Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Interview: Ask Christopher "moot" Poole About 4chan and Social Media

    Having started 4chan when he was 15, Christopher Poole, better known as "moot", is indirectly responsible for almost every meme you've ever seen. The group "Anonymous" originated on 4chan and has since engaged in a number of well-publicized publicity stunts and distributed denial-of-service attacks. Thanks to users gaming the system, moot was famously voted the world's most influential person of 2008 in an open internet poll conducted by Time magazine. He is an advocate of online anonymity and speaks on the importance of privacy online to foster creativity and open discussion. moot has agreed to answer your questions about 4chan, social media, and privacy. As usual, ask as many as you'd like, but please, one per post.

    187 comments | 10 hours ago

  • Study: Social Networks Have Negative Effect On Individual Welfare

    An anonymous reader writes: A study of 50,000 people in Italy has found the impact of social networking on individual welfare to be "significantly negative." The researchers found that improvements in self-reported well-being occurred when online networking led to face-to-face interactions, but this effect was overwhelmed by the perceived losses in well-being (PDF) generated by interaction strictly through social networks. The researchers "highlight the role of discrimination and hate speech on social media which they say play a significant role in trust and well-being. Better moderation could significantly improve the well-being of the people who use social networks, they conclude."

    76 comments | 4 days ago

  • Why Women Have No Time For Wikipedia

    Andreas Kolbe writes Wikipedia is well known to have a very large gender imbalance, with survey-based estimates of women contributors ranging from 8.5% to around 16%. This is a more extreme gender imbalance than even that of Reddit, the most male-dominated major social media platform, and it has a palpable effect on Wikipedia content. Moreover, Wikipedia editor survey data indicate that only 1 in 50 respondents is a mother – a good proportion of female contributors are in fact minors, with women in their twenties less likely to contribute to Wikipedia. Wikimedia Foundation efforts to address this "gender gap" have so far remained fruitless. Wikipedia's demographic pattern stands in marked contrast to female-dominated social media sites like Facebook and Pinterest, where women aged 18 to 34 are particularly strongly represented. It indicates that it isn't lack of time or family commitments that keep women from contributing to Wikipedia – women simply find other sites more attractive. Wikipedia's user interface and its culture of anonymity may be among the factors leading women to spend their online time elsewhere.

    573 comments | 4 days ago

  • Anita Sarkeesian, Creator of "Tropes vs. Women," Driven From Home By Trolls

    Sonny Yatsen writes: Anita Sarkeesian, the creator of Tropes vs. Women — a video series exploring negative tropes and misogynistic depictions of women in video games — reports that she has been driven from her home after a series of extremely violent sexual threats made against her. Her videos have previously drawn criticism from many male gamers, often coupled with violent imagery or threats of violence. The Verge story linked has this to say: The threats against Sarkeesian have become a nasty backdrop to her entire project — and her life. If the trolls making them hoped for attention, they've gotten it. They've also inexorably linked criticism of her work, valid or not, with semi-delusional vigilantism, and arguably propelled Tropes vs. Women to its current level of visibility. If a major plank of your platform is that misogyny is a lie propagated by Sarkeesian and other "social justice warriors," it might help to not constantly prove it wrong.

    1234 comments | 5 days ago

  • Facebook Cleans Up News Feed By Reducing Click-Bait Headlines

    An anonymous reader writes "Facebook today announced further plans to clean up the News Feed by reducing stories with click-bait headlines as well as stories that have links shared in the captions of photos or within status updates. The move comes just four months after the social network reduced Like-baiting posts, repeated content, and spammy links."

