Forgot your password?
typodupeerror

Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

Quake

Changing the Rules of a 15-Year-Old Game: Quake Live Update Causes Controversy 16

Posted by Soulskill
from the sleep-is-for-the-weak dept.
An anonymous reader writes: As id Software aims for a larger, more mainstream audience for its free-to-play shooter Quake Live (based on 1998's Quake III Arena) on Steam, big changes are afoot. A new update was pushed out last week which adds some new, more beginner-friendly features to the game. These include weapon loadouts, which grant players a weapon of their choice when they spawn, timer icons, which indicate when the all-important powerup items will spawn, and an automatic bunny-hop to gain extra speed. The changes have been met with hostility from longtime players who prefer the "purist" rules of old and the duel format. As the writer points out, however, if the update helps attract more elite players to the gamer, it could breathe new life into a very old game.
Cellphones

Mysterious, Phony Cell Towers Found Throughout US 78

Posted by Soulskill
from the can-you-hear-me-now dept.
Trachman writes: Popular Science magazine recently published an article about a network of cell towers owned not by telecommunication companies but by unknown third parties. Many of them are built around U.S. military bases. "Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. ... Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example."
Google

Google Serves Old Search Page To Old Browsers 86

Posted by Soulskill
from the you-get-what-you-get-and-you-like-it dept.
Rambo Tribble writes: In an apparent move to push those using older browsers to update, Google is reported to be serving outdated search pages to said browsers. The older pages lack features available on the newer versions, and this policy compounds with the limits announced in 2011 on Gmail support for older web clients. As a Google engineer put it, "We're continually making improvements to Search, so we can only provide limited support for some outdated browsers." The BBC offers a fairly comprehensive analysis.
Firefox

Firefox 32 Arrives With New HTTP Cache, Public Key Pinning Support 95

Posted by Soulskill
from the cache-money dept.
An anonymous reader writes: Mozilla today officially launched Firefox 32 for Windows, Mac, Linux, and Android. Additions include a new HTTP cache for improved performance, public key pinning support, and easy language switching on Android. The Android version is trickling out slowly on Google Play. Changelogs are here: desktop and mobile.
Open Source

David Klann Talks About Using Open Source Software in Broadcast Radio (Video) 25

Posted by Roblimo
from the broadcasting-to-everyone-on-land-and-to-all-the-ships-at-sea dept.
David Klann works with Driftless Radio, call letters WDRT, in Wisconsin. This is community radio, with no huge advertisers or morning shock jocks with names like Bobba the Fet Sponge. They use open source software for just about everything except accounting, and that includes processing their audio for both OTA (Over the Air) and online streaming. Their transmitter runs a "stripped down" version of Debian, and David is proud that they had 3 1/2 years of uptime -- that only ended when David did a kernel upgrade that forced a reboot. (Alternate Video Link)
Graphics

Ask Slashdot: the State of Free Video Editing Tools? 152

Posted by timothy
from the what-are-you-happy-with? dept.
New submitter Shadow99_1 writes I used to do a lot of video editing (a few years ago, at an earlier job) and at that time I used Adobe Premiere. Now a few years later I'm looking to start doing some video editing for my own personal use, but I have a limited budget that pretty well excludes even thinking about buying a copy of Adobe Premiere. So I ask slashdot: What is the state of free (as in beer or as in open source) video editing tools? In my case... I support a windows environment at work and so it's primarily what I use at home. I am also using a camcorder that uses flash cards to record onto, so for me I need a platform that supports reading flash cards. So that is my focus but feel free to discuss video editing on all platforms. I've been looking forward to the Kickstarted upgrade to OpenShot; based on the project's latest update, early versions of an installer should start appearing soon. Video editing is a big endeavor, though, and ambitious announcements and slipped schedules both seem to be the norm: an open-source version of Lightworks was announced back in 2010. Some lighter open-source options include Pitivi (raising funds to get to version 1.0) and Kdenlive, also in active development (most recent release was in mid-May). Pitiviti's site links to a sobering illustration about many of the shorter- and longer-lived projects in this area.
Software

Apple Reveals the Most Common Reasons That It Rejects Apps 119

Posted by timothy
from the too-fat-too-thin-too-talkative dept.
mrspoonsi writes One of the great mysteries of the App Store is why certain apps get rejected and why others don't. Apple has let a surprising number of ripoffs and clones through the store's iron gates, yet some developers face rejection for seemingly innocent apps. "Before you develop your app, it's important to become familiar with the technical, content, and design criteria that we use to review all apps," explains Apple on a new webpage called "Common App Rejections." Rejections include: Apple and our customers place a high value on simple, refined, creative, well thought through interfaces. They take more work but are worth it. Apple sets a high bar. If your user interface is complex or less than very good, it may be rejected; Apps that contain false, fraudulent or misleading representations or use names or icons similar to other Apps will be rejected.
Transportation

