Slashdot

Tweetbutton tweet

Subscribe to Slashdot feed Slashdot
News for nerds, stuff that matters
Updated: 14 min 17 sec ago

Artificial Spleen Removes Ebola, HIV Viruses and Toxins From Blood Using Magnets

Mon, 09/15/2014 - 12:55
concertina226 writes Harvard scientists have invented a new artificial spleen that is able to clear toxins, fungi and deadly pathogens such as Ebola from human blood, which could potentially save millions of lives. When antibiotics are used to kill them, dying viruses release toxins in the blood that begin to multiply quickly, causing sepsis, a life-threatening condition whereby the immune system overreacts, causing blood clotting, organ damage and inflammation. To overcome this, researchers have invented a "biospleen", a device similar to a dialysis machine that makes use of magnetic nanobeads measuring 128 nanometres in diameter (one-five hundredths the width of a single human hair) coated with mannose-binding lectin (MBL), a type of genetically engineered human blood protein.

Read more of this story at Slashdot.








Categories: Open Source

The FCC Net Neutrality Comment Deadline Has Arrived: What Now?

Mon, 09/15/2014 - 12:12
blottsie writes After months of heated debate, viral campaigns, deliberate "slowdowns" and record-breaking public responses, the Federal Communications Commission is finally set to decide how "net neutrality"—the principle that all data must be treated equally by Internet service providers (ISPs)—should look in the U.S., or if it should exist at all. Today, Sept. 15, the FCC officially closes its public comment period on its latest net neutrality proposal. The plan enables ISPs to discriminate against certain types of data, in certain circumstances, by charging extra for broadband “fast lanes” between content providers—like Netflix or YouTube—and users.

Read more of this story at Slashdot.








Categories: Open Source

How Governments Are Getting Around the UN's Ban On Blinding Laser Weapons

Mon, 09/15/2014 - 11:30
Lasrick writes Despite the UN's 1995 Protocol on Blinding Laser Weapons, the world is moving closer to laser weapons in both military and law enforcement situations that can cause temporary and even permanent blindness. Military-funded research in this area continues to be conducted by the Optical Radiation Bioeffects and Safety program, and already "dazzlers" have been in use in Afghanistan. Domestic versions of these weapons are intended for use by law enforcement agencies and in theory cause motion-sickness type illness but not blindness. "But something bright enough to dazzle at 300 meters can cause permanent eye damage at 50 meters, and these devices can be set to deliver a narrow (and more intense) beam."

Read more of this story at Slashdot.








Categories: Open Source

Canon Printer Hacked To Run Doom</em> Video Game

Mon, 09/15/2014 - 11:10
wiredog writes Security researcher Michael Jordon has hacked a Canon's Pixma printer to run Doom. He did so by reverse engineering the firmware encryption and uploading via the update interface. From the BBC: "Like many modern printers, Canon's Pixma range can be accessed via the net, so owners can check the device's status. However, Mr Jordon, who works for Context Information Security, found Canon had done a poor job of securing this method of interrogating the device. 'The web interface has no user name or password on it,' he said. That meant anyone could look at the status of any device once they found it, he said. A check via the Shodan search engine suggests there are thousands of potentially vulnerable Pixma printers already discoverable online. There is no evidence that anyone is attacking printers via the route Mr Jordon found."

Read more of this story at Slashdot.








Categories: Open Source

New Data Center Protects Against Solar Storm and Nuclear EMPs

Mon, 09/15/2014 - 10:49
dcblogs writes "In Boyers, Pa., a recently opened 2,000-sq.-ft. data center has been purpose-built to protect against an electromagnetic pulse (EMP), either generated by a solar storm or a nuclear event. The company that built the facility isn't disclosing exactly how the data center was constructed or what materials were used. But broadly, it did say that the structure has an inner skin and an outer skin that use a combination of thicknesses and metals to provide EMP protection. Betting against an EMP event is a gamble. In 1859, the so-called Carrington solar storm lit the night skies and disrupted the only telegraph communications. William Murtagh, program coordinator at U.S. Space Weather Prediction Center, said there is ongoing concern that the earth may see an solar storm that could impact electronics on the ground. "We're concerned that can happen," A 2012 solar storm, that missed the earth, "was very powerful, and some have suggested it would have been on par with a Carrington-level event." One researcher put the odds of a catastrophic solar storm by 2020 as one in eight.

