Slashdot

Syndicate content Slashdot
News for nerds, stuff that matters
Updated: 31 min 10 sec ago

Australian ISP Offers Pro-bono Legal Advice To Accused Pirates

5/21/2015 5:25pm
New submitter thegarbz writes: As covered previously, after losing a legal battle against Dallas Buyers Club and Voltage Pictures the Federal Court of Australia asked ISP iiNet to hand over details of customers allegedly downloading the movie The Dallas Buyers Club. iiNet has now taken the unprecedented move to offer pro-bono legal advice to all of its customers targeted over piracy claims. "It is important to remember that the Court's findings in this case do not mean that DBC and Voltage's allegations of copyright infringement have been proven," Ben Jenkins, financial controller for iiNet wrote. Also, as part of the ruling the court will review all correspondence sent to alleged copyright infringers in hopes to prevent the practice of speculative invoicing. Unless it can be proven exactly how much and and with how many people a film was shared the maximum damages could also be limited to the lost revenue by the studio, which currently stands at $10AU ($7.90US) based on iTunes pricing.

Read more of this story at Slashdot.

Student Photographer Threatened With Suspension For Sports Photos

5/21/2015 4:42pm
sandbagger writes: Anthony Mazur is a senior at Flower Mound High School in Texas who photographed school sports games and other events. Naturally he posted them on line. A few days ago he was summoned to the principal's office and threatened with a suspension and 'reporting to the IRS' if he didn't take those 4000 photos down. Reportedly, the principal's rationale was that the school has copyright on the images and not him.

Read more of this story at Slashdot.

Academics Build a New Tor Client Designed To Beat the NSA

5/21/2015 3:50pm
An anonymous reader writes: In response to a slew of new research about network-level attacks against Tor, academics from the U.S. and Israel built a new Tor client called Astoria designed to beat adversaries like the NSA, GCHQ, or Chinese intelligence who can monitor a user's Tor traffic from entry to exit. Astoria differs most significantly from Tor's default client in how it selects the circuits that connect a user to the network and then to the outside Internet. The tool is an algorithm designed to more accurately predict attacks and then securely select relays that mitigate timing attack opportunities for top-tier adversaries.

Read more of this story at Slashdot.

Ask Slashdot: Career Advice For an Aging Perl Developer?

5/21/2015 3:09pm
New submitter ukrifleman writes: I've been doing UK based perl, JS, light PHP and JQUERY dev plus Centos/Debian sys admin on a freelance basis for over a decade now. Mostly maintaining older stuff but I also undertook a big, 3 year bespoke project (all written in legacy non OO perl). The trouble is, that contract has now finished and all the legacy work has dried out and I've only got about 2 months of income left! I need to get a full time job. To most dev firms I'm going to look like a bit of a dinosaur, 40 odd years old, knows little of OO coding OR modern languages and aproaches to projects. I can write other languages and, with a bit of practice I'll pick them up pretty quickly. I really don't know where to start. What's hot, what's worth learning, I'm self-taught so have no CS degree, just 15 years of dev and sys admin experience. I've got a bit of team and project management experience too it's quite a worry going up against young whipper snappers that know all the buzz words and modern tech! Am I better off trying to get a junior job to start so I can catch up with some tech? Would I be better off trawling the thousands of job sites or finding a bonafide IT specialist recruitment firm? Should I take the brutally honest approach to my CV/interviews or just wing it and hope I don't bite off more than I can chew? What kind of learning curve could I expect if I took on a new language I have no experience with? Are there any qualififcations that I NEED to have before firms would be willing to take me on? I've been sitting here at this desk for 10 years typing away and only now do I realise that I've stagnated to the point where I may well be obsolete!

Read more of this story at Slashdot.

GM's Exec. Chief Engineer For Electric Vehicles Pam Fletcher Answers Your Question

5/21/2015 2:27pm
Pam Fletcher was propulsion system chief engineer on the first Chevrolet Volt plug-in hybrid and is now executive chief engineer for electrified vehicles at GM, overseeing electrified vehicles company-wide. A while ago you had a chance to ask about her work and the future of electric cars. Below you'll find her answers to your questions.

Read more of this story at Slashdot.

Stanford Researcher Finds Little To Love In Would-Be Hacker Marketplace

5/21/2015 1:46pm
An anonymous reader writes: What if there were an Uber for hackers? Well, there is. It's called Hacker's List, and it made the front page of the New York Times this year. Anyone can post or bid on an 'ethical' hacking project. According to new Stanford research, however, the site is a wreck. 'Most requests are unsophisticated and unlawful, very few deals are actually struck, and most completed projects appear to be criminal.' And it gets worse. 'Many users on Hacker's List are trivially identifiable,' with an email address or Facebook account. The research dataset includes thousands of individuals soliciting federal crimes.

Read more of this story at Slashdot.

