Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Chemical Bike Lock Causes Vomiting to Deter Thieves writes: Ever had a bike stolen? Bike thieves have had virtually free rein around San Francisco and the Bay area for years, stealing thousands every year, turning warehouses and underpasses into chop shops, victimizing residents and city officials alike. But BBC reports on a new weapon in the arsenal of devices developed to thwart would-be thieves — a bicycle lock that spews a pressurized, stinking gas if someone attempts to cut the lock. The company claims its "noxious chemical" is so disgusting it "induces vomit in the majority of cases." Even better, it claims, the gas causes "shortness of breathing" and impaired eyesight. The company says that the compressed gas is perfectly safe — and can only be released "by trying to cut through it with an angle grinder". If the chemical countermeasure is released, it is a one-time only use, and the lock — which costs over $100 — will have to be replaced. But the hope is that the unpleasant experience will cause them to abandon the attempted theft, leaving the bicycle behind. The inventors have not yet tested the device on an actual would-be thief, but have tested it on themselves and volunteers at distances of two feet, five feet, 10ft and 20ft. “At two feet it was pretty bad. It was absolutely vomit inducing in 99% of people. At five feet it’s very noticeable and the initial reaction is to move away from it. At 10ft it’s definitely detectable and very unpleasant.”

Submission + - SPAM: Accidental Death Insurance

waqascheema writes: Demise cause by mishaps incorporates anything from a damage however won't cover suicide and wellbeing issues that brought about death. This kind of extra security is a ton less expensive on the grounds that it just cover mischances. This is usually referred to and offered as AD&D strategy.
Link to Original Source

Dyn Executive Responds To Friday's DDOS Attack ( 74

"It is said that eternal vigilance is the price of liberty...We must continue to work together to make the internet a more resilient place to work, play and communicate," wrote Dyn's Chief Strategy Officer in a Saturday blog post. An anonymous reader reports: Dyn CSO Kyle York says they're still investigating Friday's attack, "conducting a thorough root cause and forensic analysis" while "carefully monitoring" for any additional attacks. In a section titled "What We Know," he describes "a sophisticated attack across multiple attack vectors and internet source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack." But he warns that "we are unlikely to share all details of the attack and our mitigation efforts to preserve future defenses."

He posted a timeline of the attacks (7:00 EST and 12:00 EST), adding "While there was a third attack attempted, we were able to successfully mitigate it without customer impact... We practice and prepare for scenarios like this on a regular basis, and we run constantly evolving playbooks and work with mitigation partners to address scenarios like these." He predicts Friday's attack will be seen as "historic," and acknowledges his staff's efforts to fight the attack as well as the support received from "the technology community, from the operations teams of the world's top internet companies, to law enforcement and the standards community, to our competition and vendors... On behalf of Dyn, I'd like to extend our sincere thanks and appreciation to the entire internet infrastructure community for their ongoing show of support."

Online businesses may have lost up to $110 million in sales and revenue, according to the CEO of Dynatrace, who tells CNN more than half of the 150 websites they monitor were affected.

Submission + - SPAM: Make girlfriend with WhatsApp/BBM

Dual writes: Compared to WhatsApp Messenger,which was purchased by Facebook, BBM is turning out to be the best choice among other instant messaging Applications as a secondary messenger. As of October 2014, BlackBerry Messenger had reported more than 100 million monthly active users and numbers still growing fast.

Because of its great reputation on privacy protection feature. Like in indonesia, Many local people remain loyal to their friends and family on BlackBerry Messenger, even though most of them no longer use BlackBerry devices.
But like most applications, BBM don’ t allow users run Dual BBM accounts on one phone. This might be due to business strategy or well defined protocols, but majority of us are in need of running several BBM accounts. Earlier it seemed to be impossible but some talented developers are always here to make it happen. Without further ado, here is the complete procedure for running two BBM pins on your Android phone:

Before you begin, please make sure that you have prepared:

1. An Android smart phone running on version 4.1 and up.
2. Make sure you have uninstalled the official BBM app on your Android phone, if not ,download it from Google Play (Dual BBM is not a standalone app. It needs the official BBM app to run)
3. Download Dual BBM from Google Play or Application website

How to work:

Done with installing Dual BBM? If so, follow the instructions.
You'll be seeing Dual BBM icon on your app drawer, which works for your secondary account. Now, open the Dual BBM app and sign in with account that you wish to be your 2nd account.
After setting up , you will be able to run two BBM accounts on your phone . Both the apps will send different message notifications, easy switch BBM accounts whenever and wherever. Enjoy!

