Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Submission + - @spam: The Underground on 140 Characters or Less (imchris.org)

paleshadows writes: Is there a difference between email spam and Twitter spam (besides that it's shorter)? A research paper recently published in the ACM Conference on Computer & Communications Security finds: (1) that 8% of 25 million URLs posted to the Twitter site point to phishing, malware, and scams listed on popular blacklists; (2) that the accounts that send spam seem to originate from previously legitimate accounts that have been compromised and are now being puppeteered by spammers; (3) that Twitter s a highly successful platform for coercing users to visit spam pages, with a clickthrough rate of 0.13%, compared to much lower rates previously reported for email spam; (4) that the use of URL blacklists wouldn't help to significantly stem the spread of Twitter spam, allowing more than 90% of visitors to view a page before it becomes blacklisted; and that (5) even if blacklist delays were reduced, the use by spammers of URL-shortening services for obfuscation negates the potential gains unless tools that use blacklists develop more sophisticated spam filtering.
The Internet

Submission + - Algorithm Detects Sarcasm in Product Reviews (science.uva.nl) 1

paleshadows writes: An Israeli research team from the Hebrew University of Jerusalem has come up with a computer algorithm to identify when online reviewers of products are being sarcastic. The algorithm, called SASI (Semi-supervised Algorithm for Sarcasm Identification), was shown to recognize sarcasm with a 77% hit rate; the researchers suggest that it might be beneficial to include the results of such an algorithm in reviews' summary and ranking systems. The training of the algorithm was based on 66,000 Amazon product reviews that were categorized by 80 sarcastic patterns, factoring syntactic features like the length of sentences, the number question and exclamation marks, and number of capitalized words. (Examples include: "All the features you want — too bad they don't work!"; "Well, you know what happened. ALMOST NOTHING HAPPENED!!!" and "Silly me, the Kindle and the Sony eBook can't read these protected formats. Great!".) From the reviewed products, those most likely to draw sarcastic reviews were Shure and Sony noise cancellation earphones, Dan Brown's Da Vinci Code, and Amazon's Kindle. The researchers noted that "[t]he simpler a product is, the more sarcastic comments it gets if it fails to fill its single function — i.e. noise blocking/cancelling earphones that fail to block the noise". They further speculate that "one of the strong motivations for the use of sarcasm in online communities is the attempt to 'save' or 'enlighten' the crowds and compensate for undeserved hype". The algorithm and its evaluation are described in detail in this academic paper.

Submission + - XenClient: User Review (standalone-sysadmin.com)

Bandman writes: Last week was Synergy, and annual product annoucement / cheerleading session from Citrix. At Synergy, Citrix announced XenClient, the next logical step in the progression of desktop virtualization, namely a bare metal hypervisor designed to run on end-user laptops.

Blogger Matt Simmons grabbed a spare laptop and spent some time playing. He shared his thoughts (and pictures) of the process.

Comment Re:Other practises of bundling (Score 1) 220

Yes. Rules like this probably reflect the difficulty of the issue. And when Microsoft was under scrutiny in the US, they claimed that the "browser is an integral part of the operating system". I.e. they put technical reasons forward.

Except there was a bit of wool-pulling there: the html rendering and http components may have been integral to the OS, but removing the IE "front end" - which is what competes with Firefox, Opera et. al. - is a cinch.

But the decision is artificially constrained by the exclusivity of the deal. It's anti-competitive.

...but that's not a problem with OEM bundling per se. PCs have come with bundled operating systems since the year dot. If a particular OS producer says to PC manufacturers "we won't license our OS to you at a competitive price if you also offer bare PCs or competing OSs" then you're back to antitrust law. (IANAL but I'm pretty sure that's never been legal - the problem is getting it enforced!)

If they ever achieve monopoly, I bet we will see them arguing "MacOS is an integral part of the Apple computer".

Well, it is: Windows minus IE is still Windows; a Mac minus Mac OS is just a generic PC in a designer case.

However, if Apple wanted a Mac monopoly they'd probably have to unbundle somewhere along the line anyway in order to offer a comprehensive range of hardware choices: their current bundling strategy makes perfect sense for a niche premium-priced laptop, SFF & workstation market. Currently, they seem happy there.

There are still major restrictions such as the AppStore.

The AppStore may be restrictive, but its also bootstrapped a largely new arm of the software industry. Its certainly not very Free As In Speech but it seems to have given a lot of small developers easy access to a huge market. Anyway - I see the App store as a temporary measure while mobile internet connections evolve: once you have dependable, always on mobile internet, browser-based "cloud" applications make so much more sense. Currently, if I want to run my own software on an iPhone, the best bet is to write it in AJAX and host it on my home server (which probably means it will work on Android, Palm, Nokia...).

My solution is to use free software (i.e. GNU/Linux, Amarok, Okular, Gwenview, ...). This also allows you to be creative without getting taxed for it (e.g. LaTeX, Gimp, recordmydesktop, VIM, GCC, Ruby, ...).

Until the EU demands that linux distros have a choice screen... "Do you want VIM or EMACS?", "Do you want to use LaTeX, DocBook, nroff...", "OpenOffice or KOffice or ABiword", "Amarok or Rhythmbox", "PHP, Perl or Python..." :-)

(Yes, that's silly for all sorts of reasons, but be careful what you wish for because the EU and the DOJ are not particularly strong on common sense...)

