Winamp’s woes: How the greatest MP3 player undid itself

Tens of millions of Winamp users are still out there. (credit: Flickr user uzi978 ) As many of us are busy crafting the perfect playlist for grilling outdoors, most likely such labor is happening on a modern streaming service or within iTunes. But during the last 15 years or so, that wasn’t always the case. Today, we resurface our look at the greatest MP3 player that was—Winamp. This piece originally ran on June 24, 2012 (and Winamp finally called it quits in November 2013). MP3s are so natural to the Internet now that it’s almost hard to imagine a time before high-quality compressed music. But there was such a time—and even after “MP3” entered the mainstream, organizing, ripping, and playing back one’s music collection remained a clunky and frustrating experience. Enter Winamp , the skin-able, customizable MP3 player that “really whips the llama’s ass.” In the late 1990s, every music geek had a copy; llama-whipping had gone global, and the big-money acquisition offers quickly followed. AOL famously acquired the company in June 1999 for $80-$100 million —and Winamp almost immediately lost its innovative edge. Read 87 remaining paragraphs | Comments

View article:
Winamp’s woes: How the greatest MP3 player undid itself

‘Severe’ Systemd Bug Allowed Remote Code Execution For Two Years

ITWire reports: A flaw in systemd, the init system used on many Linux systems, can be exploited using a malicious DNS query to either crash a system or to run code remotely. The vulnerability resides in the daemon systemd-resolved and can be triggered using a TCP payload, according to Ubuntu developer Chris Coulson. This component can be tricked into allocating less memory than needed for a look-up. When the reply is bigger it overflows the buffer allowing an attacker to overwrite memory. This would result in the process either crashing or it could allow for code execution remotely. “A malicious DNS server can exploit this by responding with a specially crafted TCP payload to trick systemd-resolved in to allocating a buffer that’s too small, and subsequently write arbitrary data beyond the end of it, ” is how Coulson put it. Affected Linux vendors have pushed out patches — but the bug has apparently been present in systemd code since June of 2015. And long-time Slashdot reader walterbyrd also reports a recently-discovered bug where systemd unit files that contain illegal usernames get defaulted to root. Read more of this story at Slashdot.

More:
‘Severe’ Systemd Bug Allowed Remote Code Execution For Two Years

Seattle’s $15 Minimum Wage May Be Hurting Workers, Report Finds

As companies look for ways to cut costs, Seattle’s $15 minimum wage law may be hurting hourly workers instead of helping them, according to a new report. From a USA Today article: A report (PDF) from the University of Washington (UW), found that when wages increased to $13 in 2016, some companies may have responded by cutting low-wage workers’ hours. The study, which was funded in part by the city of Seattle, found that workers clocked 9 percent fewer hours on average, and earned $125 less each month after the most recent increase. “If you’re a low-skilled worker with one of those jobs, $125 a month is a sizable amount of money, ” Mark Long, a UW public-policy professor and an author of the report told the Seattle Times. “It can be the difference between being able to pay your rent and not being able to pay your rent.” Read more of this story at Slashdot.

More:
Seattle’s $15 Minimum Wage May Be Hurting Workers, Report Finds

Vulnerability Discovered In Latest Ubuntu Distributions, Users Advised To Update

Celarent Darii writes: There is a vulnerability in the latest ubuntu distributions due to the DNS resolver included in systemd. The inclusion of the dns resolver was lamented by many on the mailing list, not without cause. All are advised to update their distribution. Read more of this story at Slashdot.

View article:
Vulnerability Discovered In Latest Ubuntu Distributions, Users Advised To Update

World’s First Floating Windfarm To Take Shape Off Coast of Scotland

An anonymous reader quotes a report from The Guardian: The world’s first floating windfarm has taken to the seas in a sign that a technology once confined to research and development drawing boards is finally ready to unlock expanses of ocean for generating renewable power. After two turbines were floated this week, five now bob gently in the deep waters of a fjord on the western coast of Norway ready to be tugged across the North Sea to their final destination off north-east Scotland. The ~$256 million Hywind project is unusual not just because of the pioneering technology involved, which uses a 78-meter-tall underwater ballast and three mooring lines that will be attached to the seabed to keep the turbines upright. It is also notable because the developer is not a renewable energy firm but Norway’s Statoil, which is looking to diversify away from carbon-based fuels. Read more of this story at Slashdot.

More:
World’s First Floating Windfarm To Take Shape Off Coast of Scotland

Hacker Behind Massive Ransomware Outbreak Can’t Get Emails From Victims Who Paid

Joseph Cox, reporting for Motherboard: On Tuesday, a new, worldwide ransomware outbreak took off, infecting targets in Ukraine, France, Spain, and elsewhere. The hackers hit everything from international law firms to media companies. The ransom note demands victims send bitcoin to a predefined address and contact the hacker via email to allegedly have their files decrypted. But the email company the hacker happened to use, Posteo, says it has decided to block the attacker’s account, leaving victims with no obvious way to unlock their files. The hacker tells victims to send $300 worth of bitcoin. But to determine who exactly has paid, the hacker also instructs people to email their bitcoin wallet ID, and their “personal installation key.” This is a 60 character code made up of letters and digits generated by the malware, which is presumably unique to each infection of the ransomware. That process is not possible now, though. “Midway through today (CEST) we became aware that ransomware blackmailers are currently using a Posteo address as a means of contact, ” Posteo, the German email provider the hacker had an account with, wrote in a blog post. “Our anti-abuse team checked this immediately — and blocked the account straight away. Read more of this story at Slashdot.

