News

RIP, NASA Moon Landing Engineer John C. Houbolt

Slashdot - 3 hours 41 sec ago
The Houston Chronicle reports the death of John C. Houbolt, whose ideas helped guide the U.S. moon-landing programs. Houbolt died on Tuesday at the age of 95, in a nursing home in Maine. Says the Chronicle's obituary: "His efforts in the early 1960s are largely credited with convincing NASA to focus on the launch of a module carrying a crew from lunar orbit, rather than a rocket from earth or a space craft while orbiting the planet. Houbolt argued that a lunar orbit rendezvous, or lor, would not only be less mechanically and financially onerous than building a huge rocket to take man to the moon or launching a craft while orbiting the earth, but lor was the only option to meet President John F. Kennedy's challenge before the end of the decade."

Read more of this story at Slashdot.








Closing Surgical Incisions With a Paintbrush and Nanoparticles

Slashdot - Sat, 04/19/2014 - 20:55
New submitter BiancaM (3582365) writes "A group of chemists has shown the power of nanoparticles for closing and healing surgical wounds [abstract]. Using no more than a paintbrush they are able to close surgical openings as well as classical techniques such as sutures. However in fragile deep tissues such as liver even more remarkable results were found- normally fatal damage to internal organs is repaired in seconds using a nanoparticle glue. The results show that closing after surgery can be faster and simpler using nanomaterials to glue wounds shut." For something between the above linked abstract and the research paper, there's this write-up at PhysOrg, and a video of the technique in action.

Read more of this story at Slashdot.








Closing Surgical Incisions With a Paintbrush and Nanoparticles

Slashdot - Sat, 04/19/2014 - 20:55
New submitter BiancaM (3582365) writes "A group of chemists has shown the power of nanoparticles for closing and healing surgical wounds [abstract]. Using no more than a paintbrush they are able to close surgical openings as well as classical techniques such as sutures. However in fragile deep tissues such as liver even more remarkable results were found- normally fatal damage to internal organs is repaired in seconds using a nanoparticle glue. The results show that closing after surgery can be faster and simpler using nanomaterials to glue wounds shut." For something between the above linked abstract and the research paper, there's this write-up at PhysOrg, and a video of the technique in action.

Read more of this story at Slashdot.








Preventative Treatment For Heartbleed On Healthcare.gov

Slashdot - Sat, 04/19/2014 - 17:59
As the San Francisco Chronicle reports, "People who have accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the confounding Heartbleed Internet security flaw." Take note, though; the article goes on to immediately point out this does not mean that the HealthCare.gov site has been compromised: "Senior administration officials said there is no indication that the HealthCare.gov site has been compromised and the action is being taken out of an abundance of caution. The government's Heartbleed review is ongoing, the officials said, and users of other websites may also be told to change their passwords in the coming days, including those with accounts on the popular WhiteHouse.gov petitions page." Also at The Verge

Read more of this story at Slashdot.








New 'Google' For the Dark Web Makes Buying Dope and Guns Easy

Slashdot - Sat, 04/19/2014 - 15:44
First time accepted submitter turkeydance (1266624) writes "The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs — sites that previously only could be found by users who knew the exact URL for the site."

Read more of this story at Slashdot.








New 'Google' For the Dark Web Makes Buying Dope and Guns Easy

Slashdot - Sat, 04/19/2014 - 15:44
First time accepted submitter turkeydance (1266624) writes "The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs — sites that previously only could be found by users who knew the exact URL for the site."

Read more of this story at Slashdot.








New 'Google' For the Dark Web Makes Buying Dope and Guns Easy

Slashdot - Sat, 04/19/2014 - 15:44
First time accepted submitter turkeydance (1266624) writes "The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs — sites that previously only could be found by users who knew the exact URL for the site."

Read more of this story at Slashdot.








New 'Google' For the Dark Web Makes Buying Dope and Guns Easy

Slashdot - Sat, 04/19/2014 - 15:44
First time accepted submitter turkeydance (1266624) writes "The dark web just got a little less dark with the launch of a new search engine that Llets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs — sites that previously only could be found by users who knew the exact URL for the site."

Read more of this story at Slashdot.








3 Former Astronauts: Earth-Asteroid Collisions Are a Real But Preventable Danger

Slashdot - Sat, 04/19/2014 - 13:28
Three former astronauts — Ed Lu, Tom Jones, and Bill Anders — say that reassuring figures about the rarity of asteroid collisions with Earth are perhaps too reassuring. The B612 Foundation, of which Lu is a director, has been established to draw public awareness to the risks of a large asteroid hitting a population center -- which these three men say is a far more serious public danger than has been acknowledged by NASA and other agencies. And beyond awareness, the Foundation's immediate goal is to raise money to " design and build an asteroid-finding space telescope and launch it by 2017," and then, Armageddon-style, to follow that up with technology to divert any asteroids whose path would threaten earth.

Read more of this story at Slashdot.








3 Former Astronauts: Earth-Asteroid Collisions Are a Real But Preventable Danger

Slashdot - Sat, 04/19/2014 - 13:28
Three former astronauts — Ed Lu, Tom Jones, and Bill Anders — say that reassuring figures about the rarity of asteroid collisions with Earth are perhaps too reassuring. The B612 Foundation, of which Lu is a director, has been established to draw public awareness to the risks of a large asteroid hitting a population center -- which these three men say is a far more serious public danger than has been acknowledged by NASA and other agencies. And beyond awareness, the Foundation's immediate goal is to raise money to " design and build an asteroid-finding space telescope and launch it by 2017," and then, Armageddon-style, to follow that up with technology to divert any asteroids whose path would threaten earth.