Comment My top 4 (Score 5, Informative) 293

There are several very important books: 1. Effective Java - Joshua Bloch. This is by far the most important one. 2. Java, Concurrency in practice - Goetz 3. The art of multiprocessor programming - Herlihy and Shavit. This is much more theory oriented, but essential to become an excellent multithreaded programmer. 4. Java Puzzlers - Joshua Bloch and Neal Gafter. This is quite a fun book - lots of Java Conundrums Enjoy!

Comment Re:Summary is wrong; idea is worthless (Score 1) 88

How about all the other things that can be found in one's browser history, such as Google searches, or, say, one's own name on some websites, such as Facebook when viewing one's own profile?

I think you don't get it. The same-origin principle, enforced by all contemporary browsers, prevents sites from just querying the history. Thus, an arbitrary site is by no means able to just view the user's Google searches or Facebook profile from the browser's history, contrary to what you seem to suggest.

The problem is that it's very, very hard to truly enforce 100% of the same-origin principle. Some limited information might leak due to side channels. For example, an attacker can try to find out if the victim visited site X by attempting to retrieve X, timing how long it takes, and concluding whether or not X was retrieved from the browser's cache based on the response time; see, e.g., "timing attacks on web privacy" (which was BTW published 10 years ago). There are lots of other tricks unrelated to timing that an attacker can employ.

As far as I understand, the contribution of TFA is noticing that group membership information is nearly unique, per user, and (based on the aforesaid methods) suggesting practical ways to trick the browser into revealing this information.

Is this worthless?

Comment Re:Summary is wrong; idea is worthless (Score 1) 88

Not sure why you think it's worthless. Like you say, the paper shows that browser-history-stealing can be exploited in a new way, allowing any web site to uniquely identify those who actively participate in social networks. All people who fall under the latter category (presumably very many) are affected, and I imagine quite a few of them do not wish to be identified. So why is this worthless?

Comment Re:Do you have non anecdotal evidence? (Score 1) 907

and observe how, unfortunately, XP consistently outperforms Linux :(

I went through the first 10 entries which support both OS's and found 8 were exactly the same and two were longer under Windows XP. Is that what you call "Consistently outperforming"?

I take you know what they say about half truths. But just in case you're interested in the whole truth, then here it is:

Out of the 28 machines that are listed in http://event.asus.com/eeepc/comparison/eeepc_comparison.htm, there are exactly 22 that have both a Linux and XP configuration; the remaining 6 machines are either exclusively Linux, or exclusively XP, which means their battery life under the two OSes can't be compared.

From within the 22 machines that can be compared, 11 (=50%) have longer battery life under XP, and 11 have exactly the same battery life under both OSes.

So yes. This is what I call consistently outperforming.

Comment Article about the subject from Berkeley Law Prof (Score 3, Interesting) 144

Pamela Samuelson, a Professor at Berkeley (with a joint appointment in the School of Information and the School of Law) has written an interesting short article about the subject in the July 2009 issue of the Communication of the ACM, titled "Legally Speaking: The Dead Souls of the Google Booksearch Settlement". She argues that

In the short run, the Google Book Search settlement will unquestionably bring about greater access to books collected by major research libraries over the years. But it is very worrisome that this agreement, which was negotiated in secret by Google and a few lawyers working for the Authors Guild and AAP (who will, by the way, get up to $45.5 million in fees for their work on the settlement--more than all of the authors combined!), will create two complementary monopolies with exclusive rights over a research corpus of this magnitude. Monopolies are prone to engage in many abuses.

The Book Search agreement is not really a settlement of a dispute over whether scanning books to index them is fair use. It is a major restructuring of the book industry's future without meaningful government oversight. The market for digitized orphan books could be competitive, but will not be if this settlement is approved as is.

Comment Re:How about some nice menus instead? (Score 2, Informative) 617

It's disallowed by MS specifically for Office-like applications. (nothing else) I have always assumed that clause was added to gain a usability edge over OpenOffice. So this could be interesting. *grabs popcorn*

Here's what Wikipedia has to say about this "patent":

Mike Gunderloy, a former Microsoft developer left the company partially over his disagreement with the company's "sweeping land grab" including its attempt to patent the Ribbon interface. He refused to "contribut[e] to the eventual death of programming."[10] He states: "Microsoft itself represents a grave threat to the future of software development through its increasing inclination to stifle competition through legal shenanigans."[11] KDE developer Jarosaw Staniek[12] has expressed beliefs that the patent cannot be acquired due to the ambiguity of prior art.[12] As no patent has been acquired yet[update], they assert that anyone who has not signed the license can legally implement the concept in their applications without having to conform to Microsoft's requirements.[13] Microsoft will grant free licensing for all to implement the ribbon interface except for products competing directly with Microsoft Office programs.[14] If the design guidelines contain legal loopholes that give Microsoft a basis for future lawsuits against products exploiting this concept, those disenfranchised would not be able to inform others due to the non-disclosure agreement.[8]

KDE developer Jarosaw Staniek notes that the ribbon concept has historically appeared extensively as "tabbed toolbars" in applications such as Macromedia HomeSite, Dreamweaver and Borland Delphi.[12]

Data Storage

Submission + - Five years of PC storage performance compared

theraindog writes: PC storage has come a long way in the last few years. Perpendicular recording tech has fueled climbing capacities, 10k-RPM spindle speeds have migrated from SCSI to Serial ATA, Native Command Queuing has made mechanical drives smarter, and a burgeoning SSD market looks set to fundamentally change the industry. The Tech Report has taken a look back at the last four and a half years of PC storage solutions, probing the capacity and performance of a whopping 70 different notebook and desktop hard drives, SSDs, and exotic RAM disks. There's a lot of test data to digest, but the overall trends are easy to spot, potentially foretelling the future of PC storage.

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...