Read more of this story at Slashdot.








Categories: Open Source

Ask Slashdot: What To Do After Digitizing VHS Tapes?

Mon, 09/15/2014 - 10:06
An anonymous reader writes Now that I've spent close to a month digitizing a desk drawer's worth of VHS tapes, deinterlacing and postprocessing the originals to minimize years of tape decay, and compressing everything down to H.264, I've found myself with a hard drive full of loosely organized videos. They'll get picked up by my existing monthly backup, but I feel like I haven't gained much in the way of redundancy, as I thought I would. Instead of having tapes slowly degrade, I'm now open to losing entire movies at once, should both of my drives go bad. Does anyone maintain a library, and if so, what would they recommend? Is having them duplicated on two drives (one of which is spun down for all but one day of the month) a good-enough long term strategy? Should I look into additionally backing up to optical discs or flash drives, building out a better (RAIDed) backup machine, or even keeping the original tapes around despite them having been digitized?

Read more of this story at Slashdot.








Categories: Open Source

Chinese City Sets Up "No Cell Phone" Pedestrian Lanes

Mon, 09/15/2014 - 09:25
An anonymous reader writes The Chinese city of Chongqing has created a smartphone sidewalk lane, offering a path for those too caught up in messaging and tweeting to watch where they're going. "There are lots of elderly people and children in our street, and walking with your cell phone may cause unnecessary collisions here," said Nong Cheng, a spokeswoman for the district's property management company. However, she clarified that the initiative was meant to be a satirical way to highlight the dangers of texting and walking.

Read more of this story at Slashdot.








Categories: Open Source

Extent of Antarctic Sea Ice Reaches Record Levels

Mon, 09/15/2014 - 08:43
schwit1 writes Scientists have declared a new record has been set for the extent of Antarctic sea ice since records began. Satellite imagery reveals an area of about 20 million square kilometers covered by sea ice around the Antarctic continent. Jan Lieser from the Antarctic Climate and Ecosystems Cooperative Research Centre (CRC) said the discovery was made two days ago. "Thirty-five years ago the first satellites went up which were reliably telling us what area, two dimensional area, of sea ice was covered and we've never seen that before, that much area."

Read more of this story at Slashdot.








Categories: Open Source

European Space Agency Picks Site For First Comet Landing In November

Mon, 09/15/2014 - 07:53
An anonymous reader writes Europe's Rosetta mission, which aims to land on a comet later this year, has identified what it thinks is the safest place to touch down. From the article: "Scientists and engineers have spent weeks studying the 4km-wide "ice mountain" known as 67P, looking for a location they can place a small robot. They have chosen what they hope is a relatively smooth region on the smaller of the comet's two lobes. But the team is under no illusions as to how difficult the task will be. Comet 67P/Churyumov-Gerasimenko, currently sweeping through space some 440 million km from Earth, is highly irregular in shape. Its surface terrain is marked by deep depressions and towering cliffs. Even the apparently flat surfaces contain potentially hazardous boulders and fractures. Avoiding all of these dangers will require a good slice of luck as well as careful planning.

Read more of this story at Slashdot.








Categories: Open Source

Google's Android One Initiative Launches In India With Three $100 Phones

Mon, 09/15/2014 - 07:17
An anonymous reader writes Google has unveiled its first set of Android One low-cost smartphones in the Indian market, partnering with Indian hardware vendors Spice, Micromax and Karbonn. The three phones will be available online on Flipkart, Amazon and Snapdeal and via Reliance Digital, Croma and The Mobile Store, offline. The phones provide a minimum set of features determined by Google, which has sourced several of the components to help cut manufacturing costs. The company has also teamed up with a local network to make it cheaper to download Android updates and new apps.

Read more of this story at Slashdot.








Categories: Open Source

Microsoft To Buy Minecraft Maker Mojang For $2.5 Billion

Mon, 09/15/2014 - 06:34
jawtheshark writes The rumors were true. Mojang, the company behind Minecraft, is being sold to Microsoft. Of course, the promise is to keep all products supported as they are. From the article: "Microsoft said it has agreed to buy Mojang AB, the Swedish video game company behind the hit Minecraft game, boosting its mobile efforts and cementing control of another hit title for its Xbox console. Minecraft, which has notched about 50 million copies sold, will be purchased by Microsoft for $2.5 billion, the company said in a statement. The move marks the tech giant's most ambitious video game purchase and the largest acquisition for Satya Nadella, its new chief executive. Minecraft is more than a great game franchise - it is an open world platform, driven by a vibrant community we care deeply about, and rich with new opportunities for that community and for Microsoft,' Nadella said in a statement."

