Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Security

Gaining Root Access On Linux-Based Femtocells 102

viralMeme writes "According to the Register, 'Security researchers have turned their attention to femtocells, and have discovered that gaining root on the tiny mobile base stations isn't as hard as one might hope.' One of the researchers said, 'After hours of sniffing traffic, changing IP address ranges, guessing passwords and investigating hardware pinouts, we had obtained root access on these Linux-based cellular-based devices, which piqued our curiosity [about] the security implications.' Whoever designed these devices should be sent back to computer school. An authentication device that can be bypassed is a contradiction in terms. Or, as some pen-pusher would put it in a report: an unantipicated security excursion.
Graphics

Microsoft Wants To Participate In SVG Development 292

rossendryv writes "After many years of fighting against the standard, Microsoft announced they are joining the WC3's SVG working group to help with the development of SVG. 'We recognize that vector graphics are an important component of the next-generation Web platform,' said Patrick Dengler, senior program manager on Microsoft's Internet Explorer team in a blog post."
Programming

Do Your Developers Have Local Admin Rights? 605

plover writes "I work as a developer for a Very Large American Corporation. We are not an IT company, but have a large IT organization that does a lot of internal development. In my area, we do Windows development, which includes writing and maintaining code for various services and executables. A few years ago the Info Security group removed local administrator rights from most accounts and machines, but our area was granted exceptions for developers. My question is: do other developers in other large companies have local admin rights to their development environment? If not, how do you handle tasks like debugging, testing installations, or installing updated development tools that aren't a part of the standard corporate workstation?"
Linux

Happy Birthday, Linus 376

Glyn Moody writes "Today is the birthday of Linus. Just under 19 years ago, on the first day the shops in Helsinki were open after the holidays, Linus rushed out and spent all his Christmas and birthday money on his first PC: a DX33 80386, with 4 Megs of RAM, no co-processor, and a 40 Megabyte hard disc. Today, the kernel he wrote on that system powers 90% of the fastest supercomputers, and is starting to find its way into more and more smartphones — not to mention everything in between. What would the world look like had he spent his money on something else?"
Medicine

Poorer Children More Likely To Get Antipsychotics 334

krou writes "A new study by a team from Rutgers and Columbia has discovered that poorer children are more likely to be given powerful antipsychotic drugs. According to the NY Times (login required), 'children covered by Medicaid are given powerful antipsychotic medicines at a rate four times higher than children whose parents have private insurance. And the Medicaid children are more likely to receive the drugs for less severe conditions than their middle-class counterparts.' It raises the question: 'Do too many children from poor families receive powerful psychiatric drugs not because they actually need them — but because it is deemed the most efficient and cost-effective way to control problems that may be handled much differently for middle-class children?' Two possible explanations are offered: 'insurance reimbursements, as Medicaid often pays much less for counseling and therapy than private insurers do,' and because of 'the challenges that families in poverty may have in consistently attending counseling or therapy sessions, even when such help is available.' The study is due to be published next year in the journal Health Affairs." The full article is available behind a paywall from the first link. The lead author of the study said he "did not have clear evidence to form an opinion on whether or not children on Medicaid were being overtreated."
Science

Fish Can Count to Four 103

Khemist writes "Fish can count, according to scientists, who have found that North American mosquito fish have the ability to count up to four. Previously it was known that fish could tell big shoals from small ones, but researchers have now found that they have a limited ability to count how many other fish are nearby. This means that they have similar counting abilities to those observed in apes, monkeys and dolphins and humans with very limited mathematical ability."
Security

Cold Reboot Attacks on Disk Encryption 398

jcrouthamel writes "Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them."
The Internet

Internet "Creates Pedophiles" According to "Expert" 548

Brian Ribbon writes "In the latest sensationalist article about pedophiles on the internet, the director of a Spanish vigilante organization has claimed that the internet 'creates pedophiles'. While conflating pedophilia with child sexual abuse, the 'expert' quoted in the article incorrectly states that 'studies show that some pedophiles feel attracted to children from an early age, but the majority of them develop the tendency later on'; he then claims that 'the internet can become a catalyst for people belonging to the latter group.'"
IBM

Cell Hits 45nm, PS3 Price Drop Likely to Follow 298

Septimus writes "At this weeks ISSCC, IBM announced that the Cell CPU used in the PlayStation 3 will soon make the transition to IBM's next-gen 45nm high-k process. 'The 45nm Cell will use about 40 percent less power than its 65nm predecessor, and its die area will be reduced by 34 percent. The greatly reduced power budget will cut down on the amount of active cooling required by the console, which in turn will make it cheaper to produce and more reliable (this means fewer warrantied returns). Also affecting Sony's per-unit cost is the reduction in overall die size. A smaller die means a smaller, cheaper package; it also means that yields will be better and that each chip will cost less overall.'"
Supercomputing

One Computer to Rule Them All 288

An anonymous reader writes "IBM has published a research paper describing an initiative called Project Kittyhawk, aimed at building "a global-scale shared computer capable of hosting the entire Internet as an application." Nicholas Carr describes the paper with the words "Forget Thomas Watson's apocryphal remark that the world may need only five computers. Maybe it needs just one." Here is the original paper."
Biotech

Three Parents Contribute to Experimental Human Embryo 136

gihan_ripper writes "It sounds like the storyline from a cheesy film, but a human embryo has been created using the genetic material from one man and two women. A team from Newcastle University, England, developed the technique in the hope that it could be used to prevent diseases caused by faulty mitochondria. Their experiment started with two ingredients: first, a left over (and 'severely abnormal') embryo from an IVF treatment; second, a donor egg from another woman. The donor egg has all but the mitochondrial DNA removed, then a nucleus from the embryo is inserted into the egg. Effectively, this results in a mitochondria transplant. 'While any baby born through this method would have genetic elements from three people, the nuclear DNA that influences appearance and other characteristics would not come from the woman providing the donor egg. However, the team only have permission to carry out the lab experiments and as yet this would not be allowed to be offered as a treatment.'"
Businesses

Dell's Linux, IT Re-Invention 132

jcatcw writes "An IDG analysis of Dell's attempts to reinvent itself concludes that there are some positive results, but there are problems with the company's supply-chain management and support. One area analysts want to see more improvement: the company's Linux business. 'Jeremy Cole, owner of Proven Scaling, a small consulting firm with offices in the US and UK ... is satisfied with Dell equipment, but said the company needs to show more support for open-source applications and the Linux OS. "It's clear that Dell cares about Linux, in that all their server-class hardware is well-supported by the Linux kernel and they have many people dedicated to making sure that's the case. However, it's not good enough just to boot," Cole said.'"
The Courts

Opera Files EU Complaint Against Microsoft 455

A number of readers have sent word about Opera Software ASA's antitrust complaint against Microsoft filed with the EU. Here is Opera's press release on the filing. The company wants the EU to "obligate Microsoft to unbundle Internet Explorer from Windows and/or carry alternative browsers pre-installed on the desktop" and to "require Microsoft to follow fundamental and open Web standards accepted by the Web-authoring communities." The latter request makes this a case to watch. Will the Commissioner take the Acid2 test using IE7?

Slashdot Top Deals

Adapt. Enjoy. Survive.

Working...