mask.of.sanity writes "Researchers have developed attacks capable of crippling Global Positioning System infrastructure critical to the navigation of a host of military and civilian technologies including planes, ships and unamed drones. The novel remote attacks can be made against consumer and professional-grade receivers using $2500 worth of custom-built equipment. Researchers from Carnegie Mellon University and Coherent Navigation detailed the attacks in a paper. (pdf)"
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
paysonwelch writes "John McAfee, famed antivirus software pioneer and human rights advocate, today announced that he will host a news conference to ask the world for its protection against the Government of Belize. On his official blog, whoismcafee.com, Mr. McAfee has accused the Belize government of widespread corruption. Because of this, Mr. McAfee feels that he will be in grave danger if he were to be returned to there."
angry tapir writes "Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing firm Rapid7. The botnet is called Skynet and can be used to launch DDoS (distributed denial-of-service) attacks, generate Bitcoins — a type of virtual currency — using the processing power of graphics cards installed in infected computers, download and execute arbitrary files or steal login credentials for websites, including online banking ones. However, what really makes this botnet stand out is that its command and control (C&C) servers are only accessible from within the Tor anonymity network using the Tor Hidden Service protocol."
Hugh Pickens writes "Defense Tech reports that several F-16 engines weighing 3,700 pounds each have been stolen from a base in a central part of the country. Israeli officials played down the loss, saying the engines were old or retired and likely stolen for scrap. U.S. security and aviation experts contacted were not so dismissive of the missing engines and said that some countries would see value in having them and taking them apart. 'They're still more modern than anything in the Iranian air force inventory, and they would even be helpful to China in their jet engine development,' says Richard Aboulafia, noting that modern technology engine design remains 'a black art' and that competitors would love the opportunity to study them. This is not the first time jet engines have gone missing. In June 2011, Israel reported the loss of eight F-15 and F-16 fighter engines from a base at Tel Nof near Jerusalem when investigators found the engines had been taken away on large trucks, prompting speculation that the thieves had help from inside the base. In 2009, two F-5 engines were stolen from an airbase in Malaysia, tracked to Argentina and ultimately located in Uruguay."
spacenet writes "As a response to RMS speaking out against Ubuntu about its privacy-violating integrated Amazon search results, which he considers to be spyware, Ubuntu Community Manager Jono Bacon has addressed RMS's statements. In his reply, Jono claims that Stallman's views on privacy do not align with Canonical's, that some of his statements are worded in order to 'generate fear, uncertainty, and doubt about Ubuntu' and that 'it just seems a bit childish to me.' The comments on the post itself are well worth a read."
Press2ToContinue writes "Dubbed the Python Challenge, the month-long contest will award $1,000 for the longest python and $1,500 for the most pythons caught between Jan. 12 and Feb. 10 in any of four hunting areas north of Everglades National Park and at the Big Cypress National Preserve. Pythons have been spreading through the Everglades for years, posing a threat to the sensitive ecosystem by preying on native species. Some estimates put their number in the tens of thousands. Last year, 272 pythons were removed from the wild, state figures show."
TrueSatan writes "Perhaps a sign of our troubled times or a sign that FreeBSD is becoming less relevant to modern computing needs: the FreeBSD project has sought $500,000 by year end to allow it to continue to offer to fund and manage projects, sponsor FreeBSD events, Developer Summits and provide travel grants to FreeBSD developers. But with the end of this year fast approaching, it has raised just over $280,000, far short of its target."
First time accepted submitter Shifuimam writes "I downloaded a DOSBox port for Android recently to get back into all the games of my childhood. Turns out that the only free distribution available hasn't been updated in nearly two years, so I looked for alternatives. There are two on Google Play — DOSBox Turbo and "DOSBot". Both charge a fee — DOSBox Turbo is $3.99; DOSBot is $0.99. The developer of DOSBot says on his Google Play entry that he will not release the source code of his application because it's not GPL, even though it's derived from source released under GPL v2 — this is definitely a violation of the license. The developer of DOSBox Turbo is refusing to release the source for his application unless you pay the $3.99 to "buy" a license of it. The same developer explicitly states that the "small" fee (although one might argue that $3.99 is pretty expensive for an OSS Android app) is to cover the cost of development. Unless I'm misreading the text of GPL v2, a fee can only be charged to cover the cost of the distribution of a program or derived work, not the cost of development. And, of course, it doesn't cost the developer anything for someone to log in to Google Play and download their app. In fact, from what I can tell, there's a one-time $25 fee to register for Google Checkout, after which releasing apps is free. Where do you draw the line on this? What do you do in this kind of situation?"
