Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Bang The Gavel (medium.com)

wesley05fj writes: Bang the Gavel is a full service auction business dedicated to providing charities the country with an easy and highly effective way to raise money for their cause. In total, Bang the Gavel has helped thousands of charities raise tens of millions of dollars, and its leadership team serves on the Boards of several charities, showcasing their commitment to philanthropic efforts.

Submission + - A solution for DDOS packet flooding attacks (oceanpark.com)

dgallard writes: On October 21, 2016, a DDOS attack crippled access to major Web sites including Amazon and Netflix.

PEIP (Path Enhanced IP) extends the IP protocol to enable determining the router path of packets sent to a target host. Currently, there is no information to indicate which routers a packet traversed on its way to a destination (DDOS target) enabling use of forged source IP addresses to attack the target via packet flooding.

PEIP changes all that. Rather than attempting to prevent attack packets, instead, PEIP provides a way to rate-limit all packets based on their router path to a destination. In this way, DDOS attacks can be thwarted be simply only allowing them a limited amount of bandwith.

Submission + - Things You Need to Know About Racing Drones! (studio9xb.com)

urbandrones writes: Drone Racing is a notable game where individuals fly around their drones and race as quick as possible. Most Drones have FPV systems nowadays, which is the First Person View. There are cameras in the racing drones, which give them the vibe of flying as though they were in the cockpit.

Submission + - "Splat" of Schiaparelli Mars lander likely found (spaceflightnow.com)

Tablizer writes: SpaceFlightNow.com: "Views from NASA’s Mars Reconnaissance Orbiter released Friday show the crash site where Europe’s experimental Schiaparelli lander fell to the red planet’s surface from a height of several miles, leaving a distinct dark patch on the Martian landscape...

The image from MRO’s context camera shows two new features attributed to the Schiaparelli spacecraft, including a large dark scar spanning an estimated 50 feet (15 meters) by 130 feet (40 meters). Schiaparelli’s ground team believes it is from the high-speed impact of the lander’s main body...

A little more than a half-mile (1 kilometer) to the south, a bright spot appears in the image, likely the 39-foot-diameter (12-meter) supersonic parachute and part of Schiaparelli’s heat shield, which released from the lander just before ESA lost contact."

Submission + - How are all these IoT devices on public address space to be hacked? 1

ChesterRafoon writes: Nearly all of these IoT devices mentioned in the latest internet bot attacks are consumer devices — webcams, thermostats, DVRs, things like that. Most consumer (home) network setups would host these kinds of devices on private address space behind a NAT box of some type. So how on earth where all these devices exposed to the WAN so that telnet (of all things) could attempt to connect and hijack them?

Submission + - AT&T Buys Time Warner in $86 Billion Deal (wsj.com)

dos4who writes: AT&T Inc. has reached an agreement to buy Time Warner Inc. for $86 billion, according to a person familiar with the plans, in a deal that would transform the phone company into a media giant.

Submission + - Australian Man Claims His iPhone 7 Exploded And Destroyed His Car (hothardware.com)

MojoKid writes: Are our ever more powerful, compact and thin smartphones putting us at risk? Or are we just more sensitized to events like smartphones blowing up since Samsung's nasty Galaxy Note 7 debacle? Regardless, it's beginning to look a lot like the latest smartphone feature trend is spontaneous combustion. While taking a surfing lesson, Australian Mat Jones put his brand-new iPhone 7 underneath some clothing on the seat of his car, safe and sound. Or, so he thought. Upon returning to his vehicle, it was filled with smoke and the source was undeniably his iPhone 7. Not only was the phone destroyed, but his car was torched as well. All smartphones using Lithium-ion batteries have the capability of exploding or catching fire, due to their internal chemical makeup, but under normal circumstances and operating conditions this should never be an issue. Extreme heat can be one contributor to a catastrophic event like this, but that seems an unlikely cause as temperatures are moderate right now at the South Coast of Australia — about 20C (68F) on average. The iPhone 7 in question was also not charging at the time as well. Apple is reportedly working with Jones to determine root cause of the explosion.

