Forgot your password?
typodupeerror

Please create an account to participate in the Slashdot moderation system

Government

To Fight $5.2B In Identity Theft, IRS May Need To Change the Way You File Taxes 132

Posted by Soulskill
from the your-tax-dollars-at-work dept.
coondoggie writes: Based on preliminary analysis, the Internal Revenue Service (IRS) estimates it paid $5.2 billion in fraudulent identity theft refunds in filing season 2013 while preventing an additional $24.2 billion (based on what it could detect). As a result, the IRS needs to implement changes (PDF) in a system that apparently can't begin verifying refund information until July, months after the tax deadline. Such changes could impact legitimate taxpayers by delaying refunds, extending tax season and likely adding costs to the IRS.
Open Source

jQuery.com Compromised To Serve Malware 63

Posted by timothy
from the send-you-this-query-to-have-your-advice dept.
An anonymous reader writes jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, had been compromised and had been redirecting visitors to a website hosting the RIG exploit kit and, ultimately, delivering information-stealing malware. While any website compromise is dangerous for users, this one is particularly disconcerting because of the demographic of its users, says James Pleger, Director of Research at RiskIQ.
Upgrades

Counter-Strike: Global Offensive Premieres On Linux, 2 Years After Windows 73

Posted by timothy
from the man-this-is-a-long-party dept.
An anonymous reader writes Counter-Strike: Global Offensive has finally been released for Linux two years after its Windows debut. The game is reported to work even on the open-source Intel Linux graphics drivers, but your mileage may vary. When it comes to the AMD and NVIDIA drivers, NVIDIA continues dominating for Linux gaming over AMD with Catalyst where there's still performance levels and other OpenGL issues.
Red Hat Software

Fedora 21 Alpha Released 32

Posted by timothy
from the every-release-represents-years-of-work dept.
An anonymous reader writes Fedora 21 Alpha has been released. After encountering multiple delays, the first development version is out for the Fedora.NEXT and Fedora 21 products. Fedora 21 features improved Wayland support, GNOME 3.14, many updated packages, greater server and cloud support, and countless other improvements with Fedora 20 already being nearly one year old.
Operating Systems

Outlining Thin Linux 200

Posted by Soulskill
from the tux-on-a-diet dept.
snydeq writes: Deep End's Paul Venezia follows up his call for splitting Linux distros in two by arguing that the new shape of the Linux server is thin, light, and fine-tuned to a single purpose. "Those of us who build and maintain large-scale Linux infrastructures would be happy to see a highly specific, highly stable mainstream distro that had no desktop package or dependency support whatsoever, so was not beholden to architectural changes made due to desktop package requirements. When you're rolling out a few hundred Linux VMs locally, in the cloud, or both, you won't manually log into them, much less need any type of graphical support. Frankly, you could lose the framebuffer too; it wouldn't matter unless you were running certain tests," Venezia writes. "It's only a matter of time before a Linux distribution that caters solely to these considerations becomes mainstream and is offered alongside more traditional distributions."
Government

Service Promises To Leak Your Documents If the Government Murders You 95

Posted by samzenpus
from the if-anything-happens-to-me dept.
Jason Koebler writes With all the conspiracy theories surrounding some high-profile deaths in recent years, how can you, theoretical whistleblower with highly sensitive documents, be assured that your information gets leaked if you're murdered in some government conspiracy? A new dark web service says it's got your back. "Dead Man Zero" claims to offer potential whistleblowers a bit more peace of mind by providing a system that will automatically publish and distribute their secrets should they die, get jailed, or get injured.
Businesses

Ask Slashdot: Who Should Pay Costs To Attend Conferences? 175

Posted by samzenpus
from the conference-or-else dept.
An anonymous reader writes I wanted to get your opinion on who should pay the costs associated with attending conferences. In the past, I've covered costs associated with attending some local (in town) conferences, but despite claims to be willing to cover some costs associated with conferences, training, and certifications, my requests have been denied. The short version is I would like to attend a national conference, hosted in Las Vegas, and that while specific to a technology, it is what 90% of my day is related to so its directly work related. My employer has declined to pay some of the costs associated with the conference, but has said if I pay my way, they will pay for the training associated with it. Since this is a pretty hot technology, I'm very interested in getting certified and appreciate their offer.

I should add that I work for a public entity and due to some fairly public issues, we have enjoyed record levels of funding the past couple of years. We know that they cannot afford to continue so we're about to start a multi-year decrease in our budget. My current thoughts are: First, I was working for a company where we faced potential layoffs, getting as close as to within 24 hours of one. Even just having some job security is extremely appreciated. Second, I work in a WONDERFUL environment. They aren't clock punchers, its about getting the job done. We're not micromanaged and have freedom to try new things. For the public sector, I know those are rare things and I appreciate them. Third, I work on a very talented team. I am probably the weakest member, so for me its a perfect learning/growth opportunity. Finally, its not my employer saying the conference isn't important, its looking at the bottom line and that we are a public entity so its not like we can easily raise more money. Tough decisions must be made.

