You are here

Feed aggregator

Linux and Multiple Internet Uplinks: a New Tool

Slashdot - Tue, 03/03/2015 - 21:02
New submitter Alessandro Zarrilli writes: Linux has been able do multipath routing for a long time: it means being able to have routes with multiple gateways and to use them in a (weighted) round-robin fashion. But Linux is missing a tool to actively monitor the state of internet uplinks and change the routing accordingly. Without it, from a LAN perspective, it's like having a RAID-0: just one uplink goes down and all of your LAN-to-WAN traffic goes down too. Documentation and examples on the subject are lacking; existing solutions are few and deeply integrated in firewall/routing specific distributions. To address these issues, a new standalone tool was just released: Fault Tolerant Router. It also includes a complete (iptables + ip policy routing) configuration generator.

Read more of this story at Slashdot.

Categories: Tech/Science News

Snowden Reportedly In Talks To Return To US To Face Trial

Slashdot - Tue, 03/03/2015 - 20:20
HughPickens.com writes: The Globe and Mail reports that Edward Snowden's Russian lawyer, Anatoly Kucherena, says the fugitive former U.S. spy agency contractor is working with American and German lawyers to return home. "I won't keep it secret that he wants to return back home. And we are doing everything possible now to solve this issue. There is a group of U.S. lawyers, there is also a group of German lawyers and I'm dealing with it on the Russian side." Kucherena added that Snowden is ready to return to the States, but on the condition that he is given a guarantee of a legal and impartial trial. The lawyer said Snowden had so far only received a guarantee from the U.S. Attorney General that he will not face the death penalty. Kucherena says Snowden is able to travel outside Russia since he has a three-year Russian residency permit, but "I suspect that as soon as he leaves Russia, he will be taken to the U.S. embassy."

Read more of this story at Slashdot.

Categories: Tech/Science News

Deutsche Telecom Calls For Google and Facebook To Be Regulated Like Telcos

Slashdot - Tue, 03/03/2015 - 19:38
An anonymous reader writes Tim Hoettges, the CEO of the world's third-largest telecoms company, has called for Google and Facebook to be regulated in the same way that telcos are, declaring that "There is a convergence between over-the-top web companies and classic telcos" and "We need one level regulatory environment for us all." The Deutsche Telekom chief was speaking at Monday's Mobile World Congress, and further argued for a loosening of the current regulations which telcos operate under, in order to provide the infrastructure development that governments and policy bodies are asking of them. Hoettges' imprecation comes in the light of news about the latest Google Dance — an annual change in ranking criteria which boosts some businesses and ruins others. The case for and against regulating Google-level internet entities comes down to one question: who do you trust to 'not be evil'?

Read more of this story at Slashdot.

Categories: Tech/Science News

Gritty 'Power Rangers' Short Is Not Fair Use

Slashdot - Tue, 03/03/2015 - 18:56
Bennett Haselton writes: Vimeo and Youtube are pressured to remove a dark, fan-made "Power Rangers" short film; Vimeo capitulated, while Youtube has so far left it up. I'm generally against the overreach of copyright law, but in this case, how could anyone argue the short film doesn't violate the rights of the franchise creator? And should Vimeo and Youtube clarify their policies on the unauthorized use of copyrighted characters? Read on for the rest.

Read more of this story at Slashdot.

Categories: Tech/Science News

Flaw In GoPro Update Mechanism Reveals Users' Wi-Fi Passwords

Slashdot - Tue, 03/03/2015 - 18:15
An anonymous reader writes A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials (including his own). The popular rugged, wearable cameras can be controlled via an app, but in order to do so the user has to connect to the camera's Wi-Fi network. Israel-based infosec expert Ilya Chernyakov discovered the flaw when he had to access the network of a friend's camera, but the friend forgot the login credentials.

Read more of this story at Slashdot.

Categories: Tech/Science News

Supreme Court Gives Tacit Approval To Warrantless DNA Collection

Slashdot - Tue, 03/03/2015 - 17:33
An anonymous reader writes On Monday, the U.S. Supreme Court refused to review a case involving the conviction of a man based solely on the analysis of his "inadvertently shed" DNA. The Electronic Frontier Foundation (EFF) argues that this tacit approval of the government's practice of collecting anyone's DNA anywhere without a warrant will lead to a future in which people's DNA are "entered into and checked against DNA databases and used to conduct pervasive surveillance."

