Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
New submitter outofluck70 (1734164) writes Got an email today from Microsoft, text is below. [Note: text here edited for formatting and brevity; see the full text at seclists.org.] They are no longer going to send out emails regarding patches, you have to use RSS or keep visiting their security sites. They blame "governmental policies" as the reason. What could the real reason be? Anybody in the know? From the email: "Notice to IT professionals: As of July 1, 2014, due to changing governmental policies concerning the issuance of automated electronic messaging, Microsoft is suspending the use of email notifications that announce the following: Security bulletin advance notifications; Security bulletin summaries; New security advisories and bulletins; Major and minor revisions to security advisories and bulletins. In lieu of email notifications, you can subscribe to one or more of the RSS feeds described on the Security TechCenter website." WindowsIT Pro blames Canada's new anti-spam law.
jones_supa (887896) writes Google's YouTube announced that it's adding two new features that will especially benefit people who enjoy watching gameplays and those who stream games live. Most excitingly, the site is rolling out 60 frames per second video playback. The company has a handful of videos from Battlefield Hardline and Titanfall (embedded in the article) that show what 60fps playback at high definition on YouTube looks like. As the another new feature, YouTube is also offering direct funding support for content creators — name-checking sites like Kickstarter and Patreon — and is allowing fans to 'contribute money to support your channel at any time, for any reason.' Adding the icing on the cake, the website has also a number of other random little features planned, including viewer-contributed subtitles, a library of sound effects and new interactive info cards.
wiredmikey (1824622) writes Human Rights Watch on Friday demanded a clarification from Saudi Arabia over allegations from security researchers that the kingdom is infecting and monitoring dissidents' mobile phones with surveillance malware. The New York-based rights watchdog said surveillance software allegedly made by Italian firm Hacking Team mostly targeted individuals in Qatif district in Eastern Province, which has been the site of sporadic Shiite-led protests since February 2011. "We have documented how Saudi authorities routinely crack down on online activists who have embraced social media to call out human rights abuses," said Cynthia Wong, HRW's senior Internet researcher. "It seems that authorities may now be hacking into mobile phones, turning digital tools into just another way for the government to intimidate and silence independent voices." The accusations against the Saudi Government come days after researchers from Kaspersky Lab and Citizen Lab uncovered new details on advanced surveillance tools offered by HackingTeam [Note: mentioned in this earlier Slashdot story], including never before seen implants for smartphones running on iOS and Android.
New submitter trogdoro (3716731) writes with an excerpt from Linux Cookbook author Carla Schroder's enthusiastic introduction to what looks like a tempting tool, combining elements of GUI and text-mode interfaces: Command-line lovers, allow me to introduce you to Xiki, the incredibly interactive, flexible, and revolutionary command shell. I do not use the word "revolutionary" lightly. The command shell has not advanced all that much since the ancient days of Unix. Xiki is a giant leap forward. If you're looking for the Next Big Thing in FOSS, Xiki is it. It's not the first tool meant to combine text and graphic interface, but from the screencast demo, Xiki looks like it gets a lot of things right.
Trailrunner7 writes The United States federal government issued more than 19,000 National Security Letters – perhaps its most powerful tool for domestic intelligence collection – in 2013, and those NSLs contained more than 38,000 individual requests for information. The new data was released by the Office of the Director of National Intelligence on Friday as part of its effort to comply with a directive from President Obama to declassify and release as much information as possible about a variety of tools that the government uses to collect intelligence. The directive came in the immediate aftermath of the first revelations by former NSA contractor Edward Snowden about the agency's capabilities, methods and use of legal authorities.
The use of NSLs is far from new, dating back several decades. But their use was expanded greatly after 9/11 and NSLs are different from other tools in a number of ways, perhaps most importantly in the fact that recipients typically are prohibited from even disclosing the fact that they received an NSL. Successfully fighting an NSL is a rare thing, and privacy advocates have been after the government for years to release data on their use of the letters and the number of NSLs issued. Now, the ODNI is putting some of that information into the public record."
redletterdave writes: According to a blog post from Gregg Pollack, CEO of the Code School, Google is paying for three free months for any women and minorities interested in tech to expand their skills. The offer is part of Google's $50 million "Made With Code" initiative, which aims to help close the gender gap in tech. While Google is also offering the same vouchers to the women in attendance at its annual I/O developers conference this week, the search giant has released an online application that's available to women everywhere. Google says its available vouchers for women number in the "thousands."
tyggna writes: "The flame wars of different shells and text editors have long been established, but my question is this: are text editors and various languages linked? Do the majority of Ruby programmers use Emacs? Are most Perl programmers using vim?
