Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Even if they were ranked #1... (Score 1) 201

I'm with AT&T, I have an iPhone 4 (bought used), and I don't have a data plan. I switched my voice plan to a GoPhone account. I add money to my account whenever I want and then I'm charged $0.10/min. for voice calls and $5/month/200 text messages. They won't let me use pay-as-you-go data on an iPhone even if I want to. I haven't worked it out exactly, but my bill went from ~$65/month to more like $25/month at most.
Security

Self-Destructing USB Stick 223

Hugh Pickens writes "PC World reports that Victorinox, maker of the legendary Swiss Army Knife, has launched a new super-secure memory stick that sounds like something out of Mission: Impossible. The Secure Pro USB comes in 8GB, 16GB, and 32GB sizes, and provides a variety of security measures including fingerprint identification, a thermal sensor, and even a self-destruct mechanism. Victorinox says the Secure is 'the most secure [device] of its kind available to the public.' The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.' While offering no explanation how the self-destruct mechanism works, Victorinox says that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that 'irrevocably burns [the Secure's] CPU and memory chip.' At a contest held in London, Victorinox put its money where its mouth was and put the Secure Pro to the test offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."
Apple

Opera For iPhone To Test Apple's Resolve 292

Barence writes "Opera is launching a version of its Mini browser for the iPhone in what could prove a landmark decision for Apple's app gatekeepers. Apple has been traditionally hostile to rival browsers, with Mozilla claiming that Apple made it 'too hard' for its rivals to develop a browser for the iPhone. However, Opera remains bullishly confident that its app will be approved. 'We have not submitted Opera Mini to the Apple App store,' an Opera spokesperson told PC Pro. 'However, we hope that Apple will not deny their users a choice in web browsing experience.'" I can't imagine what would motivate them to do that.
Cellphones

With New SDK, VoIP Over 3G Apps Now Working On iPhone 171

silverpig writes "Yesterday marked the announcement of the Apple iPad device, and with it came a new version of the SDK. In this new version, Apple has lifted the VoIP over 3G restrictions that limited VoIP traffic to wifi only. This morning, Fring announced that its iPhone app is 3G-capable starting immediately. No update is needed as apparently the app had 3G capability all along, but a server-side block prevented its use. Furthermore, apparently a 3G-capable version of Skype has been ready for some time now, and has been waiting for this restriction to be lifted."
Security

Could Cyber-Terrorists Provoke Nuclear Attacks? 183

Hugh Pickens writes "The Guardian reports that according to a study commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND), a joint initiative of the Australian and Japanese Governments, terrorists could use information warfare techniques to make a nuclear attack more likely — triggering a catastrophic chain of events that may be an easier alternative 'than building or acquiring a nuclear weapon or dirty bomb themselves.' While the possibility of a radical group gaining access to actual launch systems is remote, the study suggests that terrorists could focus on feeding in false information further down the chain — or spreading fake information to officials in a carefully orchestrated strike. According to the study 'Hacking Nuclear Command and Control' [PDF], cyber-terrorists could 'provoke a nuclear launch by spoofing early warning and identification systems or by degrading communications networks.' Since command and control systems are placed at a higher degree of exploitation due to the need for rapid decisions under high pressure with limited intelligence, cyber-terrorists 'would not need deception that could stand up over time; they would only need to be believable in the first 15 minutes or so.'"
Networking

Best Tools For Network Inventory Management? 251

jra writes "Once every month or so, people ask here about backups, network management, and so on, but one topic I don't see come up too often is network inventory management — machines, serial numbers, license keys, user assignments, IP addresses, and the like. This level of tracking is starting to get out of hand in my facility as we approach 100 workstations and 40 servers, and I'm looking for something to automate it. I'm using RT (because I'm not a good enough Web coder to replace it, not because I especially like it) and Nagios 3. I've looked at Asset Tracker, but it seems too much like a toolkit for building things to do the job, and I don't want my ticket tracking users to have to be hackers (having to specify a URL for an asset is too hackish for my crew). I'd prefer something standalone, so I don't have to dump RT or Nagios, but if something sufficiently good looking comes by, I'd consider it. I'd like to be able to hack a bit here and there, if I must. Perl and Python, along with C, are the preferred implementation languages; least favorite is Java. Anyone care to share their firsthand experiences with this topic, and what tools they use (or built) to deal with it? "
Businesses

Why New Systems Fail 140

bfwebster writes "Over the last forty years, a small set of classic works on risks and pitfalls in software engineering and IT project management have been published and remained in print. The authors are well known, or should be: Gerry Weinberg, Fred Brooks, Ed Yourdon, Capers Jones, Stephen Flowers, Robert Glass, Tom DeMarco, Tim Lister, Steve McConnell, Steve Maguire, and so on. These books all focus largely on projects where actual software development is going on. A new book by Phil Simon, Why New Systems Fail, is likewise a risks-and-pitfalls book, but Simon covers largely uncharted territory for the genre: selection and implementation of enterprise-level, customizable, off-the-shelf (COTS) software packages, such as accounting systems, human resource systems, and enterprise resource planning (ERP) software. As such, Simon's book is not only useful, it is important." Read on for the rest of Bruce's thoughts on this book.

