Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Whatever Speed I Want (Score 2) 717

in germany that's actually quite normal. germany has no speed limit on highways. austria (where i live) f.ex. does but if you're a little careful you don't have to care too much about it. i usually go about 110 mph on highways and the most i ever got was a 125 euro fine.

Businesses

Submission + - 439 Fewer Ways to Hate Bank of America

theodp writes: Haters of Bank of America and CEO Brian Moynihan now have 439 fewer ways to express their disdain for the bank. In recent days, at least 439 domain names that are critical of BofA’s top officials were taken off the market. The registrations of the domain names, which include imaginative swipes at the bank's CEO, such as BrianMoynihanBlows.com and BrianTMoynihanSucks.net, will stop BofA-haters from slamming the bank's top execs and directors with a couple of very specific pejoratives. Companies have made it a practice to scoop up negative web addresses that might be used by disgruntled customers, but this domain name buy is unusual in that it focuses on BofA's directors and corporate officers rather than the corporate brand. In other BofA news, a cloud of suspense surrounds Bank of America and WikiLeaks amidst speculation that BofA may be the next target of Julian Assange.
Security

Submission + - d0z.me: The Evil URL Shortener (spareclockcycles.org)

supernothing writes: DDoS attacks seem to be in vogue today, especially considering the skirmishes over Wikileaks in the past few weeks. The size of a DDoS attacks, however, has historically been limited by how many computers one has managed to recruit into a botnet. These botnets almost universally require code to be executed on the participants' local systems, whether they be willing or unwilling. A new approach has been emerging recently, however, which uses some simple Javascript to achieve similar ends. d0z.me is a new service that utilizes these techniques, but provides a unique twist on the idea. Posing as a legitimate URL shortening service, it serves users the requested pages in an iframe, while simultaneously participating in a DDoS attack in the background. No interaction is required beyond clicking the link and staying on the page. This makes it relatively trivial to quickly mount large scale DDoS attacks, and affords willing participants plausible deniability in the assault. Full writeup here.

Submission + - Giving a Netbook to a 4yr old. What to load on it? 2

nostrodecus writes: I have a nephew who is very young, but who has the techie gene — he found the Gruffalo on youtube before anyone knew he could spell. Now he's almost 4, and I was thinking of giving him my netbook (Acer running XP), which i hardly use any more. So of course I will be deleting all the porn, but what should I load up on it? Are there tools/apps that I can load up on it to protect it and him from things he shouldn't see until college? Also, what apps or games could I load on it that a 4 year old will get some use out of?
Novell

Submission + - Groklaw: Its "Like Selling Your Baby toaPedophile" (groklaw.net)

Xenographic writes: PJ has put up her analysis of the Novell acquisition and she refuses to mince words, saying that 'selling any patents to Microsoft is like selling your baby to a pedophile'. Less hyperbolically, she has found that some language in Novell's 8k, 'indicates to me that the consortium sees some relationship between the value of the patent sale and the merger with Attachmate.' Fortunately, 'Novell has released Linux under [the GPL] for some time, and so it provides Linux the only patent protection that Novell couldn't sell.'

Editors: Please fix that headline. There wasn't enough space.

Movies

HDCP Master Key Is Legitimate; Blu-ray Is Cracked 1066

adeelarshad82 writes "Intel has confirmed that the leaked HDCP master key protecting millions of Blu-ray discs and devices that was posted to the Web this week is legitimate. The disclosure means, in effect, that all Blu-ray discs can now be unlocked and copied. HDCP (High Definition Content Protection), which was created by Intel and is administered by Digital Content Protection LLP, is the content encryption scheme that protects data, typically movies, as they pass across a DVI or an HDMI cable. According to an Intel official, the most likely scenario for a hacker would be to create a computer chip with the master key embedded it, that could be used to decode Blu-ray discs."

Submission + - Vista update alleged to brick Advent laptops in UK (adventsupport.com)

An anonymous reader writes: We have an Advent 6411 here that appears to have been bricked by a Vista update applied yesterday, lots of other people also have these problems with Advent laptops of similar specifications. Given that these motherboards are probably used in other brands of laptop this will impact others.

In the UK owners of bricks appear to be covered by the sale of goods act 1979 others may not be so fortunate.

