Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
GNU is Not Unix

Submission + - GPLv3 is DRM

An anonymous reader writes: This post says:

"Imagine: some software/music, say GCC, is released/distributed under GPLv2. People can do whatever they want with it: redistribute it, reuse it in their own source code/music, or whatever. Then GPLv3 comes out. Suddenly the software/music won't work on/play in your hardware/software."

Please comment, I hope I'm wrong.
Censorship

Ethics of Proxy Servers? 194

Mav asks: "I was recently asked to host a website for free in return for a lot of advertising. After querying them about how they knew the site would produce traffic they stated the site was going to be running PHPProxy (an open source web proxy). The traffic was a result of him and his contacts (nearly one thousand of them) using the site to bypass his school's firewall in order to view their MySpace pages and get access to their MSN messengers. Given all the attention social networking sites have recently received and the various laws attempting to block or control access to them I feel guilty and unsure making this available. Are there legal implications that I need to worry about? Could I be held liable if one of the students got in trouble? Most importantly, what's the moral thing to do?"

Securing a High School Windows XP Computer Lab? 533

An anonymous reader asks: "My SO just inherited a computer lab from a departed teacher who was no security guru. These are Windows XP systems, and security basically consists of a password on the admin account, a subscription to McAfee Security Center, and a free Internet filter. The students have access through a non-passworded 'limited' user account that doesn't seem to limit much. They have been going in and changing settings, downloading games and music, and generally screwing the computers up during class time, in many cases leaving them unusable. As the geek in our house, she has asked me to give her a hand, but while I have dealt with some security issues in the past, it was to protect against remote intruders, not against someone who has to have access to the keyboard. Any suggestions on the best way to lock these systems down?"

What Brings Users to Blogs? 143

Billosaur writes "The Center for Citizen Media Blog has an interesting overview of the Collaborative News Survey 'Hype versus Reality', detailing the results of a study done by Hsing Wei from Harvard University's Kennedy School of Government on why users are attracted to collaborative news, commenting and blogging sites. Among the conclusions of the study are that people who use these sites are 'mostly young and male, especially those who visit technology-related sites, looking for 'a fix of unique, informative fun,' and 'filling in the blanks' left by traditional news sources. Or is it just because it beats working?"

Slashdot Top Deals

On the eighth day, God created FORTRAN.

Working...