Notice :
Dual BBM needs to apply for the permissions to function normally. And please add BBM2 to white list or exceptional list of some "optimize apps" to make sure that notification of the second account functions well.

Link to Original Source

Submission + - A solution for DDOS packet flooding attacks (

dgallard writes: On October 21, 2016, a DDOS attack crippled access to major Web sites including Amazon and Netflix.

PEIP (Path Enhanced IP) extends the IP protocol to enable determining the router path of packets sent to a target host. Currently, there is no information to indicate which routers a packet traversed on its way to a destination (DDOS target) enabling use of forged source IP addresses to attack the target via packet flooding.

PEIP changes all that. Rather than attempting to prevent attack packets, instead, PEIP provides a way to rate-limit all packets based on their router path to a destination. In this way, DDOS attacks can be thwarted be simply only allowing them a limited amount of bandwith.

Submission + - "Splat" of Schiaparelli Mars lander likely found (

Tablizer writes: "Views from NASA’s Mars Reconnaissance Orbiter released Friday show the crash site where Europe’s experimental Schiaparelli lander fell to the red planet’s surface from a height of several miles, leaving a distinct dark patch on the Martian landscape...

The image from MRO’s context camera shows two new features attributed to the Schiaparelli spacecraft, including a large dark scar spanning an estimated 50 feet (15 meters) by 130 feet (40 meters). Schiaparelli’s ground team believes it is from the high-speed impact of the lander’s main body...

A little more than a half-mile (1 kilometer) to the south, a bright spot appears in the image, likely the 39-foot-diameter (12-meter) supersonic parachute and part of Schiaparelli’s heat shield, which released from the lander just before ESA lost contact."

Submission + - How are all these IoT devices on public address space to be hacked? 1

ChesterRafoon writes: Nearly all of these IoT devices mentioned in the latest internet bot attacks are consumer devices — webcams, thermostats, DVRs, things like that. Most consumer (home) network setups would host these kinds of devices on private address space behind a NAT box of some type. So how on earth where all these devices exposed to the WAN so that telnet (of all things) could attempt to connect and hijack them?

Feds Walk Into a Building, Demand Everyone's Fingerprints To Open Phones ( 400

An anonymous Slashdot reader quotes the Daily Herald: Investigators in Lancaster, California, were granted a search warrant last May with a scope that allowed them to force anyone inside the premises at the time of search to open up their phones via fingerprint recognition, Forbes reported Sunday. The government argued that this did not violate the citizens' Fifth Amendment protection against self incrimination because no actual passcode was handed over to authorities...

"I was frankly a bit shocked," said Andrew Crocker, a staff attorney at the Electronic Frontier Foundation, when he learned about the scope of search warrant. "As far as I know, this warrant application was unprecedented"... He also described requiring phones to be unlocked via fingerprint, which does not technically count as handing over a self-incriminating password, as a "clever end-run" around constitutional rights.


Quantum Researchers Achieve 10-Fold Boost In Superposition Stability ( 81

An anonymous reader quotes The Stack: A team of Australian researchers has developed a qubit offering ten times the stability of existing technologies. The computer scientists claim that the new innovation could significantly increase the reliability of quantum computing calculations... The new technology, developed at the University of New South Wales, has been named a 'dressed' quantum bit as it combines a single atom with an electromagnetic field. This process allows the qubit to remain in a superposition state for ten times longer than has previously been achieved. The researchers argue that this extra time in superposition could boost the performance stability of quantum computing calculations... Previously fragile and short-lived, retaining a state of superposition has been one of the major barriers to the development of quantum computing. The ability to remain in two states simultaneously is the key to scaling and strengthening the technology further.
Do you ever wonder what the world will look like when everyone has their own personal quantum computer?