Submission + - Is Disclosure of Podesta's emails a Step to Far? (theintercept.com)

mspohr writes: Interesting discussion between Glenn Greenwald and Naomi Klein on The Intercept on the limits of disclosure and privacy.
"...the author and activist Naomi Klein believes there are serious threats to personal privacy and other critical political values posed by hacks of this sort, particularly when accompanied by the indiscriminate publication of someone’s personal emails."
The article notes that back in the early days, Wikileaks carefully vetted its leaks to avoid compromising personal information. However, the latest leaks of DNC email have no editing and contain personal information such as discussion of personal problems of individuals unrelated to any public purpose.
"But personal emails — and there’s all kinds of personal stuff in these emails — this sort of indiscriminate dump is precisely what Snowden was trying to protect us from. That’s why I wanted I wanted to talk with you about it, because I think we need to continuously reassert that principle."
Do Wikileaks or journalists have any responsibility to privacy?

Submission + - Google Goes on Virtual Reality Hiring Spree Amid Daydream Launch (roadtovr.com)

An anonymous reader writes: Google, who began their journey into the world of modern virtual reality with 'Cardbord' in 2014 (https://vr.google.com/cardboard/), has since made the immersive technology central to the future of Android. The company announced Daydream (https://vr.google.com/daydream/), a high-end Android VR initiative earlier this year, and announced the first Daydream ready phone and headset (the Google Pixel and Daydream View) earlier this month. Surrounding these announcements, the company has been adding significantly to its VR talent pool, publishing seven full time VR job listings in the last 30 days alone, and no less than 15 VR job listings in the last 12 months. Those new positions will augment the company's VR team which industry publication Road to VR speculates to number between 50 and 100 employees.

Comment Re:Hunger strike... how silly (Score -1) 66

Anybody really think they will let him die? Please! There will be feeding tubes going into both ends..

Well, I don't think he has anything to worry about since "Hacking" is not a crime and if it is made into one then I think that will be rather difficult to enforce since you would have to lock up most of the population of this planet. Now "Cracking" (think safe cracker) is a different matter.

IT writers, popular press and especially Holywood have been getting the definition of "hacker" wrong for over 25 years.

Even Wikipedia has got it wrong (from an older school perspective) in their initial definition of the word Hacker although if you read further the article does mention the historical difference between the words "hacker" and "cracker". Ah! the power of the ill-informed media.

Repeat after me "A computer hacker is someone who writes and modifies computer code. A computer cracker is someone who illegally breaks into computer systems". As an example, a hacker can write and modify computer code for nefarious purposes but it is only when that code is used for illegal purposes then the person who uses it becomes what is called a "black hat hacker", "script kiddy" or more accurately a "cracker".

Not convinced? How about downloading Wireshark . It's free and it is an excellent network checker. Run Wireshark in the confinement of your home and you are effectively hacking your own network by capturing and analyzing all packets. Run Wireshark outside your own home without permission (written is best) and you could be in trouble for trying to crack any networks that your PC can see.

Submission + - China surpasses U.S. in iOS App Store revenue (bizjournals.com)

Murpatrick writes: Gaming is a large contributor to iOS revenue in China, while other prominent categories include Entertainment and Social Networking. Video streaming apps are also having a major impact on China’s Entertainment category as a whole. App Annie expects non-games will also experience revenue growth due to in-app subscriptions.

Submission + - Would redundancy and really long TTL have countered a lot of DDOS effects? (medium.com) 1

marmot7 writes: My primary takeaways from this article was that it's important to have redundancy (additional NS's) and that it's important to have a very long TTL when you're not actively updating something. Would the measures in this article have at least limited the damage of these attacks? The long TTL change alone would have made the cache likely covered the entire attack, right?

Submission + - Is a Mini Ice Age Coming? 'Maunder Minimum' Spurs Controversy (livescience.com)

An anonymous reader writes: A scientist who claims waning solar activity in the next 15 years will trigger what some are calling a mini ice age has revived talk about the effects of man-made versus natural disruptors to Earth's climate.

Valentina Zharkova, a professor of mathematics at Northumbria University in the United Kingdom, used a new model of the sun's solar cycle, which is the periodic change in solar radiation, sunspots and other solar activity over a span of 11 years, to predict that "solar activity will fall by 60 percent during the 2030s to conditions last seen during the 'mini ice age' that began in 1645," according to a statement.

Slashdot Top Deals

Wishing without work is like fishing without bait. -- Frank Tyger