Slashdot

Slashdot
News for nerds, stuff that matters
Updated: 10 min 6 sec ago

The Reason For Java's Staying Power: It's Easy To Read

Thu, 21/05/2015 - 12:13pm
jfruh writes: Java made its public debut twenty years ago today, and despite a sometimes bumpy history that features its parent company being absorbed by Oracle, it's still widely used. Mark Reinhold, chief architect for the Oracle's Java platform group, offers one explanation for its continuing popularity: it's easy for humans to understand it at a glance. "It is pretty easy to read Java code and figure out what it means. There aren't a lot of obscure gotchas in the language ... Most of the cost of maintaining any body of code over time is in maintenance, not in initial creation."

Read more of this story at Slashdot.

Oldest Stone Tools Predate Previous Record Holder By 700,000 Years

Thu, 21/05/2015 - 11:33am
derekmead writes: The oldest stone tools ever found have been discovered by scientists in Kenya who say they are 3.3m years old, making them by far the oldest such artifacts discovered. Predating the rise of humans' first ancestors in the Homo genus, the artifacts were found near Lake Turkana, Kenya. More than 100 primitive hammers, anvils and other stone tools have been found at the site. An in-depth analysis of the site, its contents, and its significance as a new benchmark in evolutionary history will be published in the May 21 issue of Nature.

Read more of this story at Slashdot.

Telstra Says Newly Acquired Pacnet Hacked, Customer Data Exposed

Thu, 21/05/2015 - 9:30am
An anonymous reader writes: Telstra’s Asian-based data center and undersea cable operator Pacnet has been hacked exposing many of the telco’s customers to a massive security breach. The company said it could not determine whether personal details of customers had been stolen, but it acknowledged the possibility. The Stack reports: "Telstra said that an unauthorized third party had been able to gain access to the Pacnet business management systems through a malicious software installed via a vulnerability on an SQL server. The hack had taken place just weeks before Telstra acquired the Asian internet service provider for $550mn on 16 April this year. The telecom company confirmed that it had not been aware of the hack when it signed the deal in December 2014."

Read more of this story at Slashdot.

Secret Files Reveal UK Police Feared That Trekkies Could Turn On Society

Thu, 21/05/2015 - 7:07am
An anonymous reader writes: Scotland Yard was worried that fans of shows like the X Files and Star Trek might run amok during the Millennium according to secret files. The file, called UFO New Religious Movements (NRMs) And The Millennium, reveals that anti-terrorism experts were also concerned about the brain-washing effect of Dark Skies, Roswell, Millennium and The Lawnmower Man on viewers. According to the Telegraph: "The secret briefing note was obtained from the Met under the Freedom of Information Act by Sheffield-based British X-Files expert Dr Dave Clarke while researching a new book, How UFOs Conquered the World. Dr Clarke, who teaches investigative journalism at Sheffield Hallam University, said: 'The documents show the police and security services were concerned about the export of some new religious movements concerning UFOs and aliens from the USA in the aftermath of the mass suicide by followers of the Heaven's Gate.'"

Read more of this story at Slashdot.

Rate These 53 Sub-$200 Hacker SBCs, Win 1 of 20

Thu, 21/05/2015 - 5:05am
DeviceGuru writes: LinuxGizmos and Linux.com have just launched their annual 2-minute survey asking folks to rate their favorite hacker SBCs from a list of 53 single board computers that are priced below $200, supported by open documentation and Linux or Android OSes, and will ship before July. As usual, the survey's data will be made available publicly, but one big change this year is that participants can register for a random drawing that will give away 20 hacker SBCs, split equally among the BeagleBone Black, Imagination Creator CI20, Intel Edison Kit for Arduino, and Qualcomm DragonBoard 410c. (Emails submitted will only be used for selecting and notifying SBC drawing winners, say the sites.)

Read more of this story at Slashdot.

FBI: Social Media, Virtual Currency Fraud Becoming a Huge Problem

Thu, 21/05/2015 - 4:29am
coondoggie writes: Criminals taking advantage of personal data found on social media and vulnerabilities of the digital currency system are two of the emerging Internet law-breaking trends identified by the FBI's Internet Crime Complaint Center (IC3) in its annual look at online crime. The IC3 said 12% of the complaints submitted in 2014 contained a social media trait. Complaints involving social media have quadrupled over the last five years. In most cases, victim’s personal information was exploited through compromised accounts or social engineering.

Read more of this story at Slashdot.

Simple Flaw Exposed Data On Millions of Charter Internet Customers

Thu, 21/05/2015 - 2:05am
Daniel_Stuckey writes: A security flaw discovered in the website of Charter Communications, a cable and Internet provider active in 28 states, may have exposed the personal account details of millions of its customers. Security researcher Eric Taylor discovered the internet service provider's vulnerability as part of his research, and demonstrated how a simple header modification performed with a browser plug-in could reveal details of Charter subscriber accounts. After Fast Company notified Charter of the issue, the company said it had installed a fix within hours.

Read more of this story at Slashdot.

