Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy

Reasonable Expectation of Privacy From Web Hosts? 287

Shafted writes "I'm in a bit of dilemma, and I'm wondering what fellow Slashdotters think regarding this subject. I've been hosting web sites for some clients for years using my own server. About a year and a half ago, I got a reseller account with a company that will remain nameless. They are, however, fairly large, and they did come highly recommended. Other than the usual slow tech support, occasional server overloading, and... well... typical support staff, it's been pretty good and has saved me from having to deal with problems like hardware and driving down to the colo at 4AM to figure out a routing problem. All-in-all, it was acceptable. Until yesterday, when I was asking for a relatively minor email-related fix, and by the tech support staff's response, they had accessed my MySQL database directly and looked at the contents; presumably, in order to tell me what I was doing wrong. Regardless of the fact that they missed the boat with regards to the support question, I found it surprising that they would access my database data without my consent. When I asked them why they were accessing the database without my permission, they've pretty much ignored me, despite repeated requests asking why they think this is acceptable. So, my question is this: Do I, as a customer who, according to the acceptable use policy, owns my data, have a reasonable expectation of privacy for the data which I own, despite it being hosted on a third-party's server? Or do web hosting companies have the right to poke around at everyone's data as they see fit?" Read below for the rest of the question.
Mozilla

Firefox Goes for World Download Record 344

Kelson writes "For the upcoming release of Firefox, Mozilla is preparing Download Day 2008: a campaign to set a world record for the most software downloaded in 24 hours. Participants are asked to pledge to download Firefox 3 on the day that it's launched. The exact date hasn't been scheduled yet, but everything seems on track for June."
The Almighty Buck

Video Game Actors Say They Don't Get Their Due 573

Dekortage writes "The New York Times reports today about Michael Hollick, the actor who provided the voice of Niko Bellic in Grand Theft Auto IV. Although the game has made more than $600 million in sales for Rockstar Games, Hollick earns nothing beyond the original $100K he was paid. If this was television, film, or radio, Hollick and the other GTA actors could have made millions by now. Hollick says, 'I don't blame Rockstar. I blame our union for not having the agreements in place to protect the creative people who drive the sales of these games. Yes, the technology is important, but it's the human performances within them that people really connect to, and I hope actors will get more respect for the work they do within those technologies.' Is it time for video game actors to be treated as well as those in other mediums?"
Security

Coding Around UAC's Security Limitations 334

Mariam writes "Free software developers from the non-profit NeoSmart Technologies have published a report detailing their experience with coding around Windows Vista's UAC limitations, including the steps they took to make their software perform system actions without requiring admin approval or UAC elevation. Their conclusion? That Windows Vista's improved security model is nothing more than a series of obstacles that in reality only make it more difficult for honest ISVs to publish working code and not actually providing any true protection from malware authors. Quoting from the post: 'Perhaps most importantly though, is the fact that Windows Vista's newly-implemented security limitations are artificial at best, easy to code around, and only there to give the impression of security. Any program that UAC blocks from starting up "for good security reasons" can be coded to work around these limitations with (relative) ease. The "architectural redesign" of Vista's security framework isn't so much a rebuilt system as much as it is a makeover, intended to give the false impression of a more secure OS.'"
Windows

Details On Windows XP SP3 Leaked 140

crazyeyes notes the leak of 7 pages of secret Microsoft information on the upcoming Service Pack for Windows XP. Quoting: "We were the first to break the news on the release of Windows Vista Service Pack 1 and the final RTM schedule of Windows XP Service Pack 3. Now, we will be the first to release the full details on Microsoft's Windows XP Service Pack 3, which as we know will be available for manual update on April 29, 2008."
Security

Serious Vulnerability In Firefox 2.0.0.12 355

Oh, Not Now writes "Mozilla Firefox 2.0.0.12, mere hours old, is vulnerable by default to a directory traversal trick, via the view-source mechanism. Although mitigated by the NoScript plug-in, this is quite a serious bug — the default installation is vulnerable from the get-go."
Windows

Hostile ta Vista, Baby 663

Frequent Slashdot contributor Bennett Haselton adds his experience to the litany of woes with Microsoft Vista. Unlike most commentators who have a beef with the operating system, Bennett does a bit of surveying to bolster his points. Read his account by clicking on the magic link.
Space

Largest Ever Digital Survey of the Milky Way Released 75

Several readers have written to tell us that an international team of over fifty astronomers from around the globe have created the largest ever digital survey of the Milky Way. IPHAS (INT/WFC Photometric H-alpha Survey of the Northern Galactic Plane) is an image survey designed to show large-scale structure within our galaxy. IPHAS data is being released by utilizing technology from the UK government funded open source project Astrogrid. Some of the images are quite spectacular.
Social Networks

Secret Mailing List Rocks Wikipedia 531

privatemusings writes "Wikipedians are up in arms at the revelations that respected administrators have been discussing blocking and banning editors on a secret mailing list. The tensions have spilled over throughout the 'encyclopedia anyone can edit' and news agencies are sniffing around. The Register has this fantastic writeup — read it here first." The article says that some Wikipedians believe Jimbo Wales has lost face by supporting the in-crowd of administrators and rebuking the whistle blower who leaked the existence of the secret mailing list.
Security

Submission + - Operation Banner - British MoD Reminisce Northern (blogspot.com)

Rapide writes: Here's a recently unearthed document outlining the British military view of its own role, function, successes and failures from 1969 to 2006 in Northern Ireland. The document, Operation Banner — An Analysis of Military Operations in Northern Ireland ( pdf), offers insight into the thinking of senior military officers and civil servants at the Ministry of Defence in Whitehall. The level of detail re operational matters proves that this wasn't intended to reach the hoi polloi.
Businesses

Submission + - The Key to Gay acceptance (treycruz.com)

Trey Cruz writes: "I think Abercrombie may also be bisexual. They don 't know whether to stick with pretty girls, or have guys frolicking around naked together at the beach...Nonetheless their homoerotic content is what primarily lead to their sucess in the fashion industry. Advertisers everywhere will tell you that today, homosexuals are highly marketable."
Slashback

McCain Wants Ballmer For His Cabinet 431

While many people jumped all over presidential hopeful John McCain's wrong-headed view on network neutrality, few noticed his infuriating love for Microsoft. "[T]he 70 year old presidential hopeful also said that he would ask Microsoft CEO Steve Ballmer to serve on his cabinet to deal with technology issues if elected. He did not however say what position Ballmer might be hired in, but did joke that he might consider him for a diplomatic position, such as ambassador to China."

Comment Strong AI not possible... (Score 1) 218

"Arguing whether computers can think is like arguing whether submarines can swim" (I forget who said this).

Read "The Emperor's New Mind" by Roger Penrose for a critique of strong AI. (Strong AI in its sense of consciousness being no more than some very complicated algorithm) His basic argument is that the way that computers work is very very different from the way that our brains work. Computers use algorithms for everything, and Penrose argues that there are some important aspects of human consciousness that are non-algorithmic.

For example, Godel's theorem states that there are some mathematical propositions that can neither be proved nor disproved in any given logic system (ie, using some algorithm to show they follow from the axioms). But humans can intuitively recognize the truth of some of these propositions. This implies that human consciousness consists of more than a mere algorithm.

My main problem with strong AI is that it's impossible to decide whether a computer is conscious/intelligent when a proper definition of consciousness doesn't exist.

Joe

Slashdot Top Deals

A failure will not appear until a unit has passed final inspection.

Working...