Read more of this story at Slashdot.

Categories: Tech/Science News

What Would Minecraft 2 Look Like Under Microsoft?

Slashdot - Tue, 03/03/2015 - 16:54
An anonymous reader writes "Microsoft spent billions purchasing Mojang, the studio behind the game Minecraft, and while it's unlikely to start work on a sequel anytime soon, rather than continue development of the game, it's worth considering what a Minecraft 2 will look like. After all, as a public company with revenues to justify, it doesn't seem beyond unreasonable a few years down the line, especially since a Minecraft-like game was one of the stand-out tech demos shown for the software giant's HoloLens augmented reality headset. As the author points out, Microsoft will have to tread carefully, tackling issues like whether greater graphical fidelity is actually what players will want ever — and whether to continue to support Minecraft on PlayStation."

Read more of this story at Slashdot.

Categories: Tech/Science News

Why We Should Stop Hiding File-Name Extensions

Slashdot - Tue, 03/03/2015 - 16:13
An anonymous reader writes 14 years after the Anna Kournikova virus took advantage of users' ignorance about file-name extensions in order to wreak worldwide havoc, virus writers and hackers are still taking advantage of the tendency of popular consumer operating systems to hide file-name extensions: Windows users still need to activate extension visibility manually – even though email-transmitted viruses depend most on less savvy users who will never do this. Additionally applications on even the latest versions of Apple's OSX operating system still require the user to 'opt in' to including a file-name extension during an initial save. In looking at some of the eccentricities of the modern user experience, this article argues that it might be time to admit that users need to understand, embrace and responsibly use the only plain-text, obvious indicator of what a file actually is.

Read more of this story at Slashdot.

Categories: Tech/Science News

Why We Should Stop Hiding File-Name Extensions

Slashdot - Tue, 03/03/2015 - 16:13
An anonymous reader writes 14 years after the Anna Kournikova virus took advantage of users' ignorance about file-name extensions in order to wreak worldwide havoc, virus writers and hackers are still taking advantage of the tendency of popular consumer operating systems to hide file-name extensions: Windows users still need to activate extension visibility manually – even though email-transmitted viruses depend most on less savvy users who will never do this. Additionally applications on even the latest versions of Apple's OSX operating system still require the user to 'opt in' to including a file-name extension during an initial save. In looking at some of the eccentricities of the modern user experience, this article argues that it might be time to admit that users need to understand, embrace and responsibly use the only plain-text, obvious indicator of what a file actually is.

Read more of this story at Slashdot.








Categories: Tech/Science News

Khronos Group Announces Vulkan To Compete Against DirectX 12

Slashdot - Tue, 03/03/2015 - 15:54
Phopojijo writes The Khronos Group has announced the Vulkan API for compute and graphics. Its goal is to compete against DirectX 12. It has some interesting features, such as queuing to multiple GPUs and an LLVM-based bytecode for its shading language to remove the need for a compiler from the graphics drivers. Also, the API allows graphics card vendors to support Vulkan with drivers back to Windows XP "and beyond."

Read more of this story at Slashdot.

Categories: Tech/Science News

Khronos Group Announces Vulkan To Compete Against DirectX 12

Slashdot - Tue, 03/03/2015 - 15:54
Phopojijo writes The Khronos Group has announced the Vulkan API for compute and graphics. Its goal is to compete against DirectX 12. It has some interesting features, such as queuing to multiple GPUs and an LLVM-based bytecode for its shading language to remove the need for a compiler from the graphics drivers. Also, the API allows graphics card vendors to support Vulkan with drivers back to Windows XP "and beyond."

Read more of this story at Slashdot.