Submission + - Uk.gov responds to IE6 petition (hmg.gov.uk)

toomanyairmiles writes: The UK government has responded to a petition, signed by over 6000 people asking it to upgrade away from IE6 as follows:-

" In response to the concerns of many people regarding the security of Internet Explorer 6 and the use of this software by Government Departments the Cabinet Office can confirm that the Government takes internet security very seriously. This has been reflected in recent changes to the Information Security and Assurance team and the Office of Cyber Security within the Cabinet Office which are in the process of merging together to lead a joined-up approach to information assurance and cyber security strategy and policy.

Complex software will always have vulnerabilities and motivated adversaries will always work to discover and take advantage of them. There is no evidence that upgrading away from the latest fully patched versions of Internet Explorer to other browsers will make users more secure. Regular software patching and updating will help defend against the latest threats. The Government continues to work with Microsoft and other internet browser suppliers to understand the security of the products used by HMG, including Internet Explorer and we welcome the work that Microsoft are continuing do on delivering security solutions which are deployed as quickly as possible to all Internet Explorer users.

Each Department is responsible for managing the risks to its IT systems based on Government Information Assurance policy and technical advice from CESG, the National Technical Authority for Information Assurance. Part of this advice is that regular software patching and updating will help defend against the latest threats. It is for individual departments to make the decision on how best to manage the risk based on this clear guidance. Public sector organisations are free to identify software that supports their business needs as long as it adheres to appropriate standards. Also, the cost-effectiveness of system upgrade depends on the circumstances of the individual department’s requirements.

It is not straightforward for HMG departments to upgrade IE versions on their systems. Upgrading these systems to IE8 can be a very large operation, taking weeks to test and roll out to all users. To test all the web applications currently used by HMG departments can take months at significant potential cost to the taxpayer. It is therefore more cost effective in many cases to continue to use IE6 and rely on other measures, such as firewalls and malware scanning software, to further protect public sector internet users.
"

Submission + - Prosecuting DDOS attacls 1

dptalia writes: We all have heard of major DDOS attacks taking down countries, companies, and organizations. But how many of them are ever prosecuted? And how many prosecutions are even successful?

I've done some research and it appears the answer is very few (Well duh!). And those that are successfully prosecuted tend to have teenagers as the instigators. Does this mean DDOS is a fairly safe crime to conduct? Are the repercussions nonexistent?

Does anyone have some knowledge an insight into this that I don't have? How would you go about prosecuting a DDOS attacker? As this becomes tool in the political toolbox of countries and organizations this becomes more important. So I need your help. What's your experience with getting the responsible parties to justice?
Google

Submission + - Pedestrian Follows Google Map, Gets Run Over, Sues 1

Hugh Pickens writes: "The Toronto Star reports that a Utah woman is suing Google for more than $100,000 in damages, claiming its maps function gave her walking directions that led her onto a major highway, where she was struck by a car. Lauren Rosenberg sought directions between two addresses in Utah about 3 kilometers apart and the top result suggested that Rosenberg follow a busy rural highway for several hundred meters. The highway did not have sidewalks or any other pedestrian-friendly amenities, and Rosenberg was struck by a car. Rosenberg filed suit against both the driver of the car that struck her and Google, claiming both carried responsibility in her injury and her lawyers claim that Google is liable because it did not warn her that the route would not offer a safe place for a pedestrian to walk. Google has pointed out that the directions Rosenberg sought come with a warning of caution for pedestrians but Rosenberg claims that she accessed the Maps function on her Blackberry mobile device, where it did not include the warning. Danny Sullivan notes on Search Engine Land that despite getting bad directions from Google (or a gas station attendant, a local person or any source), people are also expected to use common sense. "So when you come to an intersection like this (photo at bottom of page), as Rosenberg would have come to before crossing onto the highway," writes Sullivan. "You might be expected to consider for yourself whether it is safe to continue.""
Piracy

Warner Bros. Accused of Pirating Anti-Pirating Tech 228

psycho12345 writes "German firm Medien Patent Verwaltung claims that in 2003, it revealed a new kind of anti-piracy technology to Warner Bros. that marks films with specific codes so pirated copies can be traced back to their theaters of origin. But like a great, hilariously ironic DRM Ouroborus, the company claims that Warner began using the system throughout Europe in 2004 but hasn't actually paid a dime for it."

Slashdot Top Deals

We are not a clone.

Working...