Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Censorship

Submission + - Graphic Artists Condemn UK Ban on Erotic Comics

mdwh2 writes: Graphic artists, publishers and MPs have condemned the UK's Coroners and Justice Bill, which will criminalise possession of sexual depictions that appear to show someone under 18 (the age of consent is 16 in the UK), as well as adults where the "predominant impression conveyed" is of someone under 18, and even if they are merely drawn as being present whilst sexual activity took place between adults. The definitions could include Lost Girls, Watchmen, and South Park. The Comic Book Alliance has launched a Petition against the law.
United States

Journal Journal: And who wants to force you to buy insurance? 6

Who else? Hillary's golden goose. And this is another payment to her for dropping the nomination attempt. Makes me think she's actually the acting president. And why do they want it? For the benefit of the market, of course. It's certainly not for any of ours. I suppose the Wall Street guys are drooling over this. More free government money, only this time it comes straight from

New Gadget Blocks 'Spam' Phone Calls 274

Smivs writes "The BBC report on a new gizmo that can block/filter spam phone calls. The system basically intercepts all calls. If it recognizes them as a friend or a member of the user's family — numbers on the so-called star list created by the user — it lets them through as normal. If the caller's number is on a zap list — numbers of telemarketers or other nuisance callers — the device answers it, and all future calls from that number, with an automated message which means the phone does not ring at all. If the system doesn't recognize the caller's number, or the caller withholds their number, it asks them who they are, puts them on hold and then rings the user's phone. The user has the option of taking the call, having the system take a message, or they can reject the call and add the number to the 'zap' list. Users can add callers to their 'star' list by pressing the star button on their phone at any point during a call." So wait, they can't spam me twice? If I press a button? And if they actually show their phone number on my caller ID? What about the auto insurance scammers that hit me 10x/week?
Moon

Indian Moon Mission Launched 305

hackerdownunder writes "India's maiden lunar mission (Chandrayaan-1) got off to a flying start today. Describing the launch as 'perfect and precise,' the chairman of the Indian Space Research Organization (ISRO), G Madhavan Nair, said that it would be 14 days before the satellite would enter into lunar orbit. Chandrayaan carries eleven payloads: five designed and developed in India, three from the European Space Agency, one from Bulgaria and two from NASA."
Security

Damning Report On Sequoia E-Voting Machine Security 200

TechDirt notes the publication of the New Jersey voting machine study, the attempted suppression of which we have been discussing for a while now. The paper that the Princeton and Lehigh University researchers are releasing, as permitted by the Court, is "the same as the Court's redacted version, but with a few introductory paragraphs about the court case, Gusciora v. Corzine." What's new is the release of a 90-minute evidentiary video — the researchers have asked the court for permission to release a shorter version that hits the high points, as the high-res video is about 1 GB in size. See TechDirt's article for the report's executive summary listing eight ways the AVC Advantage 9.00 voting machine can be subverted.
Games

MUDs Turn 30 Years Old 238

Massively points out that today marks the 30th anniversary of the first Multi-User Dungeon (MUD) going live at Essex University in the UK. The game, referred to as MUD1, was created by Roy Trubshaw. Richard Bartle, a man who also worked on the game as a student at Essex, has a post discussing the milestone and talking about how MUDs relate to modern MMOs. What MUDs did you play?
Communications

Handling Caller ID Spoofing? 556

An anonymous reader writes "A nice little old lady I know has had her number spoofed by some car warranty scammers. They're calling hundreds of potential victims per day pretending to use her phone number, and the angry ones call her back; some of them have even left death threats. She's terrified. Some well-intending anti-telemarketing folks have posted her address on the 'net as well. How can we figure out where these scammer bastards are, and what's the state of the current legislation to prevent caller ID spoofing? I called the FBI in Boston (near where she lives) and they said they can't help. She's called her phone company, but they said they can't help either. She's had the same number for over 50 years and doesn't want to change it." If the Feds can't or won't handle it, what's the best approach here?
Linux Business

