Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:RTFA... (Score 1) 156

The link is to a scribd page, not a PDF, and scribed--a you-can't-copy-this-document publishing solution--uses a UI that sucks for many people.

Were it a PDF, it probably would have been fine. Perhaps we should check our facts before we jump all over the person.

Naaaaaaaaa! (Apologies to Steve Martin...)

Comment Re:So... (Score 1) 156

I don't think money orders are legal tender, so they could decline to accept payment in that form. However, since pennies are legal tender, no creditor can decline to accept it as payment for a debt.

Money orders, checks, and credit cards are not legal tender, either, but many court-imposed payments may be made with them.

OTOH, pennies are legal tender, but don't try paying your taxes (or tolls--except in Illinois) with them!

Legal tender or not, refusing to accept proffered payment can have some interesting legal ramifications, but are not the be-all, end-all answer to the question.

From what I've seen, courts pretty much set their own rules on what payments they will (or will not) accept. Ignore their rules at your peril.

Comment Re:Infringing material... (Score 1) 155

Their trademark.

No, I don't think so. Intellectual Property, perhaps, but the takedown request, which may be seen by following one of the links in TFA, specifically mentions "17 U.S.C. sect. 501", which is copyright, not trademark law. (For trademark law, see the Lanham Act, 15 U.S.C.)

This really looks like they think he's distributing their property. He should take a deep breath and send them a letter, clearly stating that he's doing no such thing.

Here are what appear to be the salient points of Atari's letter:

Based on available information, Atari has a good faith belief that the url(s):

http://dcemu.seanbajuice.com/dcemu-atari800.htm
http://dcemu.seanbajuice.com/dcemu-DC7800.htm
http://dcemu.seanbajuice.com/dcemu-dcs2600.htm
http://dcemu.seanbajuice.com/dcemu-lynx.htm
http://dcemu.seanbajuice.com/dcemu-stelladc.htm

infringes its copyright and other intellectual property right by copying, reproducing and/or offering for distribution, display and/or download (including through links to other sites) unauthorized console emulation software and/or unauthorized copies of game products (software) protected by Atari's copyright rights. Atari's copyrighted works that have been infringed include:

Atari 800; Atari 2600; Atari 7800; Atari Lynx

The infringing material or the material that is the subject of infringing activities (collectively referred to as "Infringing Material") is listed and/or identified by console and game-related titles or variations thereof, console and game-related descriptions, or images of console and game-related artwork.

The Infringing Material is in violation of Atari's exclusive rights under the United States Copyright Act. It therefore constitutes copyright infringement in violation of 17 U.S.C. sect. 501.

Comment Re:Question about DRM (Score 1) 210

No, SecuROM really is DRM, just like CSS or region encoding on a commercial video DVD. Anything that restricts free, unencumbered use of digital media is Digital Rights Management (some say Digital Restrictions Management).

SecuROM can be used by the publisher as simple copy protection (by verifying unusual data written to the disc), it can perform date checks and disallow use of the package before a certain date, it can "phone home" to request permission to install, or it can count the number of installations and prevent any that exceed a pre-set limit.

If it phones home and the validation server is not reachable (or says "no"), you can't play your game. I'm sorry but that doesn't sound like it "preserves your rights" at all; it sounds to me like it thwarts them.

I have no hatred of SecuROM (or any other DRM system) provided the limitation are spelled out to me before I buy. What I hate are surprises.

Comment Re:Question about DRM (Score 1) 210

In all of Bethesda's previous games, the answer to that would be an unambiguous 'yes'. They haven't indicated anything to suggest different for Skyrim.

No, not quite all. While the original Oblivion was fairly unprotected, the Shivering Isles expansion and the GOTY Edition DO contain the dreaded SecuROM DRM. AFAIK, it does not "phone home" like some other titles, but it's there, nevertheless and will prevent use of some drive emulators and utilities like ProcessExplorer.

Comment Re:Yikes. Coffee. Smell. Up. Getting. (Score 3, Insightful) 159

In my experience, the COST of security matters much less to people than does the INCONVENIENCE it entails. Many organizations are quite willing to spend money on security hardware, software, and services. Secure implementations can be defeated by authorized users who either perceive the security as inconvenient or unnecessarily harsh ("I'm not going to lock my screen before I get coffee; I'll only be gone for a couple of minutes.")

One solution might consist of better user training coupled with better security design (protect truly secret data but don't worry about disclosure of information freely obtainable by outsiders via mechanisms like FOIA, stockholder inquiry, etc.)

It's a challenge, regardless of what you have to protect--or how you choose to protect it.