Originally posted here:
Hacker Behind Massive Ransomware Outbreak Can’t Get Emails From Victims Who Paid

Ethereum Exchange Reimburses Customer Losses After ‘Flash Crash’

An anonymous reader writes: “The price of ethereum crashed as low as 10 cents from around $319 in about a second on the GDAX cryptocurrency exchange on Wednesday, ” reports CNBC, calling it “a move that is being blamed on a ‘multimillion dollar market sell’ order… As the price continued to fall, another 800 stop loss orders and margin funding liquidations caused ethereum to trade as low as 10 cents.” An executive for the exchange said “Our matching engine operated as intended throughout this event and trading with advanced features like margin always carries inherent risk.” Though some users complained they lost money, the price rebounded to $325 — and according to a report on one trading site, “one person had an order in for just over 3, 800 ethereum if the price fell to 10 cents on the GDAX exchange, ” reports CNBC. “Theoretically this person would have spent $380 to buy these coins, and when the price shot up above $300 again, the trader would be sitting on over $1 million.” Yet the currency exchange announced Friday that they’re honoring everyone’s gains, while also reimbursing customers who suffered losses. “We view this as an opportunity to demonstrate our long-term commitment to our customers and belief in the future of this industry.” Read more of this story at Slashdot.

Continue Reading:
Ethereum Exchange Reimburses Customer Losses After ‘Flash Crash’

Los Angeles Tests Reflective ‘Cool Pavement’ On Streets

mikeebbbd writes: As reported in the Los Angeles Daily News, during the current heatwave various officials swooped down on streets coated with an experimental light-gray sealer that makes the old asphalt into a “cool street” — and it works, with average temperature differences between coated streets and adjacent old asphalt around 10F. At a large parking lot, the temperature reduction was over 20F. If the material holds up and continues to meet other criteria, LA plans to use it on more pavement rehab projects, which could eventually make a difference in the heat island effect. The “CoolSeal” coating is apparently proprietary to a company named GuardTop LLC, costs $25-40K/mile, and lasts 5-7 years. At that price, it’s might not be used a lot, at least at first; typical slurry seals run $15-30K/mile. Read more of this story at Slashdot.

View the original here:
Los Angeles Tests Reflective ‘Cool Pavement’ On Streets

32TB of Windows 10 Internal Builds, Core Source Code Leak Online

According to an exclusive report via The Register, “a massive trove of Microsoft’s internal Windows operating system builds and chunks of its core source code have leaked online.” From the report: The data — some 32TB of installation images and software blueprints that compress down to 8TB — were uploaded to betaarchive.com, the latest load of files provided just earlier this week. It is believed the data has been exfiltrated from Microsoft’s in-house systems since around March. The leaked code is Microsoft’s Shared Source Kit: according to people who have seen its contents, it includes the source to the base Windows 10 hardware drivers plus Redmond’s PnP code, its USB and Wi-Fi stacks, its storage drivers, and ARM-specific OneCore kernel code. Anyone who has this information can scour it for security vulnerabilities, which could be exploited to hack Windows systems worldwide. The code runs at the heart of the operating system, at some of its most trusted levels. In addition to this, hundreds of top-secret builds of Windows 10 and Windows Server 2016, none of which have been released to the public, have been leaked along with copies of officially released versions. Read more of this story at Slashdot.

View the original here:
32TB of Windows 10 Internal Builds, Core Source Code Leak Online

Scientists may have solved a key barrier to fusion power

We’ve been working towards nuclear fusion, a near-limitless source of clean energy, for the past six decades, and now scientists have made a major breakthrough. A new article published in Physical Review Letters details how to solve a dangerous issue with runaway electrons that has, until now, posed a major problem for fusion reactors. Fusion reactors model themselves on the reactions that power our stars: Hydrogen atoms collide at such incredibly high speeds that they fuse into helium. That process releases astounding amounts of energy. It’s the same thing that’s happening in our sun’s core right now. Runaway electrons are simply free-floating electrons that are energized by potent electric fields. In the high energy of nuclear fusion, the levels and speeds to which these runaway electrons are charged can be catastrophic. The team discovered that it’s possible to decelerate the electrons by injecting heavy ions, like neon or argon, into the reactor. The electrons collide with these neutral atoms, resulting in energy loss and slower speeds. It may seem like a small step, but every problem we solve with nuclear fusion moves us closer to finally achieving it here on Earth. Linnea Hesslow, coauthor of the article, told Wired , “Many believe it will work, but it’s easier to travel to Mars than it is to achieve fusion.” We’ve got a long way to go yet, but eventually (hopefully), we’ll get there. Via: Wired Source: Physical Review Letters

View original post here:
Scientists may have solved a key barrier to fusion power