An anonymous reader writes with this snippet from ABC News: "Software millionaire John McAfee has been taken to a Guatemala City hospital via ambulance after suffering a possible heart attack at the detention center where he is being held. McAfee, 67 — who may soon be deported back to Belize, where authorities want to question him about the shooting death of his neighbor — was reportedly prostrate on the floor of his cell and unresponsive. He was wheeled into the hospital on a gurney, but when nurses began removing his suit, he became responsive and said, 'Please, not in front of the press.' Earlier today, McAfee had complained of chest pains."
Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
coondoggie writes "The U.S. government's overly complicated way of classifying and declassifying information needs to be dumped and reinvented with the help of a huge technology injection if it is to keep from being buried under its own weight. That was one of the main conclusions of a government board tasked with making recommendations on exactly how the government should transform the current security classification system (PDF)."
Bob9113 writes "Ars Technica reports that Derek Khanna is getting axed over his memo detailing the conflict between laissez-faire-oriented free market ideals and the regulatory monopoly that is copyright. 'The Republican Study Committee, a caucus of Republicans in the House of Representatives, has told staffer Derek Khanna that he will be out of a job when Congress re-convenes in January. The incoming chairman of the RSC, Steve Scalise (R-LA) was approached by several Republican members of Congress who were upset about a memo Khanna wrote advocating reform of copyright law. They asked that Khanna not be retained, and Scalise agreed to their request.'"
Having the ability to create a 20 liter cloud of slime and tie themselves in knots, hagfish have always been one of my favorite deep-sea denizens. Being a living slime dispenser has not won the species many fans however, with the notable exceptions of Mike Rowe and Dr. Egon Spengler. All that is about to change thanks to the work of a research team at Canada’s University of Guelph. They've found that hagfish slime might be used to make new plastics and even super-strong fabrics. From the article: "A research team at Canada’s University of Guelph managed to harvest the slime from the fish, dissolve it in liquid, and then reassemble its structure by spinning it like silk. It’s an important first step in being able to process the hagfish slime into a useable material, according to Atsuko Negishi, a research assistant and lead author on the paper in this week’s journal Biomacromolecules. 'We’re trying to understand how they make these threads and how we can learn from that to make protein-based fibers that have excellent mechanical properties,' Negishi said. 'The first step is can we harvest the threads. It turns out that is doable.'"
curtwoodward writes "Advanced battery maker A123 Systems was supposed to be one of the marquee names of the U.S. cleantech manufacturing scene — it won hundreds of millions in federal grants, had operations around the globe, and supplied the luxury Fisker electric car. In 2009, as the economy sputtered, A123 registered the country's biggest IPO. Today, it's in bankruptcy court, with possible buyers submitting bids for its parts and pieces. How'd A123 fall so far, so fast? As losses mounted, its reliance on just two big customers came back to haunt the company — and a series of screwups at a Michigan plant delivered the final blow."
An anonymous reader writes with this quote from Tom's Hardware: "Due to Apple's anti-3rd-party browser stance, and Windows RT's IE-only advantage on the 'Desktop,' Android is the only mobile platform where browser competition is thriving. The results are pretty surprising, with the long-time mobile browsers like Dolphin, Maxthon, Sleipnir, and the stock Android browser coming out ahead of desktop favorites like Firefox, Opera, and even Chrome. Dolphin, thanks to its new Jetpack HTML5 engine, soars ahead of the competition."
Orome1 writes "Check Point has revealed how a sophisticated malware attack was used to steal an estimated €36 million from over 30,000 customers of over 30 banks in Italy, Spain, Germany and Holland over summer this year. The theft used malware to target the PCs and mobile devices of banking customers (PDF). The attack also took advantage of SMS messages used by banks as part of customers' secure login and authentication process. The attack infected both corporate and private banking users, performing automatic transfers that varied from €500 to €250,000 each to accounts spread across Europe."
Hugh Pickens writes writes "William J. Broad writes that a plan now before Congress would create a national park to protect the aging remnants of the atomic bomb project from World War II, including hundreds of buildings and artifacts scattered across New Mexico, Washington and Tennessee — among them the rustic Los Alamos home of Dr. Oppenheimer and his wife, Kitty, and a large Quonset hut, also in New Mexico, where scientists assembled components for the plutonium bomb dropped on Japan. 'It's a way to help educate the next generation,' says Cynthia C. Kelly, president of the Atomic Heritage Foundation, a private group in Washington that helped develop the preservation plan. 'This is a major chapter of American and world history. We should preserve what's left.' Critics have faulted the plan as celebrating a weapon of mass destruction, and have argued that the government should avoid that kind of advocacy. 'At a time when we should be organizing the world toward abolishing nuclear weapons before they abolish us, we are instead indulging in admiration at our cleverness as a species,' says Rep. Dennis J. Kucinich. Historians and federal agencies reply that preservation does not imply moral endorsement, and that the remains of so monumental a project should be saved as a way to encourage comprehension and public discussion. A park would be a commemoration, not a celebration, says Heather McClenahan, director of the Los Alamos Historical Society pointing out there are national parks commemorating slavery, Civil War battles and American Indian massacres. 'It's a chance to say, "Why did we do this? What were the good things that happened? What were the bad? How do we learn lessons from the past? How do we not ever have to use an atomic bomb in warfare again?" '"
holy_calamity writes "MIT Technology Review looks at the small companies attempting to build dedicated chips for mining Bitcoins. Several are claiming they will start selling hardware based on their chips early in 2013, with the technology expected to force many small time miners to give up. However, as happened in the CPU industry, miners may soon be caught in an expensive arms race that pushes development of faster and faster chips."
