Forgot your password?
typodupeerror

Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

Facebook

Facebook Sets Up Shop On Tor 7

Posted by Soulskill
from the mixing-privacy-with-antiprivacy dept.
itwbennett writes: Assuming that people who use the anonymity network want to also use Facebook, the social network has made its site available on Tor, Facebook software engineer Alec Muffett said in a post on Friday. Facebook also decided to encrypt the connection between clients and its server with SSL, providing an SSL certificate for Facebook's onion address. This was done both for internal technical reasons and as a way for users to verify Facebook's ownership of the onion address. Since it is still an experiment, Facebook hopes to improve the service and said it would share lessons learned about scaling and deploying services via an onion address over time.
Microsoft

Microsoft Enters the Wearables Market With 'Band' 83

Posted by Soulskill
from the competing-for-the-forearm dept.
Microsoft has announced the availability of "Microsoft Band," a wearable device that goes on the wrist. It's designed to do health- and fitness-related tasks, like monitoring heart rate and how well a wearer sleeps, and its on-board GPS lets users map their run/bike routes. The company says Band plays nicely with iOS and Android devices in addition to Windows phones. It also has full support for viewing phone notifications and calendar alerts, and a built-in microphone enables queries through the Cortana personal assistant software. The display is rectangular, 11mm x 33mm (0.43" x 1.3"), and has a resolution of 320x106. They claim a battery life of 48 hours, with a charge time of 1.5 hours or less. The device costs $200.
Open Source

Slashdot Asks: Appropriate Place For Free / Open Source Software Artifacts? 41

Posted by timothy
from the you-haul dept.
A friend of mine who buys and sells used books, movies, etc. recently purchased a box full of software on CD, including quite a few old Linux distributions, and asked me if I'd like them. The truth is, I would like them, but I've already collected over the last two decades more than I should in the way of Linux distributions, on at least four kinds of media (starting with floppies made from a CD that accompanied a fat book on how to install some distribution or other -- very useful in the days of dialup). I've got some boxes (Debian Potato, and a few versions of Red Hat and Mandrake Linux), and an assortment of marketing knickknacks, T-shirts, posters, and books. I like these physical artifacts, and they're not dominating my life, but I'd prefer to actually give many of them to someplace where they'll be curated. (Or, if they should be tossed, tossed intelligently.) Can anyone point to a public collection of some kind that gathers physical objects associated with Free software and Open Source, and makes them available for others to examine? (I plan to give some hardware, like a pair of OLPC XO laptops, to the same Goodwill computer museum highlighted in this video, but they probably don't want an IBM-branded radio in the shape of a penguin.)
Privacy

Hacking Team Manuals: Sobering Reminder That Privacy is Elusive 35

Posted by timothy
from the legitimacy-generally-is-too dept.
Advocatus Diaboli writes with a selection from The Intercept describing instructions for commercial spyware sold by Italian security firm Hacking Team. The manuals describe Hacking Team's software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team's manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. (Here are the manuals themselves.)
Education

The Most Highly Cited Scientific Papers of All Time 77

Posted by samzenpus
from the popularity-contest dept.
bmahersciwriter writes Citation is the common way that scientists nod to the important and foundational work that preceded their own and the number of times a particular paper is cited is often used as a rough measure of its impact. So what are the most highly cited papers in the past century plus of scientific research? Is it the determination of DNA's structure? The identification of rapid expansion in the Universe? No. The top 100 most cited papers are actually a motley crew of methods, data resources and software tools that through usability, practicality and a little bit of luck have propelled them to the top of an enormous corpus of scientific literature.
Technology

Remote Vision Through a Virtual Reality Headset (Video) 42

Posted by Roblimo
from the it-looks-much-better-over-there-than-it-does-here dept.
Add some material-handling devices and you'd have software-controlled Waldos, first described by Robert A. Heinlein in the 1942 short story titled Waldo. So while the idea of a pair of artificial eyes you control by moving your head (while looking at the area around the artificial eyes, even if it's in orbit), sounds like futuristic fun, especially if you use an Oculus Virtual Reality device instead of an LED screen, it not only hasn't caught up with science fiction, but is a fair ways behind science fact. Still, the idea of being able to control a vision system deep under the sea or in orbit around Saturn is certainly interesting in and of itself. (Alternate Video Link)
Software

