Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Important to note (Score 1) 446

...important to note that this is a Schedule I compound?

It's probably also worth noting that marijuana is also a schedule 1 drug, due to its "high potential for abuse", "no currently accepted medical use in the U.S.", and "potentially severe psychological or physical dependence".

NOTE: Tetrahydrocannabinol (THC, marijuana) is still considered a Schedule 1 drug by the DEA, even though some U.S. states have legalized marijuana for personal, recreational use or for medical use.

Security

Submission + - Nokia Seems To Be Hijacking Traffic On Some Of Its Phones, Including HTTPS

An anonymous reader writes: On Wednesday, security professional Gaurang Pandya outlined how Nokia is hijacking Internet browsing traffic on some of its phones. As a result, the company technically has access to all your Internet content, including sensitive data that is sent over secure connections (HTTPS), such as banking credentials and pretty much any other usernames and passwords you use to login to services on the Internet. Last month, Pandya noted his Nokia phone (an Asha 302) was forcing traffic through a proxy, instead of directly hitting the requested server. The connections are either redirected to Nokia/Ovi proxy servers if the Nokia browser is used, and to Opera proxy servers if the Opera Mini browser is used (both apps use the same User-Agent).
Botnet

Kelihos Botnet Comes Back To Life 97

angry tapir writes "A botnet that was crippled by Microsoft and Kaspersky Lab last September is spamming once again and experts have no recourse to stop it. The Kelihos botnet only infected 45,000 or so computers but managed to send out nearly 4 billion spam messages a day, promoting, among other things, pornography, illegal pharmaceuticals and stock scams. But it was temporarily corralled last September after researchers used various technical means to get the 45,000 or so infected computers to communicate with a "sinkhole," or a computer they controlled."
The Almighty Buck

US Research Open Access In Peril 237

luceth writes "Several years ago, the U.S. National Institutes of Health instituted a policy whereby publications whose research was supported by federal funds were to be made freely accessible a year after publication. The rationale was that the public paid for the research in the first place. This policy is now threatened by legislation introduced by, you guessed it, a Congresswoman who is the largest recipient of campaign contributions from the scientific publishing industry. The full text of the bill, H.R. 3699, is available online."

Comment Re:The invisible hand of captialism (Score 2) 300

3) My guess is that these execs are M&A (Mergers and Acquisition) specialists. They were likely specifically bought in to engineer something like this. So they've done their job and they'll move on to the next.

Doesn't look that way, but I agree on all of your other points.

The departures included David Gurle, vice president and general manager for Skype for Business; Don Albert, vice president and general manager for the Americas and Advertising; Doug Bewsher, chief marketing officer; Christopher Dean, head of consumer market business development; Russ Shaw, vice president and general manager; and Anne Gillespie, head of human resources. Two executives who joined Skype following its acquisition earlier this year of video-sharing utility Qik have also left. They are Qik founder Ramu Sunkara and senior vice president Allyson Campa.

Comment Re:Uh, unless you're a programmer... (Score 2) 766

RedHat Enterprise Linux 1, 2, 3 & 4 - all gone

Except that RHEL3 is still supported in its extended life cycle phase until October 31, 2013, and RHEL4 doesn't reach the end of its regular life cycle until February 29, 2012 - and then is in extended life cycle phase until February 28, 2015

Red Hat Enterprise Linux Life Cycle

Every major release of Red Hat Enterprise Linux is maintained and supported independently during the 10 year Life Cycle

But yeah - RHEL 2.1 reached EOL in mid-2009, so you're right about that - gone. There was no such thing as Red Hat Enterprise Linux 1, though.

Security

Security Researcher Kaminsky Pushes DNS Patching 57

BobB-nw writes "Dan Kaminsky, who for years was ambivalent about securing DNS, has become an ardent supporter of DNS Security Extensions. Speaking at the Black Hat DC 2009 conference Thursday, the prominent security researcher told the audience that the lack of DNS security not only makes the Internet vulnerable, but is also crippling the scalability of important security technologies. 'DNS is pretty much our only way to scale systems across organizational boundaries, and because it is insecure it's infecting everything else that uses' DNS, the fundamental Internet protocol that provides an IP address for a given domain name, said Kaminsky, director of penetration testing at IOActive. 'The only group that has actually avoided DNS because it's insecure are security technologies, and therefore those technologies aren't scaling.'"
Databases

Setting Up a Home Dev/Testing Environment? 136

An anonymous reader writes "I'm a Project Manager (hold the remarks) who recently decided that I want/need to get my dev skills more up-to-date, as more projects are looking for their PM's to be hands-on with the development. Looking around my house, I have quite the collection of older (read: real old — it's been a while) PCs — it's pretty much a PC graveyard. Nothing that would really help me set up a nice dev infrastructure for developing web/database apps. So, my question is as follows: Should I buy a number of cheaper PC's, or should I buy one monster machine and leverage (pick your favorite) virtual machine technology?"

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (9) Dammit, little-endian systems *are* more consistent!

Working...