Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Courts

Craigslist Forced To Reveal a Seller's Identity 314

mi writes "The Academy of Motion Pictures Arts has won a judgment compelling Craigslist to reveal the identity of 'Daniel,' who tried to sell two tickets to the Oscar ceremony recently. The plaintiff's argument against such sales is scary and can be taken very far very quickly: 'If you don't know who's inside the theater, it's very difficult to provide security.' Craigslist's handling of the case may be even scarier, however — instead of fighting tooth-and-nail for the user's privacy, as we expect Google, Yahoo, and AOL, and even credit-card issuers to do, Craigslist simply did not show up in court and lost by default."
Hardware Hacking

Hacked Oyster Card System Crashes Again 95

Barence sends along PcPro coverage of the second crash of London's Oyster card billing system in two weeks. Transport for London was forced to open the gates and allow free travel for all. "There is currently a technical problem with Oyster readers at London Underground stations which is affecting Oyster pay as you go cards only," explains the TfL website. This follows the first crash two weeks ago, which left 65,000 Oyster cards permanently corrupted. Speculation is increasing that the crashes may be related to the hacking of the Oyster card system by Dutch researchers from Radboud University, though TfL denies any link. Plans to publish details of the hack were briefly halted when the makers of the chip used in the system sued the group, although a judge ruled earlier this week that the researchers could go ahead. During the court action, details briefly leaked on website Wikileaks.
Programming

The Father of Multi-Core Chips Talks Shop 90

pacopico writes "Stanford professor Kunle Olukotun designed the first mainstream multi-core chip, crafting what would become Sun Microsystems's Niagra product. Now, he's heading up Stanford's Pervasive Parallelism Lab where researchers are looking at 100s of core systems that might power robots, 3-D virtual worlds and insanely big server applications. The Register just interviewed Olukotun about this work and the future of multi-core chips. Weird and interesting stuff."
United States

USAF Counter-Terror Funds Buy "Comfort Capsules" 429

An anonymous reader writes "The Washington Post reports, 'The Air Force's top leadership sought for three years to spend counterterrorism funds on "comfort capsules" to be installed on military planes that ferry senior officers and civilian leaders around the world ... Air Force documents spell out how each of the capsules is to be "aesthetically pleasing and furnished to reflect the rank of the senior leaders using the capsule," with beds, a couch, a table, a 37-inch flat-screen monitor with stereo speakers, and a full-length mirror.' Congress told the USAF twice that they could not spend the money on this frivolous project, but they did it anyway."
The Internet

Canadian ISP Hijacking DNS Lookup Errors 225

Freshly Exhumed tips us to news that Canadian ISP Rogers Cable appears to be redirecting invalid DNS requests to their own search and advertising page. Roadrunner got caught doing the same thing earlier this year. According to the article, "The hijacking appears to be an attempt by Rogers to use its Deep Packet Inspection (DPI) technology to cash in on the mistakes of its users." Freshly Exhumed also reminds us, "As IOActive security researcher Dan Kaminsky has warned in the past, this presents a very serious security problem."
Programming

Reusing and Recycling Code 114

An anonymous reader sends us to a writeup about when and how to recycle code, excerpting: "As developers, once we start separating our code into abstract ontological typologies, we make use of the human mind's phenomenal ability to work with types. Our code becomes less about jump tables and registers and more about users, email messages and images. What once was a problem of allocating resources and operations within the computer becomes an abstract, logical problem within a collection of objects....Over time, by constantly working to reuse our own code, we choose practices that work well for ourselves and discard practices that don't work as well or slow down our workflow. For developers flying solo or those working on small projects, this evolutionary process is a sufficient way of going about things. But there's trouble when we add other players into the mix--other developers, a user interface person, a database person, a sysadmin, a project mana-jerk: as a developer, they don't have access to our 'experience' of the code and we don't have access to theirs. "
Social Networks

Social Networking Sites Becoming Useful For Lawyers 353

chareverie writes "With how the internet has become, social networking sites such as Facebook and MySpace have become a tool for crime solvers, employers, and now, lawyers. Two weeks after Joshua Lipton was charged in a drunk driving case, the college junior attended a Halloween party dressed as a prisoner, with the words 'jail bird' on his costume. Not surprisingly, his prosecutor was able to obtain photos of him at the party that were posted on Facebook, and claimed he was an 'unrepentant partier who lived it up while his victim recovered in the hospital.' The photos were presented in a slideshow, with one of them showing Lipton holding a can of Red Bull in one hand, and an arm draped around a girl bearing sorority letters. The judge agreed with the prosecutor, and changed Lipton's sentence to two years in prison. The article also cites other instances of people getting harsher sentences from pictures of them posted online."
The Courts

Blizzard Wins Major Lawsuit Against Bot Developers 838

Captain Kirk writes "World of Warcraft owners Blizzard have won their case against the programmer who wrote Glider, Michael Donnelly. (We discussed the case here when it was filed.) Blizzard won on two arguments: first, that if a game is loaded into RAM, that can be considered an unauthorized copy of the game and as such a breach of copyright; second, that selling Glider was interfering with Blizzard's contractual relationship with its customers. The net effect? If you buy a game, you transfer rights to the game developer that they can sue you for."
Role Playing (Games)

Second Life Faces Open Source Challenges 198

ruphus13 writes "Linden Labs has talked about Open Sourcing aspects of their platform for a while, but have not always followed through. Now, the OpenSimulator project has been gathering some solid momentum, and this was followed by an announcement by IBM that showed interoperability between OpenSimulator and Linden Servers. What this means is that you can use a Second Life client to log on to an OpenSim server. Beyond that, anyone can run their own server. 'Working with the protocols derived from the official Second Life client, and a knowledge of how Second Life works, these people have implemented their own compatible server code.' It is only a matter of time before users will be able to move profiles, virtual goods, and other elements of their 'second life' on to any server in a truly open world, thereby threatening Linden Labs' virtual world experience. With Google and Sun at the fringes of this space, things are going to get very interesting, virtually speaking."

20 Features Windows 7 Should Include 901

Damian Francis writes "Australian computer expert Vito Cassisi has come up with a list of 20 features that Windows 7 should have. The article includes features like modularized OS, new UAC, program caching, standards compliant browser and a whole lot more with explanations as to why these features should be included. With Windows Vista only receiving a luke-warm reception, Microsoft needs to make sure Windows 7 is a winner from the get go." What other features would you suggest to Microsoft if they are to have a hope for recovery?

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...