Categories: Tech/Science News

Inside the North Korean Data Smuggling Movement

Slashdot - Tue, 03/03/2015 - 15:31
Sparrowvsrevolution writes A new Wired magazine story goes inside the North Korean rebel movement seeking to overthrow Kim Jong-un by smuggling USB drives into the country packed with foreign television and movies. As the story describes, one group has stashed USB drives in Chinese cargo trucks. Another has passed them over from tourist boats that meet with fishermen mid-river. Others arrange USB handoffs at the Chinese border in the middle of the night with walkie talkies, laser pointers, and bountiful bribes. Even Kim assassination comedy The Interview, which the North Korean government allegedly hacked Sony to prevent from being released, has made it into the country: Chinese traders' trucks carried 20 copies of the film across the border the day after Christmas, just two days after its online release.

Read more of this story at Slashdot.

Categories: Tech/Science News

Inside the North Korean Data Smuggling Movement

Slashdot - Tue, 03/03/2015 - 15:31
Sparrowvsrevolution writes A new Wired magazine story goes inside the North Korean rebel movement seeking to overthrow Kim Jong-un by smuggling USB drives into the country packed with foreign television and movies. As the story describes, one group has stashed USB drives in Chinese cargo trucks. Another has passed them over from tourist boats that meet with fishermen mid-river. Others arrange USB handoffs at the Chinese border in the middle of the night with walkie talkies, laser pointers, and bountiful bribes. Even Kim assassination comedy The Interview, which the North Korean government allegedly hacked Sony to prevent from being released, has made it into the country: Chinese traders' trucks carried 20 copies of the film across the border the day after Christmas, just two days after its online release.

Read more of this story at Slashdot.








Categories: Tech/Science News

NVIDIA Fixes Old Compiz Bug

Slashdot - Tue, 03/03/2015 - 14:50
jones_supa writes NVIDIA has fixed a long-standing issue in the Ubuntu Unity desktop by patching Compiz. When opening the window of a new application, it would go black or become transparent on NVIDIA hardware. There have been bug reports dating back to Ubuntu 12.10 times. The problem was caused by Compiz, which had some leftover code from a port. An NVIDIA developer posted on Launchpad and said the NVIDIA team has been looking at this issue, and they also proposed a patch. "Our interpretation of the specification is that creating two GLX pixmaps pointing at the same drawable is not allowed, because it can lead to poorly defined behavior if the properties of both GLX drawables don't match. Our driver prevents this, but Compiz appears to try to do this," wrote NVIDIA's Arthur Huillet. The Compiz patch has been accepted upstream.

Read more of this story at Slashdot.

Categories: Tech/Science News

NVIDIA Fixes Old Compiz Bug

Slashdot - Tue, 03/03/2015 - 14:50
jones_supa writes NVIDIA has fixed a long-standing issue in the Ubuntu Unity desktop by patching Compiz. When opening the window of a new application, it would go black or become transparent on NVIDIA hardware. There have been bug reports dating back to Ubuntu 12.10 times. The problem was caused by Compiz, which had some leftover code from a port. An NVIDIA developer posted on Launchpad and said the NVIDIA team has been looking at this issue, and they also proposed a patch. "Our interpretation of the specification is that creating two GLX pixmaps pointing at the same drawable is not allowed, because it can lead to poorly defined behavior if the properties of both GLX drawables don't match. Our driver prevents this, but Compiz appears to try to do this," wrote NVIDIA's Arthur Huillet. The Compiz patch has been accepted upstream.

Read more of this story at Slashdot.








Categories: Tech/Science News

Hillary Clinton Used Personal Email At State Dept., Possibly Breaking Rules

Slashdot - Tue, 03/03/2015 - 14:10
HughPickens.com writes: The NY Times reports that Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, according to State Department officials. She may have violated federal requirements that officials' correspondence be retained as part of the agency's record. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act. "It is very difficult to conceive of a scenario — short of nuclear winter — where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business," said attorney Jason R. Baron. A spokesman for Clinton defended her use of the personal email account and said she has been complying with the "letter and spirit of the rules."

Read more of this story at Slashdot.

Categories: Tech/Science News

Hillary Clinton Used Personal Email At State Dept., Possibly Breaking Rules

Slashdot - Tue, 03/03/2015 - 14:10
HughPickens.com writes: The NY Times reports that Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, according to State Department officials. She may have violated federal requirements that officials' correspondence be retained as part of the agency's record. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act. "It is very difficult to conceive of a scenario — short of nuclear winter — where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business," said attorney Jason R. Baron. A spokesman for Clinton defended her use of the personal email account and said she has been complying with the "letter and spirit of the rules."