For this particular conference, I decided to try and save up my own money. Unfortunately, my personal life has gotten in the way, so I've resorted to begging. My problem with this is I hate begging, but what am I going to do for future conferences? So should I re-think my acceptance of my employers policy and start looking for a new job? Obviously, it is a personal decision, but I don't have a mentor or close friends to act as sounding boards, so I'd love to hear your thoughts.
Piracy

The Raid-Proof Hosting Technology Behind 'The Pirate Bay' 140

Posted by timothy
from the pesky-vikings-and-their-lessons dept.
HughPickens.com writes Ernesto reports at TorrentFreak that despite its massive presence the Pirate Bay doesn't have a giant server park but operates from the cloud, on virtual machines that can be quickly moved if needed. The site uses 21 "virtual machines" (VMs) hosted at different providers, up four machines from two years ago, in part due to the steady increase in traffic. Eight of the VMs are used for serving the web pages, searches take up another six machines, and the site's database currently runs on two VMs. The remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller. In total the VMs use 182 GB of RAM and 94 CPU cores. The total storage capacity is 620 GB. One interesting aspect of The Pirate Bay is that all virtual machines are hosted with commercial cloud hosting providers, who have no clue that The Pirate Bay is among their customers. "Moving to the cloud lets TPB move from country to country, crossing borders seamlessly without downtime. All the servers don't even have to be hosted with the same provider, or even on the same continent." All traffic goes through the load balancer, which masks what the other VMs are doing. This also means that none of the IP-addresses of the cloud hosting providers are publicly linked to TPB. For now, the most vulnerable spot appears to be the site's domain. Just last year TPB burnt through five separate domain names due to takedown threats from registrars. But then again, this doesn't appear to be much of a concern for TPB as the operators have dozens of alternative domain names standing by.
Encryption

Researchers Propose a Revocable Identity-Based Encryption Scheme 75

Posted by timothy
from the now-who-was-I? dept.
jd writes Identity-based public key encryption works on the idea of using something well-known (like an e-mail address) as the public key and having a private key generator do some wibbly-wobbly timey-wimey stuff to generate a secure private key out if it. A private key I can understand, secure is another matter. In fact, the paper notes that security has been a big hassle in IBE-type encryption, as has revocation of keys. The authors claim, however, that they have accomplished both. Which implies the public key can't be an arbitrary string like an e-mail, since presumably you would still want messages going to said e-mail address, otherwise why bother revoking when you could just change address?

Anyways, this is not the only cool new crypto concept in town, but it is certainly one of the most intriguing as it would be a very simple platform for building mostly-transparent encryption into typical consumer apps. If it works as advertised. I present it to Slashdot readers to engender discussion on the method, RIBE in general and whether (in light of what's known) default strong encryption for everything is something users should just get whether they like it or not.
IOS

Ask Slashdot: Is iOS 8 a Pig? 495

Posted by timothy
from the not-intended-to-denigrate-pigs dept.
kyjellyfish writes I've been using iOS 8 for several days and aside from a few gimmicks and add-ons that attempt to achieve parity with Android, my experience has been overwhelmingly unsatisfactory. My chief complaint is that the vast majority of my apps are slow to boot and noticeably sluggish in operation. I want to point out that all of these apps have been "upgraded" specifically for iOS 8 compatibility. Previous operating system upgrades have been relatively seamless, so I'm asking whether other slashdotters have experienced this degraded performance.
Encryption

Wired Profiles John Brooks, the Programmer Behind Ricochet 49

Posted by timothy
from the bouncy-bouncy dept.
wabrandsma writes with this excerpt from Wired: John Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the "to" and "from" headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he'd made Ricochet's code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists's sources and others.
Government

