Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - In the speed vs. security battle, speed still wins (

dinscott writes: The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong security posture is mission critical.

Yet the majority of IT security personnel within large corporations are shutting off critical functionality in security applications to meet network performance demands for business applications.


Submission + - McCain Asks For Committee on Wikileaks, Anonymous (

Trailrunner7 writes: In the face of continued attacks on federal agencies and contractors such as Booz Allen Hamilton and IRC Federal that do highly sensitive security work for the U.S. government, Sen. John McCain has asked Senate leaders to appoint a select committee to look into the attacks and data leaks that have plagued Washington throughout 2011.

In a letter to Republican leader Harry Reid and Senate majority leader Mitch McConnell, McCain (R-Ariz.) said that a temporary Senate committee is necessary in order to get a handle on all of the disparate cybersecurity legislation proposals and to address the threat posed by groups such as Anonymous, LulzSec and Wikileaks.

Comment Re:That Anonymous reader works for the RIAA? (Score 2) 758

MD5 Hashes of the files is a fine way of identifying pirated music. In fact I'm pretty sure it's how most cloud services WILL do it. The real question here is how do you identify which hashes will be blacklisted? I think the best approach to that would be to go through some famous torrent and Gnutella sites and scrape the hash values from those torrent files and databases. I know torrents have a way of doing this as part of the .torrent file itself and I believe that the Gnutella protocol probably has a similar system of uniquely identifying files. This way you would not have to download all the files but could still know which ones are being shared illegally by logging all those hashes and comparing them to your files. I think it is technically feasible to do this, but extremely difficult. I would recommend cleaning your files instead by adding trash to the tags section in an unused field. This would confuse most common hash algorithms. I imagine the companies could have a much more sophisticated way of hashing the files such that it does not take tags into account, but to preform this form of unique ID the companies would have to manually download each song illegally and ID it. I don't think that's likely. I feel that cleaning your pirated files is the best solution.

Comment Re:$7 mil is nothing for corporate medical researc (Score 2) 141

I agree. $7 Million is small compared to most major drug research. The cost here was the research the matrix itself is cheap by comparison. I believe there is money to be made in this field. The ability to regrow damaged organs in particular muscle mass is vital to rehabilitation of most patients. This could cut out a lot of money spent in rehab. That's not to say rehab will be rendered unnecessary, but a large portion of time spent in rehab on rebuilding the initial muscle mass can be channeled towards increasing flexibility and endurance. In my opinion those are their largest losses in movement.
Electronic Frontier Foundation

Submission + - AISD Teacher Throws Fit Over Student's Linux CD ( 4

trrichard writes: Teacher in Austin Texas takes up and reports a student for showing his peers his Linux OS Computer and handing out Helios CD's. "Mr. Starks, I am sure you strongly believe in what you are doing but I cannot either support your efforts or allow them to happen in my classroom. At this point, I am not sure what you are doing is legal. No software is free and spreading that misconception is harmful.

These children look up to adults for guidance and discipline. I will research this as time allows and I want to assure you, if you are doing anything illegal, I will pursue charges as the law allows. Mr. Starks, I along with many others tried Linux during college and I assure you, the claims you make are grossly over-stated and hinge on falsehoods. I admire your attempts in getting computers in the hands of disadvantaged people but putting linux on these machines is holding our kids back."

Input Devices

Equatorial Mounts For Budget Astrophotography? 85

Timoris writes "With the Perseids approaching rapidly, I am looking for a good beginner's motorized equatorial mount for astrophotography. I have seen a few for $150 to $200, but apparently the motor vibrations make for poor photographs. Orion makes good mounts, but are out of my price range ($350) and the motor is sold separately, adding to the price half over again. Does anyone have any good experience with any low- or mid-priced mounts?"

EU Launches Antitrust Investigation Against IBM 135

FlorianMueller writes "The European Commission announced today that it has launched two parallel antitrust investigations into IBM's mainframe practices, following complaints lodged by T3 Technologies last year and French open source startup TurboHercules in March. EU regulators suspect an abuse of a dominant position and illegal tying of IBM's mainframe hardware to its proprietary mainframe operating system z/OS. There's even the possibility of a third case based on a complaint filed very recently by NEON, and the DoJ is also looking into this matter. IBM now finds itself in a situation previously experienced by Microsoft and Intel. This may also affect IBM's credibility when lobbying in the EU for open standards." Reader coondoggie points out a response from IBM saying that the accusations are being driven by Microsoft and other competitors.

Submission + - Is Computer Science a Dead End in the Workforce? (

snydeq writes: "Fatal Exception's Neil McAllister asks whether the need for advanced development expertise is on the decline in an era in which tools grow increasingly more advanced, and coding increasingly moves offshore. 'Few companies share Google's zeal for academic credentials when hiring new developers. Many are willing to accept self-taught programmers, particularly if they have other skills relevant to the business.' Witness Zoho's homegrown approach to recruitment, in which high school graduates are molded into programmers by way of Zoho's own curriculum. 'Many American employers are trying a similar, ground-up approach to developer education. Rather than hiring new programmers to staff software projects, they recruit internally, often tapping employees with little or no previous coding experience to transition into development roles.' The mixed state of IT education may play a factor here, but all these forces seem to suggest that the demand for computer science education in the job market is on the wane."

Submission + - NASA Hubble spots hot comet-like planet ( 1

coondoggie writes: Is it a planet or a comet? Astronomers are calling a newly explored scorched object a "cometary planet" because it has the components of a planet but with a tail like a comet. Astronomers from the University of Colorado in Boulder using NASA's Hubble Space Telescope say the planet, named HD 209458b, is orbiting so close to its star that its heated atmosphere is escaping into space, creating a tail-like appearance.

Slashdot Top Deals

Mathemeticians stand on each other's shoulders while computer scientists stand on each other's toes. -- Richard Hamming