Software glitch “unlikely” to blame for deadly cannon incident, expert says

It looks as though the once though anti-aircraft software glitch that killed multiple people in South Africa, actually wasn’t software based. But was human intervention and software that caused the incident.

It looks as though the once though anti-aircraft software glitch that killed multiple people in South Africa, actually wasn’t software based. But was human intervention and software that caused the incident.

Nine South African soldiers died and eleven were injured last Friday during a live-fire exercise when an anti-aircraft gun went out of control. But, contrary to some reports, the tragic accident was not the result of an automated or robotic weapon going out of control, a defence expert says.

Initial reports from a South African newspaper say the Oerlikon 35mm Mk5 anti-aircraft twin-barrelled gun jammed while firing. A female soldier tried to free the shell, but another shell was accidentally fired, causing some rounds in the gun’s two near-full ammunition magazines to explode. The gun began firing again and swung in a circle, leaving nine soldiers dead and eleven wounded.

Read the full article at…

Did you like this article?

You May Also Like

Sailing To A New Island With The Pirate Bay

Just an update from the Pirate Bay in regards to what there current situation is, and a status update on everything that is going on.
Sailing To A New Island With The Pirate Bay - Being in The Pirate Bay team means you have a very busy life. Running the world's largest tracker and dealing with raids and court cases leaves little time for anything else. But as usual, the Pirate Bay guys still make the time to update their fans on their plans to buy an island.

Error’d: More Like Didgeridon’t! 4G Australian Time Zone Application

Error'd: More Like Didgeridon't! -

If you were tasked with building a time zone synching application, you could probably do it in less than 1MB. Maybe you Linux guys could write it in one line of Perl (or at least brag about having the ability to write it in one line of Perl). Hell, maybe you'd just use the built-in synching functionality in your favorite OS. Anyhow, I can't imagine the crazy Western Australian rules for calculating time that make this software baloon to 4GB.

(submitted by Marty)



[The Daily WTF]

US Prepares for Eventual Cyberwar

US Prepares for Eventual Cyberwar - The New York Times is reporting on preparations in the works by the US government to prep for a 'cyberwar'. Precautionary measures are being taken to guard against concerted attacks by politically-minded (or well-paid) hackers looking to cause havoc. Though they outline scenarios where mass damage is the desired outcome (such as remotely opening a dam's gates to flood cities), most expect such conflicts to be more subtle. Parts of the internet, for example, may be unreachable or unreliable for certain countries. Regardless, the article suggests we've already seen our first low-level cyberwar in Estonia: "The cyberattacks in Estonia were apparently sparked by tensions over the country's plan to remove Soviet-era war memorials. Estonian officials initially blamed Russia for the attacks, suggesting that its state-run computer networks blocked online access to banks and government offices. The Kremlin denied the accusations. And Estonian officials ultimately accepted the idea that perhaps this attack was the work of tech-savvy activists, or 'hactivists,' who have been mounting similar attacks against just about everyone for several years."

Read more of this story at Slashdot.


Symantec outgrows underground nuclear bunker

Almost like a RTCW Malware Camp. Would be interesting to see what the bunker looks like.
Symantec outgrows underground nuclear bunker - Symantec has emerged from its bunker in the British countryside, moving its malware-fighting operations from a former U.K. military nuclear shelter to a more conventional office in Reading. The nuclear bunker, with concrete walls and an obscure entrance on a hillside near Twyford, England, was used for one of the company's Special Operations Center (SOC). The regional centers are used by security analysts who are part of the company's Managed Security Services. Companies hire Symantec to help with part or all of their IT security operations.

The nuclear shelter may have been good public relations for a security company, but it wasn't comfortable: It lacked windows and had "sanitation" problems, company officials said. On Wednesday, Symantec offered a tour of its new facility in Reading to journalists, analysts, and customers. The facility, formerly used by storage company Veritas, which Symantec acquired in 2005, has twice as much space as the bunker and was needed to accommodate Symantec's growth.

View: The full story
News source: Infoworld

Read full story...


Guide to upgrading Drupal using SSH Commands

A well written guide on how to upgrade Drupal using SSH commands
This guide is meant to augment the official Upgrade guide. Please read the official upgrade steps in UPGRADE.txt as well as in the Dcoumentation thoroughly to ensure that you understand every aspect of the upgrade process. This guide is for more advanced users with SSH experience.