Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Yes (Score 1) 486

He's right they should cut bot infected machines off, but for what they are charging they should then provide the use with a CD/software to clean thier pc with so they caqn get back on the net (good will all the way).

The Internet

US Fed Gov. Says All Music Downloads Are Theft 451

BenEnglishAtHome writes "Nearly all US government employees and contractors are subject to mandatory annual information security briefings. This year the official briefing flatly states that all downloaded music is stolen. The occasionally breathless tone of the briefing and the various minor errors contained therein are funny but the real eye-opener is a 'secure the building' exercise where employees stumble across security problems and resolve them. According to the material, the correct response to an employee who is downloading music is to shout 'That's stealing!' No mention is made of more-free licenses, public domain works, or any other legitimate download. If this were a single agency or department that had made a mistake in their training material it might not be so shocking. But this is a government-wide training package that's being absorbed by hundreds of thousands of federal employees, both civilian and military. If you see a co-worker downloading music, they're stealing. Period. Who woulda thunk it? Somebody should mirror this. Who wants to bet that copies will become hard to find if clued-in technogeeks take notice and start making noise?" Warning: this site gives a whole new meaning to "Flash heavy."
Government

One Crime Solved Per 1,000 London CCTV Cameras 404

SpuriousLogic writes "Only one crime was solved for each 1,000 CCTV cameras in London last year, a report into the city's surveillance network has claimed. The internal police report found the million-plus cameras in London rarely help catch criminals. In one month CCTV helped capture just eight out of 269 suspected robbers. David Davis MP, the former shadow home secretary, said: 'It should provoke a long overdue rethink on where the crime prevention budget is being spent.' He added: 'CCTV leads to massive expense and minimum effectiveness. It creates a huge intrusion on privacy, yet provides little or no improvement in security. The Metropolitan Police has been extraordinarily slow to act to deal with the ineffectiveness of CCTV.'"
Spam

Anti-Spam Lawyer Loses Appeal, and His Possessions 237

Techdirt is reporting that one particularly rabid anti-spam fighter has not only lost his case, but most of his worldly possessions as well. James Gordon tried to set himself up as an ISP to get around the conventions of the CAN SPAM act in order to set up a litigation house designed to sue companies that spam. Unfortunately a judge did not take kindly to this trick and ordered him to pay $110,000 to the firm he was suing, a decision that was not only upheld on appeal but accompanied by some very unkind words trying to shut down litigation mills like his. "But, perhaps even more fascinating is that the guy, James Gordon, didn't just lose the lawsuit, it appears he lost most of his possessions as well. Remember that ruling telling him to pay the $110k to Virtumundo? He refused. The company sent the debt to a collections agency, but told Gordon they'd call off the collections agency if he dropped the appeal. Gordon didn't."
The Courts

Goldman Sachs Code Theft Not Quite So Cut and Dried 306

The New York Times has some interesting details that are surfacing about the recent charges brought against Sergey Aleynikov, the programmer who allegedly stole code from Goldman Sachs on his way out the door to another job. "This spring, Mr. Aleynikov quit Goldman to join Teza Technologies, a new trading firm, tripling his salary to about $1.2 million, according to the complaint. He left Goldman on June 5. In the days before he left, he transferred code to a server in Germany that offers free data hosting. [...] After his arrest, Mr. Aleynikov was taken for interrogation to F.B.I. offices in Manhattan. Mr. Aleynikov waived his rights against self-incrimination, and agreed to allow agents to search his house. He said that he had inadvertently downloaded a portion of Goldman's proprietary code while trying to take files of open source software — programs that are not proprietary and can be used freely by anyone. He said he had not used the Goldman code at his new job or distributed it to anyone else, and the criminal complaint offers no evidence that he has."
Movies

Avatar, Has Sci-fi Found Its Heaven's Gate? 443

brumgrunt writes "Den Of Geek wonders if James Cameron's Avatar is heading for a fall, and if it will even be a science fiction film, off the back of the previews shown last week. It writes: 'It seems in Avatar that all this gee-whiz science is merely there to draw the "old crowd" in and provide some kind of rationale for a brightly-coloured fantasy-world which reflects the most emetic of the artwork plastered over teenage girls' MySpace pages.'"