Please post your editor and language of choice in the comments."
dcblogs writes: In a speech Wednesday on the floor of the U.S. House of Representatives, Rep. Luis Gutierrez (D-Ill.) declared immigration reform dead. He chastised and baited Republicans in Congress for blocking reform, and declared that winning the White House without the support of a growing Hispanic population will become mathematically impossible. "The Republican Presidential nominee, whoever he or she may be, will enter the race with an electoral college deficit they cannot make up," said Gutierrez. If he's right, and comprehensive immigration reform is indeed dead, then so too is the tech industry's effort to raise the cap on H-1B visas. Immigration reform advocates have successfully blocked any effort to take up the immigration issue in piecemeal fashion, lest business support for comprehensive reform peel away. Next year may create an entirely new set of problems for tech. If the Republicans take control of the Senate, the tech industry will face this obstacle: Sen. Chuck Grassley (R-Iowa). Grassley, the ranking Republican on the Judiciary Committee could become its next chairman. He has been a consistent critic of the H-1B program through the years. "The H-1B program is so popular that it's now replacing the U.S. labor force," said Grassley, at one point.
Dega704 sends this news from Wired:
Plenty of nightmare surveillance theories surround the million-square-foot NSA facility opened last year in Bluffdale, Utah. Any locals driving by the massive complex Friday morning saw something that may inspire new ones: A massive blimp hovering over the center, with the letters NSA printed on its side.
Activist groups including the Electronic Frontier Foundation and Greenpeace launched the 135-foot thermal airship early Friday morning to protest the agency's mass surveillance programs and to announce the launch of Stand Against Spying, a website that rates members of Congress on their support or opposition to NSA reform. The full message on the blimp reads 'NSA: Illegal Spying Below' along with an arrow pointing downward and the Stand Against Spying URL."
An anonymous reader sends news that Norway will no longer experiment with online voting: [T]he trials have ended because, said the government, voters' fears about their votes becoming public could undermine democratic processes. Political controversy and the fact that the trials did not boost turnout also led to the experiment ending. In a statement, Norway's Office of Modernisation said it was ending the experiments following discussions in the nation's parliament about efforts to update voting systems. The statement said although there was "broad political desire" to let people vote via the net, the poor results from the last two experiments had convinced the government to stop spending money on more trials. ... A report looking into the success of the 2013 trial said about 70,000 Norwegians took the chance to cast an e-vote. This represented about 38% of all the 250,000 people across 12 towns and cities who were eligible to vote online. However, it said, there was no evidence that the trial led to a rise in the overall number of people voting nor that it mobilised new groups, such as young people, to vote.
blottsie writes: The Supreme Court ruled this week that it is illegal for police to search your phone without a warrant. But just because that's the new rule doesn't mean all 7.5 million law enforcement officers in the U.S. will abide by it. This guide, put together with the help of the EFF and ACLU, explains what to do if a police officer tries to search your phone without a warrant. Of course, that doesn't mean they don't have other ways of getting your data.
An anonymous reader sends an article about CRISPR, a system for modifying genes and moving them from cell to cell. It's notable because the cost to do so is dropping to the point where it's becoming viable to use on a patient-by-patient basis. CRISPR is one of those interesting inventions that comes, not from scientists explicitly trying to cure a disease, but from researchers trying to understand something fundamental about nature. Jennifer Doudna's research at the University of California, Berkeley has focused on how bacteria fight the flu. It turns out bacteria don't like getting flu any more than the rest of us do. Doudna says the way bacteria fight off a flu virus gave her and her colleagues an idea. Bacteria have special enzymes that can cut open the DNA of an invading virus and make a change in the DNA at the site of the cut — essentially killing the virus. Doudna and other scientists figured out how this defense system works in bacteria; that was interesting all by itself. But then they realized that they could modify these enzymes to recognize any DNA sequence, not just the DNA sequence of viruses that infect bacteria.
An anonymous reader writes Google often gets criticism for its seemingly boundless desire for data collection and analysis, but the company says it has higher ambitions than just figuring out how best to serve advertising. Speaking to the NY Times, Larry Page said, "We get so worried about these things that we don't get the benefits Right now we don't data-mine healthcare data. If we did we'd probably save 100,000 lives next year." By "these things," he means privacy concerns and fear that the data might be misused. But he also pointed to Street View as a case where privacy concerns mostly melted away after people used it and found it helpful. "In the early days of Street View, this was a huge issue, but it's not really a huge issue now. People understand it now and it's very useful. And it doesn't really change your privacy that much. A lot of these things are like that."
shocking writes: Arizona National Guard member Vivin Paliath was surprised to be commended for writing Perl scripts and Excel macros while his unit was deployed in Iraq. His work automated a number of previously manual processes that were part of the logistics processes of his unit. He wrote, '[A]s a programmer, I'm constantly looking for ways to make my job easy. I didn't want to sit and add qualifications, and print licenses one by one. I was too lazy for that, and worse, the whole thing was horribly inefficient. So I decided to figure out how to automate the process. ... I started writing Perl scripts to query the data. By the time we had reached Iraq, I had a working script that generated licenses as text files for all the soldiers. The script only took a second or two to run, and the longest part of the process was simply printing out the licenses. But I wasn't done yet. I was still annoyed that I would have to add driver qualifications manually. So I wrote another script that would go and add qualifications to drivers en masse. The script even had a configuration file where you could specify what qualifications you wanted to add and to whom."
