Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:sigh. (Score 1) 150

Well to be fair the PLATO system didn't modify their logo, they just added a "heart" to the top of the screen. Google actually makes custom logos.
A better example of prior art would be Blue's News
http://www.bluesnews.com/cgi-bin/logos.pl
As you we can see the first christmas logo was for 2000, a few months before google submitted their application.

Comment Re:Baen Books (Score 1) 304

How many people download mediocre top 40 music? A lot of people. Just because some cover band doesn't get downloaded doesn't mean people don't download thousands of albums just because.
I have a friend who has terabytes of music, do you honestly want to tell me he listens to all of it? I don't think he has enough years left in his life ;)

Comment Re:and we should also... (Score 1) 515

I don't know about other places but when I worked at a gas station with a Tim Hortons in it, I would always give a free coffee to the cops that showed up on the night shifts. The cops who patrolled this area knew it, and well it made me feel just a little bit safer.
Google

Google Bans Sale of Android Spying App 415

dbune writes "Google is not letting a handset application that spies on someone's text messages be sold at its Android App Store. The Secret SMS Replicator developed by DLP Mobile to help lovers find out if their partners are cheating on them violates company policy, according to Google. The app works by secretly duplicating incoming text messages and forwarding these to another mobile phone number."
Privacy

75% Use Same Password For Social Media & Email 278

wiredmikey writes "Over 250,000 user names, email addresses, and passwords used for social networking sites can easily be found online. A study of the data collected showed that 75 percent of social networking username and password samples collected online were identical to those used for email accounts. The password data was gathered from blogs, torrents, online collaboration services and other sources. It was found that 43 percent of the data was leaked from online collaboration tools while 21 percent of data was leaked from blog postings. Meanwhile, torrents and users of other social hubs were responsible for leaking 10 percent and 18 percent of user data respectively...."

Slashdot Top Deals

The number of UNIX installations has grown to 10, with more expected. -- The Unix Programmer's Manual, 2nd Edition, June 1972

Working...