Hydrogen-Powered Drone Can Fly For 4 Hours at a Time

Thu, 21/05/2015 - 12:24am
stowie writes: The Hycopter uses its frame to store energy in the form of hydrogen instead of air. With less lift power required, it's fuel cell turns the hydrogen in its frame into electricity to power its rotors. The drone can fly for four hours at a time and 2.5 hours when carrying a 2.2-pound payload. “By removing the design silos that typically separate the energy storage component from UAV frame development - we opened up a whole new category in the drone market, in-between battery and combustion engine systems,” says CEO Taras Wankewycz.

Read more of this story at Slashdot.

New Chrome Extension Uses Sound To Share URLs Between Devices

Wed, 20/05/2015 - 11:45pm
itwbennett writes: Google Tone is an experimental feature that could be used to easily and instantly share browser pages, search results, videos and other pages among devices, according to Google Research. "The initial prototype used an efficient audio transmission scheme that sounded terrible, so we played it beyond the range of human hearing," researcher Alex Kauffmann and software engineer Boris Smus wrote in a post on the Google Research blog.

Read more of this story at Slashdot.

Huawei's LiteOS Internet of Things Operating System Is a Minuscule 10KB

Wed, 20/05/2015 - 11:02pm
Mark Wilson writes: Chinese firm Huawei today announces its IoT OS at an event in Beijing. The company predicts that within a decade there will be 100 billion connected devices and it is keen for its ultra-lightweight operating system to be at the heart of the infrastructure. Based on Linux, LiteOS weighs in at a mere 10KB — smaller than a Word document — but manages to pack in support for zero configuration, auto-discovery, and auto-networking. The operating system will be open for developers to tinker with, and is destined for use in smart homes, wearables, and connected vehicles. LiteOS will run on Huawei's newly announced Agile Network 3.0 Architecture and the company hopes that by promoting a standard infrastructure, it will be able to push the development of internet and IoT applications

Read more of this story at Slashdot.

How 1990s Encryption Backdoors Put Today's Internet In Jeopardy

Wed, 20/05/2015 - 10:17pm
An anonymous reader writes: While debate swirls in Washington D.C. about new encryption laws, the consequences of the last crypto war is still being felt. Logjam vulnerabilities making headlines today is "a direct result of weakening cryptography legislation in the 1990s," researcher J. Alex Halderman said. "Thanks to Moore's law and improvements in cryptanalysis, the ability to break that crypto is something really anyone can do with open-source software. The backdoor might have seemed like a good idea at the time. Maybe the arguments 20 years ago convinced people this was going to be safe. History has shown otherwise. This is the second time in two months we've seen 90s era crypto blow up and put the safety of everyone on the internet in jeopardy."

Read more of this story at Slashdot.

The Brainteaser Elon Musk Asks New SpaceX Engineers

Wed, 20/05/2015 - 9:33pm
Nerval's Lobster writes: The latest biography of Elon Musk, by technology journalist Ashlee Vance, provides an in-depth look into how the entrepreneur and tech titan built Tesla Motors and SpaceX from the ground up. For developers and engineers, getting a job at SpaceX is difficult, with a long interviewing/testing process... and for some candidates, there's a rather unique final step: an interview with Musk himself. During that interview, Musk reportedly likes to ask candidates a particular brainteaser: "You're standing on the surface of the Earth. You walk one mile south, one mile west, and one mile north. You end up exactly where you started. Where are you?" If you can answer that riddle successfully, and pass all of SpaceX's other stringent tests, you may have a shot at launching rockets into orbit.

Read more of this story at Slashdot.

Learn About The Technology Education And Literacy in Schools Program (Video #2)

Wed, 20/05/2015 - 8:49pm
Quoting our intro from yesterday's 'Part One' video: 'The Technology Education And Literacy in Schools program (TEALS to its friends), started with one volunteer, a Berkeley CS grad named Kevin Wang who taught high school for a while, then went to Microsoft for a much higher salary than he got from teaching. But before long, he was getting up early and teaching a first period computer science class at a Seattle-area high school that was (sort of) on his way to work.' TEALS is now in 130 high schools and has 475 volunteers in multiple states but still has a long way to go (and needs to recruit many more volunteers) because, Kevin says, fewer than 1% of American high school students are exposed to computer science, even though "Computer science is now fundamental in these kids' lives." He doesn't expect everyone who takes a TEALS class to become a computer person any more than chemistry teachers expect all their students to become chemists. You might say that learning a little about how computers and networks work is like knowing how to change a car tire and cook a simple meal: skills that make life easier even for people who don't want to become mechanics or cooks.

Read more of this story at Slashdot.

Grand Theft Auto V Keeps Raking In Money

Wed, 20/05/2015 - 8:06pm
jones_supa writes: At end of 2013, Grand Theft Auto V made $800 million during initial 24 hours of sales. The title keeps churning profit as the publisher Take-Two closes the book on fiscal year 2015, which ended March 31. The company reported better-than-expected profits of $54.3 million atop revenue of $427.7 million in its fourth quarter, a significant improvement over the $21.5 million profit it reaped from $233.2 million in revenue during the same period last year. This time around Take-Two once again credited GTA V as its premier revenue driver for the final quarter of the year. With PS4/XBOne/PC versions out as well, the game has been an excellent investment. Strong runner-ups were 2K titles NBA 2K15 and Evolve.

