Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Amazon Purchases .buy TLD For $4.6 Million

    onproton writes: Amazon outbid Google at the ICANN auction this week for the top-level domain .buy , to which it now has exclusive rights, paying around $4.6 million for the privilege. Google was also reportedly outbid for the .tech domain, which went for around $6.7 million. No word yet on Amazon's plans for the new domain suffix, but it's probably safe to say amazonsucks.buy will be added to Amazon's collection of reserved anti-Amazon URLs.

    51 comments | 7 hours ago

  • Once Vehicles Are Connected To the Internet of Things, Who Guards Your Privacy?

    Lucas123 (935744) writes Carmakers already remotely collect data from their vehicles, unbeknownst to most drivers, but once connected via in-car routers or mobile devices to the Internet, and to roadway infrastructure and other vehicles around them, that information would be accessible by the government or other undesired entities. Location data, which is routinely collected by GPS providers and makers of telematics systems, is among the most sensitive pieces of information that can be collected, according to Nate Cardozo, an attorney with the Electronic Frontier Foundation. "Not having knowledge that a third party is collecting that data on us and with whom they are sharing that data with is extremely troubling," Cardozo said. in-vehicle diagnostics data could also be used by government agencies to track driver behavior. Nightmare scenarios could include traffic violations being issued without law enforcement officers on the scene or federal agencies having the ability to track your every move in a car. That there could be useful data in all that personally identifiable bits made me think of Peter Wayner's "Translucent Databases."

    128 comments | yesterday

  • Scientists Twist Radio Beams To Send Data At 32 Gigabits Per Second

    concertina226 writes Scientists from three international universities have succeeded in twisting radio beams in order to transfer data at the speed of 32 gigabits per second, which is 30 times faster than 4G LTE wireless technology in use today. The researchers, led by Alan Willner, an electrical engineering professor with the University of Southern California Viterbi School of Engineering, successfully demonstrated data transmission rates of 32 gigabits per second across 2.5m of free space in a basement laboratory.

    120 comments | 2 days ago

  • Why Is It Taking So Long To Secure Internet Routing?

    CowboyRobot writes: We live in an imperfect world where routing-security incidents can still slip past deployed security defenses, and no single routing-security solution can prevent every attacks. Research suggests, however, that the combination of RPKI (Resource Public Key Infrastructure) with prefix filtering could significantly improve routing security; both solutions are based on whitelisting techniques and can reduce the number of autonomous systems that are impacted by prefix hijacks, route leaks, and path-shortening attacks. "People have been aware of BGP’s security issues for almost two decades and have proposed a number of solutions, most of which apply simple and well-understood cryptography or whitelisting techniques. Yet, many of these solutions remain undeployed (or incompletely deployed) in the global Internet, and the vulnerabilities persist. Why is it taking so long to secure BGP?"

    85 comments | 3 days ago

  • Ask Slashdot: Advice On Building a Firewall With VPN Capabilities?

    An anonymous reader writes "I currently connect to the internet via a standard router, but I'm looking at bulking up security. Could people provide their experiences with setting up a dedicated firewall machine with VPN capabilities? I am a novice at Linux/BSD, so would appreciate pointers at solutions that require relatively little tweaking. Hardware-wise, I have built PC's, so I'm comfortable with sourcing components and assembling into a case. The setup would reside in my living room, so a quiet solution is required. The firewall would handle home browsing and torrenting traffic. Some of the questions knocking around in my head: 1. Pros and cons of buying an off-the-shelf solution versus building a quiet PC-based solution? 2. Software- versus hardware-based encryption — pros and cons? 3. What are minimum requirements to run a VPN? 4. Which OS to go for? 5. What other security software should I include for maximum protection? I am thinking of anti-virus solutions."

    238 comments | about a week ago

  • Device Boots Drones, Google Glass Off Wi-Fi

    An anonymous reader writes: Amid the backlash against spy-eye drones as well as wearable cameras like Google Glass, one company is building a device to fight back. The Cyborg Unplug actively scans for drones or Google Glass on a local wireless network and blocks their traffic. They're billing it as an "anti-surveillance system" and marketing it toward businesses, restaurants, and schools. They take pains to note that it's not a jammer, instead sending copies of a de-authentication packet usually sent by a router when it disconnects a device. The device can, however, force devices to disconnect from any network, which they warn may be illegal in some places.