Read more of this story at Slashdot.








Categories: Tech/Science News

Codename: Cloudy Viper

The Daily WTF - Tue, 03/03/2015 - 13:00

In the interview, Initech seemed nice enough. The managers seemed like nice, normal people, and the company’s vibe seemed quite good. When Terrence was extended an offer, he accepted and joined.


by Jeremy Thompson

Things immediately went south. A major client cancelled after years of mounting frustration with Initech’s software. A major client, and that affected cashflow enough that Initech was forced to downsize.

The hatchet-job on the staff moved a developer named Boris up to the Lead Architect position. Boris was a weird bloke with odd social skills and a big, greasy lollipop head, but the staff whispered in awe of his “legendary” programming skills. As one co-worker explained to Terrance, “Boris knows everything there is to know about software engineering techniques, he just doesn’t bother to use them.” By skipping over trivial steps, like requirements gathering, documentation, and testing, Boris was able to develop new applications very quickly, and that speed was important if Initech was going to start getting clients again.

Boris took the lead on a new project, code-named “Cloudy Viper”. The name was apt, because without any formal requirements or development plan, its intended purpose was quite murky, and it poisoned any developer not named “Boris”. Turnover hit 60% that year, as Boris burned through the development team, churning out terrible, mostly incomprehensible, and untested (and untestable) code. “It’s important we get core feature working,” he explained before passing the code off to junior developers to make production-worthy.

Over time, the product oozed out and was released to multiple clients, for utterly different purposes. A modular or plugin-based architecture would have been perfect, but instead the big ball of mud was given to all of the customers, with no variation. This meant customers who bought a system to manage their ice cream inventory also had tools to herd cats. The user interface was so hacked together and hostile, some screens required users to manually enter their own SQL into a text box.

As Cloudy Viper poisoned developer after developer, it was only a matter of time before Terrance was exposed to the project. Boris handed him thousands of lines of scripts and includes, some with millions of lines of code, strewn like electronic garbage around a senseless directory system, and a single exception handler in the top-level Main function, which handled all exceptions for the application and would eventually crash the Visual Studio debugger.

One line stuck out to Terrance:

thechkbox = currRating[0].parentElement.parentElement.parentElement.parentElement.parentElement.parentElement.children(2).children(0).children(0) thechkbox.disabled = false;

The database backend was a classic example of the Inner-Platform Effect, containing tables of tables and tables of fields and tables of datatypes. Terrance began interviewing with other companies, and along the way, met several other people who used to work at Initech.

They all asked the same thing: “Does Boris still work there?”

“He’s the Lead Architect now.”

“I can see why you’re leaving.”

[Advertisement] Release! is a light card game about software and the people who make it. Play with 2-5 people, or up to 10 with two copies - only $9.95 shipped!
Categories: Fun/Other

Google Backs Off Default Encryption on New Android Lollilop Devices

Slashdot - Tue, 03/03/2015 - 11:09
An anonymous reader writes: Although Google announced in September 2014 that Android 5.0 Lollipop would require full-disk encryption by default in new cell phones, Ars Technica has found otherwise in recently-released 2nd-gen Moto E and Galaxy S6. It turns out, according to the latest version of the Android Compatibility Definition document (PDF), full-disk encryption is currently only "very strongly recommended" in anticipation of mandatory encryption requirements in the future. The moral of the story is: don't be lazy — check that your full-disk encryption is actually enabled.

Read more of this story at Slashdot.

Categories: Tech/Science News

Google Backs Off Default Encryption on New Android Lollilop Devices

Slashdot - Tue, 03/03/2015 - 11:09
An anonymous reader writes: Although Google announced in September 2014 that Android 5.0 Lollipop would require full-disk encryption by default in new cell phones, Ars Technica has found otherwise in recently-released 2nd-gen Moto E and Galaxy S6. It turns out, according to the latest version of the Android Compatibility Definition document (PDF), full-disk encryption is currently only "very strongly recommended" in anticipation of mandatory encryption requirements in the future. The moral of the story is: don't be lazy — check that your full-disk encryption is actually enabled.

Read more of this story at Slashdot.








Categories: Tech/Science News

Pages

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer