Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Music

Submission + - Apple cracks down on the Hymn Project (hymn-project.org) 2

An anonymous reader writes: Ever since the initial launch of the iTunes Music Store, an intrepid group of programmers over at the Hymn Project have engaged in a marvelous cat-and-mouse game with Apple. Now they're finally being hobbled by Apple's lawyers.

The purpose of the project has always been to provide software that can be used to losslessly remove Digital Rights Management (DRM) protection from music purchased through iTunes, so that the buyer may exercise their right of fair use and play the music on non-Apple devices (Hear Your Music aNywhere).

The software has gone through many incarnations. The original hymn has been succeeded by JHymn, QTFairUse6, MyFairTunes, and others. Regardless of the program, the emphasis has always been squarely on fair use — not piracy. Any discussions of piracy have been strongly and actively discouraged on the site's forums.

For years now, Apple has been content to mostly ignore the Hymn Project. At worst, they would introduce subtle changes to new versions of iTunes that would break the Hymn software. Nobody really knows if this was done intentionally, but it was usually just a matter of time before a new solution was found. This seemed like a reasonable approach for Apple to take. After all, why should they care? The DRM was only in place to placate the record companies. Apple CEO Steve Jobs has even expressed his opinion that all music should be free of DRM.

Well, now things have changed. Recently, a new program called Requiem was announced that appears to be a complete crack of the iTunes DRM scheme. Previous programs had relied on various forms of trickery or memory hooks to access the unencrypted audio data — none had ever completely cracked the encryption algorithms.

Requiem seems to have been the last straw. Earlier this week, the ISP hosting the site received a Cease and Desist order from Apple Legal, demanding that all downloads be removed from the site, and that the site post no links to any programs that could remove DRM from Apple music or video. Reportedly, similar C & D orders were also sent to at least one of the project's developers, and to another ISP where Reqiuem had been hosted. Ironically, Requiem was never actually hosted on the Hymn site — merely mentioned and linked to in one of the forums. Nevertheless, the Hymn Project has now come into the crosshairs of Apple's lawyers and, lacking legal resources, has seen no choice but to comply with the order.

Space

Submission + - Voyager 2 finds solar system's shape is 'dented' (reuters.com)

Selikoff writes: "NASA's Voyager 2 spacecraft has found that our solar system is not round but is "dented" by the local interstellar magnetic field of deep space, space experts said on Monday. The data was gathered by the craft on its 30-year journey into the edge of the solar system when it crossed into a sweeping region called the termination shock, they said. It showed that the southern hemisphere of the solar system's heliosphere is being pushed in or "dented." Voyager 2 is the second spacecraft to enter this region of the solar system behind Voyager 1, which entered the northern region of the heliosheath in December 2004."
Businesses

Submission + - SCO drops plan to sell Unix business

Stony Stevenson writes: The SCO Group has dropped plans to sell its disputed Unix business to a private investment group. The company, which has filed for Chapter 11 protection, earlier this month asked the bankruptcy court for permission to sell assets related to its Unix software and mobile technology businesses to York Capital Management for $36 million. SCO on Tuesday withdrew the request, according to a brief document filed with the District of Delaware bankruptcy court. SCO did not provide a reason for the change of heart.
Security

Submission + - Monster.com unknowingly recruited bots for crime

Stony Stevenson writes: Without the company's permission, Monster.com was briefly recruiting new bots this week to work on behalf of cyber criminals. The company has confirmed that malicious software was inserted on the site's Monster Company Boulevard pages, which allow job seekers to research companies, in order to surreptitiously turn visitors' PCs into zombies for spam and malware delivery. "It seems that company.monster.com suffered some sort of iframe injection attack on Monday," said Roger Thompson, CTO of Exploit Prevention Labs in a blog post, noting that the employment ads for a number of major brands were affected, including Eddie Bauer, GMAC Mortgage, BestBuy, Toyota Financial, and Tricounties Bank. Monster.com spokesperson Kathryn Burns confirmed the compromise and said that the company promptly removed and cleaned the affected Web pages.
Hardware Hacking

Submission + - Automatically Calibrating Projector System

Eliot writes: I thought this was a really cool system submitted to Hack-a-Day which allows you to quickly calibrate any size of projection on any size of screen. It uses concealed light sensors to detect the loction of all the pixels on the screen after a quick calibration. This allows for the projector to send about 2 seconds of flashing bars and then the projector will automatically adjust to fit the screen. With some knowledge of the geometry they even show it being used on a 3-D car, also, they use it to merge two different projections onto one screen.

Hack-A-Day link: http://www.hackaday.com/2007/11/15/automatic-projector-calibration/
The video is here: http://www.youtube.com/watch?v=XgrGjJUBF_I
The PDF of the project is here: http://www.cs.cmu.edu/~johnny/academic/proj4.pdf
Security

Submission + - Virtual servers introduce new security threats (networkworld.com)

bednarz writes: "IT managers worry that security attacks designed to exploit a hypervisor could infect virtual machines that reside on the same physical host, in what is known as a "virtual-machine escape." If a virtual machine is able to "escape" the isolated environment in which it resides and interact with the parent hypervisor, industry experts say it's possible an attacker could gain access to the hypervisor, which controls other virtual machines, and avoid security controls designed to protect the virtual machine. "The Holy Grail of security in the virtual world is to bounce out of the [virtual machine] and take control," said Burton Group analyst Pete Lindstrom."
Security

Submission + - Mac Tojan In Wild (macnn.com)

Naturalis Philosopho writes: MacNN is reporting that a Mac Trojan is loose in the wild. Newsworthy due to it's rarity, not newsworthy as you have to type an administrator password to run it.
The Military

Submission + - Can we control the uses, evolution of technology? (technologyreview.com) 1

Lucas123 writes: "J. Robert Oppenheimer was the chairman of the U.S. Atomic Energy Commission and the lead architect in the development of the atomic bomb. Using a rare piece of video footage in which Oppenheimer describes his feelings about the use of the atomic bomb, Technology Review's Jason Pontin poses the question whether we can control technology as it evolves."

Slashdot Top Deals

Force needed to accelerate 2.2lbs of cookies = 1 Fig-newton to 1 meter per second

Working...