Read more of this story at Slashdot.








Categories: Open Source

Comcast Allegedly Asking Customers to Stop Using Tor

Mon, 09/15/2014 - 05:46
An anonymous reader writes Comcast agents have reportedly contacted customers who use Tor and said their service can get terminated if they don't stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent who allegedly called Tor an “illegal service.” The Comcast agent told the customer that such activity is against usage policies. The Comcast agent then allegedly told the customer: "Users who try to use anonymity, or cover themselves up on the internet, are usually doing things that aren’t so-to-speak legal. We have the right to terminate, fine, or suspend your account at anytime due to you violating the rules. Do you have any other questions? Thank you for contacting Comcast, have a great day."

Read more of this story at Slashdot.








Categories: Open Source

New Details About NSA's Exhaustive Search of Edward Snowden's Emails

Mon, 09/15/2014 - 05:04
An anonymous reader points out this Vice story with new information about the NSA's search of Edward Snowden's emails. Last year, the National Security Agency (NSA) reviewed all of Edward Snowden's available emails in addition to interviewing NSA employees and contractors in order to determine if he had ever raised concerns internally about the agency's vast surveillance programs. According to court documents the government filed in federal court September 12, NSA officials were unable to find any evidence Snowden ever had. In a sworn declaration, David Sherman, the NSA's associate director for policy and records, said the agency launched a "comprehensive" investigation after journalists began to write about top-secret NSA spy programs upon obtaining documents Snowden leaked to them. The investigation included searches of any records where emails Snowden sent raising concerns about NSA programs "would be expected to be found within the agency." Sherman, who has worked for the NSA since 1985, is a "original classification authority," which means he can classify documents as "top-secret" and process, review, and redact records the agency releases in response to Freedom of Information Act (FOIA) requests. In his declaration, Sherman detailed steps he said agency officials took to track down any emails Snowden wrote that contained evidence he'd raised concerns inside the agency. Sherman said the NSA searched sent, received, deleted emails from Snowden's account and emails "obtained by restoring back-up tapes." He noted that NSA officials reviewed written reports and notes from interviews with "NSA affiliates" with whom the agency spoke during its investigation.

Read more of this story at Slashdot.








Categories: Open Source

Malware Distributed Through Twitch Chat Is Hijacking Steam Accounts

Mon, 09/15/2014 - 02:03
An anonymous reader writes If you use Twitch don't click on any suspicious links in the video streaming platform's chat feature. Twitch Support's official Twitter account issued a security warning telling users not to click the "csgoprize" link in chat. According to f-secure, the link leads to a Java program that asks for your name and email. If you provide the info it will install a file on your computer that's able to take out any money you have in your Steam wallet, as well as sell or trade items in your inventory. "This malware, which we call Eskimo, is able to wipe your Steam wallet, armory, and inventory dry," says F-Secure. "It even dumps your items for a discount in the Steam Community Market. Previous variants were selling items with a 12 percent discount, but a recent sample showed that they changed it to 35 percent discount. Perhaps to be able to sell the items faster."

Read more of this story at Slashdot.








Categories: Open Source

Apple Outrages Users By Automatically Installing U2's Album On Their Devices

Sun, 09/14/2014 - 23:03
Zanadou writes "Apple may have succeeded at breaking two records at once with the free release of U2's latest album, titled Songs of Innocence, via iTunes. But now, it looks like it's also on track to become one of the worst music publicity stunts of all time. Users who have opted to download new purchases to their iPhones automatically have found the new U2 album sitting on their phones. But even if iTunes users hadn't chosen automatic downloads, Songs of Innocence will still be displayed as an "iTunes in the Cloud" purchase. That means it will still be shown as part of your music library, even if you delete all the tracks. The only way to make the U2 album go away is to go to your Mac or PC and hide all of your "iTunes in the Cloud" purchases, or to use iTunes to manually hide each track from your purchased items list. Other reactions include rapper, Tyler, The Creator, saying that having the new U2 album automatically downloaded on his iPhone was like waking up with a STD.

