Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
The Internet

Michael Cohen Says He Tried To Rig Online Polls 'at the Direction' of Donald Trump (cnbc.com) 552

Dan Mangan, writing for CNBC: President Donald Trump's former personal lawyer and longtime fixer Michael Cohen on Thursday said he tried to rig online polls -- including one conducted by CNBC -- "at the direction and for the sole benefit of" Trump when he was thinking about making a run for the White House. "I truly regret my blind loyalty to a man who doesn't deserve it," Cohen said in a tweet copping to the electronic chicanery to have Trump's name rank higher in online polls than it otherwise would have.

Cohen's admission came shortly after The Wall Street Journal published a story detailing how he retained an information technology company to manipulate a 2014 CNBC online poll identifying the nation's top 100 business leaders to bolster Trump's chances of making that list. That effort failed. And Trump himself fumed in 2014 on Twitter about his absence from CNBC's poll results.

Submission + - NSA's use of 'traffic shaping' allows unrestrained spying on Americans (zdnet.com)

schwit1 writes: A new analysis of documents leaked by whistleblower Edward Snowden details a highly classified technique that allows the National Security Agency to "deliberately divert" US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans.

The new findings, published Thursday, follows a 2014 paper by researchers Axel Arnbak and Sharon Goldberg, published on sister-site CBS News, which theorized that the NSA, whose job it is to produce intelligence from overseas targets, was using a "traffic shaping" technique to route US internet data overseas so that it could be incidentally collected under the authority of a largely unknown executive order.

Submission + - 20 Years of MAME (mame.net)

AmiMoJo writes: Way back in 1997, Nicola Salmoria merged a few stand-alone arcade machine emulators into the first Multiple Arcade Machine Emulator. Could he have possibly imagined the significance of what he’d built? Over the past two decades, MAME has brought together over a thousand contributors to build a system that emulates more machines than any other program. But MAME is more than that: MAME represents the idea that our digital heritage is important and should be preserved for future generations. MAME strives to accurately represent original systems, allowing unmodified software to run as intended. Today, MAME documents over thirty thousand systems, and usably emulates over ten thousand.

Submission + - Twitter Releases National Security Letters (techcrunch.com)

An anonymous reader writes: Today, Twitter joined the ranks of Yahoo, Cloudflare and Google by announcing it had received two national security letters, one in 2015 and one in 2016. The NSLs came with gag orders that prevented Twitter from telling the public or the targeted users about the government’s demands. The FBI recently lifted these gag orders, allowing Twitter to acknowledge the NSLs for the first time. In the newly-published NSLs, the FBI asked Twitter to turn over “the name, address, length of service, and electronic communications transactional records” of two users. Twitter associate general counsel Elizabeth Banker said that the company provided a “very limited set of data” in response to the requests, but did not make clear exactly what kind of data Twitter provided. “Twitter remains unsatisfied with restrictions on our right to speak more freely about national security requests we may receive,” Banker wrote in a blog post. “We would like a meaningful opportunity to challenge government restrictions when ‘classification’ prevents speech on issues of public importance.”

Submission + - "Most serious" Linux privilege-escalation bug ever is under active exploit (arstechnica.com)

operator_error writes: Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

By Dan Goodin — 10/20/2016

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

Comment Tor router (Score 1) 184

There are a lot of posts here about scary legal problems for the router owner. But what if the routers allowed access to the Internet only through Tor, for example, so the router owner is not in danger of what people do with it? Couldn't the router help by running an internal Tor relay to help that network too?
Government

Leak Shows US Lead Opponent of ACTA Transparency 164

An anonymous reader writes "Throughout the debate over ACTA transparency, the secret copyright treaty, many countries have taken public positions that they support release of the actual text, but that other countries do not. Since full transparency requires consensus of all the ACTA partners, the text simply can't be released until everyone is in agreement. A new leak from the Netherlands fingers who the chief opponents of transparency are: the United States, South Korea, Singapore, and Denmark lead the way, with Belgium, Germany, and Portugal not far behind as problem countries."
First Person Shooters (Games)

Open Source FPS Game Alien Arena 2009 Released 142

Alienkillerrace writes "The open sourced, freeware FPS game Alien Arena 2009 has been released (Windows and Linux). The improvements to the game engine are very significant, and have surely raised the bar for free games of this genre. All surfaces in the game are now rendered using GLSL, not only improving the visual quality, but the performance as well. Interesting new effects like post-process distortions using GLSL have been implemented, as well as light volumes, better per-pixel lighting (reminiscent of UT3), and shaded water. Equally notable is that the sound system has been completely rewritten using OpenAL, allowing for effects such as Doppler, and adding Ogg Vorbis support. The game is free to play and available for download on its official website. It has a stats system and a built-in IRC client in its front-end game browser."
The Courts

iPhone Antitrust and Computer Fraud Claims Upheld 273

LawWatcher writes "On October 1, 2008, a federal judge in California upheld a class action claiming that Apple and AT&T Mobility's five-year exclusive voice and data service provider agreement for the iPhone violates the anti-monopoly provisions of the antitrust laws. The court also ruled that Apple may have violated federal and California criminal computer fraud and abuse statutes by releasing version 1.1.1 of its iPhone operating software when Apple knew that doing so would damage or destroy some iPhones that had been 'unlocked' to enable use of a carrier other than AT&T."

Comment Re:less microsoft bias please? (Score 1) 685

I love how there is an article that has first hand accounts of why actual people are leaving Google to work at Microsoft and there still seems to be argument against Microsoft.

There really is an unsurprising argument against Microsoft to be found here in the article. First, it reeks of propaganda, who else calls a mystery number over 8 people coming back to work at Microsoft an "exodus"? Why is Google suddenly so much worse to work for? Couldn't it simply be related to the latest push to hire workers to bolster Microsoft's search engine development? They have just recently run ads trying to hire disgruntled Yahoo workers too because they couldn't buy them out. It seems a pretty obvious attempt to attract competitor workers, or it's really conveniently timed.

Now a lot of people do frequently rush off to defend Microsoft for some strange reason, often one tied to a paycheck. But for most people, they have an understandably harder time wiping off the "dirty tricks Microsoft has pulled this month" slate and thinking maybe, just maybe, this time there are no tricks involved.
Software

Open Source Growing At an Exponential Rate 146

sipmeister writes "Two computer scientists who work for enterprise software giant SAP have shown that open source is growing at an exponential rate. Not only is the code base growing exponentially, but also the number of viable projects. Researchers Amit Deshpande and Dirk Riehle analyzed the database of open source startup ohloh.net and looked at the last 16 years of growth in open source. They consistently got the best fit for the data using an exponential model. Relating this to open source market revenue, Desphande and Riehle conclude that open source is eating into closed source at a non-trivial pace."

Slashdot Top Deals

"Our reruns are better than theirs." -- Nick at Nite

Working...