CareFirst Admits More Than a Million Customer Accounts Were Exposed In Security Breach

5/21/2015 1:04pm
An anonymous reader writes with news, as reported by The Stack, that regional health insurer CareFirst BlueCross BlueShield, has confirmed a breach which took place last summer, and may have leaked personal details of as many as 1.1 million of the company's customers: "The Washington D.C.-based firm announced yesterday that the hack had taken place in June last year. CareFirst said that the breach had been a 'sophisticated cyberattack' and that those behind the crime had accessed and potentially stolen sensitive customer data including names, dates of birth, email addresses and ID numbers. All affected members will receive letters of apology, offering two years of free credit monitoring and identity threat protection as compensation, CareFirst said in a statement posted on its website." Free credit monitoring is pretty weak sauce for anyone who actually ends up faced with identity fraud.

Read more of this story at Slashdot.

Take Two Sues BBC Over Drama About GTA Development

5/21/2015 12:22pm
An anonymous reader writes: Take Two Interactive, the parent company of Rockstar Games, is suing the BBC for trademark infringement over its planned "making of GTA" drama, Game Changers. The 90-minute movie was created without the involvement of the studio, which rarely comments on the GTA series' development outside of organised press events. (It is expected that it will draw upon the public conflict between Sam Houser and notorious anti-gaming crank Jack Thompson, via the expose "Jacked" by David Kushner.) After direct negotiations with the BBC failed, Take Two brought suit to "ensure that [their] trademarks are not misused." The details of the suit, Rockstar's objections, and the penalties sought, are not yet known.

Read more of this story at Slashdot.

Asus ZenFone 2 Performance Sneak Peek With Intel Z3580 Inside

5/21/2015 11:35am
MojoKid writes: Asus just finally made their ZenFone 2 available for sale in the US. It's an Intel-powered smartphone running Android Lollipop that's compatible with AT&T and T-Mobile, and other cellular networks that utilize GSM technology, like Straight Talk, MetroPCS, and Cricket Wireless among others.The device is packing a quad-core Intel Atom Z3580 (2.3GHz) with PowerVR G6430 graphics and 4GB of RAM, along with Intel 7262 and Intel 2230 modem tech, a 5.5" Full HD screen, a 13MP rear camera, dual-SIM support and 802.11ac Wi-Fi. The high-end model can be had for only $299, unlocked. A $199 version with 2GB of RAM and a slightly slower Intel Atom Z3560 is also available. In the benchmarks, the Zenfone 2 offers competent though middling performance but considering Asus has priced the ZenFone 2 so aggressively, it's sure to grab some attention at retail with consumers looking for a contract-free commitment.

Read more of this story at Slashdot.

In 1984, Jobs and Wozniak Talk About Apple's Earliest Days

5/21/2015 11:11am
harrymcc writes: In 1984, Apple launched the Apple IIc computer. As part of its promotion, it produced a video with Steve Jobs, Steve Wozniak, and other employees talking about company's founding and the creation of the Apple I and Apple II computers. Over at Fast Company, I've shared this remarkable, little-seen bit of history. It's full of goodies, from images of Jobs and Wozniak wearing remarkably Apple Watch-like timepieces to evocative photos of early computer stores.

Read more of this story at Slashdot.

Pre-Orders Start For Neo900 Open Source Phone

5/21/2015 10:54am
New submitter JoSch1337 writes: After a year and a half of development, the Neo900 project now opened its web shop for the down payments of binding pre-orders for either a full Neo900 phone or the bare circuit board to upgrade an existing Nokia N900. The up-front down payment is necessary to now secure expensive "risk parts" like the modem, 1GB RAM and N900 cases. Thus, without pre-ordering now, there might not be enough parts left after the first batch. The Neo900 is the spritual successor of the Nokia N900. The new circuit board can be placed into an existing N900 for better specs (faster CPU, more RAM, LTE modem) than the original device while still maintaining fremantle (maemo 5) backwards compatibility. Alternatively, a fully assembled phone can be purchased as well. The Neo900 will be fully operational without any binary blob running on the main CPU. While the modem still requires a non-free firmware, it is completely decoupled from the rest of the device (think of a LTE usb stick you put in your laptop) and can reliably be monitored or switched off by the operating system. You can follow the development of the project in the maemo forum, read about the specs of the device or consult the FAQ

Read more of this story at Slashdot.

US Proposes Tighter Export Rules For Computer Security Tools

5/21/2015 10:10am
itwbennett writes: The U.S. Commerce Department has proposed tighter export rules for computer security tools and could prohibit the export of penetration testing tools without a license. The proposal would modify rules added to the Wassenaar Arrangement in 2013 that limit the export of technologies related to intrusion and traffic inspection. The definition of intrusion software would also encompass 'proprietary research on the vulnerabilities and exploitation of computers and network-capable devices,' the proposal said.

Read more of this story at Slashdot.

Linux 4.0 Has a File-System Corruption Problem, RAID Users Warned

5/21/2015 9:23am
An anonymous reader writes: For the past few days kernel developers and Linux users have been investigating an EXT4 file-system corruption issue affecting the latest stable kernel series (Linux 4.0) and the current development code (Linux 4.1). It turns out that Linux users running the EXT4 file-system on a RAID0 configuration can easily destroy their file-system with this newest "stable" kernel. The cause and fix have materialized but it hasn't yet worked its way out into the mainline kernel, thus users should be warned before quickly upgrading to the new kernel on systems with EXT4 and RAID0.

