Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Medicine

Submission + - Scientists Identify Itch-Specific Neurons

Hugh Pickens writes: "A ticklish problem in neuroscience has been that although historically many scientists have regarded itching as just a less intense version of pain and decades searching for itch-specific nerve cells have been unfruitful. Now Nature reports that neuroscientist Zhou-Feng Chen and his colleagues at Washington University in St Louis, Missouri have found the first behavioral evidence that there are separate circuits of nerve cells to convey itchiness and pain and their studies suggest that itch and pain signals are transmitted along different pathways in the spinal cord. "Most people accept that there are specific, highly specialized neurons for sensations like taste," says Chen. "But for pain and itch this is much more controversial." Two years ago, Chen's group discovered that a cell-surface protein called the gastrin-releasing peptide receptor (GRPR) is important for sensing itchiness but not pain in mice. When Chen and his colleagues destroyed GRPR-bearing neurons by means of a cell toxin, the mice reacted to painful stimuli just like normal mice, licking themselves and flinching or jumping in response to heat, highly irritant chemicals and mechanical pressure. But when the researchers injected the animals with chemicals that normally cause scratching, such as histamine, they barely responded and the greater the number of GRPR-expressing neurons destroyed, the more subdued was the scratching response. "This is the first behavioral evidence that there are itch-specific neurons," says Chen. "People have been looking for these for many years." Although the present research only scratches the surface, the discovery highlights a new target for therapy and opens the field for specific treatments for itch that don't affect pain."
Security

Submission + - How do I detect if I am part of a botnet

ashraya writes: My father (Not too computer literate) has a desktop and a laptop both running windows in his network back in Hyderabad, India. I set up a Linksys router for him to use with his broadband service. For some reason, he reset the config on the Linksys, and connected it up without Wireless security, and also with the default admin password for some time. As you would expect, both the windows computers got 'slow', and the desktop stopped connecting to internet completely for some reason. As I logged in remotely to 'fix' things — I noticed on the linksys log that the laptop was making seemingly random connections to high numbered ports on various IPs. I did a nslookup on the IPs to see that they were all either in Canada or US, with comcast and other ISP addresses.

Is that a sign that the computers were in a botnet? Are the other hosts part of the botnet too?

I have since rebuilt the windows hosts, and this connections are not happening now. I have also secured the Linksys.
Censorship

Submission + - Graphic Artists Condemn UK Ban on Erotic Comics

mdwh2 writes: Graphic artists, publishers and MPs have condemned the UK's Coroners and Justice Bill, which will criminalise possession of sexual depictions that appear to show someone under 18 (the age of consent is 16 in the UK), as well as adults where the "predominant impression conveyed" is of someone under 18, and even if they are merely drawn as being present whilst sexual activity took place between adults. The definitions could include Lost Girls, Watchmen, and South Park. The Comic Book Alliance has launched a Petition against the law.
United States

Journal Journal: And who wants to force you to buy insurance? 6

Who else? Hillary's golden goose. And this is another payment to her for dropping the nomination attempt. Makes me think she's actually the acting president. And why do they want it? For the benefit of the market, of course. It's certainly not for any of ours. I suppose the Wall Street guys are drooling over this. More free government money, only this time it comes straight from

New Gadget Blocks 'Spam' Phone Calls 274

Smivs writes "The BBC report on a new gizmo that can block/filter spam phone calls. The system basically intercepts all calls. If it recognizes them as a friend or a member of the user's family — numbers on the so-called star list created by the user — it lets them through as normal. If the caller's number is on a zap list — numbers of telemarketers or other nuisance callers — the device answers it, and all future calls from that number, with an automated message which means the phone does not ring at all. If the system doesn't recognize the caller's number, or the caller withholds their number, it asks them who they are, puts them on hold and then rings the user's phone. The user has the option of taking the call, having the system take a message, or they can reject the call and add the number to the 'zap' list. Users can add callers to their 'star' list by pressing the star button on their phone at any point during a call." So wait, they can't spam me twice? If I press a button? And if they actually show their phone number on my caller ID? What about the auto insurance scammers that hit me 10x/week?
Moon

Indian Moon Mission Launched 305

hackerdownunder writes "India's maiden lunar mission (Chandrayaan-1) got off to a flying start today. Describing the launch as 'perfect and precise,' the chairman of the Indian Space Research Organization (ISRO), G Madhavan Nair, said that it would be 14 days before the satellite would enter into lunar orbit. Chandrayaan carries eleven payloads: five designed and developed in India, three from the European Space Agency, one from Bulgaria and two from NASA."
Security

Damning Report On Sequoia E-Voting Machine Security 200

TechDirt notes the publication of the New Jersey voting machine study, the attempted suppression of which we have been discussing for a while now. The paper that the Princeton and Lehigh University researchers are releasing, as permitted by the Court, is "the same as the Court's redacted version, but with a few introductory paragraphs about the court case, Gusciora v. Corzine." What's new is the release of a 90-minute evidentiary video — the researchers have asked the court for permission to release a shorter version that hits the high points, as the high-res video is about 1 GB in size. See TechDirt's article for the report's executive summary listing eight ways the AVC Advantage 9.00 voting machine can be subverted.
Games

