Kali Linux, Successor of the BackTrack Penetration Testing Distro, Launched

mask.of.sanity writes “Kali, the sixth installment of the BackTrack operating system has been launched. The platform is a favorite of hackers and penetration testers and has been entirely rebuilt to become more secure, transparent and customizable. Metasploit too has been rebuilt to be more stable with an optional noob-friendly interface. Kali even works on ARM devices and comes ready to go for your Raspberry Pi.” The big new feature is that it’s been repackaged as a flavor of Debian, instead of using their own custom packaging magic. Read more of this story at Slashdot.

Read the article:
Kali Linux, Successor of the BackTrack Penetration Testing Distro, Launched

StarCraft 2: Heart of the Swarm Released

Today Blizzard launched its first expansion to StarCraft 2, titled Heart of the Swarm. When initially developing StarCraft 2, Blizzard made the decision to split the game into three parts, each with a campaign as long as the original StarCraft. The initial release in 2010, Wings of Liberty, centered on the story of the Terrans. The newly-released Heart of the Swarm is focused on the Zerg. The final release, Legacy of the Void, will dedicate its campaign to the Protoss (and does not have a projected release timeframe yet). In addition to the new campaign, new units have been introduced for multiplayer and new maps have been added, which ought to shake things up in the competitive landscape. Blizzard has also made long-awaited improvements to the social system, including support for groups and clans. Read more of this story at Slashdot.

Read the original post:
StarCraft 2: Heart of the Swarm Released

Massive Email Crash Hits Canadian ISP Shaw

rueger writes “One of Canada’s biggest cable/Internet providers has their customers in an outrage. ‘… after an interruption of Shaw’s email services Thursday led to millions of emails being deleted … About 70 per cent of Shaw’s email customers were affected when the company was troubleshooting an unrelated email delay problem and an attempted solution caused incoming emails to be deleted … Emails were deleted for a 10-hour period between 7:45 a.m. and 6:15 p.m. Thursday, although customers did not learn about the problem until Friday, and only then by calling customer service or accessing an online forum for Shaw Internet subscribers.’ To top it off, when Shaw did send out notices about this, they looked so much like every day phishing spam that many people deleted them unread.” Read more of this story at Slashdot.

Read More:
Massive Email Crash Hits Canadian ISP Shaw

Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious

An anonymous reader sends this Techdirt report on a welcome ruling from the 9th Circuit Court of Appeals: “”Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion.” Read more of this story at Slashdot.

Taken from:
Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious

Moon Mining Race Under Way

New submitter rujholla writes “The race to the moon is back! This time, though, it’s through private enterprise. Google has offered a $20m grand prize to the first privately-funded company to land a robot on the moon and explore the surface (video) by moving at least 500 meters and sending high definition video back to Earth by 2015.” Read more of this story at Slashdot.

Continue Reading:
Moon Mining Race Under Way

FTC Goes After Scammers Who Blasted Millions of Text Messages

coondoggie writes “The Federal Trade Commission today said it has filed eight court cases to stop companies who have sent over 180 million illegal or deceptive text messages to all manner of mobile users in the past year. The messages — of which the FTC said it had received some 20,000 complaints in 2012 — promised consumers free gifts or prizes, including gift cards worth $1,000 to major retailers such as Best Buy, Walmart and Target.” Read more of this story at Slashdot.

Read the article:
FTC Goes After Scammers Who Blasted Millions of Text Messages

Version 2.0 Released For Open Skype Alternative Jitsi

New submitter emilcho writes with news for anyone looking for a Free alternative to Skype “Among the most prominent new features people will find quality multi-party video conferences for XMPP, audio device hot-plugging, support for Outlook presence and calls, an overhauled user interface and support for the Opus and VP8 audio/video codec. Jitsi has lately shaped into one of the more viable open Skype Alternatives with features such as end-to-end ZRTP encryption for audio and video calls. The 2.0 version has been in the works for almost a year now, so this is an important step for the project” There are prebuilt packages from Debian, Ubuntu, Arch, Fedora, Windows, and OS X. Read more of this story at Slashdot.

See more here:
Version 2.0 Released For Open Skype Alternative Jitsi

Gamer Rewrites Valve’s Steam Installer For Debian

An anonymous reader writes “Gaming on Linux is growing fast right now, and most of that is thanks to Steam. Initially, Steam committed only to the most popular desktop distribution, Ubuntu, but more recently has opened the door to others. So what do you do when you want to game in Linux and you’re using something a little less popular — at least, on the desktop? If you’re a programmer called GhostSquad57, you rewrite the installer for Debian. GhostSquad57 uploaded his efforts to Github yesterday, and has since reached out to the Linux community.” Read more of this story at Slashdot.

Excerpt from:
Gamer Rewrites Valve’s Steam Installer For Debian

Eat a Banana to Remedy Over-Caffeination

Getting too juiced up on caffeine happens. Maybe you made a pot and nobody wanted it but you. Perhaps you got lost in a great conversation. In any case, baristas and amateur nutritionists suggest one possible remedy: eat a banana. Yes, a banana. More »

See original article:
Eat a Banana to Remedy Over-Caffeination

Physicists Discover a Way Around Heisenberg’s Uncertainty Principle

Hugh Pickens writes writes “Science Daily Headlines reports that researchers have applied a recently developed technique to directly measure the polarization states of light overcoming some important challenges of Heisenberg’s famous Uncertainty Principle and demonstrating that it is possible to measure key related variables, known as ‘conjugate’ variables, of a quantum particle or state directly. Such direct measurements of the wave-function had long seemed impossible because of a key tenet of the uncertainty principle — the idea that certain properties of a quantum system could be known only poorly if certain other related properties were known with precision. ‘The reason it wasn’t thought possible to measure two conjugate variables directly was because measuring one would destroy the wave-function before the other one could be measured,’ says co-author Jonathan Leach. The direct measurement technique employs a ‘trick’ to measure the first property in such a way that the system is not disturbed significantly and information about the second property can still be obtained. This careful measurement relies on the ‘weak measurement’ of the first property followed by a ‘strong measurement’ of the second property. First described 25 years ago, weak measurement requires that the coupling between the system and what is used to measure it be, as its name suggests, ‘weak,’ which means that the system is barely disturbed in the measurement process. The downside of this type of measurement is that a single measurement only provides a small amount of information, and to get an accurate readout, the process has to be repeated multiple times and the average taken. Researchers passed polarized light through two crystals of differing thicknesses: the first, a very thin crystal that ‘weakly’ measures the horizontal and vertical polarization state; the second, a much thicker crystal that ‘strongly’ measures the diagonal and anti-diagonal polarization state. As the first measurement was performed weakly, the system is not significantly disturbed, and therefore, information gained from the second measurement was still valid. This process is repeated several times to build up accurate statistics. Putting all of this together gives a full, direct characterization of the polarization states of the light.” Read more of this story at Slashdot.

More:
Physicists Discover a Way Around Heisenberg’s Uncertainty Principle