By Soulskill from Slashdot's arrr-me-hearties department
writes "With the latest Windows 8 build (8064) that has been delivered to Intel, it's clear that the company is taking strides to make sure that its upcoming OS isn't quit so easy to pirate. For starters, the generic volume license keys that were so easily exploited during the early days of Windows 7 leaks will no longer be an option for pirates. Product keys also won't be shipped in the prodkey.txt file included in the build packages. Instead, installers will need to retrieve a unique key from a Microsoft web page. There's also a good possibility that the recently-surfaced fast booting patent could come into play as well. If Microsoft does indeed have designs on using a remote server to push OS code to systems at boot time, that code would be a very clever place to embed activation-related programming. Even if a crack was discovered, it would be neatly undone during a subsequent start-up sequence — similar to the way Microsoft's now-idle Windows Steady State could turn back the clock an entire Widows installation after rebooting."
Microsoft has also indirectly confirmed in a recent blog post
that Windows 8 will make use of an app store
.Read Replies (0)
Wikipedia May Censor Images
Posted by News Fetcher on August 19 '11 at 06:15 AM
By Soulskill from Slashdot's good-thing-there's-no-other-nudity-on-the-internet department
KiloByte joins the ranks of accepted submitters, writing"To appease 'morality' watchdogs, Wikipedia is contemplating the introduction of a censorship feature, where images would be flagged for containing sexual references, nudity, 'mass graves,' and so on. At least in the initial implementation, it is supposed to be 'opt-in.' However, with such precedents as the UK censoring artistic nudity, Turkey censoring references to the Armenian genocide or China's stance on information about the Tiananmen massacre (note that any sensitive photos, like the Tank Man, are already absent!), I find it quite hard to believe this feature won't be mandatory for some groups of readers — whether it's thanks to an oppressive government, an ISP or a school."Read Replies (0)
By Soulskill from Slashdot's one-one-two-three-five-eureka department
An anonymous reader tips news of 7th grader Aidan Dwyer, who used phyllotaxis
— the way leaves are arranged on plant stems in nature — as inspiration to arrange an array of solar panels in a way that generates 20-50% more energy than a uniform, flat panel array
. Aidan wrote,"I designed and built my own test model, copying the Fibonacci pattern of an oak tree. I studied my results with the compass tool and figured out the branch angles. The pattern was about 137 degrees and the Fibonacci sequence was 2/5. Then I built a model using this pattern from PVC tubing. In place of leaves, I used PV solar panels hooked up in series that produced up to 1/2 volt, so the peak output of the model was 5 volts. The entire design copied the pattern of an oak tree as closely as possible. ... The Fibonacci tree design performed better than the flat-panel model. The tree design made 20% more electricity and collected 2 1/2 more hours of sunlight during the day. But the most interesting results were in December, when the Sun was at its lowest point in the sky. The tree design made 50% more electricity, and the collection time of sunlight was up to 50% longer!"
His work earned him a Young Naturalist Award from the American Museum of Natural History and a provisional patent on the design.Read Replies (0)
By Unknown Lamer from Slashdot's before-the-heat-death-of-the-universe department
Landing his first accepted submission, qpgmr writes "AES, generally thought to be the gold standard for encryption, is showing weaknesses. From Computerworld: 'Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard, the encryption algorithm used to secure most all online transactions and wireless communications.'"
The full paper has lots of details
. Note that it would still take a few billion years with current computers to actually break anything, but there may be further vunerabilities
yet to be discovered.Read Replies (0)