Drones Could 3D-Map Scores of Hectares of Land In Just a Few Hours 94

Posted by Soulskill
from the lewis-and-clark-eat-your-heart-out dept.
sciencehabit writes: Unmanned drones aren't just for warfare. In recent years, they've been used to map wildlife and monitor crop growth. But current software can't always handle the vast volume of images they gather. Now, researchers have developed an algorithm that will allow drones to 3D-map scores of hectares of land in less than a day — an advance that is important for cost-effective farming, disaster relief, and surveillance operations.

Their computer program directly projects the points from each photo onto a 3D space without knowing the exact shape of the land or the camera positions. As a result, the tie points don't necessarily match up, which means the same corn plant can have two projections on the model. When that happens, the algorithm automatically takes the middle point between the two projections as the more accurate location and adjusts the camera position accordingly, one image at a time. Because the algorithm tweaks far fewer things at each step, the shortcut drastically speeds up calculations. Once the software has adjusted the camera positions for all the photos, the software repeats the entire process — starting from projecting the points to the 3D space — to correct for any errors.
Unix

Dangerous Vulnerability Fixed In Wget 58

Posted by Soulskill
from the under-the-radar dept.
jones_supa writes: A critical flaw has been found and patched in the open source Wget file retrieval utility that is widely used on UNIX systems. The vulnerability is publicly identified as CVE-2014-4877. "It was found that wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP," developer Vasyl Kaigorodov writes in Red Hat Bugzilla. A malicious FTP server can stomp over your entire filesystem, tweets HD Moore, chief research officer at Rapid 7, who is the original reporter of the bug.
Windows

Windows 10 Gets a Package Manager For the Command Line 229

Posted by Soulskill
from the baby-steps dept.
aojensen writes: ExtremeTech reports that the most recent build of Windows 10 Technical Preview shows that Windows is finally getting a package manager. The package manager is built for the PowerShell command line based on OneGet. OneGet is a command line utility for PowerShell very similar to classic Linux utilities such as apt-get and yum, which enable administrators and power users comfortable with the command line to install software packages without the need for a graphical installer. ExtremeTech emphasizes that "you can open up PowerShell and use OneGet to install thousands of applications with commands such as Find-Package VLC and Install-Package Firefox." It's a missing feature Linux advocates have long used to argue against Windows in terms of automation and scale. The package manage is open to any software repository and is based on the Chocolatey format for defining package repositories."
Education

Tech Giants Donate $750 Million In Goods and Services To Underprivileged Schools 141

Posted by Soulskill
from the go-big-or-go-home dept.
mrspoonsi sends news that a group of major tech companies has combined to donate $750 million worth of gadgets and services to students in 114 schools across the U.S. Apple is sending out $100 million worth of iPads, MacBooks, and other products. O'Reilly Media is making $100 million worth of educational content available for free. Microsoft and Autodesk are discounting software, while Sprint and AT&T are offering free wireless service. This is part of the ConnectED Initiative, a project announced by the Obama Administration last year to bring modern technology to K-12 classrooms. The FCC has also earmarked $2 billion to improve internet connectivity in schools and libraries over the next two years. Obama also plans to seek funding for training teachers to utilize this infusion of technology.
Microsoft

Microsoft Works On Windows For ARM-Based Servers 112

Posted by timothy
from the arms-race dept.
SmartAboutThings writes According to some reports from the industry, Microsoft is working on a version of its software for servers that run on chips based on ARM Holdings's technology. Windows Server now runs on Intel hardware, but it seems that Redmond wants to diversify its strategy. An ARM-based version of Windows Server could help challenge Intel's dominance and make a place for ARM in the server market, not only in mobile chips. According to the article, though, Microsoft "hasn’t yet decided whether to make the software commercially available."
Debian