Comment Re:Lots have failed, but some have succeeded (Score 1) 362

Charter does it in Missouri too. You can "opt-out", but in that case it redirects you to a Charter server that serves up a copy of IE's DNS error page -- no matter which browser you're using. It even references the local images that IE would use so the images on the error page are broken when using Firefox.
Security

Central Anti-Virus For Small Business? 359

rduke15 writes "I'm trying to find a centrally managed anti-virus solution for a small business network, which has around 20 Windows XP machines with a Linux server. It is too big to manage each client manually. However, there is no no full-time IT person on site, and no Windows Active Directory server — just Linux with Samba. And the current solution with Symantec Endpoint Protection seems too expensive, and too complex for such a simple need. On the Linux server side, email is handled by amavisd and ClamAV. But the WinXP clients still need a real-time anti-virus for the USB disks they may bring to work, or stuff they download from their personal webmail or other sites. I'm wondering what others may be using in similar situations, and how satisfied they are with it."
The Military

Mariners Develop High Tech Pirate Repellents 830

Hugh Pickens writes "NPR reports that owners of ships that ply the dangerous waters near Somalia are looking at options to repel pirates including slippery foam, lasers, electric fences, water cannons and high-intensity sound — almost anything except guns. One defense is the Force 80 squirt gun with a 3-inch nozzle that can send 1,400 gallons a minute 100 yards in any direction. 'It is a tremendous force of water that will knock over anything in its path and will also flood a pirate's ship very quickly,' says Roger Barrett James of the the Swedish company Unifire. Next is the Mobility Denial System, a slippery nontoxic foam that can be sprayed on just about any surface making it impossible to walk or climb even with the aid of a harness. The idea would be to spray the pirate's vessel as it approached, or to coat ropes, ladders, steps and the hull of the ship that's under attack. The Long Range Acoustic Device, or LRAD, a high-powered directional loudspeaker allows a ship to hail an approaching vessel more than a mile away. 'Knowing that they've lost the element of surprise is half the battle,' says Robert Putnam of American Technology Corp. The LRAD has another feature — a piercing "deterrent tone" that sounds a bit like a smoke detector alarm with enough intensity to cause extreme pain and even permanent hearing loss for anyone directly in the beam that comes from the device. But Capt. John Konrad, who blogs for the Web site Gcaptain.com, says no anti-pirate device is perfect. 'The best case scenario is that you find these vessels early enough that you can get a Navy ship detached to your location and let them handle the situation.'"
Robotics

"Tweenbots" Test NYC Pedestrian-Robot Relations 197

MBCook recommends Kacie Kinzer's tweenbots page, which documents some of her experiments with small, anthropomorphized robots that need help. Kinzer is writing a thesis (at the Center for the Recently Possible) centered around investigating whether people in New York City will help a cute little robot to get where it's going. "Tweenbots are human-dependent robots that navigate the city with the help of pedestrians they encounter. Rolling at a constant speed, in a straight line, Tweenbots have a destination displayed on a flag, and rely on people they meet to read this flag and to aim them in the right direction to reach their goal."
Television

Digital TV Coupon Program Under Way Again 147

An anonymous reader writes with this excerpt from CNet: "Federal regulators said Thursday they are going into 'search and rescue' mode to help the millions of consumers unprepared for the phased transition to digital television, which culminates with the June 12 transition deadline. The millions of consumers waiting for coupons for digital converter box coupons will finally receive them within the next two and a half weeks, thanks to emergency funding for the coupon program provided in the stimulus package, said Bernadette McGuire-Rivera, an administrator for the National Telecommunications and Information Administration. The NTIA is also ratcheting up its outreach to consumers most likely to be unprepared for the transition... FCC commissioners said their agency is also intensifying its outreach, but they acknowledged that while one third of television stations have already dropped their analog signals, the hardest part is yet to come." We previously discussed the DTV coupon program when it ran out of money in January. The $650 million from the stimulus packages adds to the $1.3 billion that's already been spent.
Microsoft

I'm a PC and I'm 4-1/2 435

theodp writes "Microsoft's new Windows ad made its debut during the Grammy Awards on Sunday. It stars a 4-year-old cutie named Kylie (Silverlight required) showing how easy it is to use Windows Live Photo Gallery to edit and share photos. And while it's impressive that little Kylie is able to transfer a snapshot of her pet fish from her camera to a PC, color-correct it, and e-mail it to her family, what's truly amazing is that the toddler was also apparently able to read, understand, and accept Windows Live's Terms of Use and Privacy Policy. (But minors can't legally execute contracts, can they?)"

Slashdot Top Deals

Men take only their needs into consideration -- never their abilities. -- Napoleon Bonaparte

Working...