Red Hat CEO Says Economic Crisis Favors Open Source 191

arashtamere writes "Red Hat president and CEO Jim Whitehurst predicts the enterprise open source software business will emerge from the economic crisis stronger than the proprietary market. 'I've had a couple of conversations with CIOs who said, "We're a Microsoft shop and we don't use any open source whatsoever, but we're already getting pressure to reduce our operating costs and we need you to help put together a plan for us to... use open source to reduce our costs." And we've had other customers literally looking at ripping and replacing WebLogic or WebSphere for JBoss ... I think we'll know in about six to nine months but there is no question that open source will come out of this in relatively better shape than our proprietary competitors,' he told Computerworld."
Books

Submission + - SPAM: Online cartoonist breaks publishing record?

destinyland writes: "The first collection of "Perry Bible Fellowship" comics racked up pre-sales of $300,000 due to its huge online following, and within seven weeks required a third printing. Ironically, the 25-year-old cartoonist speculates people would rather read his arty comics in a book than on a computer screen, and warns that "There's something wonderful, and soon-to-be mythic, about the printed page..." He also explains the strange anti-censorship crusade in high school that earned him an FBI record!"
Link to Original Source
Education

Submission + - Danish IT company certifies people with autism (computerworld.com.au)

An anonymous reader writes: People with autism rarely have diplomas. Many lack the piece of paper showing that they have finalized school because exams are too much of an obstacle. This can limits their career opportunities, and many never get a job because their handicap requires different settings than most workplaces offer. Fortunately, there is an IT company called Specialisterne. This is Danish for "The Specialists." With few exceptions, the company only employs people who are normally not seen in Danish workplaces. Three out of four employees have ASD. Most have Asperger's Syndrome, which is a mild type of autism but a neutral incurable handicap. Last week, the first three software testers were ISEB test certified, and according to Thorkil Sonne, founder and CEO of Specialisterne, the plan is for all employees to be certified within the areas where it is possible to achieve internationally recognized proficiency diplomas and certificates.
Data Storage

Submission + - GamingShogun IronKey USB Flash Drive Review (gamingshogun.com)

JPax writes: "The Good: Great security features, installed apps are good, and its read-speed is excellent.
The Bad: Write-speed is not as fast as we would like when transferring multiple small files.Packaging
A dignified black box with a very stable foam core keeps the IronKey from jostling about during shipping. The instructional booklet summarizes important information such as the self-destruct feature...yup, you heard me right but more on that later.

Manufacturing
The IronKey features a tamperproof and waterproof metal case. Besides exuding security in it's Spartan design, it is also the sexiest USB drive we have ever seen.

Installation
Upon inserting the IronKey the first time, it asks you to initialize it by entering its name and the password that will be used to access the key. It offers you to backup your password online just in case of emergencies and then begins creating the AES encryption keys and formatting the secure volume of the drive. Then it asks you to activate the key drive. The online activation process is, of course, done over a secure site and asks you the standard registration questions in addition to some very customizable and personal secret questions you can choose from. Also, you chose a secret phrase that will help protect you from ending up on a site pretending to be the IronKey website.

Usage
Usage is like any other key drive, with the exception of entering your IronKey's password upon insertion to unlock it for use. The IronKey Control Panel is very user-friendly and easy to use.

Features
One of the most interesting features of the IronKey is that upon entering an invalid password 10 times, the drive 'self-destructs', permanently erasing all data and rendering the drive useless. Literally useless, in that, it no longer works. If you backed your data up online you can restore the uploaded data to a new IronKey drive which is nice. There is also the ability to run mobile applications such as Firefox from the drive. In the case of Firefox, the drive uses 'Secure Sessions' to keep your internet traffic encrypted while browsing. IronKey's 'Secure Sessions Service' sends your web traffic through multiple network routing servers before decrypting it on an IronKey server and sending it to the destination site. This makes it virtually impossible to track who is going where or correlate your surfing to your computer. The IronKey will also store usernames and passwords for frequently visited websites using its very strong AES encryption algorithms. According to the manufacturer's site, the IronKey can detect being scanned by an electron microscope and will subsequently self-destruct. The IronKey will also self-destruct if it detects physical attacks as all chips are protected with a thin metal shield.