    184 comments | about two weeks ago

  • Shadowy Tech Brokers Deliver Data To the NSA

    An anonymous reader notes an article about a group of companies whose business is to wiretap various ISPs (with permission) to gather data in response to federal subpoenas. Many smaller ISPs don't have the resources to deal with the flood of data requests from agencies like the NSA, so they outsource compliance and collection in order to keep costs down. The article profiles one of these companies, called Neustar: Neustar can in many cases execute the warrant from anywhere within the U.S., keeping within the bounds of the country's surveillance law. But when a wiretap device is needed, they are not hard to come by. Most networking equipment makers sell devices that can be used to collect data, or used to inspect data — so-called deep-packet inspection devices, which can also be used to prevent piracy, the spread of malware, and website access, all at the Internet provider level. Once a FISA warrant is issued, so-called "tasking" orders, which contain selectors — like a phone number or an email address — are often sent electronically to the ISP. These tell the ISP or phone company, or third-parties like Neustar, exactly where to wiretap and what data to collect to hand back to the requesting authority.

    35 comments | about two weeks ago

  • UCLA, CIsco & More Launch Consortium To Replace TCP/IP

    alphadogg writes Big name academic and vendor organizations have unveiled a consortium this week that's pushing Named Data Networking (NDN), an emerging Internet architecture designed to better accommodate data and application access in an increasingly mobile world. The Named Data Networking Consortium members, which include universities such as UCLA and China's Tsinghua University as well as vendors such as Cisco and VeriSign, are meeting this week at a two-day workshop at UCLA to discuss NDN's promise for scientific research. Big data, eHealth and climate research are among the application areas on the table. The NDN effort has been backed in large part by the National Science Foundation, which has put more than $13.5 million into it since 2010.

    254 comments | about two weeks ago

  • Facebook Blamed For Driving Up Cellphone Bills, But It's Not Alone

    colinneagle writes "Consumer site MoneySavingExpert.com reported today that it has seen "many complaints" from users who believe a recent increase in data-related charges on their cellphone bills are the result of Facebook's auto-play feature. The default setting for the auto-play feature launches and continues to play videos silently until the user either scrolls past it or clicks on it; if the user does the latter, the video then goes full-screen and activates audio. The silent auto-play occurs regardless of whether users are connected to Wi-Fi, LTE, or 3G.

    However, it's likely that Facebook isn't entirely to blame for this kind of trend, but rather, with the debut of its auto-play feature, threw gas on an already growing fire of video-sharing services. Auto-play for video is a default setting on Instagram's app, although the company refers to it as "preload." Instagram only introduced video last summer, after the Vine app, a Twitter-backed app that auto-plays and loops six-second videos, started to see significant growth.

    131 comments | about two weeks ago

  • Appeals Court Clears Yelp of Extortion Claims

    jfruh writes A U.S. appeals court cleared Yelp of charges of extortion related to its interaction with several small businesses who claim Yelp demanded that they pay for advertising or face negative reviews. While Yelp says it never altered a business rating for money, the court's finding was instead based on a strict reading of the U.S. extortion law, classifying Yelp's behavior as, at most, "hard bargaining." Interestingly, the EFF supported Yelp here, arguing that "Section 230 of the Communications Decency Act (CDA) protects online service providers from liability and lawsuits over user-generated content, except in very narrow circumstances where the providers created or developed content themselves. In its amicus brief, EFF argued that mere conjecture about contributing content – like there was in this case – is not enough to allow a lawsuit to go forward."

    63 comments | about two weeks ago

  • Study: Social Networks Have Negative Effect On Individual Welfare

    An anonymous reader writes: A study of 50,000 people in Italy has found the impact of social networking on individual welfare to be "significantly negative." The researchers found that improvements in self-reported well-being occurred when online networking led to face-to-face interactions, but this effect was overwhelmed by the perceived losses in well-being (PDF) generated by interaction strictly through social networks. The researchers "highlight the role of discrimination and hate speech on social media which they say play a significant role in trust and well-being. Better moderation could significantly improve the well-being of the people who use social networks, they conclude."