Nokia Unveils Its First Netbook 219

andylim writes "Today Nokia unveiled its first netbook that runs Windows and packs an Intel Atom processor. The Nokia Booklet 3G is the first Nokia device to feature a full-sized keypad and a 10-inch display. Recombu.com has listed the specs, which include an SD card reader, Bluetooth, GPS, 3G, HSDPA (3.5G), Wi-Fi, an HDMI port for HD video out and a front-facing camera for video calling. According to Nokia, the Booklet will provide 12 hours of battery life."
Cellphones

iPhone 3GS Is Number One In Japan 250

mudimba writes "The iPhone 3GS 32GB is currently the best selling phone in Japan (the 16GB version came in at number nine). This is in stark contrast to reports from earlier this year that the Japanese hate the iPhone. Nobody is sure what specific features caused the change of heart, though it is speculated that video capture and voice control might be part of the answer. When the 3G iPhone first came out it saw a spike in sales, but unlike the 3GS it was unable to outsell locally-made handsets."
The Internet

In the UK, a Plan To Criminalize Illegal Downloaders 382

krou writes "It looks like the launch of the UK Pirate Party came not a moment too soon. The Independent reports that Business Secretary Lord Mandelson is going to take a hard-line stance to preserve copyright after intense lobbying by the music and film industry. 'Under the proposed laws, Ofcom, the industry regulator, would be given powers to require Internet service providers to collect information on those who downloaded pirate material. The data would be anonymous, but serious repeat infringers would be tracked down through their computer ID numbers.' Prospective punishments included restricting internet access, either slowing down an offender's broadband or disconnecting them altogether, and fines up to £50,000. The Pirate Party came out against the scheme, calling it a gross invasion of civil liberties, while Tom Watson, the former minister for digital engagement, spoke out against the move, saying that the government should stop trying criminalize downloaders just so as to 'restore 20th-century incumbents to their position of power,' but should instead be 'coming up with interventions that will nurture 21st-century creative talent.'"
Biotech

Scientists Learn To Fabricate DNA Evidence 256

Hugh Pickens writes "The NY Times reports that it is possible to fabricate blood and saliva samples containing DNA from a person other than the donor, and even to construct a sample of DNA to match someone's profile without obtaining any tissue from that person — if you have access to their DNA profile in a database. This undermines the credibility of what has been considered the gold standard of proof in criminal cases. 'You can just engineer a crime scene,' said Dan Frumkin, lead author of the paper. 'Any biology undergraduate could perform this.' The scientists fabricated DNA samples in two ways. One requires a real, if tiny, DNA sample, perhaps from a strand of hair or a drinking cup. They amplified the tiny sample into a large quantity of DNA using a standard technique called whole genome amplification. The other technique relies on DNA profiles, stored in law enforcement databases as a series of numbers and letters corresponding to variations at 13 spots in a person's genome. The scientists cloned tiny DNA snippets representing the common variants at each spot, creating a library of such snippets. To prepare a phony DNA sample matching any profile, they just mixed the proper snippets together. Tania Simoncelli, science adviser to the American Civil Liberties Union, says the findings were worrisome. 'DNA is a lot easier to plant at a crime scene than fingerprints,' says Simoncelli. 'We're creating a criminal justice system that is increasingly relying on this technology.'"
Microsoft

XP Users Are Willing To Give Windows 7 a Chance 720

Harry writes "PC World and Technologizer conducted a survey of 5,000 people who use Windows XP as their primary operating system. Many have no plans to leave it, and 80% will be unhappy when Microsoft completely discontinues it. And attitudes towards Vista remain extremely negative. But a majority of those who know something about Windows 7 have a positive reaction. More important, 70 percent of respondents who have used Windows 7 say they like it, which is a sign that Windows 7 stands a chance of being what Vista never was: an upgrade good enough to convince most XP users to switch."
Networking

Suitable Naming Conventions For Workstations? 688

spectre_240sx writes "We've discussed server naming a fair amount in the past, but I haven't seen much about workstations. Where I currently work, we embed a lot of information in our workstation names: site, warranty end date, machine type, etc. I'm of the opinion that this is too much information to overload in the machine name when it can more suitably be stored in the computer description. I'd love to hear how others are naming their workstations and some pros and cons for different naming schemes. Should computers be logically tied to the person that they're currently assigned to, or does that just cause unnecessary work when a machine changes hands? Do the management tools in use make a difference in how workstations are named?"
Social Networks

No Social Media In These College Stadiums 265

RawJoe writes "Today, the Southeastern Conference (SEC) is expected to release a final version of its new media policy that, at the moment, can best be described as a ban on all social media usage at SEC games. Earlier this month, the conference informed its schools of the new policy, which says that ticketed fans can't 'produce or disseminate (or aid in producing or disseminating) any material or information about the Event, including, but not limited to, any account, description, picture, video, audio, reproduction or other information concerning the Event.' Translated, that means no Twitter, Facebook, YouTube, TwitPic, or any other service that could in any way compete with authorized media coverage of the event. In the case of the SEC, authorized media coverage rights belong to CBS, who has a $3B deal with the conference over the next 15 years, according to The St Petersburg Times." Good luck with that. To quote Clay Shirky, "The idea that people can't capture their own lived experience is a losing proposition."
Microsoft

Microsoft Files "Emergency Motion" To Ship Word 221

adeelarshad82 writes "Several days after a judge ordered Microsoft to halt sales of Word and handed down $290M in fines, the software giant has moved to stop the ban. On Friday Microsoft filed an emergency motion to stop the judgment and waive the bond requirement, according to court filings. The actual document was filed under seal, so the full contents of the request have not yet been made public."

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...