Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Input Devices

Gaming Gear Showdown, Simplicity vs. Hype 159

Slack3r78 writes "Gizmodo is running a feature putting the gaming marketing hype to the test and seeing whether it really makes your playing any more 1337. They match up the latest products from Razer and SteelSeries along with some five-year-old Logitech products and come to the conclusion that ... it doesn't seem to matter that much. It looks like maybe you can't buy your way into finally beating that annoying 13-year-old at your favorite FPS after all."
Patents

Rambus Wins Patent Case 146

Blowfishie writes "Rambus has won a major case they've been fighting since the late 90's. Rambus worked its technology into the standards for SDRAM and DDR data transfer, then waited for the major players (Hynix, Micron and Nanya) to be heavily committed before revealing that it had patents on the technology. 'At issue is whether the developer of a speedy new memory technology deserved to be paid for its inventions, or whether the company misled memory chip makers. "I think they (the jurors) misapprehended what the standards-setting organizations are about and the absolute need for good faith," said Jared Bobrow, an outside attorney for Micron. Wednesday's verdict comes after a judgment against Hynix in 2006 that resulted in a $133 million award to Rambus, Lavelle said, and potentially clears the way for Rambus to collect on that verdict.'"
Encryption

Breaking a Car's Cipher 253

An anonymous reader alerts us to research out of Belgium and Israel that claims a practical attack on the KeeLoq auto anti-theft cipher. Here are slides from a talk (PDF) at CRYPTO 2007. From the researchers' site: "KeeLoq is a cipher used in several car anti-theft mechanisms distributed by Microchip Technology Inc. It may protect your car if you own a Chrysler, Daewoo, Fiat, General Motors, Honda, Toyota, Volvo, Volkswagen, or a Jaguar. The cipher is included in the remote control device that opens and locks your car and that controls the anti-theft mechanisms. The 64-bit key block cipher was widely believed to be secure. In a recent research, a method to identify the key in less than a day was found. The attack requires access for about 1 hour to the remote control (for example, while it is stored in your pocket). The attacker than runs the implemented software, finds the secret cryptographic key, and drives away in your car after copying the key." Update: 07/23 15:27 GMT by KD : One of the researchers, Sebastiaan Indesteege, pointed out that the link to the paper was incorrect; their paper has not yet been released to the public. I also managed to mis attribute his nationality. He is Belgian, not Dutch. My apologies.
The Almighty Buck

Science Blogger Sued for Unfavorable Book Review 588

tigerhawkvok writes "Recently, new author Stuart Privar provided Professor PZ Meyers of Pharyngula a copy of his book, Lifecode, for review. Over the course of the review itself and a few follow-ups, it became evident that the content was nonsense (including, among other things, ten-legged spiders and other phenomena strongly at odds with developmental biology). However, the common threat of lawsuits finally became a reality, and now Privar is suing Myers for $15 million. Can calling someone a 'classic crackpot' in the face of such incorrect data have any chance at making it to court, or even winning the suit?"
Hardware Hacking

Couple Bonding Through PC Building 465

mikemuch writes "When his lovely girlfriend Glenda needed a new PC, Jason Cross, who spends much of the week assembling PCs with the latest gear to test for ExtremeTech, decided he would let her build it herself. She gave him her list of needs, he came up with a part list, and then watched as she did all the screwdriver wielding herself. Despite a DOA hard drive and some mis-connected wires, everyone was smiling when it was all finished. (Slide show here.)"
Censorship

Cryptome to be Terminated by Verio/NTT 171

George Maschke writes "Cryptome, a website concerned with encryption, privacy, and government secrecy, has received two weeks' notice from Verio that its service will be terminated for unspecified "violation of [its] Acceptable Use Policy." Cryptome has a history of making publicly available documents and information that governments would rather keep secret. For the notice, and a public response by Cryptome webmaster John Young, see Cryptome Shutdown by Verio/NTT."
Games

'Over 30' Section For Games Stores? 220

A New York law introduced by Representative Keith Wright seeks just that, a section for gaming stores that keeps 'violent games' under lock and key, and is accessible only to people over 30. The law is one of two poorly-thought pieces of legislation being considered by New York state's legal system. From the 1up article: "The history of the courts striking down such legislation goes just about as far back as politicians who attempt to bolster their own image by capitalizing on the public fear and hysteria over the bogeyman of video gaming. It's interesting to note that recently, courts have begun penalizing entities who purposely waste their time with attempts at passing frivolous and unconstitutional anti-videogame legislation. You'd think might deter motions like [these] somewhat, wouldn't you?" Update: 01/19 04:10 GMT by Z : As ahecht points out in the comments 1up has things wrong here. There is only one bill, and it restricts violent games from being sold to those under 18 only. Line 5 of the bill's text is the section in question.
Hardware