Debate Over Systemd Exposes the Two Factions Tugging At Modern-day Linux 844

Posted by Soulskill
from the fight-to-the-death dept.
walterbyrd (182728) sends this article about systemd from Paul Venezia, who writes: In discussions around the Web in the past few months, I've seen an overwhelming level of support of systemd from Linux users who run Linux on their laptops and maybe a VPS or home server. I've also seen a large backlash against systemd from Linux system administrators who are responsible for dozens, hundreds, or thousands of Linux servers, physical and virtual. ... The release of RHEL 7 has brought the reality of systemd to a significant number of admins whose mantra is stability over all else and who perhaps had not waded into the choppier waters of Fedora or Debian unstable to work with systemd before it arrived in RHEL.
Books

Book Review: Measuring and Managing Information Risk: a FAIR Approach 46

Posted by samzenpus
from the read-all-about-it dept.
benrothke writes It's hard to go a day without some sort of data about information security and risk. Research from firms like Gartner are accepted without question; even though they can get their results from untrusted and unvetted sources. The current panic around Ebola shows how people are ill-informed about risk. While stressing over Ebola, the media is oblivious to true public health threats like obesity, heart disease, drunk driving, diabetes, and the like. When it comes to information security, it's not that much better. With myriad statistics, surveys, data breach reports, and global analyses of the costs of data breaches, there is an overabundance of data, and an under abundance of meaningful data. In Measuring and Managing Information Risk: A FAIR Approach, authors Jack Freund and Jack Jones have written a magnificent book that will change the way (for the better) you think about and deal with IT risk. Keep reading for the rest of Ben's review.
Programming

Here's Why Apple Rejected Your iOS App 145

Posted by samzenpus
from the you-can-keep-it dept.
Nerval's Lobster writes Everybody knows that Apple runs a tight ship when it comes to approving iOS apps for its App Store, rejecting software because it features porn, allows gambling, installs types of executable code, etc. But Apple also denies apps for some pretty esoteric reasons, many of which are only just coming to light. Want to have an App that uses GPS to automatically control a real-world aircraft or automobile? Sorry, that's not allowed, presumably because Apple doesn't want iOS to serve as a drone controller. (Imagine the liability issues.) Also, apps that report your location to emergency services are forbidden, as well as any that misspell Apple product names ("iTunz" will never make it through, no matter how much you beg). Even if Apple's not sharing the exact reason why it just rejected your app from its store (what the heck does "Not enough lasting value" mean?), you can check out Apple's own page on the top reasons for iOS app rejections."
Classic Games (Games)

Tetris Is Hard To Test 169

Posted by Soulskill
from the deceptive-tetrominomic-compexity dept.
New submitter JackDW writes: Tetris is one of the best-known computer games ever made. It's easy to play but hard to master, and it's based on a NP-hard problem. But that's not all that's difficult about it. Though it's simple enough to be implemented in one line of BBC BASIC, it's complex enough to be really hard to thoroughly test.

It may seem like you can test everything in Tetris just by playing it for a few minutes, but this is very unlikely! As I explain in this article, the game is filled with special cases that rarely occur in normal play, and these can only be easily found with the help of a coverage tool.
Chromium

Building All the Major Open-Source Web Browsers 106

Posted by Soulskill
from the who-needs-packages dept.
An anonymous reader writes: Cristophe de Dinechin, long-time software developer, has an interesting article on the processes involved in building the major browsers. From the article:

"Mozilla Firefox, Chromium (the open-source variant of Chrome) and WebKit (the basis for Safari) are all great examples of open-source software. The Qt project has a simple webkit-based web browser in their examples. So that's at least four different open-source web browsers to choose from. But what does it take to actually build them? The TL;DR answer is that these are complex pieces of software, each of them with rather idiosyncratic build systems, and that you should consider 100GB of disk space to build all the browsers, a few hours of download, and be prepared to learn lots of new, rather specific tools."
Operating Systems