Secret Service Critics Pounce After White House Breach 221

Posted by timothy
from the owen-wilson-has-the-president-well-protected dept.
HughPickens.com writes On Friday evening, a man jumped the White House fence, sprinted across the North Lawn toward the residence, and was eventually tackled by agents, but not before he managed to actually enter the building. Now CBS reports that the security breach at the White House is prompting a new round of criticism for the Secret Service, with lawmakers and outside voices saying the incident highlights glaring deficiencies in the agency's protection of the president and the first family. "Because of corner-cutting and an ingrained cultural attitude by management of 'we make do with less,' the Secret Service is not protecting the White House with adequate agents and uniformed officers and is not keeping up to date with the latest devices for detecting intruders and weapons of mass destruction," says Ronald Kessler. "The fact that the Secret Service does not even provide a lock for the front door of the White House demonstrates its arrogance." But the Secret Service must also consider the consequences of overreaction says White House correspondent Major Garrett. "If you have a jumper and he is unarmed and has no bags or backpacks or briefcase, do you unleash a dog and risk having cell phone video shot from Pennsylvania Avenue of an unarmed, mentally ill person being bitten or menaced by an attack dog?" But Kessler says Julia Pierson, the first woman to head the Secret Service, has some explaining to do. "If the intruder were carrying chemical, biological or radiological weapons and President Obama and his family had been in, we would have had a dead president as well as a dead first family."
Democrats

Emails Cast Unflattering Light On Internal Politics of Healthcare.gov Rollout 385

Posted by timothy
from the wanna-be-absolutely-clear dept.
An anonymous reader writes with this report from The Verge linking to and excerpting from a newly released report created for a committee in the U.S. House of Representatives, including portions of eight "damning emails" that offer an unflattering look at the rollout of the Obamacare website. The Government Office of Accountability released a report earlier this week detailing the security flaws in the site, but a report from the House Committee on Oversight and Government Reform released yesterday is even more damning. Titled, "Behind the Curtain of the HealthCare.gov Rollout," the report fingers the Centers for Medicare and Medicaid Services, which oversaw the development of the site, and its parent Department of Health and Human Services. "Officials at CMS and HHS refused to admit to the public that the website was not on track to launch without significant functionality problems and substantial security risks," the report says. "There is also evidence that the Administration, to this day, is continuing its efforts to shield ongoing problems with the website from public view." Writes the submitter: "The evidence includes emails that show Obamacare officials more interested in keeping their problems from leaking to the press than working to fix them. This is both both a coverup and incompetence."
Upgrades

NVIDIA Launches Maxwell-Based GeForce GTX 980 and GeForce GTX 970 GPUs 124

Posted by timothy
from the upgrade-treadmill dept.
MojoKid (1002251) writes NVIDIA has launched two new high-end graphics cards based on their latest Maxwell architecture. The GeForce GTX 980 and GTX 970 are based on Maxwell and replace NVIDIA's current high-end offerings, the GeForce GTX 780 Ti, GTX 780, and GTX 770. NVIDIA's GeForce GTX 980 and GTX 970 are somewhat similar as the cards share the same 4GB frame buffer and GM204 GPU, but the GTX 970's GPU is clocked a bit lower and features fewer active Streaming Multiprocessors and CUDA cores. The GeForce GTX 980's GM204 GPU has all of its functional blocks enabled. The fully-loaded GeForce GTX 980 GM204 GPU has a base clock of 1126MHz and a Boost clock of 1216MHz. The GTX 970 clocks in with a base clock of 1050MHz and Boost clock of 1178MHz. The 4GB of video memory on both cards is clocked at a blisteringly-fast 7GHz (effective GDDR5 data rate). NVIDIA was able to optimize the GM204's power efficiency, however, by tweaking virtually every part of the GPU. NVIDIA claims that Maxwell SMs (Streaming Multiprocessors) offer double the performance of GK104 and double the perf per watt as well. NVIDIA has also added support for new features, namely Dynamic Super Resolution (DSR), Multi-Frame Sampled Anti-Aliasing (MFAA), and Voxel Global Illumination (VXGI). Performance-wise, the GeForce GTX 980 is the fastest single-GPU powered graphics card ever tested. The GeForce GTX 970 isn't as dominant overall, but its performance was impressive nonetheless. The GeForce GTX 970 typically performed about on par with a GeForce GTX Titan and traded blows with the Radeon R9 290X.
Upgrades

Why the iPhone 6 Has the Same Base Memory As the iPhone 5 252

Posted by timothy
from the enough-is-enough-for-anybody dept.
Lucas123 writes When the iPhone 5 was launched two years ago, the base $199 (with wireless plan) model came with 16GB of flash memory. Fast forward to this week when the iPhone 6 was launched with the same capacity. Now consider that the cost of 16GB of NAND flash has dropped by more than 13% over the past two years. So why would Apple increase capacity on its $299 model iPhone 6 to 64GB (eliminating the 32GB model), but but keep the 16GB in the $199 model? The answer may lie in the fact that the 16GB iPhone is, and has been, by far the best selling model. IHS analyst Fang Zhang believes Apple is using that to push users to its iCloud storage service. Others believe restricting storage capacity allows Apple to afford the new features, like NFC and biometrics.

How often I found where I should be going only by setting out for somewhere else. -- R. Buckminster Fuller

Working...