Google

Submission + - Google's Self-Driving Cars Go Legal in Nevada (digitizor.com)

dkd903 writes: "Drive to your destination while you are sound asleep". This might have been a dream for many. But not anymore, at least in Nevada, US. Well, the Self-driving cars which have been made by Google will soon be seen for real on the roads of Nevada and all this is happening legally.

The State legislators of Nevada has passed a bill which will now require the Nevada Department of Motor Vehicles amend the existing motor vehicles rules in order to allow these driver-less cars to ply on regular roads.

Submission + - Tests Find Security Tools Failures (computerworld.com)

Batblue writes: "A new round of antivirus testing found some products fail to detect malware that tries to infect a computer via a different attack vector, such as through a local network fileshare or a USB drive. The tests, conducted by NSS Labs, sought to find out how effective security products are at detecting malware from various attack vectors. Malware can be delivered to a computer via rigged websites, e-mail attachments and USB flash drives, among other ways.

Although drive-by downloads remain the most common attack vector, about 15% of attacks are delivered via e-mail with a malicious attachments, such as a PDF document. Many security products allow users to download all of their e-mail to their inbox by default and not scan it, even if it contains malware.

Of the 10 products tested, the average protection rate was just 36%. NSS Labs said that if a company runs a centralized, server-based security product that is integrated with the e-mail servers, such as Microsoft's Exchange or IBM's Lotus Notes, the malware may be removed before it reaches an end user."

Oracle

Submission + - Red Hat Changes Source Code Shipping Method (h-online.com)

mvar writes: Red Hat has changed the way it ships the source code for the Linux kernel. Previously, it was released as a standard kernel with a collection of patches which could be applied to create the source code of the kernel Red Hat used. Now though, the company ships a tarball of the source code with the patches already applied. This change, noted by Maxillian Attems and LWN.net, appears to be aimed at Oracle, who like others, repackage Red Hat's source as the basis for its Unbreakable Linux. Although targeted at Oracle, the changes will make work harder for distributions such as CentOS, the community built Linux distribution also based on Red Hat's sources.

Comment Perhaps not... (Score 1) 1

That's an AOL--not a Google--search that you linked. Nevertheless, the problem reported on that page seems to indicate a misconfigured or malfunctioning mail gateway, not a DNS problem. Since you didn't post any details, I can't tell anything about the problem you were having.

Comment Re:Quashes? (Score 1) 177

Yeah, it's really an awkward usage of the word "quashes". We're not speaking Middle English, so it's probably safe to stick with modern usage. Since one really doesn't "void", "vacate", "suppress", "defeat" or "smash" software bugs, I can only imagine the wording was an attempt to humorously play on the word "bugs", in which case a better word might have been "squashed" or "squished".

Just my $0.02...
 

Submission + - Lieberman et al. Introduce anti-Wikileaks bill (wired.com) 1

Amorymeltzer writes: Sens. John Ensign (R-Nev.), Joe Lieberman (I-Conn.) and Scott Brown (R-Mass.) introduced a bill Thursday aimed at stopping WikiLeaks by making it illegal to publish the names of military or intelligence community informants. ( http://thehill.com/blogs/hillicon-valley/technology/131885-senators-unveil-anti-wikileaks-legislation ) Leaking information is already a crime, but the proposed SHIELD Act (somebody watched Iron Man 2 recently) would go after publishers of information. Sen. Ensign (recently cleared http://www.8newsnow.com/story/13597653/breaking-news-sen-john-ensign-cleared-by-justice-department) claimed Assange was making US sources "death targets" for Al Qaeda. Of course, since criminal laws can't be retroactive, this will have no bearing on current Wikileaks activity.

Comment Re:Can't see a reason in the Acceptable Use Policy (Score 2) 528

... It's illegal in this country to distribute this information. Amazon had a legal obligation to terminate their relationship with Wikileaks. ... It is most certainly illegal. Perhaps you should go read up on Civil Disobedience.

Please remember that disclosing classified material is only illegal if the person has a security clearance. Once the material is made public (i.e. leaked), possession of it by a non-cleared person is not a statutory violation unless, of course, that person used illegal means to obtain it (e.g. breaking and entering).

(You may have trouble with the Special Rendition team, though...)

Conceivably, though, possession AND DISCLOSURE of, say, TS/SCI information could rise to the level of treason, particularly if the data was sold.

While Amazon may have a contractual obligation to do what they did, I don't believe they were legally required to do so.

Perhaps you should read Executive Order 13526 (and 13292, perhaps). Issued in 2009 and 2003, respectively, they codify (alongside 32 C.F.R. 2001), the United States' legal framework for protecting classified data. All of them are quite a bit newer than Thoreau's writing.

Slashdot Top Deals

"You don't go out and kick a mad dog. If you have a mad dog with rabies, you take a gun and shoot him." -- Pat Robertson, TV Evangelist, about Muammar Kadhafy

Working...