Become a fan of Slashdot on Facebook


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - WikiLeaks: CEO Advised Hillary To Embrace CS If She Wants To Be Elected

theodp writes: If new emails released by WikiLeaks are to be believed, co-founders Hadi and Ali Partovi advised Hillary Clinton to embrace computer science if she wants to be the next President. "Computer Science is about jobs and equity in every state in America, and it wins elections," begins Ali Partovi in a May 2015 email to Hillary for America CTO Stephanie Hannon and others. "Whichever candidate embraces it first will be seen as a visionary leader when it comes to about jobs, economic growth, and America's future." Hadi Partovi, CEO of tech-backed, adds: "One thing to consider, *Any* time Hillary says 'STEM', if she instead said 'Computer science' she'd have more voters understand and support her. Of course, STEM is *critically important* to our country. However, STEM is not where the job growth is or where the gender disparity is. STEM is also not where the H1B skilled immigration problem is." He concludes, "I'd love to work with the Clinton campaign to help sharpen a focus on this issue. Even if it's just participation in a marketing gimmick around the Hour of Code." In June, Clinton unveiled her tech plan, which promises to "engage the private sector and nonprofits to train up to 50,000 computer science teachers in the next decade."

Submission + - SPAM: Apply for Citizenship at Earth's First Space Colony

juanhf writes: For the first time in history a new nation state has been created — not on Earth but in the heavens above. Asgardia is the prototype of a free and unrestricted society which holds knowledge, intelligence and science at its core along with the recognition of the ultimate value of each human life. You can join like-minded people on this new exciting step in fostering an extended future for humankind.
Link to Original Source

Submission + - SPAM: 12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks

SecurityJorge writes: A common configuration flaw that has been documented for more than 12 years now affects millions of devices connected to the Internet of Things, and is contributing to large and diffuse attacks aimed at social media sites and other online services, according to a report by researchers at the firm Akamai.
Akamai said in a report released Wednesday that it has observed millions of of Internet connected devices taking part in web-based “credential stuffing” campaigns, a kind of slow motion brute force attack in which attackers leverage stolen (or leaked) user name and password combinations to try to hack into accounts on a revolving list of popular sites. Typically, such low-volume attacks go unnoticed. However, Akamai’s view of more than 30% of the Internet allows it to tie such diffuse activity back to a common actor – like a single host trying to methodically log into 50,000 different web sites.

Here's a link to the original paper (pdf): [spam URL stripped]...

Link to Original Source

Submission + - FBI, DOJ continue using discredited junk science .. (

An anonymous reader writes: .. the DOJ insists its science is solid, something it bases on confirmation bias. The matches determined in its forensic labs are "scientifically certain" because the DOJ's expert witnesses have said so in court. Not only are outside scientists locked out of examining evidence and forensic processes, but defense lawyers are as well.

Submission + - Cloud Hacking Trick Allows Undetectable Changes To VM Memory

An anonymous reader writes: Hacking researchers have uncovered a new attack technique which can alter the memory of virtual machines in the cloud. The team, based at Vrije Universiteit, Amsterdam, introduced the attack, dubbed Flip Feng Shui (FFS) [PDF] and explained that hackers could use the technique to crack the keys of secured VMs or install malicious code without it being noticed. The de-duplication attack enables third parties to not only view and leak data, but also to modify it – installing malware or allowing unauthorised logins. Using FFS, the attacker rents a VM on the same host as their chosen victim. They then write a memory page which they know exists on the vulnerable memory location and let it de-duplicate. The identical pages, with the same information, will merge in order to save capacity and be stored in the same part of memory of the physical computer. This allows the hacker to change information in the general memory of the computer.

Submission + - Should Cloud Vendors Cooperate With The Government? (

An anonymous reader writes: More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance. 35 percent believe cloud app vendors should be forced to provide government access to encrypted data while 55 percent are opposed. 64 percent of US-based infosec professionals are opposed to government cooperation, compared to only 42 percent of EMEA respondents. This demands some form of open debate on the best approach to take in terms of addressing this most challenging issue.

Submission + - Widespread Linux Flaw Allows TCP Session Hijacking, Data Injection

Trailrunner7 writes: The TCP implementation in all Linux systems built since 2012 has a serious flaw that can allow an attacker to terminate or inject data into a session between any two vulnerable machines on the Internet. The bug could also be used to end encrypted connections or downgrade the privacy of connections run through Tor or other anonymity networks.

The vulnerability was introduced in Linux 3.6 and an attacker does not need to be in a man-in-the-middle position in order to exploit it. The researchers at the University of California Riverside who discovered the flaw say that it results from an attackers ability to infer the TCP sequence numbers for the packets flowing between two hosts.

Submission + - Lenovo Fails To Perform Planned Spark SSD Demo

An anonymous reader writes: Lenovo, the Chinese PC giant, planned to unveil its long-anticipated Project Spark solid state drive for data center use. However, it backed out of the demonstration at the last minute, citing a ‘reassessment of the risk’ involved with completing a demonstration of the technology so far from the 2017 mid-year release date. Project Spark represents Lenovo’s initial entry into the highly competitive SSD market. A demonstration was planned at the Flash Memory Summit in California but was cancelled on the same day. The prototype SSD, approximately the size of a memory stick, is believed to have between 6 and 8TB of storage space. Lenovo is currently researching linking multiple Project Spark cards onto a single board, which could provide storage capacity of more than 48TB.