Benchmarks
We benchmarked the drive on our AMD X2 6000+ machine with 2GB of RAM in a Windows XP Pro environment using HD Tach Ver 3.0.4.0 and received a steady read speed of 25Mb/sec in a 'real-world test' with multiple programs running in the background — very impressive! We began copying a large, 600Mb file over to the drive and recorded speeds of roughly 14Mb/sec (again in our real-world test environment). While copying a number of smaller files, the write speed fluctuated slightly (as expected with multiple start-stops).

Conclusion
For the number of security features this drive has to offer, coupled with its respectable speeds and sleek styling, the drive is well worth it's price tag (which is average when compared to others in this category) we highly recommend it for your secure mobile data needs."

IBM

Submission + - IBM Seeking 'Patent-Protection-Racket' Patent 2

theodp writes: "Wikipedia defines a protection racket as an extortion scheme whereby a powerful non-governmental organization coerces businesses to pay protection money which allegedly serves to purchase the organization's 'protection' services against various external threats. Compare this to IBM's just-published patent application for 'Extracting Value from a Portfolio of Assets', which describes a process by which 'very large corporations' impress upon smaller businesses that paying for 'the protection of a large defensive patent portfolio' would be 'a prudent business decision' for them to make, 'just like purchasing a fire insurance policy.' Sounds like Fat Tony's been to Law School, eh? Time for IBM to put-their-money-where-their-patent-reform-mouth-is and deep-six this business method patent claim!"
PC Games (Games)

Submission + - Second Life to be Evangelized

Edis Krad writes: Among the many changes Second Life has been experiencing lately (such as the banning of gambling), it will now undergo a spiritual transformation. Going to distant, uncharted lands to spread the knowledge of Christianity has always been the way of the Jesuits, which have given its missionaries an aura of adventurers. This time, however, instead of going deep into the jungles of Africa or the far lands of China, missionaries will face the 'risqué' lands of Second Life. From the article:

"This virtual Second Life is becoming populated with churches, mosques, temples, cathedrals. synagogues, places of prayer of all kinds. And behind an avatar there is a man or a woman, perhaps searching for God and faith, perhaps with very strong spiritual needs."
Does this mean I will be now able to attend church from my living-room in my underwear?
Space

Submission + - New carbon-based paper stronger than nanotubes (sciencemag.org)

LynnwoodRooster writes: "Science Magazine reports that a group from Northwestern University in Illinois has a new process for creating carbon-based paper that's stronger than nanotubes, and incredibly easy to use to make sheets of any desired sizes. Huge implications for aircraft, automobiles, and the ever-sought-after space elevator? Forget that, I want to make some new speaker cones with this technology..."
Security

Submission + - VMWare Escape Publicized at SANSfire 2007 (foolmoon.net)

FoolMoon writes: "Anyone in the know on VMware security knows that Ed Skoudis, Tom Liston and "crew" from Intelguardians (and some close researchers) have been researching VMware escapes for the last couple years for an US government customer. At SANSfire 2006, they presented some of this research to include how malware might detect the fact it was running under virtualization and hinted that there were possible exploits. Tonight at SANSfire 2007 some of these were revealed and the world saw the first public display of this capability. My blog represents my takeaway from this presentation given. As the presentation is not expected to be made publicly available, my notes may be of interest to anyone not in attendance. Any errors and misstatements in this are my own. — Monty McDougal For the complete blog entry visit http://www.foolmoon.net/cgi-bin/blog/index.cgi?mod e=viewone&blog=1185593255"

Slashdot Top Deals

One way to make your old car run better is to look up the price of a new model.

Working...