An anonymous reader writes: According to new research from the CDC, 9.8% of deaths in working-age adults (22-64 years old) in the U.S. from 2006 to 2010 were "attributable to excessive drinking." This makes excessive drinking the fourth leading cause of preventable death in the U.S. The study included deaths from medical conditions, such as liver disease and alcohol-induced strokes, as well as deaths from alcohol-related events, like car accidents, homicides, and fall injuries. However, it did not account for cases where excessive alcohol consumption was a factor in contracting conditions like AIDS, pneumonia, and tuberculosis, so the count may actually be higher. Many western states with low population spread out over a large area showed the highest alcohol-related death rates, while states from the east coast and the midwest tended to be on the lower end of the spectrum. The study also tracked years of life lost, which is higher for alcohol-related deaths than for most other types of death. Researcher Robert Brewer said, "One of the issues with alcohol that is particularly tragic is the extent to which it gets people in the prime of their lives."
An anonymous reader writes: DefenseCode researcher Leon Juranic found security issues related to using wildcards in Unix commands. The topic has been talked about in the past on the Full Disclosure mailing list, where some people saw this more as a feature than as a bug. There are clearly a number of potential security issues surrounding this, so Mr. Juranic provided five actual exploitation examples that stress the risks accompanying the practice of using the * wildcard with Linux/Unix commands. The issue can be manifested by using specific options in chown, tar, rsync etc. By using specially crafted filenames, an attacker can inject arbitrary arguments to shell commands run by other users — root as well.
An anonymous reader writes "Many people reading this site probably have a functional understanding of how algorithms work. But whether you know algorithms down to highly mathematical abstractions or simple as a fuzzy series of steps that transform input into output, it can be helpful to visualize what's going on under the hood. That's what Mike Bostock has done in a new article. He walks through algorithms for sampling, shuffling, and maze generation, using beautiful and fascinating visualizations to show how each algorithm works and how it differs from other options.
He says, "I find watching algorithms endlessly fascinating, even mesmerizing. Particularly so when randomness is involved. ... Being able to see what your code is doing can boost productivity. Visualization does not supplant the need for tests, but tests are useful primarily for detecting failure and not explaining it. Visualization can also discover unexpected behavior in your implementation, even when the output looks correct. ...Even if you just want to learn for yourself, visualization can be a great way to gain deep understanding. Teaching is one of the most effective ways of learning, and implementing a visualization is like teaching yourself."
New submitter thermowax sends a report on how Massachusetts SWAT teams are dodging open records requests by claiming to be corporations. From the article: As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. ... Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it's here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they're private corporations, not government agencies. And therefore, they say they're immune from open records requests. Let's be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they've incorporated, they're immune to Massachusetts open records laws. The state's residents aren't permitted to know how often the SWAT teams are used, what they're used for, what sort of training they get or who they're primarily used against.
An anonymous reader writes UNYQ (pronounced: unique), a start-up based in San Francisco and Seville, has set out to change the way we look at prosthetics by selling affordable 3D printed prosthetic leg covers, known as "fairings," directly to consumers. The company was co-founded by Eythor Bender, who is best known for developing a prototype bionic exoskeleton that allows paraplegics to walk again. Bender, who has worked with the disabled for over 20 years, was frustrated by the lack of consideration of style in the medical device development process. Despite all the progress made in other areas, the devices still look more or less like a "wooden stick." Bender wants to challenge what we think is possible with prosthetics.
An anonymous reader writes Google has begun removing some search results to comply with a European Union ruling upholding citizens' right to have objectionable personal information about them hidden in search engines. "Google engineers overnight updated the company's technical infrastructure to begin implementing the removals, and Thursday began sending the first emails to individuals informing them that links they had requested were being taken down. The company has hired a dedicated 'removals team' to evaluate each request, though only a small number of the initial wave of takedown requests has so far been processed."
sciencehabit writes Astronomers staring across the universe have spotted a startling scene: three supermassive black holes orbiting close to one another, two of them just a few hundred light-years apart. The trio, housed in a pair of colliding galaxies, may help scientists hunting for ripples in spacetime known as gravitational waves.
vinces99 writes Car and truck exhaust fumes that foul the air for humans also cause problems for pollinators. In new research on how pollinators find flowers when background odors are strong, University of Washington and University of Arizona researchers found that both natural plant odors and human sources of pollution can conceal the scent of sought-after flowers. When the calories from one feeding of a flower gets you only 15 minutes of flight, as is the case with the tobacco hornworn moth studied, being misled costs a pollinator energy and time. "Local vegetation can mask the scent of flowers because the background scents activate the same moth olfactory channels as floral scents," according to Jeffrey Riffell, UW assistant professor of biology. "Plus the chemicals in these scents are similar to those emitted from exhaust engines and we found that pollutant concentrations equivalent to urban environments can decrease the ability of pollinators to find flowers."