    61 comments | about a week ago

  • Magnitude 6.0 Quake Hits Northern California, Causing Injuries and Outages

    As numerous sources report, an earthquake of magnitude 6.0 struck California early Sunday morning, with an epicenter about 9 miles south of Napa. According to the San Francisco Chronicle's account, Some power lines down in western Contra Costa County, but Bay Area bridges appeared to be fine, according to the California Highway Patrol. There were widespread reports of power outages, gas leaks and flooding in the North Bay, with at least 15,000 Pacific Gas and Electric Co. customers without power in Vallejo, Napa, Rohnert Park, Santa Rosa and Sonoma. Police reminded motorists to stop at darkened intersections. ... In Benicia, several miles from the epicenter, the quake was strong enough to knock pictures off mantles. Bay Area bridges appear to have survived the quake -- significant, in that the L.A. Times reports that USGS estimates peg it as "the largest earthquake to strike the Bay Area since the Loma Prieta temblor of 1989," and says that injury reports (especially from glass) are streaming in from the area around Napa. The Times also has a larger estimate of customers suffering power outages: "more than 42,000" around the northern Bay Area. Unsurprisingly, social media channels are full of pictures showing some of the damage.

    For those in California, did you feel the quake? (And from how far away?) Update: 08/24 13:15 GMT by T : Also in earthquake news: an even stronger quake (magnitude 6.4) on Saturday struck central Chile, shaking Santiago -- nearly 70 miles from the epicenter -- for more than half a minute, but with "no immediate reports of fatalities or serious damage."

    135 comments | about two weeks ago

  • Illinois University Restricts Access To Social Media, Online Political Content

    onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.

    130 comments | about two weeks ago

  • Finding an ISIS Training Camp Using Google Earth

    An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.

    134 comments | about two weeks ago

  • Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

    Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

    49 comments | about two weeks ago

  • UK Police Warn Sharing James Foley Killing Video Is a Crime

    An anonymous reader points out that UK authorities have warned that sharing the video of the James Foley murder could lead to prosecution under anti-terror laws. Scotland Yard has warned internet users they could be arrested under terrorism legislation if they viewed or shared the video of James Foley's murder, as Twitter and YouTube attempted to remove all trace of the footage from the web. Twitter suspended dozens of accounts that published the graphic footage while YouTube tried to remove several copies of the video, which was first uploaded on Tuesday night. Twitter CEO Dick Costolo tweeted: "We have been and are actively suspending accounts as we discover them related to this graphic imagery. Thank you." The unprecedented social media clampdown came as the Metropolitan police warned that even viewing the video could constitute a criminal offence in the UK. The force said in a statement: "The MPS counter-terrorism command (SO15) is investigating the contents of the video that was posted online in relation to the alleged murder of James Foley. We would like to remind the public that viewing, downloading or disseminating extremist material within the UK may constitute an offence under terrorism legislation."

    391 comments | about two weeks ago

  • Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques

    benrothke writes When I got a copy of Social Engineering in IT Security Tools, Tactics, and Techniques by Sharon Conheady, my first thought was that it likely could not have much that Christopher Hadnagy didn't already detail in the definitive text on the topic: Social Engineering: The Art of Human Hacking. Obviously Hadnagy thought differently, as he wrote the forward to the book; which he found to be a valuable resource. While there is overlap between the two books; Hadnagy's book takes a somewhat more aggressive tool-based approach, while Conheady take a somewhat more passive, purely social approach to the topic. There are many more software tools in Hadnagy; while Conheady doesn't reference software tools until nearly half-way through the book. This book provides an extensive introduction to the topic and details how social engineering has evolved through the centuries. Conheady writes how the overall tactics and goals have stayed the same; while the tools and techniques have been modified to suit the times. Keep reading for the rest of Ben's review.

    45 comments | about two weeks ago

  • Interviews: Andrew "bunnie" Huang Answers Your Questions

    A while ago you had a chance to ask Andrew "bunnie" Huang about hardware, hacking and his open source hardware laptop Novena. Below you'll find his answers to those questions.