Should Journalists Ignore Some Leaked Emails? ( 345

Tuesday Lawrence Lessig issued a comment about a leaked email which showed complaints about his smugness from a Clinton campaign staffer: "I'm a big believer in leaks for the public interest... But I can't for the life of me see the public good in a leak like this..." Now mirandakatz shares an article by tech journalist Steven Levy arguing that instead, "The press is mining the dirty work of Russian hackers for gossipy inside-beltway accounts." This is perfectly legal. As long as journalists don't do the stealing themselves, they are solidly allowed to publish what thieves expose, especially if, as in this case, the contents are available to all... [But] is the exploitation of stolen personal emails a moral act? By diving into this corpus to expose anything unseemly or embarrassing, reporters may be, however unwillingly, participating in a scheme by a foreign power to mess with our election...

As a 'good' journalist, I know that I'm supposed to cheer on the availability of information... But it's difficult to argue that these discoveries were unearthed by reporters for the sake of public good...

He's sympathetic to the idea that minutiae from campaigns lets journalists "examine the failings of 'business as usual'," but "it would be so much nicer if some disgruntled colleague of Podesta's was providing information to reporters, rather than Vladimir Putin using them as stooges to undermine our democracy." He ultimately asks, "is it moral to amplify anything that's already exposed on the internet, even if the exposers are lawbreakers with an agenda?"
Classic Games (Games)

New Text Adventures Compete In 22nd 'Interactive Fiction Competition' ( 24

An anonymous Slashdot reader writes: 58 brand-new text adventures are now available free online for the 22nd Annual Interactive Fiction Competition. The public is encouraged to play the games, and on November 16th the contest's organizers will announce which ones received the highest average ratings. After 22 years, the contest is now under "the auspices of the Interactive Fiction Technology Foundation, a new, charitable non-profit corporation dedicated to supporting the technologies and services that enable IF creation and play..." according to the contest's organizers. "[T]he competition now runs on servers paid for by the IF-loving public, and for this I feel sincere gratitude."

New Smart Guns Will Have Fingerprint Readers ( 414

A recent article in the Wall Street Journal described the International San Francisco Smart Gun Symposium, and the "Mark Zuckerberg of guns," a Colorado 18-year-old who's developing a gun which only fires when its owner's fingerprint makes contact with the pistol grip. But it looks like he'll have competition. Lucas123 writes: Armatix LLC's new iP9 smart gun will go on sale in the U.S. in mid-2017 and...will have a fingerprint reader that can store multiple scans like a smartphone. The iP9 is expected to retail for about $1,365, which is more than twice the price of many conventional 9mm semi-automatic pistols...
The company's previous product was a smart gun which only fired when it was within 10 inches of radio waves emanating from its owner's watch, but they had trouble attracting buyers. Armatix now also hopes to interest shooting ranges in a gun which only fires when its built-in RFID system recognizes that it's pointing at a shooting target.

China Has Now Eclipsed The US in AI Research ( 97

Earlier this week, the Obama administration discussed a new strategic plan aimed at fostering the development of AI-centered technologies in the United States. What's striking about it is, the Washington Post notes, although the United States was an early leader in deep-learning research (a subset of the overall branch of AI known as machine learning), China has effectively eclipsed it in terms of the number of papers published annually on the subject (Editor's note: the link could be paywalled; alternate source). From the report: The rate of increase is remarkably steep, reflecting how quickly China's research priorities have shifted. The quality of China's research is also striking. The chart narrows the research to include only those papers that were cited at least once by other researchers, an indication that the papers were influential in the field.

Submission + - Samsung stops production of Galaxy Note 7 (

tripleevenfall writes: Samsung reportedly has halted production of its large screen phone following news of overheating issues in its replacement devices, according to South Korean publications such as Yonhap News Agency. An anonymous Samsung official told Yonhap that the halt was done in cooperation with safety regulators from South Korea, China and the United States.

Over the past week, there have been a handful of reports of overheating in replacement devices. One caused the evacuation of a Southwest Airlines flight; another hurt a teenage girl. What's likely up for Samsung next is a rare, second recall of the Note 7.

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.