Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Safe tool/weapon (Score 1) 29

This anti-stab knife is horribly flawed. Sure, it is difficult to stab with it, but it looks unsafe. By unsafe, I mean, difficult to sharpen, difficult to chop and cut veggies and meat with. This will lead to injury. Loss of fingers. Etc. This sort of dangerous product is the sort of thing that should be kept off shelves, IMHO.

Graphics

ASUS Designs Monster Dual-GTX285 4GB Graphics Card 212

suraj.sun writes to mention that ASUS has just designed their own monster graphics card based on the GeForce GTX 295. While the card retains the GeForce GTX 295 name, same device ID, and remains compatible with existing NVIDIA drivers, ASUS has made a couple of modifications to call its own. "the company used two G200-350-B3 graphics processors, the same ones that make the GeForce GTX 285. The GPUs have all the 240 shader processors enabled, and also have the complete 512-bit GDDR3 memory interface enabled. This dual-PCB monstrosity holds 32 memory chips, and 4 GB of total memory (each GPU accesses 2 GB of it). Apart from these, each GPU system uses the same exact clock speeds as the GeForce GTX 285: 648/1476/2400 MHz (core/shader/memory)."

Comment Is this even practical? (Score 1) 379

Is detecting a bullet once fired even practical? A typical rifle bullet travels between approximately 700 m/s to 1000m/s.

Assuming a 1000 m/s bullet, like a 50BMG or 338LM, if a sniper is positioned 2km away, it will take 2 seconds for the round to reach the target. 1km, 1 second.

Problem is that most sniper engagements are not at extreme long ranges. Most occur between 275-550 meters. That means a quarter to a half a second.

That is not enough time to get out of the way of a typical bullet, even if your reaction is instantaneous.

Comment Re:Why is this news? (Score 1) 904

I agree that private individuals and corporations have a right to restrict what they want. But they have to play by the rules that we all agreed upon when we joined the site.

When you sign up, you have to agree to an acceptable use policy which bans "obscene, pornographic or sexually explicit" images.

So how exactly is a woman breast feeding obscene? It is not, of course, and I dare say that the Facebook owners ever intended for these photos to be banned.

But the way that Facebook censors interpret the rule is that is if there is any nipple showing, it gets deleted.

Clearly, management needs to rewrite the censors rule book to allow an exception for breast-feeding.

This has almost nothing to do with the first amendment, and more to do with a woman's "right to privacy" -- ie. the right to do what she wants with her body without prudes or religious nuts making it illegal.

Comment Let's try a better...wait, its legal! (Score 1) 609

Can the police put a beeper/tracker in a container which is sold to a suspect? Yes, according to United States v. Knotts, 460 U.S. 276 (1983) [ http://supreme.justia.com/us/460/276/index.html ] and United States v Karo, 468 U.S. 705 (1984) [ http://supreme.justia.com/us/468/705/index.html ].

Basically, a person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements.

NASA

Submission + - NASA's Mars Phoenix ready for Launch

StaffInfection writes: "After a one day delay in fueling of the Boeing Delta II-7925 (http://www.boeing.com/defense-space/space/delta/d elta2/delta2.htm) launch vehicle due to weather, the Phoenix Mars Scout Mission is prepared for launch on Saturday, August 4th, at 5:26 a.m. or 6:02 a.m EDT. The Mars Phoenix lander (http://phoenix.lpl.arizona.edu/mission.php) is a table for four — about the size of a modest dinner table. At Mars, it will soft land a suite of science instruments for studying the Martian Polar regolith. Phoenix is the rekindling of the Mars Surveyor Lander, twin to the ill-fated Mars Polar Lander (MPL, http://solarsystem.nasa.gov/missions/profile.cfm?M Code=MPL). The science payload will analyze the martian polar soil for water and mineral content and study the surrounding morphology and atmospheric conditions. The stationary lander includes an 8 foot robotic arm that will feed soil samples to miniaturized chemical laboratories (MECA,http://phoenix.lpl.arizona.edu/science_meca. php and TEGA, http://phoenix.lpl.arizona.edu/science_tega.php). Landing (animations at http://phoenix.lpl.arizona.edu/newsArchive.php?p=4 &y=2007) will be a Viking style soft landing rather than the air bag system used on the Mars Pathfinder and Rover missions. All missions to Mars are challenging but Phoenix represents a last chance to rectify for the loss of MPL and Mars Climate Orbiter in 1999. All three spacecraft share a common development lineage at Lockheed Martin, Denver. A successful landing will present our first visit to the Martian Polar environment. In the last ten years, American, European and Japanese Mars exploration has resulted in seven successful missions and four failures. Phoenix will be supported by a constellation of orbiters presently at Mars — Mars Reconnaissance Orbiter, Mars Express and Mars Odyssey, functioning as communication relays."
Businesses

In Australia, An Ebay Sale is a Sale 267

syousef writes "An eBay sale is a sale says an Australian New South Wales State Judge in a case where a man tried to reneg on the Ebay sale of a 1946 World War II Wirraway aircraft. The seller tried to weasel out of the deal because he'd received a separate offer $100,000 greater than the Ebay sale price. The buyer who had bid the reserve price of $150,000 at the last minute took him to court. 'It follows that, in my view, a binding contract was formed between the plaintiff and the defendant and that it should be specifically enforced,' Justice Rein said in his decision." I haven't found anything like this in previous discussions; have there been similar decisions like this handed down in the US, Canada, or Europe?
The Courts

