Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Same legal protections? (Score 1) 686

I am confident that you can sniff wireless traffic if you're just using WPA(2) with a PSK because I've done it on my own network. If you give the neighbors your passphrase, they can sniff you.

There are options such as using multiple APs in DD-WRT, or using an enterprise WPA method where you have a login for your stuff (nerd/securepassword) and give one to the public (public/publicpass).

Comment Better be opt-out (Score 1) 99

Unless the sync is optional, or it allows the user to use a key separate from the credentials that requires a re-sync if you lose it (like Firefox Sync) where the provider can't tell what you store on their servers (encrypted/decrypted locally), it'll bar me from buying Apple products ever again.

Comment Quote in summary is misleading (Score 3, Informative) 246

RTFA and you see that, as many of us already know, you can get a court order to get the exact identity of the account holder, so the problem as described by the summary quote is not the real issue. Rather, just because you know the account holder does not mean that you can prove that the account holder, or whoever you have on the stand, is the one that infringed.

Despite rear-end covering clauses in the terms of most home ISPs that state that the account holder is liable for everything that goes across their connection, most courts won't accept that. I wouldn't be willing to test it, but it's a very valid point of defense. The number of people with open Wi-Fi is staggering, and even then there are attacks which work on WEP (a ton) and WPA (GPU accelerated attacks can get passphrases in under a minute on many routers), which is the maximum security many home routers in use are capable of. That makes this point even more valid.

Comment Re:So what eBook to buy? (Score 1) 584

Sony uses ADEPT DRM on its books (if I recall correctly. Barnes & Noble uses their own format (the decryption tool is called ignoble), I can't find any solid confirmation but the rumor is that Apple is using FairPlay on their ePUBs.

Decryption tools exist (at least for ADEPT and B&N) but I don't know if that's the case with Apple (I would guess that the answer is yes) but it is a major problem with portability.

Amazon uses their own DRM which is pretty easy to circumvent (With tools); once you do, conversion via a tool like Calibre to another format (e.x. ePUB) is trivial. Couple mouse clicks.
Privacy

Submission + - 4chan hacks Plainfield, NJ School District (green-oval.net)

An anonymous reader writes: Visitors of 4chan's Technology board used admin credentials to access the school's Genesis management system and wreak havok (text mirror of thread here). Users from the board posted screenshots of their shenanigans, which included suspending students for drug trafficking, making installing Gentoo a sport, and sending out a message from Richard Stallman as an emergency broadcast to parents.

The school has posted a message indicating that the Genesis system is down, but has yet to publicly acknowledge that a breach occurred.

Security

Submission + - Hackers Respond To Help Wanted Ads With Malware (itworld.com)

itwbennett writes: The FBI issued a warning Wednesday about a new twist on a long-running computer fraud technique, known as Automated Clearing House fraud. With ACH fraud, criminals install malware on a small business' computer and use it to log into the company's online bank account. In this latest twist on the scam, the criminals are apparently looking for companies that are hiring online and then sending malicious software programs that are doctored to look like job applications. One unnamed company recently lost $150,000 in this way, according to the FBI's Internet Crime Complaint Center. 'The malware was embedded in an e-mail response to a job posting the business placed on an employment website,' the FBI said in a press release. The malware, a variant of the Bredolab Trojan, 'allowed the attacker to obtain the online banking credentials of the person who was authorized to conduct financial transactions within the company.'

Comment Re:Can Zen Magnets sue? (Score 4, Informative) 475

The voicemail was left on the mailbox of a recipient. A voicemail is a knowingly made recording, and one that has no reasonable expectation of privacy.

I'm no lawyer, but if a voicemail sender retains copyright on their message, I have no idea how a site like Audioo (which shares embarrassing voicemails with the world) hasn't been sued into oblivion yet.

As far as the images of Jake (Buckyballs CEO) used in the presentation go (which are images from Google Images, all freely available, used as a representation of a subject matter at a low resolution), I am extremely doubtful. I'm not a lawyer, and it's why Zen is consulting one.

There was no other property belonging to Buckyballs. The trademark was identified as that of a competitor, so there's no basis for a trademark infringement claim. The rest of the video was recorded entirely by Zen Magnets.

Comment Re:Counter-takedown notice? (Score 2, Informative) 475

The reddit link seems to indicate that they're in the process of making sure they're completely clear:

Decision is we're going to do a counter-notification, but we're gonna have a lawyer back us up. (Especially since there have been good points about potential $$$ damages for perjuring a false copyright take-down.)

The video has been reuploaded to Youtube by a few others though.

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...