Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - 'Calibration error' changes GOP votes to Dem in Illinois (

Okian Warrior writes: Early voting in Illinois got off to a rocky start Monday, as votes being cast for Republican candidates were transformed into votes for Democrats.

Republican state representative candidate Jim Moynihan: “I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”

The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.

Submission + - "Most serious" Linux privilege-escalation bug ever is under active exploit (

operator_error writes: Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

By Dan Goodin — 10/20/2016

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

Submission + - ICANN recommends TLDs like .txt -- and .exe ( 1

fyngyrz writes: ICANN says, in part:

Given preliminary feedback that there is not a technical need to prevent file extensions as TLDs, as well as the lack of an authoritative source of common file extensions to draw from, staff determined that it is not workable to prevent common file extensions from being used as TLDs.

To summarize, it is the recommendation of the ICANN technical staff to allow applications for TLD strings that may also be commonly used for file extensions.

But will ICANN approve such applications? If so, we can all look forward to opportunities to click on...


Submission + - Filmmaker Arrested At Pipeline Protest Facing 45 Years In Felony Charges (

walterbyrd writes: The lengths that the oil industry, and their puppet politicians, will go to suppress information is amazing. 45 years is way more than most people get for murder.

Deia Schlosberg, the producer of the upcoming documentary “How to Let Go of the World and Love All Things Climate Can’t Change,” was detained while filming a protest against TransCanada’s Keystone Pipeline in Walhalla, North Dakota. Activists at the event, associated with the group Climate Direct Action, shut down the pipeline, which carries oil from Canadian tar sands to the U.S, for about seven hours.

Submission + - Strange New World: Samba Server running on Windows ! ( 1

Jeremy Allison - Sam writes: "Do you know what this is? This is a non-Windows SMB file server running natively on Windows."

"To be more specific, this is a Virtualbox Ubuntu virtual machine running on Windows 10, grabbing a file across SMB from a Samba file server running inside the Windows Subsystem for Linux through Bash."

Submission + - SPAM: John Podesta's Password Found in WikiLeaks Dump

Okian Warrior writes: Unauthorized users appear to have accessed Hillary Clinton Campaign Chairman John Podesta’s various accounts after an email containing his Apple ID and password was found within the recent WikiLeaks email release.

One user is alleged to have remotely erased Podesta’s iPhone . Another user tagged WikiLeaks editor Julian Assange in a Twitter post along with various screenshots of Podesta’s Apple account and the comment: “You are going to be getting some interesting information shortly.”

Link to Original Source

Comment Re:Why Retire the ISS? (Score 1) 64

As time goes on it becomes harder to keep the inside infection free. The ISS has no immune system, let alone an adaptable one. Mir was filled with lots of nasty bacteria and fungi after a short lifetime, which showed us that we need to build spacecraft with super cleanliness in mind, but we still can't get it right over the long term. Now and then it will be prudent to just build a new one and try not to cross-infect it with equipment and people exchanges before we burn it with reentry.

Submission + - Argumentative Twitter bot can go for hours before people realize it's not human

AmiMoJo writes: Like something out of a Monty Python sketch, the a Twitter bot called "Liz" with the handle @arguetron has been engaging in long running debates using simple AI. Its author points out that "So many arguments, especially on a place like Twitter, are almost content-neutral. You can swap one argument out for another and the context is almost irrelevant." That’s why @arguetron’s conversations look so much like arguments a real person might have with a persistent troll.

Submission + - Why science fiction authors can't win

bowman9991 writes: Science fiction authors have long been outcasts from the literary world, critics using the worst examples of the genre as ammunition against it. Unfortunately though, at times even science fiction authors themselves can turn on their own kind: “Science fiction is rockets, chemicals and talking squids in outer space,” mocked Margaret Atwood, one of her many attempts to convince people that she is not a science fiction author, even though one of her most famous novels, A Handmaid’s Tale, is exactly that. Considered by the literary establishment, and frequently by non-SF award-giving institutions, to be trashy, pulpish, commercially driven lightweight gutter fiction, it’s no surprise that very few works of science fiction have won major literary awards. Kim Stanley Robinson, author of the award-winning (not “literary” awards obviously) Mars novels recently hit out at the literary establishment, accusing the Man Booker judges of “ignorance” in neglecting science fiction, which he declared was “the best British literature of our time”.

Submission + - A U.S. election-system vendor who uses developers in Serbia (

dcblogs writes: Voting machines are privately manufactured and developed and, as with other many other IT systems, the code is typically proprietary. The use of proprietary systems in elections has its critics. One Silicon Valley group, the Open Source Election Technology Foundation, is pushing for an election system that shifts from proprietary, vendor-owned systems to one that that is owned "by the people of the United States." One major election technology company, Dominion Voting Systems (DVS), develops its systems in the U.S. and Canada but also has an office in Belgrade, Serbia. It was recently advertising openings for four senior software developers in Belgrade. "Like many of America's largest technology companies — which develop some of the software for their products in places like Asia, India, Ireland and the Mideast — some of our software development is undertaken outside the U.S. and Canada, specifically, in Serbia, where we have conducted operations for 10 years," said firm spokesman Chris Riggall.

Submission + - SPAM: Dark matter unnecessary?

schwit1 writes: A new analysis of the infrared data from 153 galaxies using the Spitzer Space Telescope suggests that dark matter might not be necessary to explain the rotation of galaxies.

First, this concise and nicely written explanation from the link of why dark matter has been proposed:

Newton’s laws of motion predict that planets that revolve closer to a star move faster than those that are farther away. In principle this should also hold true for stars circling the cores of galaxies, but for nearly a century, astronomers have seen that stars near the outskirts of galaxies orbit at nearly the same velocities as ones near galactic centers.

To explain why these outlying stars travel as quickly as they do without flying out into the void beyond, researchers came up with the idea of dark matter, a substance whose gravitational pull is thought to keep whirling stars in check. Scientists have largely ruled out all known particles as possible explanations for dark matter, and the consensus is that dark matter must be a kind of invisible, intangible material that is only detectable via its gravitational influence.

However, despite decades of trying, researchers have failed to capture a single mote of dark matter, even though it is supposed to make up roughly five-sixths of all matter in the universe. This raises the possibility that dark matter might not be real.

Link to Original Source

Submission + - Multiple Linux Distributions Affected by Crippling Bug in systemd ( 1

An anonymous reader writes: System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with one command. "After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system." According to the bug report, Debian, Ubuntu, and CentOS are among the distros susceptible to various levels of resource exhaustion. The bug, which has existed for more than two years, does not require root access to exploit.

Submission + - The Power of Lazy Programming

snydeq writes: Whoever said working hard is a virtue never met a programmer, writes Peter Wayner in his roundup of tools and techniques that prove the power of lazy programming. 'Coders who ignore those “work hard, stay humble” inspirational wall signs often produce remarkable results, all because they are trying to avoid having to work too hard. The true geniuses find ways to do the absolute minimum by offloading their chores to the computer. After all, getting the computer to do the work is the real job of computer programmers.'

Submission + - Ask Slashtot: How to determine if your IOT device is part of a botnet? 1

galgon writes: There has been a number of stories of IoT devices becoming part of
Botnets and being used in DDOS Attacks. If these devices are seemingly working correctly to the user how would they ever know the device was compromised? Is there anything the average user can do to detect when they have a misbehaving device on their network?

Slashdot Top Deals

8 Catfish = 1 Octo-puss