SternisheFan writes "In Southwestern France, a group of fish have learned how to kill birds. As the River Tarn winds through the city of Albi, it contains a small gravel island where pigeons gather to clean and bathe. And patrolling the island are European catfish—1 to 1.5 meters long, and the largest freshwater fish on the continent. These particular catfish have taken to lunging out of the water, grabbing a pigeon, and then wriggling back into the water to swallow their prey. In the process, they temporarily strand themselves on land for a few seconds. Other aquatic hunters strand themselves in a similar way, including bottlenose dolphins from South Carolina, which drive small fish onto beaches, and Argentinian killer whales, which swim onto beaches to snag resting sealions. The behavior of the Tarn catfishes is so similar that Julien Cucherousset from Paul Sabatier University in Toulouse describes them as 'freshwater killer whales.'"
sfcrazy writes "Ubuntu is becoming a shopping center. Instead of addressing the queries raised by Stallman and the EFF, Canonical is now pushing for making Ubuntu a shopping cart. With Ubuntu 13.04 Canonical is going one step forward, and soon you will be able to purchase software and music right from the Dash without opening the software center or web browser.This is intended to make the whole experience even more interactive and useful for the end user."
First time accepted submitter Tastecicles writes "Patrick Moore, the monocled surveyor of the sky who awakened in millions of people an interest in galactic goings on, has died at 89. His love of astronomy began at the age of six, and that childhood curiosity developed into a lifelong passion. It was a passion he shared through his program, The Sky at Night, which he presented for more than 50 years, only ever missing one episode due to illness. Patrick Alfred Caldwell-Moore was born at Pinner, Middlesex on 4 Mar 1923. Heart problems meant he spent much of his childhood being educated at home and he became an avid reader. His mother gave him a copy of GF Chambers' book The Story of the Solar System, and this sparked his lifelong passion for astronomy. He was soon publishing papers about the moon's surface, based on observations made with his first three-inch telescope. His 1908 vintage typewriter enabled him to publish more than a thousand books on subjects ranging from astronomy, his first love, to cricket, golf, and music."
First time accepted submitter Press2ToContinue writes "Deep brain stimulation (DBS) is the use of a pacemaker-like device implanted in the brain to treat the symptoms of diseases like Parkinson's, or other maladies such as depression. For the first time in the US, surgeons at Johns Hopkins in Baltimore, Maryland have used this technique to attempt to slow memory loss in a patient suffering from the early stages of Alzheimer's disease. The fornix, a vital part of the brain that brings data to the hippocampus, is being targeted with this device. Essentially, the fornix is the area of the brain that converts electrical activity into chemical activity. Holes are drilled into the skull, and wires are placed on both sides of the brain. Then, the stimulator device pumps in small and unnoticeable electrical impulses upwards of 130 times per second. Half of the patients will begin the electrical treatment two weeks post-surgery, but the other half won't have their pacemakers turned on until a full year after the surgery to provide comparison data for the study."
An anonymous reader writes "Hot on the heels of the closure of Newzbin2, this morning the usenet NZB indexing website NZBMatrix closed shop in the face of another DMCA notice. NZBMatrix allowed users to sift through messy usenet groups and quickly find data for download. NZBMatrix's API allowed automated polling from various clients, making it one of the more popular NZB sites. This is one of the last public NZB indexing sites, leaving mostly invite-only underground sites. A sad day for usenet users everywhere."
Hugh Pickens writes writes "BBC reports that UN climate talks in Doha have closed, with a historic shift in principle agreed to by nearly 200 nations, extending the Kyoto Protocol through 2020 and establishing for the first time that rich nations should move towards compensating poor nations for losses due to climate change. Until now rich nations have agreed to help developing countries to get clean energy and adapt to climate change, but they have stopped short of accepting responsibility for damage caused by climate change elsewhere. 'It is a breakthrough,' says Martin Khor of the South Center — an association of 52 developing nations. 'The term Loss and Damage is in the text — this is a huge step in principle. Next comes the fight for cash.' U.S. negotiators made certain that neither the word 'compensation,' nor any other term connoting legal liability, was used, to avoid opening the floodgates to litigation – instead, the money will be judged as aid. Ronny Jumea, from the Seychelles, told rich nations earlier that discussion of compensation would not have been needed if they had cut emissions earlier. 'We're past the mitigation [emissions cuts] and adaptation eras. We're now right into the era of loss and damage. What's next after that? Destruction?' While the United States has not adopted a comprehensive approach to climate change, the Obama administration has put in place a significant auto emissions reduction program and a plan to regulate carbon dioxide from new power plants. 'What this meeting reinforced is that while this is an important forum, it is not the only one in which progress can and must be made,' says Jennifer Haverkamp, director of the international climate programs at the Environmental Defense Fund. The disconnect between the level of ambition the parties are showing here and what needs to happen to avoid dangerous climate change is profound.'"
kodiaktau writes "A proposal put forth by Russia, China, Saudi Arabia, Algeria, Sudan and the United Arab Emirates seeks greater international control and government of internet addressing. 'A leaked draft (PDF) of the Russia-led proposals would give countries "equal rights to manage the Internet including in regard to the allotment, assignment and reclamation of Internet numbering." This could allow governments to render websites within their borders inaccessible, even via proxy servers or other countries. It also could allow for multinational pacts in which countries could terminate access to websites at each others' request.' The move would basically undermine ICANN and decentralize control of internet addressing: 'The revision would give nations the explicit right to "implement policy" on net governance and "regulate the national Internet segment," the draft says.'"