Read more of this story at Slashdot.

The Reason For Java's Staying Power: It's Easy To Read

5/21/2015 8:13am
jfruh writes: Java made its public debut twenty years ago today, and despite a sometimes bumpy history that features its parent company being absorbed by Oracle, it's still widely used. Mark Reinhold, chief architect for the Oracle's Java platform group, offers one explanation for its continuing popularity: it's easy for humans to understand it at a glance. "It is pretty easy to read Java code and figure out what it means. There aren't a lot of obscure gotchas in the language ... Most of the cost of maintaining any body of code over time is in maintenance, not in initial creation."

Read more of this story at Slashdot.

Oldest Stone Tools Predate Previous Record Holder By 700,000 Years

5/21/2015 7:33am
derekmead writes: The oldest stone tools ever found have been discovered by scientists in Kenya who say they are 3.3m years old, making them by far the oldest such artifacts discovered. Predating the rise of humans' first ancestors in the Homo genus, the artifacts were found near Lake Turkana, Kenya. More than 100 primitive hammers, anvils and other stone tools have been found at the site. An in-depth analysis of the site, its contents, and its significance as a new benchmark in evolutionary history will be published in the May 21 issue of Nature.

Read more of this story at Slashdot.

Telstra Says Newly Acquired Pacnet Hacked, Customer Data Exposed

5/21/2015 5:30am
An anonymous reader writes: Telstra’s Asian-based data center and undersea cable operator Pacnet has been hacked exposing many of the telco’s customers to a massive security breach. The company said it could not determine whether personal details of customers had been stolen, but it acknowledged the possibility. The Stack reports: "Telstra said that an unauthorized third party had been able to gain access to the Pacnet business management systems through a malicious software installed via a vulnerability on an SQL server. The hack had taken place just weeks before Telstra acquired the Asian internet service provider for $550mn on 16 April this year. The telecom company confirmed that it had not been aware of the hack when it signed the deal in December 2014."

Read more of this story at Slashdot.

Secret Files Reveal UK Police Feared That Trekkies Could Turn On Society

5/21/2015 3:07am
An anonymous reader writes: Scotland Yard was worried that fans of shows like the X Files and Star Trek might run amok during the Millennium according to secret files. The file, called UFO New Religious Movements (NRMs) And The Millennium, reveals that anti-terrorism experts were also concerned about the brain-washing effect of Dark Skies, Roswell, Millennium and The Lawnmower Man on viewers. According to the Telegraph: "The secret briefing note was obtained from the Met under the Freedom of Information Act by Sheffield-based British X-Files expert Dr Dave Clarke while researching a new book, How UFOs Conquered the World. Dr Clarke, who teaches investigative journalism at Sheffield Hallam University, said: 'The documents show the police and security services were concerned about the export of some new religious movements concerning UFOs and aliens from the USA in the aftermath of the mass suicide by followers of the Heaven's Gate.'"

Read more of this story at Slashdot.

Rate These 53 Sub-$200 Hacker SBCs, Win 1 of 20

5/21/2015 1:05am
DeviceGuru writes: LinuxGizmos and Linux.com have just launched their annual 2-minute survey asking folks to rate their favorite hacker SBCs from a list of 53 single board computers that are priced below $200, supported by open documentation and Linux or Android OSes, and will ship before July. As usual, the survey's data will be made available publicly, but one big change this year is that participants can register for a random drawing that will give away 20 hacker SBCs, split equally among the BeagleBone Black, Imagination Creator CI20, Intel Edison Kit for Arduino, and Qualcomm DragonBoard 410c. (Emails submitted will only be used for selecting and notifying SBC drawing winners, say the sites.)

Read more of this story at Slashdot.

FBI: Social Media, Virtual Currency Fraud Becoming a Huge Problem

5/21/2015 12:29am
coondoggie writes: Criminals taking advantage of personal data found on social media and vulnerabilities of the digital currency system are two of the emerging Internet law-breaking trends identified by the FBI's Internet Crime Complaint Center (IC3) in its annual look at online crime. The IC3 said 12% of the complaints submitted in 2014 contained a social media trait. Complaints involving social media have quadrupled over the last five years. In most cases, victim’s personal information was exploited through compromised accounts or social engineering.

Read more of this story at Slashdot.

Simple Flaw Exposed Data On Millions of Charter Internet Customers

5/20/2015 10:05pm
Daniel_Stuckey writes: A security flaw discovered in the website of Charter Communications, a cable and Internet provider active in 28 states, may have exposed the personal account details of millions of its customers. Security researcher Eric Taylor discovered the internet service provider's vulnerability as part of his research, and demonstrated how a simple header modification performed with a browser plug-in could reveal details of Charter subscriber accounts. After Fast Company notified Charter of the issue, the company said it had installed a fix within hours.

Read more of this story at Slashdot.

novalug.com