Read more of this story at Slashdot.








3 Former Astronauts: Earth-Asteroid Collisions Are a Real But Preventable Danger

Slashdot - Sat, 04/19/2014 - 13:28
Three former astronauts — Ed Lu, Tom Jones, and Bill Anders — say that reassuring figures about the rarity of asteroid collisions with Earth are perhaps too reassuring. The B612 Foundation, of which Lu is a director, has been established to draw public awareness to the risks of a large asteroid hitting a population center -- which these three men say is a far more serious public danger than has been acknowledged by NASA and other agencies. And beyond awareness, the Foundation's immediate goal is to raise money to " design and build an asteroid-finding space telescope and launch it by 2017," and then, Armageddon-style, to follow that up with technology to divert any asteroids whose path would threaten earth.

Read more of this story at Slashdot.








3 Former Astronauts: Earth-Asteroid Collisions Are a Real But Preventable Danger

Slashdot - Sat, 04/19/2014 - 13:28
Three former astronauts — Ed Lu, Tom Jones, and Bill Anders — say that reassuring figures about the rarity of asteroid collisions with Earth are perhaps too reassuring. The B612 Foundation, of which Lu is a director, has been established to draw public awareness to the risks of a large asteroid hitting a population center -- which these three men say is a far more serious public danger than has been acknowledged by NASA and other agencies. And beyond awareness, the Foundation's immediate goal is to raise money to " design and build an asteroid-finding space telescope and launch it by 2017," and then, Armageddon-style, to follow that up with technology to divert any asteroids whose path would threaten earth.

Read more of this story at Slashdot.








3 Former Astronauts: Earth-Asteroid Collisions Are a Real But Preventable Danger

Slashdot - Sat, 04/19/2014 - 13:28
Three former astronauts — 2, Ed Lu, Tom Jones, and Bill Anders, — say that reassuring figures about the rarity of asteroid collisions with Earth are perhaps too reassuring. The B612 Foundation, of which Lu is a director, has been established to draw public awareness to the risks of a large asteroid hitting a population center -- which these three men say is a far more serious public danger than has been acknowledged by NASA and other agencies. And beyond awareness, the Foundation's immediate goal is to raise money to " design and build an asteroid-finding space telescope and launch it by 2017," and then, Armageddon-style, to follow that up with technology to divert any asteroids whose path would threaten earth.

Read more of this story at Slashdot.








Ask Slashdot: Hungry Students, How Common?

Slashdot - Sat, 04/19/2014 - 13:00
Gud (78635) points to this story in the Washington Post about students having trouble with paying for both food and school. "I recall a number of these experiences from my time as grad student. I remember choosing between eating, living in bad neighborhoods, putting gas in the car, etc. Me and my fellow students still refer to ourselves as the 'starving grad students.' Today we laugh about these experiences because we all got good jobs that lifted us out of poverty, but not everyone is that fortunate. I wonder how many students are having hard time concentrating on their studies due to worrying where the next meal comes from. In the article I found the attitude of collage admins to the idea of meal plan point sharing, telling as how little they care about anything else but soak students & parents for fees and pester them later on with requests for donations. Last year I did the college tour for my first child, after reading the article, some of the comments I heard on that tour started making more sense. Like 'During exams you go to the dining hall in the morning, eat and study all day for one swipe' or 'One student is doing study on what happens when you live only on Ramen noodles!' How common is 'food insecurity in college or high school'? What tricks can you share with current students?"

Read more of this story at Slashdot.








Google's New Camera App Simulates Shallow Depth of Field

Slashdot - Sat, 04/19/2014 - 11:30
New submitter katiewilliam (3621675) writes with a story at Hardware Zone about a new feature that Google's working on for Android phones' built-in cameras: the illusion of shallow depth of field in phone snapshots, which typically err on the side of too much in focus, rather than too little. Excerpting: "The Google Research Blog [note: here's a direct link] revealed that there's quite a fair bit of algorithms running to achieve this effect; to put it in a nutshell, computer vision algorithms create a 3D model of the world based on the shots you have taken, and estimate the depth to every point in the scene."

Read more of this story at Slashdot.








Beer Price Crisis On the Horizon

Slashdot - Sat, 04/19/2014 - 10:10
Rambo Tribble (1273454) writes "The aficionados of beer and distilled spirits could be in for a major price-shock, if proposals by the Food and Drug Administration come to pass. Currently, breweries are allowed to sell unprocessed brewing by-products to feed farm animals. Farmers prize the nutritious, low-cost feed. But, new rules proposed by the FDA could force brewers to implement costly processing facilities or dump the by-products as waste. As one brewer put it, "Beer prices would go up for everybody to cover the cost of the equipment and installation.""

Read more of this story at Slashdot.








Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions

Slashdot - Sat, 04/19/2014 - 09:03
wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software. "Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated." After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."

Read more of this story at Slashdot.








Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions

Slashdot - Sat, 04/19/2014 - 09:03
wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software. "Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated." After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."

Read more of this story at Slashdot.








Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions

Slashdot - Sat, 04/19/2014 - 09:03
wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software. "Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated." After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."

Read more of this story at Slashdot.








Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions

Slashdot - Sat, 04/19/2014 - 09:03
wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software. "Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated." After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."

Read more of this story at Slashdot.








Syndicate content