Read more of this story at Slashdot.








Categories: Open Source

Oculus Rift CEO Says Classrooms of the Future Will Be In VR Goggles

Sun, 09/14/2014 - 20:02
jyosim writes "Oculus Rift isn't just for gaming. Brendan Iribe, CEO of the VR company, says the immersive tech will be "one of the most transformative platforms for education of all time." In an interview with Chronicle of Higher Education, he imagined laser-scanning every object in the Smithsonian for students to explore, and collaborating in shared virtual spaces rather than campuses. "The next step past that is when you have shared space, and not only do you believe that this object is right there in front of me, but I look around and I see other people just like we see each other now, and I really, truly believe that you’re right in front of me. We can look at each others’ eyes. If you look down at something, I can look down at the same time. And it’s every bit as good as this. And if we can make virtual reality every bit as good as real reality in terms of communications and the sense of shared presence with others, you can now educate people in virtual classrooms, you can now educate people with virtual objects, and we can all be in a classroom together [virtually], we can all be present, we can have relationships and communication that are just as good as the real classroom," he says.

Read more of this story at Slashdot.








Categories: Open Source

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

Sun, 09/14/2014 - 17:05
wabrandsma) writes with the latest accusations about NSA spying activity in Germany. According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.

Read more of this story at Slashdot.








Categories: Open Source

Chrome For Mac Drops 32-bit Build

Sun, 09/14/2014 - 15:53
jones_supa writes Google has revealed that it's launching the finished 64-bit version of Chrome 39 for OS X this November, which already brought benefits in speed, security and stability on Windows. However at this point the 32-bit build for Mac will cease to exist. Just to make it clear, this decision does not apply to Windows and Linux builds, at least for now. As a side effect, 32-bit NPAPI plugins will not work on Chrome on Mac version 39 onwards. The affected hardware are only the very first x86-based Macs with Intel Core Duo processors. An interesting question remains, whether the open source version of Chrome, which is of course Chromium, could still be compiled for x86-32 on OS X.

Read more of this story at Slashdot.








Categories: Open Source

3D-Printed Car Takes It's First Test Drive

Sun, 09/14/2014 - 14:38
An anonymous reader points out this advancement in 3D printing. This week, at the International Manufacturing Technology Show (IMTS) in Chicago, Arizona-based automobile manufacturer Local Motors stole the show. Over the six day span of the IMTS, the company managed to 3D print, and assemble an entire automobile, called the "Strati", live in front of spectators. Although the Strati is not the first ever car to be 3D printed, the advancements made by Local Motor with help from Cincinnati Inc, and Oak Ridge National Laboratory, have produced a vehicle in days rather than months.

Read more of this story at Slashdot.








Categories: Open Source

Navy Guilty of Illegally Broad Online Searches: Child Porn Conviction Overturned

Sun, 09/14/2014 - 13:24
An anonymous reader writes In a 2-1 decision, the 9th Circuit Court ruled that Navy investigators regularly run illegally broad online surveillance operations that cross the line of military enforcement and civilian law. The findings overturned the conviction of Michael Dreyer for distributing child pornography. The illegal material was found by NCIS agent Steve Logan searching for "any computers located in Washington state sharing known child pornography on the Gnutella file-sharing network." The ruling reads in part: "Agent Logan's search did not meet the required limitation. He surveyed the entire state of Washington for computers sharing child pornography. His initial search was not limited to United States military or government computers, and, as the government acknowledged, Agent Logan had no idea whether the computers searched belonged to someone with any "affiliation with the military at all." Instead, it was his "standard practice to monitor all computers in a geographic area," here, every computer in the state of Washington. The record here demonstrates that Agent Logan and other NCIS agents routinely carry out broad surveillance activities that violate the restrictions on military enforcement of civilian law. Agent Logan testified that it was his standard practice to "monitor any computer IP address within a specific geographic location," not just those "specific to US military only, or US government computers." He did not try to isolate military service members within a geographic area. He appeared to believe that these overly broad investigations were permissible, because he was a "U.S. federal agent" and so could investigate violations of either the Uniform Code of Military Justice or federal law."

Read more of this story at Slashdot.








Categories: Open Source

Pages