Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Programming

Submission + - BSD coders caught stealing Linux code

sproketboy writes: The inquirer has a piece about some Broadcom driver code that was apparently copied into BSD using their license in violation of the GPL. The thread is here. Flame on.
Censorship

Submission + - Turkish Assembly Votes Censoring of Web sites

unity100 writes: "Cnn has some piece of news about recent a development in turkey, where turkish assembly, totally in lieu with turkey's commitment to european union membership and european ideals, have voted to have sites that "insult" Turkish Republic founder M.Kemal Ataturk censored from entire Turkish population.

http://www.cnn.com/2007/TECH/internet/04/06/turkey .youtube.ap/index.html"
Programming

Submission + - Natural language Javascript events

psydeshow writes: "We're in the middle of an amazing Javascript renaissance right now. Unbelievable magic happening, like Ryan Johnson's Event.Behavior.

"A domain specific language for defining events in your JavaScript applications. It approximates how one would describe an event in the english language and allows you to extend it with your own verbs, conditions and events."
So you can write stuff like "show('state_field').when('country').is('United States');", instead of fooling around with connecting and listening and callbacks. Nice!"
Security

Submission + - Vista Protected Processes DRM broken

W2k writes: "It's a well-known fact that Microsoft's Windows Vista operating system contains DRM features, intended to keep a user from manipulating protected digital content that passes through his system. One core part of the DRM in Vista is Protected Processes. In short, a protected process is given special privileges by the operating system to keep other processes from accessing its memory or injecting their own code into its execution path. For example, running a media player as a protected process would make it theoretically impossible for a hacker to read encryption keys for DRM:ed content from its memory space. Well, not any longer. ReactOS developer and well-known kernel hacker Alex Ionescu has published on his blog a tool that can protect or unprotect any process, no questions asked. Screenshots of the tool in action are provided, but no source code."
GNU is Not Unix

Submission + - OpenBSD in a GPL violation?

Yenya writes: "In a message sent to OpenBSD developers as well as the linux-wireless and bcm43xx-devel lists, Michael Buesch, the main developer of the Linux bcm43xx driver for Broadcom WiFi devices, wrote:

[...]We believe that you might have directly copied code out of bcm43xx (licensed under GPL v2), without our explicit permission, into bcw (licensed under BSD license). There are implementation details in bcm43xx that appear exactly the same in bcw. These implementation details clearly don't come from the open specifications at bcm-specs.sipsolutions.net or bcm-v4.sipsolutions.net.
The bcm43xx driver is being developed as a clean room design, based on the reverse-enginered specs, created by another team. As it seems now, the bcw driver in question might just be removed from the OpenBSD source."
Security

.ANI Vulnerability Patch Breaks Applications 164

Jud writes "Microsoft's fix for the .ANI vulnerability was part of Patch Tuesday yesterday. However, all is not well with the update. Reportedly, installing the patch will break applications such as Realtek HD Audio Control Panel and CD-Tag, which mentions they are affected by the problem on their main page. A hotfix is currently available from Microsoft, however their current position is this is an isolated problem and the fix is not planned to be pushed out through Microsoft Update. "
Security

VBootkit Bypasses Vista's Code Signing 210

An anonymous reader writes "At the Black Hat Conference in Amsterdam, security experts from India demonstrated a special boot loader that gets around Vista's code-signing mechanisms. Indian security experts Nitin and Vipin Kumar of NV labs have developed a program called the VBootkit that launches from a CD and boots Vista, making on-the-fly changes in memory and in files being read. In a demonstration, the 'boot kit' managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista, even without a Microsoft signature. The demo was run on Vista RC2. The researchers say the only reason they didn't do it on Vista final was cost. Schneier blogged the exploit."
Businesses

Submission + - Verizon Adds 5GB Limit to Unlimited Data Plan

Jason writes: "For years there have been stories about people getting their unlimited Verizon accounts terminated because of excessive data usage, but Verizon never explicitly said that there is a limit. Now if you dive a into the terms of the Unlimited Data Service plan they have put a section in that specifically states that anything over 5GB of data usage in a one month period is considered abnormal. Since when does 5GB per month equal unlimited? Does Verizon need to hire some new mathematicians?"
Windows

Microsoft Sued Over Vista Marketing 556

daviddennis writes "According to the Seattle Post-Intelligencer, a lawsuit alleges that Microsoft engaged in deceptive practices by letting PC makers promote hardware as 'Windows Vista Capable' even though they knew it could not run most of Vista's widely-promoted features. Microsoft responds by saying that the differences have been promoted with one of the most extensive marketing pushes in company history. 'In sum, Microsoft engaged in bait and switch -- assuring consumers they were purchasing Vista Capable machines when, in fact, they could obtain only a stripped-down operating system lacking the functionality and features that Microsoft advertised as Vista ... As a result, the suit said, people were buying machines that couldn't run the real Vista.'"
Input Devices

Hacking Our Five Senses 232

zdude255 writes "Wired is running an article exploring several studies of giving the human brain 'new input devices.' From seeing with your sense of touch to entirely new senses such as sensing direction intuitively, the human brain seems to be capable of interpreting and using new data on the fly. This offers many applications from pilots being able to sense the plane's orientation to the potential recovery of patients with blindness or ear damage. (which helps balance).'It turns out that the tricky bit isn't the sensing. The world is full of gadgets that detect things humans cannot. The hard part is processing the input. Neuroscientists don't know enough about how the brain interprets data. The science of plugging things directly into the brain -- artificial retinas or cochlear implants -- remains primitive. So here's the solution: Figure out how to change the sensory data you want -- the electromagnetic fields, the ultrasound, the infrared -- into something that the human brain is already wired to accept, like touch or sight.'"
Slashdot.org

Submission + - What should I ask Slashdot?

TodMinuit writes: "Dearest Slashdot: Recently, I've wanted to ask Slashdot something. Unable to come up with a question myself, I thought who better to ask what I should ask Slashdot than Slashdot itself? Surely the very people answering the question are quite capable of coming up with one. So, Slashdot, what should I ask Slashdot?"
Microsoft

Submission + - Microsoft Performs Illegal Operation, Shuts Down

mail.app writes: Microsoft Performs Illegal Operation, Shuts Down Microsoft Corp. issued a surprise press release this morning announcing that the company had "performed an illegal operation and would be shut down." Company executives refused to provide further information regarding the cause of the unexpected shutdown, only issuing a cryptic error number of $00038FF577 and advising all interested parties to "contact their system administrator."
Mozilla

Submission + - Firefox No Longer Alternative Enough

Kelson writes: "The Alternative Browser Alliance, which promotes the use of alternative browsers over Internet Explorer, has stopped promoting Firefox after nearly two years. According to the announcement, Firefox has sold out, gone mainstream, and "is no longer an alternative web browser."

Reportedly the site will throw its weight behind iCab, as it is guaranteed to remain alternative since it will never run on Windows Vista.""
Microsoft

Windows Vulnerability in Animated Cursor Handling 338

MoreDruid writes "Secunia reports a vulnerability in Windows Animated Cursor Handling. According to the linked article, the rating is "extremely critical". Microsoft has put up their own advisory on the subject, confirming this is a vulnerability that affects Windows 2000, XP, 2003 and Vista. The exploit has already been used in the wild. From the Secunia page: The vulnerability is caused due to an unspecified error in the handling of animated cursors and can e.g. be exploited by tricking a user into visiting a malicious website using Internet Explorer or opening a malicious e-mail message. Successful exploitation allows execution of arbitrary code."

Slashdot Top Deals

Money will say more in one moment than the most eloquent lover can in years.

Working...