Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Handhelds

Inside Apple's iPhone SDK Gag Order 495

snydeq writes "InfoWorld's Tom Yager takes a closer look at Apple's iPhone SDK confidentiality agreement, which restricts developers from discussing the SDK or exchanging ideas with others, thereby leaving no room for forums, newsgroups, open source projects, tutorials, magazine articles, users' groups, or books. But because anyone is free to obtain the iPhone SDK by signing up for it, Apple is essentially branding publicly available information as confidential. This 'puzzling contradiction' is the 'antithesis of the developer-friendly Apple Developer Connection' on which the iPhone SDK program is based, Yager contends. 'You'll see arguments from armchair legal analysts that the iPhone developer Agreements won't stand up in court — but those analysts certainly won't stand up in court on your behalf.' Anyone planning to launch an iPhone forum or open source project should have 'a lawyer draft your request for exemption, and make sure that the Apple staffer granting it personally commits to status as authorized to approve exceptions to the iPhone Registered Developer and iPhone SDK Agreements,' Yager warns."
Censorship

Comcast Blocks Web Browsing 502

An anonymous reader writes "A team of researchers have found that Comcast has quietly rolled out a new traffic-shaping method, which is interfering with web browsers in addition to p2p traffic. The smoking gun that documents this behavior are network traces collected from Comcast subscribers Internet connections. This evidence shows Comcast is forging packets and blocking connection attempts from web browsers. One has to hope this isn't the congestion management system they are touting as no longer targeting BitTorrent, which they are deploying in reaction to the recent FCC investigations."
Google

Submission + - Some anti-spam vendors blocking and slowing Gmail (arstechnica.com)

fiorenza writes: Google's Gmail (and corporate mail) are being throttled and sometimes blocked by some anti-spam services, including MessageLabs and Antigen. Ars Technica reports that the blocking is a result of the Google CAPTCHA crack (previous /. coverage), which has allowed a deluge of spam from Gmail's clusters. Most users won't get blocked mail, but Ars confirmed with MessageLabs that Gmail delivery delays are to be expected. Is Gmail destined to become another cesspool of spam?
Windows

Submission + - Windows 7 - What we know so far... (apcmag.com)

Anonymous Anti-Coward writes: "We're still in the long dark before 7's dawn, but the earliest signs are encouraging: a new streamlined kernel, an inbuilt VM for running old software, a revised and simplified UI... there's every chance that Microsoft intends Windows 7 to rise from the ashes of Vista and be what Mac OS X was for Apple.'

Vista was released on January 30 2007 at which time it became available to one and all.
Unfortunately for Microsoft, the number of people who bought Vista was much closer to 'one' than 'all'."

Microsoft

Microsoft Bought Sweden's ISO Vote on OOXML? 340

a_n_d_e_r_s writes "The vote on OOXML looked fairly secured. Most in the Working Group in Sweden was against the vote to approve OOXML. The day of the vote, though, more companies showed up at the door. Some 20 new companies — each one payed about $2500 to be allowed to vote — and vote they did ... for Microsoft. Most of the new companies were partners from Microsoft who suddenly out of the blue joined the Working Group, payed membership fees and voted yes for approval. From the OS2World story: 'The final result was 25 Yes, 6 No and 3 Abs and this would from the start be a done deal of saying No! Jonas Bosson who participated in today's meeting on behalf on FFII said that he left the meeting in protest and so did also IBM's Swedish local representative Johan Westman.'"

Armed Police Bots with Stun Guns 219

foniksonik writes "'On 28 June, Taser International of Arizona announced plans to equip robots with stun guns ... the new stun-capable robots could be used against civilians.' Non-lethal weapons experts are concerned that the robots will have to stun the suspected criminal for longer periods of time while awaiting human police to come make the official arrest. "If someone is severely punished by an autonomous robot, who are you going to take to a tribunal?" asks Steve Wright, a security expert at Leeds Metropolitan University, UK."
United States

DOJ Accidentally Gives Lawyer Wiretap Transcript 319

good soldier svejk writes "'It could be a scene from Kafka or Brazil. Imagine a government agency, in a bureaucratic foul-up, accidentally gives you a copy of a document marked "top secret." And it contains a log of some of your private phone calls. You read it and ponder it and wonder what it all means. Then, two months later, the FBI shows up at your door, demands the document back and orders you to forget you ever saw it.' That is what happened to Washington D.C. attorney Wendell Belew. His lawsuit takes on special significance given today's Sixth Circuit Court ruling that surveillance victims can only sue the DOJ if they can prove they were affected."
The Internet

Submission + - Owner of Rizon to serve time for DDOS attacks. (spamfighter.com)

An anonymous reader writes: A man from Kentucky is sentenced for prison after being convicted in Detroit of charges that he carried out attacks on computers numbering in thousands and cutting them off from the Internet, as per the news published by Crime-research on June 22, 2007.

Jason Michael Downey, 24 and belonging to Dry Ridge, Kentucky admitted having committed computer fraud in order to operate a botnet. When Downey was pleading guilty in the court, the information presented there served as evidence of Downey's ownership of the Rizon.net Internet Relay Chat (IRC) network from June 18, 2004 to September 5, 2004.

