×
The Internet

Weather Balloons To Provide Broadband In Africa 179

An anonymous reader writes "Two African entrepreneurs have secured exclusive access to market near-space technology — developed by Space Data, an American telecommunications company — throughout Africa. The technology raises hydrogen-filled weather balloons to 80,000 — 100,000 feet, which individuals contact via modems. The balloons, in turn, serve as satellite substitutes which can connect Africans to broadband Internet. 'Network operation centers are located close to a fiber optic cable — say, in Lagos or Accra — and a signal is sent back and forth to the [balloon] in near space,' says one of the entrepreneurs, Timothy Anyasi. The technology will also allow mobile phone operators to offer wireless modems to customers."
Image

Drupal 6: Ultimate Community Site Guide Screenshot-sm 63

Michael J. Ross writes "Among the more popular and better-regarded content management systems (CMSs), Drupal is distinguished partly by its building-block approach, in which a website's functionality is built up in pieces, each of which is a module (either core or contributed). The opposite approach — using far fewer but more encompassing modules — is generally preferred by non-developers who do not relish integrating a sizable collection of modules or trying to modify the underlying code. Nonetheless, anyone who wishes to build a Drupal-based social website, can learn how to do so in a new e-book titled Drupal 6: Ultimate Community Site Guide." Read below for the rest of Michael's review.
Security

New Denial-of-Service Attacks Threaten Wireless Data Networks 31

alphadogg writes "Forget spam, viruses, worms, malware, and phishing. These threats are apparently old-school when compared to a new class of denial-of-service attacks that threaten wireless data networks. The threats were outlined in a talk in NYC Thursday by Krishan Sabnani, vice president of networking research at Bell Labs, at the Cyber Infrastructure Protection Conference at City College of New York. Sabnani said they are the result of inherent weaknesses in Mobile IP, a protocol that uses tunneling and complex network triangulation to allow mobile devices to move freely from one network to another. 'We need to especially monitor the mobile networks — with limited bandwidth and terminal battery — for DOS attacks,' Sabnani said, adding that the newest DOS attacks on wireless networks involve repeatedly establishing and releasing connections. These attacks are easy to launch and hard to detect, he said."
Math

String Theory Predicts Behavior of Superfluids 348

schrodingers_rabbit writes "Despite formidable odds, condensed matter physicists have made a breakthrough most thought impossible — finding a practical use for string theory. The initial breakthrough was made by physicist and cosmologist Juan Maldacena. His theory states that the known universe is only a 2D construct in anti-de-Sitter space, projected into 3 dimensions. This theory manages to model black holes and quantum theory congruently, a feat that has eluded scientists for decades; but it fails to correspond to the shape of space-time in the known universe. However, it does predict thermodynamic properties of black holes, including higher-dimensional viscosity — the equations for which elegantly and almost exactly calculate the behavior of quark-gluon plasma and other superfluids. According to Jan Zaanen at the University of Leiden, 'The theory is calculating precisely what we are seeing in experiments.' Unfortunately, the correspondence cannot prove or disprove string theory, although it is a positive step." Not an easy path to follow: one condensed matter theorist said, "It took two years and two 1000-page books of dense mathematics, but I learned string theory and got kind of enchanted by it. [When the string-theory related] thing began to... make predictions about high-temperature superconductors, my traditional mainstay, I was one of the few condensed matter physicists with the preparation to take it up."
The Courts

FTC Shuts Down Calif. ISP For Botnets, Child Porn 224

An anonymous reader writes "The Federal Trade Commission has convinced a federal judge to pull the plug on a 3FN.net, a.k.a. 'Pricewert LLC,' a Northern California based hosting provider. The FTC alleges that 3FN/Pricewert was directly involved in setting up spam-spewing botnets, among other illegal activities, the Washington Post's Security Fix Blog writes. From the story: 'Pricewert hosts very little legitimate content and vast quantities of illegal, malicious, and harmful content, including child pornography, botnet command and control servers, spyware, viruses, trojans, phishing related sites, illegal online pharmacies, investment and other Web-based scams, and pornography featuring violence, bestiality, and incest.' The story quotes a former Justice Dept. expert saying the FTC action may be a smoke screen for a larger criminal investigation by the federal government in 3FN's activities."
Security

