Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Is Yahoo Stealing Identities?

An anonymous reader writes: I was shopping at and went to check out. I was offered the chance to use GoogleCheckout or YahooCheckout. I have a Google account so I used that. However instead of being checked out I was sent to a page with the YahooCheckout logo and prompted to enter all my credit card info. I was also notified that I was "registered" on (I had to give them my email). So I backed out the transaction, deleted my email from my account. I went to my Google account and found that had given itself 3rd party access rights to my account. I immediately revoke those rights and changed my Google account password.'s dns records all point to WTF is going on here?

Comment Re:Shrinks antenna not tower (Score 2) 113

As someone who has extensively built and repaired all manner of cellular(GSM, UMTS, PCN/DCS) base station antennas for a living, let me tell you straight off that this thing is not revolutionary. Perhaps they've figured out a way of doing what is already possible (small antennas everywhere) at a lower cost in terms of manufacturing and energy-consumption. But, if I understand it correctly, the antennas consume far more energy than the electronics used to process the signal. I was also led to believe that grouping dipoles into large, concentrated arrays is a more efficient way of getting a strong signal over a wide area. But don't listen to me; I'm not an RF engineer. I'm just a soldering genius who happened to work with RF engineers for a few years.

Comment Re:My toy, not yours. (Score 1) 266

but you still have to have the disk in the drive while you play. The OP wants to use the disk once and then, presumably, keep it in a locked glass cabinet for the rest of time. If any console manufacturer allowed users to do this, piracy would kill any incentive for developers to make games on that platform.

Comment Re:A scanner darkly (Score 1) 99

"But most of all, I want to see a law being passed against ever adapting VALIS to the big screen. Or, alternatively, the powers need to legalize drugs in the quantity needed to sit through and get an experience out of it."

This. VALIS would never make it to the big screen while retaining the themes and beauty of the book. However, if someone made a film of the film VALIS from the book VALIS, that might be a little bit awesome. I want to see Mother Goose's head explode.

Submission + - NASA tests hardware/software on Armadillo Rocket ( 1

porcinist writes: On June 23rd NASA successfully tested hardware and software on an Armadillo Rocket. With the end of NASA's Constellation program in sight, NASA is starting to focus on new, innovative exploration programs like Project-M. This project is meant to land a robotic humanoid on the moon in a thousand days. To meet this goal NASA teamed with Armadillo Aerospace and Draper Labs (The lab responsible for creating the original Apollo Guidance Computer) to integrate and flight test a real-time navigation system in only 7 weeks. This might be the fastest thing NASA has done in 30 years. Maybe NASA is taking Obama's new vision to heart.

Submission + - Microsoft's Health-y Patent Appetite 1

theodp writes: This week's USPTO patent application disclosures included a trifecta of scary health-related 'inventions' from Microsoft. For starters, Microsoft envisions seeing Kids Personal Health Records Fed Into Video Game, where they can be used to 'regulate and/or prescribe an individual's behavior while playing electronic games.' Next up is Centralized Healthcare Data Management, which describes how employees' health habits can be 'monitored, tracked or otherwise discovered' so employers can 'incentivize a user for an act or penalize for an omission to act.' Finally, there's Wearing Health on Your Sleeve, which describes a sort of high-tech Scarlet Letter designed to tip off 'doctors, potential dates, etc.' about your unhealthy behavior by converting information — 'number of visits to the gym, workout activities, frequency of workouts, heart rate readings, blood pressure statistics, food consumption, vitamin intake, etc.' — into a visual form so that others can see the data 'on mechanisms such as a mood ring, watch, badge, on a website etc.'

Submission + - What to do with email/password list? 3

An anonymous reader writes: For Ask Slashdot:
I just found a list of email addresses. The file seems to contain about 1 million email addresses and passwords for some of them. It seems some of the passwords are correct, I don't really want do check too much of them. My guess is some hacker was careless with this list and it landed on the internet. What should I do now? Should i report it? Did I do something illegal by downloading and checking it? Are there organizations that offer rewards for such lists and their sources? I have no idea what to do, please help! PS: sry for bad english

Google Remotely Nukes Apps From Android Phones 509

itwbennett writes "Google disclosed in a blog post on Thursday that it remotely removed two applications from Android phones that ran contrary to the terms of the Android Market. From the post: 'Recently, we became aware of two free applications built by a security researcher for research purposes. These applications intentionally misrepresented their purpose in order to encourage user downloads, but they were not designed to be used maliciously, and did not have permission to access private data — or system resources beyond permission.INTERNET. As the applications were practically useless, most users uninstalled the applications shortly after downloading them. After the researcher voluntarily removed these applications from Android Market, we decided, per the Android Market Terms of Service, to exercise our remote application removal feature on the remaining installed copies to complete the cleanup.' The blog post comes a day after security vendor SMobile Systems published a report saying that 20% of Android apps provide access to sensitive information." Update: 06/25 16:44 GMT by S : Clarified last sentence, which incorrectly suggested that 20% of Android apps were malicious. According to the report (PDF, which we discussed recently), "a majority of these applications were developed with the best of intentions and the user data will likely not be compromised.

Slashdot Top Deals

Asynchronous inputs are at the root of our race problems. -- D. Winker and F. Prosser