Italian Supreme Court Bans the 'Microsoft Tax' 350

Posted by Soulskill
from the making-hardware-a-bit-cheaper dept.
An anonymous reader writes: In a post at the Free Software Foundation, lawyer Marco Ciurcina reports that the Italian Supreme Court has ruled the practice of forcing users to pay for a Windows license when they buy a new PC is illegal. Manufacturers in Italy are now legally obligated to refund that money if a buyer wants to put GNU/Linux or another free OS on the computer. Ciurcina says, "The focus of the Court's reasoning is that the sale of a PC with software preinstalled is not like the sale of a car with its components (the 4 wheels, the engine, etc.) that therefore are sold jointly. Buying a computer with preinstalled software, the user is required to conclude two different contracts: the first, when he buys the computer; the second, when he turns on the computer for the first time and he is required to accept or not the license terms of the preinstalled software. Therefore, if the user does not accept the software license, he has the right to keep the computer and install free software without having to pay the 'Microsoft tax.'"
Bug

OwnCloud Dev Requests Removal From Ubuntu Repos Over Security Holes 126

Posted by timothy
from the if-you-could-turn-back-time dept.
operator_error notes a report that ownCloud developer Lukas Reschke has emailed the Ubuntu Devel mailing list to request that ownCloud (server) be removed from the Ubuntu repositories because it contains "multiple critical security bugs for which no fixes have been backported," through which an attacker could "gain complete control [of] the web server process." From the article: However, packages can't be removed from the Ubuntu repositories for an Ubuntu version that was already released, that's why the package was removed from Ubuntu 14.10 (2 days before its release) but it's still available in the Ubuntu 14.04 and 12.04 repositories (ownCloud 6.0.1 for Ubuntu 14.04 and ownCloud 5.0.4 for Ubuntu 12.04, while the latest ownCloud version is 7.0.2). Furthermore, the ownCloud package is in the universe repository and software in this repository "WILL NOT receive any review or updates from the Ubuntu security team" (you should see this if you take a look at your /etc/apt/sources.list file) so it's up to someone from the Ubuntu community to step up and fix it. "If nobody does that, then it unfortunately stays the way it is", says Marc Deslauriers, Security Tech Lead at Canonical. You can follow the discussion @ Ubuntu Devel mailing list. So, until (if) someone fixes this, if you're using ownCloud from the Ubuntu repositories, you should either remove it or upgrade to the latest ownCloud from its official repository, hosted by the openSUSE Build Service."
AT&T

AT&T Locks Apple SIM Cards On New iPads 112

Posted by timothy
from the well-that's-not-cricket dept.
As reported by MacRumors, the unlocked, carrier-switchable SIM cards built into the newest iPads aren't necessarily so -- at least if you buy them from an AT&T store. Though the card comes from Apple with the ability to support (and be switched among with software, if a change is necessary) all major carriers, "AT&T is not supporting this interchangeability and is locking the SIM included with cellular models of the iPad Air 2 and Retina iPad mini 3 after it is used with an AT&T plan. ... AT&T appears to be the only participating carrier that is locking the Apple SIM to its network. T-Mobile's John Legere has indicated that T-Mobile's process does not lock a customer in to T-Mobile, which appears to be confirmed by Apple's support document, and Sprint's process also seems to leave the Apple SIM unlocked and able to be used with other carrier plans. Verizon, the fourth major carrier in the United States, did not opt to allow the Apple SIM to work with its network." The iPad itself can still be activated and used on other networks, but only after the installation of a new SIM.
Hardware

FTDI Removes Driver From Windows Update That Bricked Cloned Chips 571

Posted by Soulskill
from the righteous-backpedaling dept.
New submitter weilawei writes: Last night, FTDI, a Scottish manufacturer of USB-to-serial ICs, posted a response to the ongoing debacle over its allegedly intentional bricking of competitors' chips. In their statement, FTDI CEO Fred Dart said, "The recently release driver release has now been removed from Windows Update so that on-the-fly updating cannot occur. The driver is in the process of being updated and will be released next week. This will still uphold our stance against devices that are not genuine, but do so in a non-invasive way that means that there is no risk of end user's hardware being directly affected." This may have resulted from a discussion with Microsoft engineers about the implications of distributing potentially malicious driver software.

If you design hardware, what's your stance on this? Will you continue to integrate FTDI chips into your products? What alternatives are available to replace their functionality?

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...