Testing So-Called 'Unified Threat Managers' 98

snydeq writes "The InfoWorld Test Center has released vulnerability testing results for four so-called 'unified threat managers' — single units that combine firewall, VPN, intrusion detection and prevention, anti-malware, anti-spam, and Web content filtering in lieu of a relay rack stuffed top to bottom with appliances. The lab threw nearly 600 exploits of known vulnerabilities in a wide range of popular OSes, applications, and protocols, and despite being designed to thwart such threats, the UTMs as a class allowed hundreds to pass through. Why did the UTMs miss so many exploits? A lack of horsepower to perform the necessary deep packet inspection under load is suspected, as the lab pushed the limits of each unit's throughput with legitimate traffic. 'The upshot is, although the vendors have packed these devices with additional gateway security functions, clearly many UTMs are still strictly firewalls at heart.'"
Graphics

Budget Graphics Card Roundup 186

Anonymous Coward writes "Not all of us are prepared to drop $500 for a killer graphics card. Generally, the sweet spot in price and performance is in the budget category of GPUs. Joel Durham Jr. over at ExtremeTech reviews nine current graphics cards, all of which are below $250, some below $150, to determine which cards are worth the time and money for the gamer on a budget. In the sub $150 category, the ATI Radeon 4770 performed the best for its price. Spend a little more and Joel recommends the GeForce 260."
The Courts

Unmasking Blog Commenters Not a Huge Threat To Freedom 105

Frequent Slashdot contributor Bennett Haselton writes with his take on a recent court decision about the rights of online commenters. "Although a court has ruled that the police can subpoena the identities of users who posted comments in a newspaper's blog, I think this is not as big of a threat to journalistic integrity as it might seem. And in any case when the judge ruled against the privacy rights of 'bloggers,' he didn't actually mean 'bloggers." Read on for the rest of Bennett's thoughts.
Bug

Skype Billing Gone Haywire For Some Users 154

Cousin Scuzzy writes "This morning I awoke to 26 e-mail messages from Skype and PayPal notifying me of multiple payments for my Skype account that had been charged to my credit card and subsequently refunded. At first I suspected that this was a new wave of spam that had slipped through my defenses, but it quickly became apparent that they were legitimate messages. I then began to worry that my Skype account had been compromised. The first message from Skype thanked me for setting up their "Auto-Recharge" service which automatically purchases Skype credit when the balance falls below a certain amount. This was very suspicious, as I had never requested this service. Based on posts to Skype's forum, it now appears that there have been serious billing problems at Skype relating to Auto-Recharge for over a month. Although I believe that all unauthorized charges to my credit card have been refunded, it is worrisome that Skype, or anyone, would charge my account erroneously. Skype, for their part, has not yet e-mailed me an explanation or posted one online. This problem reinforces my aversion to automatic bill payment services that give companies the authority to draw money from my bank account at their discretion." For all the Skype users out there, have you experienced this? For what it's worth, the company's own response on the linked forum thread says that the problem is now solved.
Image

Front End Drupal Screenshot-sm 68

Michael J. Ross writes "Content management systems (CMSs) are created largely by Web developers using back-end programming languages (such as PHP, by far the most common choice). The free CMSs are built as open source projects, by volunteers who have many demands on their time. As a result of both of these competing factors, far less time is devoted to the front-end aspects of these CMSs. In turn, the "themes" that define the appearance of a CMS-based website are typically substandard, in the eyes of many Web designers and, most likely, countless users of those sites. This criticism has been leveled even against Drupal, although the situation is improving. A new book, Front End Drupal: Designing, Theming, Scripting, is intended to help Drupal designers everywhere speed up that process of improvement." Read on for the rest of Michael's review.

A System For Handling 'Impostor' Complaints 165

Frequent Slashdot contributor Bennett Haselton writes "A woman sued Yahoo because they wouldn't remove a page created by her ex-boyfriend pretending to be her and soliciting strangers for sex. What would be an effective system for large companies like Yahoo to handle 'impostor' complaints, without getting bogged down by phony complaints and unrelated disputes? This is a harder problem than it seems because of the several possible cases that have to be considered. One possible solution is given here." Read on for Bennett's analysis.
Spam

FTC Targets Massive Car Warranty Robocall Scheme 361

coondoggie writes "Robocalls are a scourge, and the Federal Trade Commission today took action against one outfit by asking a federal court to shut down companies that have been bombarding consumers with hundreds of millions of allegedly deceptive robocalls in an effort to sell vehicle service contracts. According to the FTC, the robocalls have prompted tens of thousands of complaints from consumers who are either on the Do Not Call Registry or asked not to be called. Five telephone numbers associated with the defendants have generated a total of 30,000 Do Not Call complaints. Consumers received the robocalls at home, work, and on their cell phones, sometimes several times in one day. Businesses, government offices and even 911 dispatchers also have been subjected to the calls, the FTC said." Reader powerlord points out that another such company, not named in the FTC filing, raised the ire of thousands of internet-goers, who struck back by rickrolling the company's voice mail and digging up personal information on the company's president.
The Military