Read more of this story at Slashdot.

Eugene Kaspersky: "Our Business Is Saving the World From Computer Villains"

Wed, 20/05/2015 - 7:23pm
blottsie writes: While the nature of Kaspersky's relationship with the Kremlin remains, at the very least, a matter of contention, his company's influence is anything but hazy. On top of their successful antivirus business, Kaspersky Lab researchers have discovered key details about the now-infamous Stuxnet virus, which was deployed by the U.S. and Israel against Iran's nuclear facilities. Kaspersky analysts later uncovered Flame, which the Washington Post found was another American-Israeli cyberweapon against Iran. All of this is on top of building a highly successful antivirus business. In a new interview with the Daily Dot, Kaspersky elaborates on thoughts about his company, his wealth, and the state of modern cybersecurity.

Read more of this story at Slashdot.

Do Russian Uranium Deals Threaten World Supply Security?

Wed, 20/05/2015 - 6:40pm
Lasrick writes: A recent article in the New York Times notes that the Russian state nuclear corporation Rosatom and associated firms are gaining control of a growing number of uranium resources and mining operations. The article, headlined Cash Flowed to Clinton Foundation Amid Russian Uranium Deal focuses on donations to charities connected to former US President Bill Clinton and his family, made by businessmen who stood to profit from the sale of Uranium One, a Canadian company with worldwide uranium-mining interests. But a major premise of the article is that Russian uranium control threatens the security of the global uranium supply. Steve Fetter and Erich Schneider demolish the idea that Russian control of uranium stocks is a threat to global security.

Read more of this story at Slashdot.

Canadian Piracy Rates Plummet As Industry Points To New Copyright Notice System

Wed, 20/05/2015 - 5:56pm
An anonymous reader writes: Canada's copyright notice-and-notice system took effect earlier this year, leading to thousands of notifications being forwarded by Internet providers to their subscribers. Since its launch, there have been serious concerns about the use of notices to demand settlements and to shift the costs of enforcement to consumers and Internet providers. Yet reports indicate that piracy rates in Canada have plummeted, with some ISPs seeing a 70% decrease in online infringement.

Read more of this story at Slashdot.

Adblock Plus Launches Adblock Browser: a Fork of Firefox For Android

Wed, 20/05/2015 - 5:14pm
An anonymous reader writes: Adblock Plus has launched Adblock Browser for Android. Currently in beta, the company's first browser was created by taking the open source Firefox for Android and including Adblock Plus out-of-the-box. The Firefox Sync functionality is disabled, as is the ability to use other addons. "Adblock Plus for Android got kicked out of Google Play along with other ad blocking apps in March 2013, because Google’s developer distribution agreement states apps cannot interfere with the functionality of other apps. Williams thus believes Adblock Browser “should be fine” as it only blocks ads that are shown as you browse the Web."

Read more of this story at Slashdot.

Ask Slashdot: Best Way To Solve a Unique Networking Issue?

Wed, 20/05/2015 - 4:31pm
New submitter petro-tech writes: I work as a service technician, maintaining and repairing gas pumps and POS equipment. In my day to day activities, one that consumes a ton of time and is relatively regular is the process of upgrading the software on pumps. This is done by connecting to the pump via direct ethernet from my laptop, then running a manufacturer-provided program that connects to the device and pushes the new software. Some sites have 8+ pumps with 2 devices in each, and at 20-30 minutes apiece this can be quite time consuming. Unfortunately the devices are not actually on a network, and as such cannot be updated remotely, also since they are not on a network, they are all configured with the same IP address. Additionally the software doesn't allow you to specify the adapter to use. I would like to be able to get to a site, connect a cable to each pump, and load them all at the same time. The only way I can figure to accomplish this with the software we've been provided is to do this: Get a 16-port powered USB hub, with a usb-ethernet adaptor in each port; Set up 16 VM's with extremely stripped down XP running on each, with only one USB-ethernet adaptor assigned to each VM; Set XP to boot the application for loading software as its shell; and load each device that way at the same time. Is there a better way to accomplish this?

Read more of this story at Slashdot.

Critical Vulnerability In NetUSB Driver Exposes Millions of Routers To Hacking

Wed, 20/05/2015 - 3:51pm
itwbennett writes: NetUSB, a service that lets devices connected over USB to a computer be shared with other machines on a local network or the Internet, is implemented in Linux-based embedded systems, such as routers, as a kernel driver. Once enabled, it opens a server that listens on TCP port 20005 for connecting clients. Security researchers from a company called Sec Consult found that if a connecting computer has a name longer than 64 characters, a stack buffer overflow is triggered in the NetUSB service. The advisory notice has a list of affected routers.

Read more of this story at Slashdot.