Navy Gets 8-Megajoule Rail Gun Working 650

prototypo writes "The Free Lance-Star newspaper is reporting that the Navy Surface Warfare Center in Dahlgren, Virginia has successfully demonstrated an 8-megajoule electromagnetic rail gun. A 32-megajoule version is due to be tested in June. A 64-megajoule version is anticipated to extend the range of naval gunfire (currently about 15 nautical miles for a 5-inch naval gun) to more than 200 nautical miles by 2020. The projectiles are small, but go so fast that have enough kinetic punch to replace a Tomahawk missile at a fraction of the cost. In the final version, they will apex at 95 miles altitude, well into space. These systems were initially part of Reagan's SDI program ("Star Wars"). An interesting tidbit in the article is that the rail gun is only expected to fire ten times or less per day, presumably because of the amount of electricity needed. I guess we now need a warp core to power them."
OS X

Submission + - Best Backup Solution For OS X?

SpartanVII writes: I purchased a Mac roughly two years ago and have made the switch with a fair amount of ease. However, one thing that has troubled me is how best to backup my important data to an external hard drive. Right now I have rigged up an Automator workflow that runs every night, but I have also seen software options like SuperDuper and Knox. Since the Automator workflow lacks much of the flexibility and features available with these apps, I am ready to try something else. What app have you come across that provides the best backup solution?

Linux Users Banned From World of Warcraft? 515

Turmoyl writes "Many Cedega (formerly WINEX) users claim to have been mistakenly caught up in a security sweep of the U.S. game servers performed by Blizzard's World of Warcraft Game Master (GM) staff. Affected users received the same strongly-worded 'Notice of Account Closure' email messages that true bot users did, in which they were accused of the 'Use of Third Party Automation Software.' While diagnosis of this event continues early speculation points to Blizzard's use of the Warden anti-cheating spyware application that is bundled with World of Warcraft, and the odd things that may have been produced by it when it was run via Cedega. Emails to World of Warcraft's Account Administration staff continue to go unanswered while the list of affected people continues to grow."

Robot Identifies Human Flesh As Bacon 312

Jearil writes "Wired's 'Table of Malcontents' blog links to an article about a wine-tasting robot that thinks humans taste like bacon. The Japanese robot is intended to act as a personal sommelier, suggesting wines, cheeses, and hors d'oeuvres based on its owners personal tastes. It also apparently thinks humans would be tasty as part of a sandwich." From the article: "Let the robot holocaust commence: robots think we taste like bacon ... Upon being given a sample, he will speak up in a childlike voice and identify what he has just been fed. The idea is that wineries can tell if a wine is authentic without even opening the bottle, amongst other more obscure uses ... like 'tell me what this strange grayish lump at the back of my freezer is/was.' But when some smart aleck reporter placed his hand in the robot's omnivorous clanking jaw, he was identified as bacon. A cameraman then tried and was identified as prosciutto." This is most distressing.

China - We Don't Censor the Internet 554

kaufmanmoore writes "A Chinese government official at a United Nations summit in Athens on internet governance has claimed that no Net censorship exists at all in China. The article includes an exchange by a Chinese government official and a BBC reporter over the blocking of the BBC in China." From the article: "I don't think we should be using different standards to judge China. In China, we don't have software blocking Internet sites. Sometimes we have trouble accessing them. But that's a different problem. I know that some colleagues listen to the BBC in their offices from the Webcast. And I've heard people say that the BBC is not available in China or that it's blocked. I'm sure I don't know why people say this kind of thing. We do not have restrictions at all."

How Encrypted Binaries Work In Mac OS X 365

An anonymous reader writes "By now we know that OS X uses encrypted binaries for some critical apps like Dock, Finder and LoginWindow. Amit Singh explains the implementation of this protection scheme which makes use of the AES crypto algorithm and a special memory pager in Mach. The so called Do Not Steal Mac OS X (DSMOS) kernel extension helps along the way by decrypting things for the special pager when apps get executed. A funny thing is that if you print the pointer at address 0xFFFF1600 in your own app you get as output Apple's karma poem for crackers! According to the article there are 8 protected binaries in OSX including Rosetta and Spotlight meta data demon. Interestingly Apple's window server is NOT one of those."

Slashdot Top Deals

When the bosses talk about improving productivity, they are never talking about themselves.

Working...