Submission + - Germans reject file-sharing paranoia (arstechnica.com)

athloi writes: "German prosecutors have begun denying requests to force ISPs to identify the subscribers behind IP addresses, saying that the alleged file-sharing was a "petty offense." According to German-language Heise Online, the court said that the labels did not explain how a "criminally relevant damage" could have arisen from the alleged file-sharing. Unlike the US legal system, German law has no provision allowing for civil proceedings to obtain ISP subscriber info.

http://arstechnica.com/news.ars/post/20070802-file -sharing-is-a-petty-offense-say-german-prosecutors .html"

Announcements

Submission + - New York Jumps into Open Formats Fray (infoworld.com)

cyrusmack writes: "Hot on the heels of the bad news regarding the defeat of all open formats bills (erroneously reported by the mainstream media as "ODF" bills), New York has become the latest in an area that has seen a flurry of activity already this year. In the article on InfoWorld, it's pretty clear that this bill is significantly watered down from what other states have attempted to do this year. You can Microsoft will be there in force, just as it has been elsewhere."
The Courts

Submission + - Court Santions 'Anti-RIAA' Lawyer (com.com)

uolamer writes: "Last year, an attorney representing a woman sued by the Recording Industry Association of America claimed his client is innocent and asked a federal judge to levy sanctions against the association's lawyers.

Instead, in an unexpected legal twist, U.S. District Judge Terry Means ruled on May 16 that it was entirely likely that the woman was violating copyright law via the Kazaa file-sharing program — and ordered that her attorney be sanctioned for wasting the court's time with "frivolous" arguments.

CNET Story"

It's funny.  Laugh.

Sci-fi Writers Join War on Terror 793

yoyoq writes "Homeland Security is looking for suggestions from sci-fi writers. "Looking to prevent the next terrorist attack, the Homeland Security Department is tapping into the wild imaginations of a group of self-described "deviant" thinkers: science-fiction writers." Here's a suggestion: 9-11 could have been prevented with locks on the cockpit door."
Businesses

Submission + - Fired Employee Can Sue Company For Stolen Data

ubuwalker31 writes: Plaintiff Louis Thyroff was an insurance agent for defendant Nationwide Mutual Insurance Company. In 1988, the parties had entered into an Agent's Agreement that specified the terms of their business relationship. As part of the arrangement, Nationwide agreed to lease Thyroff computer hardware and software to facilitate the collection and transfer of customer information to Nationwide. In addition to the entry of business data, Thyroff also used the AOA system for personal e-mails, correspondence and other data storage that pertained to his customers. On a daily basis, Nationwide would automatically upload all of the information from Thyroff's AOA system, including Thryoff's personal data, to its centralized computers.

The Agent's Agreement was terminable at will and, in September 2000, Thyroff received a letter from Nationwide informing him that his contract as an exclusive agent had been cancelled. The next day, Nationwide repossessed its AOA system and denied Thyroff further access to the computers and all electronic records and data. Consequently, Thyroff was unable to retrieve his customer information and other personal information that was stored on the computers. Thyroff initiated an action for conversion (civil theft) against Nationwide Insurance in the United States District Court for the Western District of New York, alleging that Nationwide stole his business and personal information stored on the company's computer hard drives, which had been leased to him.

Shockingly, New York State's highest court ruled for the little guy, and agreed that an action for conversion could be pursued in Federal Court.

How will this effect corporate data policies and practices in the future? Do you think this legal ruling was correct?

Read the entire court opinion in Thyroff v. Nationwide

Submission + - ISPs willingly accepting abuse?

beh writes: Yesterday, at 2:30pm GMT someone started ssh scanning my servers — thanks to fail2ban, there's not much chance of anything happening there, but nevertheless, when I finally saw all the fail2ban messages about it 2 1/2 hours later, I reported the issue to theplanet.com, the provider from which the attack originated.

At first, there was no response apart from 'This is an auto-response'. A further 12 hours later, finally an answer "we will investigate", in the meantime, the attack continues.

By now, it has been 23 hours since the attack started, and over 20 since I reported it to the ISP; no further reaction, the ssh scans continue to come in from 70.87.55,194; and since the attack goes again all IP addresses of both of my servers, I can only assume it will go against the entire subnet of those servers (especially since a third server belonging to the same domain, with another ISP is not the target).

I've just had a quick online chat with their support desk, and all they tell me is "I can't do anything about it; my hands are tied. Mail the abuse desk again, but please note, the investigation and actions from it can take between 24 and 72hours.".

My question now is this — when does an ISP become an accomplice to an attacker, by willingly leaving him to continue to attack other systems, even though the provider knows full well about what's going on?

Where are the rights of those people that are on the receiving end of those attacks — I can hardly 'take my business elsewhere', since I'm not a customer of theplanet.com... For the moment, I'm 'happy' with the attacks to continue, as the attacker seems to be using dictionary based attacks and hasn't hit on any accounts that could be vulnerable; but obviously, I can't say how safe other systems on the same subnets, or on other subnets that are being attacked might be. Leaving this unchallenged for 24-72 hours seems a sure-fire way to exacerbate the problem, as any additional host someone might be able to break into, will only make future attacks worse.

So, what can/should be done?

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...