Submission + - DOTA 2 Forums Hacked: Salted MD5 ( writes: In another case of serious programmer impairment, the DOTA 2 official forums have been hacked, making available to the perpetrators around 2 million emails, usernames, and MD5 hashed passwords. You read that right — MD5. In a forum bound to a game released in 2013. For those unaware of how negligent this is,: one-way MD5 hashing has been deemed insecure (i.e. not-so-one-way) for almost a decade, with collision attack strategies reported as early as 2007 using off-the-shelf hardware at the time. That's as far back as the advent of the financial crisis, or a lifetime from an computer cryptography point of view (even for pre-Snowden standards).

Now to be fair, the hashing did use salting algorithms, but this should be seen as a moot point, since it should be common knowledge for any company that if you get something as important as a database or public-facing APIs hacked, your server-side source code is very likely under flawed protection by association. Some organizations just beg to be hacked with practices like these.

If you think you might have a compromised account, you are urged to change your identical or similar credentials in that and other services. Just make sure you don't use similar ones this time!

Originally reported by (paywalled) and made available by ZDNet.

Submission + - Weapons-drone student fights expulsion (

Big Hairy Ian writes: A teenager who posted videos of drones firing a gun and a flamethrower is suing his university after he was expelled, the AP news agency reports.
Austin Haughwout claims he was kicked out of Central Connecticut state university over the footage.
The institution says he was expelled over threats to shoot people there. Mr Haughwout argued he was only joking.
Last month, Mr Haughwout and his father were ordered to give information about the drones videos to the authorities.

Submission + - Why Did The Stars Wars And Star Trek Worlds Turn Out So Differently? writes: In the Star Trek world there is virtual reality, personal replicators, powerful weapons, and, it seems, a very high standard of living for most of humanity while in Star Wars there is widespread slavery, lots of people seem to live at subsistence, and eventually much of the galaxy falls under the Jedi Reign of Terror. Why the difference? Tyler Cowen writes about some of the factors differentiating the world of Star Wars from that of Star Trek: 1) The armed forces in Star Trek seem broadly representative of society. Compare Uhura, Chekhov, and Sulu to the Imperial Storm troopers. 2) Captains Kirk and Picard do not descend into true power madness, unlike various Sith leaders and corrupted Jedi Knights. 3) In Star Trek, any starship can lay waste to a planet, whereas in Star Wars there is a single, centralized Death Star and no way to oppose it, implying stronger checks and balances in the world of Star Trek. 4) Star Trek embraces egalitarianism, namely that all humans consider themselves part of the same broader species. There is no special group comparable to the Jedi or the Sith, with special powers in their blood. 5) Star Trek replicators are sufficiently powerful it seems slavery is highly inefficient in that world.

Submission + - Ubuntu developer suggests dropping i386 support (

Ilgaz writes: Ubuntu developer Dimitri suggests dropping i386 support from Ubuntu and naturally,derivatives such as Kubuntu citing 3rd parties (Google and couple of "cool" developers named) dropping 32bit support&maintenance. On the other hand, Windows 10 which switched to rolling update model and will be the last ever Windows major version does support i386 and will continue to do so in foreseeable future.

Submission + - Brain activity decline linear, starting at 500 ppm CO2

An anonymous reader writes: Is there a CO2 — level sense that says “be calm, you sleep in a chamber”, “be active, you are outdoors”, similarly to the circadian rhythm? Or is it because atmospheric CO2 makes the blood PH decline sharply already? A study says “the exposure — response between CO2 and cognitive function is approximately linear across the concentrations used in this study,” which were in the range 500 ppm — 1500 ppm. 600 ppm is exceeded already in large cities and prognosed everywhere in several decades. Is the coal industry going to make the idiocracy real?

Comment Re:Don't Panic (Score 4, Informative) 535

The Green Party was consistent in being pro EU. They are generally excluded from the media debates as - (1) the First Past the Post favours the largest parties and the only other party that small is the UKIP - who make far better headlines for the media. (2) The print media are 80% owned by 5 anti-EU individuals who stand to gain more media power in a post-Brexit UK. (3) The UK Civil Service (completely anti-EU) are also very antagonistic towards their communitarian ethos.

Submission + - 'Women In the Workplace' Emojis Rejected By Unicode Consortium (

itwbennett writes: The Unicode Consortium has spoken and a woman's place is not in workplace emojis — except in the traditional roles like dancer, princess, and mom-to-be. This might not seem like a very big deal, except when you consider that a 2014 survey found that '76% of American workers admit they have used emoji in digital communications to people in their professional life.' Add that to a growing body of research showing that 'You can't be what you can't see,' as Sheryl Sandberg famously asserted when launching a collection of stock photos depicting women at work. So, yes, even in emojis, representation matters.

Slashdot Top Deals

"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985