    32 comments | about two weeks ago

  • 51% of Computer Users Share Passwords

    An anonymous reader writes Consumers are inadvertently leaving back doors open to attackers as they share login details and sign up for automatic log on to mobile apps and services, according to new research by Intercede. While 52% of respondents stated that security was a top priority when choosing a mobile device, 51% are putting their personal data at risk by sharing usernames and passwords with friends, family and colleagues. The research revealed that consumers are not only sharing passwords but also potentially putting their personal and sensitive information at risk by leaving themselves logged in to applications on their mobile devices, with over half of those using social media applications and email admitting that they leave themselves logged in on their mobile device.

    117 comments | about two weeks ago

  • New HP Laptop Would Mean Windows at Chromebook Prices

    New submitter nrjperera (2669521) submits news of a new laptop from HP that's in Chromebook (or, a few years ago, "netbook") territory, price-wise, but loaded with Windows 8.1 instead. Microsoft has teamed up with HP to make an affordable Windows laptop to beat Google Chromebooks at their own game. German website Mobile Geeks have found some leaked information about this upcoming HP laptop dubbed Stream 14, including its specifications. According to the leaked data sheet the HP Stream 14 laptop will share similar specs to HP's cheap Chromebook. It will be shipped with an AMD A4 Micro processor, 2GB of RAM, 32GB of flash storage and a display with 1,366 x 768 screen resolution. Microsoft will likely offer 100GB of OneDrive cloud storage with the device to balance the limited storage option.

    215 comments | about two weeks ago

  • Delaware Enacts Law Allowing Heirs To Access Digital Assets of Deceased

    An anonymous reader writes Ars reports: "Delaware has become the first state in the U.S .to enact a law that ensures families' rights to access the digital assets of loved ones during incapacitation or after death." In other states, the social media accounts and email of people who die also die with them since the companies hosting those accounts are not obligated to transfer access even to the heirs of the deceased. In Delaware, however, this is no longer the case. The article notes that even if the deceased was a resident of another state, if his/her will is governed by Delaware law, his/her heirs will be allowed to avail of the new law and gain access to all digital assets of the deceased.

    82 comments | about two weeks ago

  • Hackers Steal Data Of 4.5 Million US Hospital Patients

    itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.

    111 comments | about two weeks ago

  • The Royal Society Proposes First Framework For Climate Engineering Experiments

    Jason Koebler writes The Royal Society of London, the world's oldest scientific publisher, has unveiled a proposal to create the first serious framework for future geoengineering experiments. It's a sign that what are still considered drastic and risky measures to combat climate change are drifting further into the purview of mainstream science. The scientific body has issued a call to create "an open and transparent review process that ensures such experiments have the necessary social license to operate."

    174 comments | about two weeks ago

  • EFF's Cell Phone Guide For US Protesters

    An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."

    82 comments | about two weeks ago

  • Email Is Not Going Anywhere

    An anonymous reader writes: It seems the latest trend sweeping the online world is the idea that email is on its way out. Kids are eschewing email for any of the hundreds of different instant messaging services, and startups are targeting email as a system they can "disrupt." Alexis C. Madrigal argues that attempts to move past email are shortsighted and faddish, as none of the alternatives give as much power to the user. "Email is actually a tremendous, decentralized, open platform on which new, innovative things can and have been built. In that way, email represents a different model from the closed ecosystems we see proliferating across our computers and devices. Email is a refugee from the open, interoperable, less-controlled 'web we lost.' It's an exciting landscape of freedom amidst the walled gardens of social networking and messaging services." Madrigal does believe that email will gradually lose some of its current uses as new technologies spring up and mature, but the core functionality is here to stay.

    235 comments | about two weeks ago

  • Posting Soccer Goals On Vine Is Illegal, Say England's Premier League

    New submitter JonnyCalcutta writes: The football Premier League in England is warning about posting clips of goals on online services such as Vine and Twitter. The claim is that posting these clips is "illegal under copyright laws." I'm naturally dubious about blanket statements from rightsholders already known to push the truth, especially concerning such short clips, but I don't know enough about copyright law to understand the implications fully. Is it illegal? What can they actually do about it? Does adding commentary give the uploader any rights to post?

    226 comments | about three weeks ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>