An anonymous reader writes "The Motion Picture Association of America (MPAA) has declared that the Megaupload shutdown earlier this year has been a great success. In a filing to the Office of the U.S. Trade Representative, the group representing major movie studios says the file hosting and sharing industry has been massively disrupted. Yet the MPAA says there is still work to be done, identifying sites that make available to downloaders 'unauthorized copies of high-quality, recently-released content and in some cases, coordinate the actual upload and download of that content.' Here's the list of sites, including where they are hosted: Extratorrent (Ukraine), IsoHunt (Canada), Kickass Torrents (Canada), Rutracker (Russia), The Pirate Bay (Sweden), Torrentz (Canada), and Kankan (China)."
An anonymous reader writes "The U.S. House of Representatives voted 397-0 today on a resolution to oppose U.N. control of the internet. 'The 397-0 vote is meant to send a signal to countries meeting at a U.N. conference on telecommunications this week. Participants are meeting to update an international telecom treaty, but critics warn that many countries' proposals could allow U.N. regulation of the Internet.' The European Parliament passed a similar resolution a couple weeks ago, and the U.N. telecom chief has gone on record saying that freedom on the internet won't be curbed. However, that wasn't enough for U.S. lawmakers, who were quite proud of themselves for actually getting bipartisan support for the resolution (PDF). Rep Marsha Blackburn (R-TN) said, 'We need to send a strong message to the world that the Internet has thrived under a decentralized, bottom-up, multi-stakeholder governance model.'"
An anonymous reader writes "With kids growing up in an increasingly digital world, it's alarming that many of them have no idea how the devices that power their lives actually work. So three cheers for Coderdojo — a worldwide group of volunteers teaching programming and web design to children aged seven and up. From the article: 'Coderdojo's format is open and inclusive. Participants can use the operating system and programming tools of their choice. There is no set curriculum and the only rule is: "Above all: be cool." More rigid approaches, he suggests, can often stifle learners' enthusiasm: "A lot of coding tuition aimed at young people tends to revolve around games," he said. "But that can disengage some young people. Many of them, particularly girls, just aren't interested in gaming. "On the other hand, doing something like developing a web site shows them that they can do things they might not have realized they were able to and combines artistic and design skills with an understanding of why things are built in a certain way."'"
dcblogs writes "Despite the fact that technology plays an increasingly important role in the economy, IT wages remain persistently flat. This may be tech's inconvenient truth. In 2000, the average hourly wage was $37.27 in computer and math occupations for workers with at least a bachelor's degree. In 2011, it was $39.24, adjusted for inflation, according to a new report by the Economic Policy Institute. That translates to an average wage increase of less than a half percent a year. In real terms, IT wages overall have gone up by $1.97 an hour in just over 10 years, according to the EPI. Data from professional staffing firm Yoh shows wages in decline. In its latest measure for week 12 of 2012, the hourly wages were $31.45 and in 2010, for the same week, at $31.78. The worker who earned $31.78 in 2010 would need to make $33.71 today to stay even with inflation. Wages vary by skill and this data is broad. The unemployment rate for tech has been in the 3-4% range, but EPI says full employment has been historically around 2%."
An anonymous reader writes "Coursera announced its 'career services' feature yesterday for students who opt in. The company that works with elite colleges to offer free courses is sharing more than just academic scores — showing potential employers evidence of 'soft skills,' like how helpful students were in class discussion forums. 'Udacity, another company that provides free online courses, offers a similar service. ... Udacity's founder, Sebastian Thrun, said in an interview that 350 partner companies had signed up for its job program. While Mr. Thrun would not say how much employers pay, he characterized the fee as "significantly less than you'd pay for a headhunter, but significantly more than what you'd pay for access to LinkedIn," a popular social network for job hunters.'"
benrothke writes "It is well known that the password, while the most widespread information security mechanism, is also one of the most insecure. It comes down to the fact that the average person can't create and maintain secure passwords. When it comes to physical locks, the average lock on your home and in your office is equally insecure. How insecure it in? In two fascinating books on the topic, Deviant Ollam writes in Practical Lock Picking, Second Edition: A Physical Penetration Testers Training Guide and Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks that it is really not that difficult. When it comes to information security penetration tests done on the client site, the testers will most often have permission to be inside the facility. On rare occasions, the testers need to find alternative means to gain entrance. Sometimes that means picking the locks." Keep reading to learn if you'll be picking locks soon.