Hidden Obstacles For Delivery Drones 208

Posted by Soulskill
from the cloaked-birds-of-prey dept.
An anonymous reader writes: A few days ago we talked over some of the difficulties faced by makers of autonomous car software, like dealing with weather, construction, and parking garages. Today, the NY Times has a similar article about delivery drones, examining the safety and regulatory problems that must be solved in addition to getting the basic technology ready. "[R]researchers at NASA are working on ways to manage that menagerie of low-flying aircraft. At NASA's Moffett Field, about four miles from Google's headquarters in Mountain View, Calif., the agency has been developing a drone traffic management program that would in effect be a separate air traffic control system for things that fly low to the ground — around 400 to 500 feet for most drones. Much like the air traffic control system for conventional aircraft, the program would monitor the skies for weather and traffic. Wind is a particular hazard, because drones weigh so little compared with regular planes." Beyond that, the sheer scale of infrastructure necessary to get drone delivery up and running in cities across the U.S. is staggering. Commercial drones aren't going to have much range, particularly when carrying something heavy. They'll be noisy, and the products they're transporting will still need to be relatively close by. What other issues do Amazon, DHL, Google, and other need to solve?
Security

Hackers Behind Biggest-Ever Password Theft Begin Attacks 105

Posted by Soulskill
from the 123456-letmein-iloveyou-trustno1 dept.
An anonymous reader writes Back in August, groups of Russian hackers assembled the biggest list of compromised login credentials ever seen: 1.2 billion accounts. Now, domain registrar Namecheap reports the hackers have begun using the list to try and access accounts. "Overnight, our intrusion detection systems alerted us to a much higher than normal load against our login systems. ... The group behind this is using the stored usernames and passwords to simulate a web browser login through fake browser software. This software simulates the actual login process a user would use if they are using Firefox/Safari/Chrome to access their Namecheap account. The hackers are going through their username/password list and trying each and every one to try and get into Namecheap user accounts." They report that most login attempts are failing, but some are succeeding. Now is a good time to check that none of your important accounts share passwords.
Communications

Tox, a Skype Replacement Built On 'Privacy First' 172

Posted by Soulskill
from the pet-rock-also-built-on-privacy-first dept.
An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down."
Software

Raspberry Pi Gets a Brand New Browser 102

Posted by samzenpus
from the brand-new dept.
sfcrazy writes The Raspberry Pi team has announced a new browser for Raspberry Pi. They had worked with Collabora to create an HTML5-capable, modern browser for Pi users. While announcing the new browser, Eben Upton said, "Eight months and a lot of hard work later, we're finally ready. Epiphany on Pi is now a plausible alternative to a desktop browser for all but the most JavaScript-heavy sites."
Bitcoin

The Apache Software Foundation Now Accepting BitCoin For Donations 67

Posted by samzenpus
from the a-different-way-to-give dept.
rbowen writes The Apache Software Foundation is the latest not-for-profit organization to accept bitcoin donations, as pointed out by a user on the Bitcoin subreddit. The organization is well known for their catalog of open-source software, including the ubiquitous Apache web server, Hadoop, Tomcat, Cassandra, and about 150 other projects. Users in the community have been eager to support their efforts using digital currency for quite a while. The Foundation accepts donations in many different forms: Amazon, PayPal, and they'll even accept donated cars. On their contribution page the Apache Software Foundation has published a bitcoin address and QR code.
Microsoft

Microsoft Defies Court Order, Will Not Give Emails To US Government 406

Posted by Soulskill
from the you-didn't-say-pretty-please dept.
schwit1 sends this excerpt from a report about Microsoft: Despite a federal court order directing Microsoft to turn overseas-held email data to federal authorities, the software giant said Friday it will continue to withhold that information as it waits for the case to wind through the appeals process. The judge has now ordered both Microsoft and federal prosecutors to advise her how to proceed by next Friday, September 5.

Let there be no doubt that Microsoft's actions in this controversial case are customer-centric. The firm isn't just standing up to the US government on moral principles. It's now defying a federal court order. "Microsoft will not be turning over the email and plans to appeal," a Microsoft statement notes. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen."
Wireless Networking

Wi-Fi Router Attack Only Requires a Single PIN Guess 83

Posted by Soulskill
from the one-two-three-four dept.
An anonymous reader writes: New research shows that wireless routers are still quite vulnerable to attack if they don't use a good implementation of Wi-Fi Protected Setup. Bad implementations do a poor job of randomizing the key used to authenticate hardware PINs. Because of this, the new attack only requires a single guess at the hardware PIN to collect data necessary to break it. After a few hours to process the data, an attacker can access the router's WPS functionality. Two major router manufacturers are affected: Broadcom, and a manufacturer to be named once they get around to fixing it. "Because many router manufacturers use the reference software implementation as the basis for their customized router software, the problems affected the final products, Bongard said. Broadcom's reference implementation had poor randomization, while the second vendor used a special seed, or nonce, of zero, essentially eliminating any randomness."
Cellphones

Ask Slashdot: Best Phone Apps? 163

Posted by Soulskill
from the there's-an-app-for-picking-apps-that-pick-apps dept.
An anonymous reader writes: The phone app ecosystem has matured nicely over the past several years. There are apps for just about everything I need to do on my phone. But I've noticed that once an app fills a particular need, I don't tend to look for newer or potentially better apps that would replace it. In a lot of areas, I'm two or three years out of date — maybe there's something better, maybe not. Since few people relish the thought of installing, testing, and uninstalling literally hundreds of apps, I thought I'd put the question to the Slashdot community: what interesting, useful new(ish) apps are you aware of? This can be anything from incredibly slick, well-designed single purpose apps to powerful multi-function apps to entertainment-oriented apps.
Transportation

