Forgot your password?
typodupeerror
Security

A Flood of Stable Linux Kernels Released 105

Julie188 writes "Greg Kroah-Hartman has released five new stable Linux kernels, correcting minor errors of their predecessors and including improvements which are unlikely to generate new errors. As so often with kernel versions in the stable series, it remains undisclosed if the new versions contain changes which fix security vulnerabilities, although the number of changes and some of the descriptions of those changes certainly suggest that all the new versions contain security fixes."
The Media

Comcast Seeking Control of Both Pipes and Content? 241

techmuse writes "Reuters reports that Comcast may be attempting to use its huge cash reserves to purchase a large media content provider, such as Disney, Viacom, or Time Warner. This would result in Comcast controlling both the delivery mechanism for content, and the content itself. Potentially, it could limit access to content it owns to subscribers to its own services, thus shutting out competing services (where they still exist at all)."

Lucene and SOLR Get Commercial Support 47

ruphus13 writes "Two of the technical leads and core committers of the Lucene Project have launched Lucid Imagination, a venture backed company now offering commercial versions of Lucene and SOLR in the hopes of making it the de facto choice of search technologies used by companies within their products. 'The Lucene search library ranks amongst the top 5 Apache projects, installed at over 4,000 global companies. Although OStatic is primarily Drupal-based, our site's search is based on Lucene. According to Lucid Imagination officials, the Solr search server, which transforms the Lucene search library into a ready-to-use search platform for building applications, is the fastest growing Lucene sub-project...Lucid's business model is roughly comparable to Red Hat's very successful model, in that it centers on support and services for free, open source software.'"
Security

Building a Better CAPTCHA 197

jcatcw writes "Steven J. Vaughan-Nichols reports that CAPTCHA cracking isn't that difficult these days. It has even become a business. For example, DeCaptcher.com will solve CAPTCHAs for your spamming needs at a rate of $2 per 1,000 successfully cracked CAPTCHAs. In response, newer systems are in development. Both Carnegie Mellon and Penn State (is there something about the water in PA?) are working on image-based systems. ESP-PIX and SQ-PIX both require the viewer to interpret pictures. Imagination CAPTCHA from Penn has the user find the center of an image. The idea is that humans are better at image recognition that computers, but humans can legitimately disagree on their interpretations and some humans are color blind. Problems remain. For now, sites would be well advised to look at reCAPTCHA — the system that works with Google Books and the Internet Archive to digitize printed texts — which comes with a wide variety of application and programming plug-ins and an open API."

Nvidia 480-Core Graphics Card Approaches 2 Teraflops 261

An anonymous reader writes "At CES, Nvidia has announced a graphics card with 480 cores that can crank up performance to reach close to 2 teraflops. The company's GTX 295 graphics cards has two GPUs with 240 cores each that can execute graphics and other computing tasks like video processing. The card delivers 1.788 teraflops of performance, which Nvidia claims is the fastest single graphics card in the market."
Censorship

IWF Backs Down On Wiki Censorship 226

jonbryce writes "The Internet Watch Foundation, guardians of the Great Firewall of Britain, have stopped censoring Wikipedia for hosting what they considered to be a child porn image. They had previously threatened to block Amazon for hosting the same image." Here is the IWF's statement, which credits the Streisand Effect for opening their eyes: "...in light of the length of time the image has existed and its wide availability, the decision has been taken to remove this webpage from our list. Any further reported instances of this image which are hosted abroad, will not be added to the list. ... IWF's overriding objective is to minimize the availability of indecent images of children on the internet, however, on this occasion our efforts have had the opposite effect."
Microsoft

Microsoft Woos Developers Under the Silverlight 300

CWmike writes to tell us that with the impending release of their Silverlight 2.0 product, Microsoft is poised to enact the next phase of their plan, wooing developers and designers directly. Microsoft is funding a French open-source project designed to allow programmers to utilize the Eclipse framework to build Silverlight apps. "Microsoft is also releasing for free a set of programming templates called the Silverlight Control Pack under its Microsoft Permissive License, as well as the technical specification for Silverlight's Extensible Application Markup Language (XAML) vocabulary via Microsoft's Open Specification Promise. The latter, said Goldfarb, should make it easier for would-be Silverlight developers."

Comment tools not reusable (Score 1) 118

For the folks who are planning to re-use those tools to analyze botnets, they should think again. The botnet "controller" usually DDoS the monitoring machine. They would also observe their bots for consistency. Moreover, they would keep changing the protocol making it difficult for people to construct clients to connect to those IRC channels.

Slashdot Top Deals

"But what we need to know is, do people want nasally-insertable computers?"

Working...