Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Space

Submission + - Raspberry Pi: Putting the Linux device into orbit (zdnet.com)

Jack Spine writes: "The Raspberry Pi is likely to be blasted into space, according to project founder Eben Upton.

The $35/$25 credit-card-sized single-board educational computer could be used in sounding rockets, satellites, and high altitude balloon tests, according to Upton.

Raspberry Pi has proved wildly popular since its launch, with one developer planning to build into a model boat to sail it across the Atlantic."

Submission + - Tunny code-breaker rebuilt at Bletchley Park (zdnet.co.uk)

Jack Spine writes: Engineers at the National Museum of Computing at Bletchley Park have rebuilt the Tunny machine, a key device used in decoding German High Command messages during the Second World War.

The Tunny machine took a team of three people three years to rebuild. At the end of the war, Tunny machines were broken up and the components recycled, while the original circuit diagrams were destroyed or hidden. The team had to piece together plans for the machine from odd pieces of circuit diagram that had been squirreled away by engineers, as well as from the recollections of some of the original builders,

Submission + - Controllers: Air traffic system 'not safe' (zdnet.co.uk)

Jack Spine writes: "Air traffic control technology being implemented in one of the major transport hubs in the UK is 'not safe', according to air traffic controllers. The electronic flight data system (EFD) being phased in at Glasgow Prestwick Airport is too slow to handle real-time inputs, and could not cope with an outage that isolated it from the main air traffic system. Controllers had to scramble to handle the situation. Good luck if you're travelling to the UK anytime soon."

Submission + - Chertoff advocates cyber Cold War (zdnet.co.uk)

Jack Spine writes: The US and allied countries should formulate a doctrine to apply the principles of nuclear deterrence to cyber attacks and cyber espionage, according to former US Homeland Security secretary Michael Chertoff. No matter that it's very difficult to attribute the source of cyber attacks — just take punitive action against the platform being used to attack, says Chertoff.
Encryption

Submission + - European credit and debit card security broken (zdnet.co.uk)

Jack Spine writes: With nearly a billion users dependent on smart banking credit and debit cards, banks have refused liability for losses where an idenification number has been provided.

But now, the process behind the majority of European credit and debit card transactions is fundamentally broken, according to researchers from Cambridge University.

The researchers have demonstrated a man-in-the-middle attack which fooled a card reader into accepting a number of point-of-sale transactions, even though the cards were not properly authenticated.

The researchers used off-the-shelf components, and a laptop running a Python script, to undermine the two factor authentication process on European credit and debit cards, which is called Chip and PIN.

Slashdot Top Deals

You must realize that the computer has it in for you. The irrefutable proof of this is that the computer always does what you tell it to do.

Working...