Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment At least... (Score 3, Interesting) 579

it seems that the two clerks were big enough nerds to identify the weapon as a Batleth!

Unfortunately it seems that the robber was masked so they weren't able to tell if he was a swarmy Klingon.

Some great writing in the story: "The clerk did not give him any money and the suspect transported himself out of the store"

So the suspect ummm.. "left" the store? Oh wait... "transported himself", dude got beamed up!

Comment Don't think this is a big deal (Score 1) 301

I use twitter regularly and haven't seen this much.

Regardless, this is similar to stolen accounts being used to spam the message board on Myspace. Slightly annoying yes, but not a big deal because the user generally quickly reclaims their account.

Myspace also took a number of steps to cut down on this and warn users about links to outside domains and significantly reduced the problem.

I don't think this is that big of a deal on Twitter now and if it becomes one I believe it can be effectively combated.

On a side note, it'd be nice that when you notice that you are not logged in to Slashdot after writing a comment and click the 'log in' button on the comment box that it allowed you to log in without losing your comment

Windows

Submission + - It's official: Vista copy protection 100% cracked

Slinky Sausage writes: "There's been a steady stream of 'sort of' cracks for Vista coming out of the piracy groups, but a crack has been released this morning by "Pantheon" which is doesn't avoid Vista's activation — it exploits it! Apparently despite the requirements for everyone including volume licence customers to activate, Microsoft built in the capability for OEM system builders to pre-install copies of Vista without activating it over the internet. The crack works on any Acer, HP, Lenovo, Hewlett Packard or custom machine (as long as you have the BIOS of that machine available)."
The Internet

Submission + - Best & Worst Decisions Starting Internet Compa

markfletcher writes: "Today I launched a new site dedicated to helping Internet entrepreneurs, called Startupping. For the launch, I asked several successful entrepreneurs about lessons they learned starting and running Internet companies. The first set of replies includes responses from Paul Graham, John Battelle, Chris Pirillo, Ross Mayfield and Dick Costolo."
Businesses

Submission + - Does not having signed an NDA give any leverage?

An anonymous reader writes: For the past few months, I've worked with a startup developing a new technology that could be of interest to many different sectors when market ready. Despite the fact that the company is well funded, I have yet to be paid, and the issue will likely soon come to a head. Through a combination of circumstance and oversight, I also happen to be the only employee at the company who has not signed a non-disclosure agreement, despite having full access to the technology at hand. Does this give me any discernible leverage in getting the money that is owed to me?
Sun Microsystems

Submission + - Could Sun be the dot in web 2.0

oxide7 writes: "With the demand for computing power exploding among the distributors of media rich Internet content, some analysts believe Sun (Nasdaq: SUNW) is poised for a rebound in demand following five years in the wilderness. The most notable development, one analyst contends, its UltraSPARC T1 processor, with an architecture fit for tomorrow's "Web 2.0" Internet. "The T1 appears to align Sun perfectly with the needs of mega-scale computing companies whose mission is to deliver content, which is beginning to rapidly migrate from text to video," Wolf says. "These companies are likely to turn to suppliers who can provide sophisticated systems at competitive prices rather than companies focused simply on the assembly of generic boxes.""
Security

Submission + - Google Maps used to locate phishing victims

Damon Hastings writes: http://www.techworld.com/security/news/index.cfm?n ewsID=8077

Okay, the story here is that it is once again possible to download a trojan merely by visiting a web page. All articles I've found have unfortunately focused on a single exploit of this vulnerability, and thus the articles are nearly irrelevant. The vulnerability is what matters. If it isn't patched soon, you could see millions of infections from more creative exploits in the very near future. If any hacker is able to smuggle the trojan onto even a single major website, he could net millions of victims.

Does anyone know which vulnerability is being used? Or what browser(s) are affected? Is it just Internet Explorer 6? IE7? How long has Microsoft known about this vulnerability, and when will they fix it (or have they already?) I can't find any useful articles on the net — they're all just clones of this one.

The Google maps bit is of course completely irrelevant — the ability to map IP addresses to physical locations has been widely and publicly available since before Google existed. Google has no culpability here, despite the misleading reporting done by the major news agencies.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...