    76 comments | about three weeks ago

  • African States Aim To Improve Internet Interconnections

    jfruh writes A rapidly growing percentage of Africans have access to the Internet — and yet most of the content they access, even things aimed specifically at an African audience, is hosted on servers elsewhere. The reason is a bewildering array of laws in different nations that make cross-border cooperation a headache, a marked contrast to places like Europe with uniform Internet regulations. At the Africa Peering and Interconnection Forum in Senegal, a wide variety of Internet actors from the continent are aiming to solve the problem.

    27 comments | about three weeks ago

  • Predictive Modeling To Increase Responsivity of Streamed Games

    jones_supa (887896) writes Streaming game services always bump up against a hard latency limit based on the total round-trip time it takes to send user input to a remote server and receive a frame of game data from that server. To alleviate the situation, Microsoft Research has been developing a system called DeLorean (whitepaper) using predictive modeling to improve the experienced responsiveness of a game. By analyzing previous inputs in a Markov chain, DeLorean tries to predict the most likely choices for the user's next input and then generates speculative frames that fit those inputs and sends them back to the user. The caveat is that sending those extra predictive frames and information does add a bandwidth overhead of anywhere from 1.5 to 4 times that of a normal streaming game client. During testing the benefits were apparent, though. Even when the actual round-trip time between input and server response was 256 ms, double-blind testers reported both the gameplay responsiveness and graphical quality of the DeLorean system were comparable to a locally played version of the game.

    120 comments | about three weeks ago

  • Securing Networks In the Internet of Things Era

    An anonymous reader writes "Gartner reckons that the number of connected devices will hit 26 billion by 2020, almost 30 times the number of devices connected to the IoT in 2009. This estimate doesn't even include connected PCs, tablets and smartphones. The IoT will represent the biggest change to our relationship with the Internet since its inception. Many IoT devices themselves suffer from security limitations as a result of their minimal computing capabilities. For instance, the majority don't support sufficiently robust mechanisms for authentication, leaving network admins with only weak alternatives or sometimes no alternatives at all. As a result, it can be difficult for organizations to provide secure network access for certain IoT devices."

    106 comments | about a month ago

  • Finding an ISIS Training Camp Using Google Earth

    An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.

    134 comments | about a month ago

  • It's Easy To Hack Traffic Lights

    An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.

    144 comments | about a month ago

  • Interviews: Bjarne Stroustrup Answers Your Questions

    Last week you had a chance to ask Bjarne Stroustrup about programming and C++. Below you'll find his answers to those questions. If you didn't get a chance to ask him a question, or want to clarify something he said, don't forget he's doing a live Google + Q & A today at 12:30pm Eastern.

    102 comments | about a month ago

  • Email Is Not Going Anywhere

    An anonymous reader writes: It seems the latest trend sweeping the online world is the idea that email is on its way out. Kids are eschewing email for any of the hundreds of different instant messaging services, and startups are targeting email as a system they can "disrupt." Alexis C. Madrigal argues that attempts to move past email are shortsighted and faddish, as none of the alternatives give as much power to the user. "Email is actually a tremendous, decentralized, open platform on which new, innovative things can and have been built. In that way, email represents a different model from the closed ecosystems we see proliferating across our computers and devices. Email is a refugee from the open, interoperable, less-controlled 'web we lost.' It's an exciting landscape of freedom amidst the walled gardens of social networking and messaging services." Madrigal does believe that email will gradually lose some of its current uses as new technologies spring up and mature, but the core functionality is here to stay.

    235 comments | about a month ago

  • Knocking Down the Great Firewall of China

    New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.

    167 comments | about a month ago

  • Groundwork Laid For Superfast Broadband Over Copper

    itwbennett writes: Telecom equipment vendor Adtran has developed a technology that will make it easier for operators to roll out broadband speeds close to 500Mbps over copper lines. Adtran's FDV (Frequency Division Vectoring), enhances the capabilities of two technologies — VDSL2 with vectoring and G.fast — by enabling them to better coexist over a single subscriber line, the company said. VDSL2 with vectoring, which improves speeds by reducing noise and can deliver up to 150Mbps, is currently being rolled out by operators, while G.fast, which is capable of 500Mbps, is still under development, with the first deployments coming in mid-2015. FDV will make it easier for operators to roll out G.fast once it's ready and expand where it can be used, according to Adtran. Meanwhile, Ars Technica has an article about how Verizon is letting its copper network rot in order to passively encourage customers to switch to fiber.

    93 comments | about a month ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>