Downey infected large number of computers with various kinds of bot viruses after which the computers responded to Downey's commands. He built a network with about 6,000 computers he had infected.

Through the Internet Relay Chat network, Downey controlled and issued commands to the botnet to hurl a series of 'Denial of Service' (DoS) attacks on different kinds of computer systems connected to the Internet. The attacks overloaded the systems with network data and therefore could not operate properly.

Rizon themselves have not issued any statements regarding the charges, they can be found at http://www.rizon.net/

More of the story can be read at http://www.spamfighter.com/News-8671-Man-Pleads-Gu ilty-To-Cyber-Crime.htm

The full U.S. Department of Justice briefing and sentencing guidelines can be found at the following address.
http://www.usdoj.gov/usao/mie/press/2007/2007-6-20 _mdowney.pdf

The Internet

Submission + - 35 Different Ways of Looking at Social Networks (socialcomputingmagazine.com)

jg21 writes: Social Computing Magazine has just published a list of thirty-five perspectives on online social networking reflecting how protean and difficult to pin down the phenomenon is. It was compiled by Malene Charlotte Larsen, a PhD student at Aalborg University in Denmark, who has been doing research on Danish youngsters and online social networking. She ends with an open request for further perspectives.

[From the article "I must say that I certainly do not agree with all of the mentioned perspectives, but some of them do represent the opinions (or prejudices) I hear when I am out giving lectures to adults."]

Portables (Apple)

Will You Change Your Web Site For the iPhone? 336

An anonymous reader calls to our attention a blog post about the way the iPhone's multi-touch UI will strain the interface conventions of Web 2.0. This looming clash comes clearer as Apple releases more details of the iPhone's UI. Much has been made about the iPhone including Safari to provide a full web browsing experience. But this reader is wondering how compatible certain sites will be with the iPhone's input. From the post: "[Web 2.0-style interaction] makes somewhat heavy use of 'onmouse' events and cursor changes... along with CSS a:hover styles. The iPhone challenges those particular Web 2.0 conventions, though, because it is a device that not only adds support for another pointer, but at the same time eliminates them as interface objects... [T]he user doesn't get to express their attention with the iPhone... They only get to express their immediate action." This reader asks, "What other pitfalls lurk in the multi-touch web? Do any Slashdot readers plan to adjust their sites to ensure they work with the iPhone, and can you think of any similar issues that will crop up with such a different browsing experience?"
Google

Google Releases MySQL Enhancements 208

An anonymous reader noted that "Google has released its internally developed enhancements to MySQL to the open source community this week. Changes include improvements in replication, high availability configuration, and performance." It'll be interesting to see if the changes they made are of interest to other places using MySQL.
Censorship

Dodgey DMCA Use May Lead To 'YouTube Veto Power' 129

BillGatesLoveChild writes "Bob Cringely reports that an interview potentially embarrassing to Steve Jobs was taken off YouTube. The interview was from Cringely's 1990s show Triumph of the Nerds. YouTube said it responded to a DMCA complaint made by NBD Television Ltd in London. Trouble is, NBD is not the copyright holder. They have nothing at all to do with the show and don't even sell it. PBS, who made and holds the copyright said they knew nothing of the complaint. Cringely tried to contact NBD Television Ltd who wouldn't respond. Neither would Youtube, who only speaks by form letter. 'Why did NBD Television make the complaint? Why did YouTube blindly enforce it? Is Steve Jobs behind this, or is it just another media company misusing the DMCA, at that, not even with their own copyrighted material? Why should a London-based company be able to issue DMCA takedowns, yet not be liable when they abuse the law?'"
The Courts

Private File Sharing To Remain/Become legal In EU 147

orzetto writes "Italian newspapers are reporting that the European parliament's Commitee for Legal Affairs approved an amendment presented by EMP Nicola Zingaretti (PSE, IT), that makes piracy a felony—but only if a monetary profit is made. As in the EU parliament's press release: 'Members of the Legal Affairs' committee [...] decided that criminal sanctions should only apply to those infringements deliberately carried out to obtain a commercial advantage. Piracy committed by private users for personal, non-profit purposes are therefore also excluded.' The complete proposal was passed with 23 votes in favour, 3 against and 3 abstained, and is intended to be applied to copyright, trademark, design and other IP fields, but not patent right which is explicitly excluded. The proposal has still to pass the vote of the parliament before becoming law in all EU countries, some of which (like Italy) do have criminal laws in place for non-profit file sharing. A note: Most EU countries use civil law, not common law. Translation of legal terms may be misleading."
Google

Google Says "We're Not Doing a Mobile Phone" 105

thefickler writes "A top Google executive has denied outright that the company is developing a mobile phone. Last week rumors were flying after a Google official speaking in Spain said that the company was looking into offering a mobile phone; and British phone analyst Richard Windsor claimed that during CeBIT Google staff confirmed that a Google mobile phone was being developed. However, Alan Eustace, senior vice president of engineering and research, has now said 'We're not doing a mobile phone, I'd like to find something that is broader, rather than do yet another mobile device.'"

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...