Hidden Obstacles For Google's Self-Driving Cars 283

Posted by Soulskill
from the not-looking-forward-to-denial-of-driving-attacks dept.
Paul Fernhout writes: Lee Gomes at MIT's Technology Review wrote an article on the current limits of Google self-driving car technology: "Would you buy a self-driving car that couldn't drive itself in 99 percent of the country? Or that knew nearly nothing about parking, couldn't be taken out in snow or heavy rain, and would drive straight over a gaping pothole? If your answer is yes, then check out the Google Self-Driving Car, model year 2014. Google often leaves the impression that, as a Google executive once wrote, the cars can 'drive anywhere a car can legally drive.' However, that's true only if intricate preparations have been made beforehand, with the car's exact route, including driveways, extensively mapped. Data from multiple passes by a special sensor vehicle must later be pored over, meter by meter, by both computers and humans. It's vastly more effort than what's needed for Google Maps. ... Among other unsolved problems, Google has yet to drive in snow, and Urmson says safety concerns preclude testing during heavy rains. Nor has it tackled big, open parking lots or multilevel garages. ... Pedestrians are detected simply as moving, column-shaped blurs of pixels — meaning, Urmson agrees, that the car wouldn't be able to spot a police officer at the side of the road frantically waving for traffic to stop."
Technology

Ask Slashdot: What Old Technology Can't You Give Up? 615

Posted by Soulskill
from the don't-touch-that-dial dept.
An anonymous reader writes: It's the year 2014, and I still have a floppy drive installed on my computer. I don't know why; I don't own any floppy disks, and I haven't used one in probably a decade. But every time I put together a PC, it feels incomplete if I don't have one. I also have a Laserdisc player collecting dust at the bottom of my entertainment center, and I still use IRC to talk to a few friends. Software, hardware, or otherwise, what technology have you had a hard time letting go? (I don't want to put a hard limit on age, so you folks using flip-phones or playing on Dreamcasts or still inexplicably coding in Perl 4, feel free to contribute.)
Science

Particle Physics To Aid Nuclear Cleanup 35

Posted by Soulskill
from the baby-steps-to-a-tricorder dept.
mdsolar sends this report from Symmetry Magazine: Cosmic rays can help scientists do something no one else can: safely image the interior of the nuclear reactors at the Fukushima Daiichi plant. ... [M]uon tomography is similar to taking an X-ray, only it uses naturally produced muons. These particles don't damage the imaged materials and, because they already stream through everything on Earth, they can be used to image even the most sensitive objects. Better yet, a huge amount of shielding is needed to stop muons from passing through an object, making it nearly impossible to hide from muon tomography. ... By determining how muons scatter as they interact with electrons and nuclei within the item, the team's software creates a three-dimensional picture of what's inside. ... To prove the technology, the Los Alamos team shipped a demo detector system to a small, working nuclear reactor in a Toshiba facility in Kawasaki, Japan. There, they placed one detector on either side of the reactor core. "When we analyzed our data we discovered that in addition to the fuel in the reactor core, they had put a few fuel bundles off to the side that we didn't know about," says Morris. "They were really impressed that not only could we image the core, but that we also found those bundles."
Security

IEEE Guides Software Architects Toward Secure Design 51

Posted by Soulskill
from the an-ounce-of-prevention dept.
msm1267 writes: The IEEE's Center for Secure Design debuted its first report this week, a guidance for software architects called "Avoiding the Top 10 Software Security Design Flaws." Developing guidance for architects rather than developers was a conscious effort the group made in order to steer the conversation around software security away from exclusively talking about finding bugs toward design-level failures that lead to exploitable security vulnerabilities. The document spells out the 10 common design flaws in a straightforward manner, each with a lengthy explainer of inherent weaknesses in each area and how software designers and architects should take these potential pitfalls into consideration.
Space

Software Error Caused Soyuz/Galileo Failure 156

Posted by samzenpus
from the put-that-anywhere dept.
schwit1 writes An investigation into the recent failed Soyuz launch of the EU's Galileo satellites has found that the Russian Fregat upper stage fired correctly, but its software was programmed for the wrong orbit. From the article: "The failure of the European Union’s Galileo satellites to reach their intended orbital position was likely caused by software errors in the Fregat-MT rocket’s upper-stage, Russian newspaper Izvestia reported Thursday. 'The nonstandard operation of the integrated management system was likely caused by an error in the embedded software. As a result, the upper stage received an incorrect flight assignment, and, operating in full accordance with the embedded software, it has delivered the units to the wrong destination,' an unnamed source from Russian space Agency Roscosmos was quoted as saying by the newspaper."

"And do you think (fop that I am) that I could be the Scarlet Pumpernickel?" -- Looney Tunes, The Scarlet Pumpernickel (1950, Chuck Jones)

Working...