The lengths that the oil industry, and their puppet politicians, will go to suppress information is amazing. 45 years is way more than most people get for murder.

Deia Schlosberg, the producer of the upcoming documentary “How to Let Go of the World and Love All Things Climate Can’t Change,” was detained while filming a protest against TransCanada’s Keystone Pipeline in Walhalla, North Dakota. Activists at the event, associated with the group Climate Direct Action, shut down the pipeline, which carries oil from Canadian tar sands to the U.S, for about seven hours.

Submission + - Strange New World: Samba Server running on Windows ! (samba.org) 1

Jeremy Allison - Sam writes: "Do you know what this is? This is a non-Windows SMB file server running natively on Windows."

"To be more specific, this is a Virtualbox Ubuntu virtual machine running on Windows 10, grabbing a file across SMB from a Samba file server running inside the Windows Subsystem for Linux through Bash."

Submission + - SPAM: John Podesta's Password Found in WikiLeaks Dump

Okian Warrior writes: Unauthorized users appear to have accessed Hillary Clinton Campaign Chairman John Podesta’s various accounts after an email containing his Apple ID and password was found within the recent WikiLeaks email release.

One user is alleged to have remotely erased Podesta’s iPhone . Another user tagged WikiLeaks editor Julian Assange in a Twitter post along with various screenshots of Podesta’s Apple account and the comment: “You are going to be getting some interesting information shortly.”

Link to Original Source

Slashdot Top Deals

Stupidity, like virtue, is its own reward.

Working...