MUDs Turn 30 Years Old 238

Massively points out that today marks the 30th anniversary of the first Multi-User Dungeon (MUD) going live at Essex University in the UK. The game, referred to as MUD1, was created by Roy Trubshaw. Richard Bartle, a man who also worked on the game as a student at Essex, has a post discussing the milestone and talking about how MUDs relate to modern MMOs. What MUDs did you play?
Communications

Handling Caller ID Spoofing? 556

An anonymous reader writes "A nice little old lady I know has had her number spoofed by some car warranty scammers. They're calling hundreds of potential victims per day pretending to use her phone number, and the angry ones call her back; some of them have even left death threats. She's terrified. Some well-intending anti-telemarketing folks have posted her address on the 'net as well. How can we figure out where these scammer bastards are, and what's the state of the current legislation to prevent caller ID spoofing? I called the FBI in Boston (near where she lives) and they said they can't help. She's called her phone company, but they said they can't help either. She's had the same number for over 50 years and doesn't want to change it." If the Feds can't or won't handle it, what's the best approach here?
Linux Business

Red Hat CEO Says Economic Crisis Favors Open Source 191

arashtamere writes "Red Hat president and CEO Jim Whitehurst predicts the enterprise open source software business will emerge from the economic crisis stronger than the proprietary market. 'I've had a couple of conversations with CIOs who said, "We're a Microsoft shop and we don't use any open source whatsoever, but we're already getting pressure to reduce our operating costs and we need you to help put together a plan for us to... use open source to reduce our costs." And we've had other customers literally looking at ripping and replacing WebLogic or WebSphere for JBoss ... I think we'll know in about six to nine months but there is no question that open source will come out of this in relatively better shape than our proprietary competitors,' he told Computerworld."
Books

Submission + - SPAM: Online cartoonist breaks publishing record?

destinyland writes: "The first collection of "Perry Bible Fellowship" comics racked up pre-sales of $300,000 due to its huge online following, and within seven weeks required a third printing. Ironically, the 25-year-old cartoonist speculates people would rather read his arty comics in a book than on a computer screen, and warns that "There's something wonderful, and soon-to-be mythic, about the printed page..." He also explains the strange anti-censorship crusade in high school that earned him an FBI record!"
Link to Original Source
IBM

Submission + - IBM Seeking 'Patent-Protection-Racket' Patent 2

theodp writes: "Wikipedia defines a protection racket as an extortion scheme whereby a powerful non-governmental organization coerces businesses to pay protection money which allegedly serves to purchase the organization's 'protection' services against various external threats. Compare this to IBM's just-published patent application for 'Extracting Value from a Portfolio of Assets', which describes a process by which 'very large corporations' impress upon smaller businesses that paying for 'the protection of a large defensive patent portfolio' would be 'a prudent business decision' for them to make, 'just like purchasing a fire insurance policy.' Sounds like Fat Tony's been to Law School, eh? Time for IBM to put-their-money-where-their-patent-reform-mouth-is and deep-six this business method patent claim!"
Space

Submission + - New carbon-based paper stronger than nanotubes (sciencemag.org)

LynnwoodRooster writes: "Science Magazine reports that a group from Northwestern University in Illinois has a new process for creating carbon-based paper that's stronger than nanotubes, and incredibly easy to use to make sheets of any desired sizes. Huge implications for aircraft, automobiles, and the ever-sought-after space elevator? Forget that, I want to make some new speaker cones with this technology..."
The Internet

Submission + - AC = Domestic Terrorists? 3

Miang writes: "A video from a recent FOX 11 (Los Angeles) newscast has surfaced on YouTube. In the segment, reporter Phil Shuman investigates so-called "Hacker Gangs" comprised entirely of anonymous users. The segment, which focuses mainly on users at 4chan, 7chan, and 420chan, seems to confuse /b/ raids and motivational poster templates with a genuine threat to the American public. For added FUD, the FOX team inserted an unrelated video of a van blowing up — twice! Presumably, one is intended to equate anonymous posting with domestic terror. The story and video can be found on the local FOX website, so it does not appear to be simply a clever parody."
Software

Submission + - Do "Illegal" Codecs Actually Scare Linux U (earthweb.com) 1

jammag writes: "In this article, Adrian Kingsley-Hughes says that "Despite strong points that go far beyond price, Linux falls short when it comes to legally supporting file formats such as MP3, WMA/WMV and DVDs." He talks about using Ubuntu and booting up Totem Movie Player, only to be confronted with a burst of legalese about what a hardened criminal he'll be if he uses Totem without a license. (Gasp!) This problem is "a deal breaker" for him."

Slashdot Top Deals

System checkpoint complete.

Working...