US Military Looks For Massive Spam Solution 228

Several users have pointed out a recent request to technology companies from the Defense Information System Agency for ideas on how to build an e-mail defense system to catch spam. The solution would have to scan about 50 million inbound messages a day across some 700 unclassified network domains. "Defense currently scans e-mails for viruses and spam coming into systems serving the military services, commands or units. DISA wants to extend the protection to the interface between the Internet and its unclassified network, the Non-classified Internet Protocol Router Network. The agency also wants the ability to scan all outbound e-mails from the 5 million users. [...] DISA's request ties in with recommendations that the Defense Science Board issued in April that said Defense is more vulnerable to cyberattacks because of its decentralized networks and systems. The board envisioned a major role for DISA in developing the architecture for enterprise-wide systems."
Software

Computers With Opinions On Visual Aesthetics 125

photoenthusiast writes "Penn State researchers launched a new online photo-rating system, code named Acquine (Aesthetic Quality Inference Engine), for automatically determining the aesthetic value of a photo. Users can upload their own photographs for an instant Acquine rating, a score from zero to 100. The system learns to associate extracted visual characteristics with the way humans rate photos based on a lot of previously-rated photographs. It is designed for color natural photographic pictures. Technical publications reveal how Acquine works."
Books

What Can I Do About Book Pirates? 987

peterwayner writes "Six of the top ten links on a Google search for one of my books point to a pirate site when I type in 'wayner data compression textbook.' Others search strings actually locate pages that are selling legit copies including digital editions for the Kindle. I've started looking around for suggestions. Any thoughts from the Slashdot crowd? The free copies aren't boosting sales for my books. Do I (1) get another job, (2) sue people, or (3) invent some magic spell? Is society going to be able to support people who synthesize knowledge or will we need to rely on the Wikipedia for everything? I'm open to suggestions."
Government

Let Big Brother Hawk Anti-Virus Software 405

Frequent Slashdot contributor Bennett Haselton writes with his idea for mass adoption of anti-virus software: "If the US government did more to encourage people to keep their computers secure — by buying TV ads to publicize free private-sector anti-virus programs, or subsidizing the purchase of anti-virus software — we'd all be better off, on average. That's not just idealistic nanny-statism, but something you can argue mathematically, to the point where even some libertarians would agree." Read on for the rest of Bennett's thoughts.
Communications

Bandwidth Fines Bad, But Not Net Neutrality Issue 159

Frequent Slashdot contributor Bennett Haselton writes with his take on the recent Time Warner Cable fiasco: "Net Neutrality crusaders at FreePress.net recently called attention to Time Warner's plan (later rescinded) to impose fines on users for going over bandwidth limits. I agree generally, but I think this is easily confused with the reasoning in favor of Net Neutrality, and it's important to keep the arguments separate." Read on for the rest of Bennett's thoughts.
Image

How To Have an Online Social Life When You're Dead Screenshot-sm 187

A wave of new companies are springing up to offer such things as virtual cemeteries, alerts to remind loved ones about the anniversary of your death, and even email services that send an alert to your sinful relatives in danger of being left behind when the Rapture carries you away. "People have a desire to perpetuate not only for themselves, but for their loved ones, the story of their lives, and technology has all these new great ways of doing that," said John McQueen, owner of the Anderson McQueen funeral home.
Image

Universal Design for Web Applications Screenshot-sm 85

Michael J. Ross writes "Two decades ago, Web usage was limited to a single individual (Sir Tim Berners-Lee) using the only browser in existence (WorldWideWeb) running on a single platform (a NeXT Computer). Nowadays, billions of people access the Web daily, with the ability to choose from over a dozen browsers running on desktop computers, laptops, and a variety of mobile devices, such as cell phones. The number of possible combinations is growing rapidly, and makes it increasingly difficult for Web designers and developers to craft their sites so as to be universally accessible. This is particularly true when accounting for Web users with physical and cognitive disabilities — especially if they do not have access to assistive technologies. The challenges and solutions for anyone creating an accessible website are addressed in Universal Design for Web Applications, authored by Wendy Chisholm and Matt May." Keep reading for the rest of Michael and Laura's review.
Spam

Opting Out Increases Spam? 481

J. L. Tympanum writes "I used to ignore spam but recently I have been using the opt-out feature. Now I get more spam than ever, especially of the Nigerian scam (and related) types. The latter has gone from almost none to several a day. Was I a fool for opting out? Is my email address being harvested when I opt out? Has anybody had similar experience?"

Slashdot Top Deals