Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking

Bell's Own Data Exposes P2P As a Red Herring 261

dougplanet writes with news from the Canadian-throttling front: "As ordered by the CRTC, Bell has released (some) of its data on how torrents and P2P in general are affecting its network. Even though there's not much data to go on, it's pretty clear that P2P isn't the crushing concern. Over the two-month period prior to their throttling, they had congestion on a whopping 2.6 and 5.2 per cent of their network links. They don't even explain whether this is a range of sustained congestion, or peaks amongst valleys."
The Courts

Supreme Court Holds Right to Bear Arms Applies to Individuals 2221

Now.Imperfect writes "In its last day of session, the Supreme Court has definitively clarified the meaning of the Second Amendment. The confusion is whether the Second Amendment allows merely for the existence of a state militia, or the private ownership of guns. This ruling is in response to a case regarding the 32-year-old Washington DC ban on guns." This is one of the most-watched Supreme Court cases in a long time, and Wikipedia's page on the case gives a good overview; the actual text of the decision (PDF) runs to 157 pages, but the holding is summarized in the first three. There are certainly other aspects of the Second Amendment left unaddressed, however, so you can't go straight to the store for a recently made automatic rifle.
The Internet

Submission + - SPAM: Researchers tout new-fangled network worm weapon

coondoggie writes: "Can Internet worms be thwarted within minutes of their infection? Researchers at Ohio State University say they can and they have the method to prove it. The key, researchers found, is for software to monitor the number of scans that machines on a network send out. When a machine starts sending out too many scans — a sign that it has been infected — administrators should take it off line and check it for viruses. In a nutshell, the researchers developed National Science Foundation funded a model that calculated the probability that a virus would spread, depending on the maximum number of scans allowed before a machine was taken off line."The difficulty was figuring out how many scans were too many," researchers said. [spam URL stripped]"
Link to Original Source

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...