Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Caldera

SCO Asks Judge To Give Them the Unix Copyright 286

Raul654 writes "In March, the jury in the Novell/SCO case found that Novell owns the copyright to Unix. Now, SCO's lawyers have asked judge Ted Stewart to order Novell to turn over the Unix copyright to them. 'SCO contends the jury did not answer the specific issue before Stewart that involves a legal principle called "specific performance," under which a party can ask a court to order another party to fulfill an aspect of an agreement.'" Over at Groklaw, PJ is deep into a community project to annotate SCO's filing. It's for the benefit of future historians, but it makes amusing reading now.
Security

What Free Antivirus Do You Install On Windows? 896

Techman83 writes "After years of changing between AVG Free + Avast, it's coming time to find a new free alternative for friends/relatives who run Windows. AVG and Avast have been quite good, but are starting to bloat out in size, and also becoming very misleading. Avast recently auto updated from 4.8 to 5 and now requires you to register (even for the free version) and both are making it harder to actually find the free version. Is this the end of reasonable free antivirus, or is there another product I can entrust to keep the 'my computer's doing weird things' calls to a minimum?"
Privacy

China's Human Flesh Search Engine 248

Hugh Pickens writes "The NY Times has an interesting article about Human-flesh search engines — renrou sousuo yinqing — that have become a phenomenon in China: they are a form of online vigilante justice in which Internet users hunt down and punish people who have attracted their wrath. The goal is to get the targets of a search fired from their jobs, shamed in front of their neighbors, or run out of town. It's crowd-sourced detective work, pursued online — with offline results. 'In the United States, traditional media are still playing the key role in setting the agenda for the public,' says Jin Liwen. 'But in China, you will see that a lot of hot topics, hot news or events actually originate from online discussions.' In one well known case, when a video appeared in China of a woman stomping a cat to death with the sharp point of her high heel, the human flesh search engine tracked the kitten killer's home to the town of Luobei in Heilongjiang Province, in the far northeast, and her name — Wang Jiao — was made public, as were her phone number and her employer. 'Wang Jiao was affected a lot,' says one Luobei resident. 'She left town and went somewhere else.' The kitten-killer case didn't just provide revenge; it helped turn the human-flesh search engine into a national phenomenon. Searches have also been directed against cheating spouses, corrupt government officials, amateur pornography makers, Chinese citizens who are perceived as unpatriotic, journalists who urge a moderate stance on Tibet and rich people who try to game the Chinese system."
Robotics

When Will AI Surpass Human Intelligence? 979

destinyland writes "21 AI experts have predicted the date for four artificial intelligence milestones. Seven predict AIs will achieve Nobel prize-winning performance within 20 years, while five predict that will be accompanied by superhuman intelligence. (The other milestones are passing a 3rd grade-level test, and passing a Turing test.) One also predicted that in 30 years, 'virtually all the intellectual work that is done by trained human beings ... can be done by computers for pennies an hour,' adding that AI 'is likely to eliminate almost all of today's decently paying jobs.' The experts also estimated the probability that an AI passing a Turing test would result in an outcome that's bad for humanity ... and four estimated that probability was greater than 60% — regardless of whether the developer was private, military, or even open source."
Social Networks

Facebook To Preserve Accounts of the Dead 292

Barence writes "Social-networking site Facebook is planning to preserve the accounts of dead members. The new 'memorialized' accounts will continue to display photos and wall posts, but remove 'sensitive information' such as status updates and contact information. Friends or family who want to report the death of a Facebook member are encouraged to fill out the site's Deceased form. The form asks for proof of death, such as an obituary or news article, although it's not clear how Facebook can validate the death of a member if neither of those pieces of information is published on the internet. How long before someone snuffs it on Facebook before their time?"
Earth

Were Neanderthals Devoured By Humans? 502

Hugh Pickens writes "The Guardian reports that a Neanderthal jawbone covered in cut marks similar to those left behind when flesh is stripped from deer provides crucial evidence that humans attacked Neanderthals, and sometimes killed them, bringing back their bodies to caves to eat or to use their skulls or teeth as trophies. 'For years, people have tried to hide away from the evidence of cannibalism, but I think we have to accept it took place,' says Fernando Rozzi, of Paris's Centre National de la Récherche Scientifique. According to Rozzi, a discovery at Les Rois in south-west France provides compelling support for that argument. Previous excavations revealed bones that were thought to be exclusively human. But Rozzi's team re-examined them and found one they concluded was Neanderthal." (Continued, below.)

Comment This will change nothing in the long run (Score 2, Insightful) 129

Don't fool yourself, this (temporary) rejection was only possible because some of the left wing party sneaked at the last minute to vote AGAINST the proposal. There were not enough right wing (government) politicians in the assembly to vote for it and the text was rejected.

This, however, changes NOTHING in the long run: despite being a stupid, non-applicable, lobbied-by-the-SACEM*-to-maintain-the-outdated-cash-machine, this law *will* be accepted in the end, since the government has enough of its own members of the Assemblee Nationale to vote for it, regardless of what the other "deputes" do.

When this stupid law is effective everybody loses, except maybe for recoding companies which will be able to seat for 20 more years on their obsolete business plan.

Intel

Intel Recruits TSMC To Produce Atom CPUs 109

arcticstoat writes "Intel has surprised the industry by announcing a memorandum of understanding (MOU) with Taiwanese silicon chip maker TSMC to manufacture Atom CPUs. Although TSMC is already employed by AMD, Nvidia and VIA to make chips, it's not often you see Intel requiring the services of a third fabrication party. Under the MOU, Intel agrees to port its Atom CPU technology to TSMC, which includes Intel's processes, intellectual properties, libraries and design flows relating to the processor. This will effectively allow other customers of TSMC to easily build Atom-based products similarly to how they might use an ARM processor in their own designs. However, Intel says that it will still pick the specific market segments and products that TSMC will go after, which will include system-on-chip products, as well as netbooks, nettops and embedded platforms."
Music

French President Busted For Copyright Violation 317

An anonymous reader writes "ZeroPaid has an interesting take on the story of Nicolas Sarkozy being accused of copyright infringement. The irony, of course, is Sarkozy's pushing of a 3-strikes law — disconnecting from the Internet those accused of file sharing — in France and across the EU. The French president had apparently offered to settle the copyright infringement accusation for one Euro, but the band rejected the offer, calling it an insult. The article notes that each year since 2006, a high-profile anti-piracy entity has been on the wrong end of a copyright infringement notice. In 2008, Sony BMG was sued for software piracy. In 2007, anti-piracy outfit BASCAP received a cease and desist order related to pirated software. And in 2006, the MPAA was accused of pirating 'This Film is Not Yet Rated'."
Security

Working Around Slow US Gov. On DNS Security 91

alphadogg writes "Last fall, the US government sought comments from industry about how better to secure the Internet by deploying DNSSEC on the root zone. But it hasn't taken action since then. Internet policy experts anticipate further delays because the Obama Administration hasn't appointed a Secretary of Commerce yet, the position that oversees Internet addressing issues. Meanwhile, the Internet engineering community is forging ahead with a stopgap to allow DNSSEC deployment without the DNS root zone being signed. Known as a Trust Anchor Repository, the alternative was announced by ICANN last week and has been in testing since October."
Be

BeOS Successor Haiku Keeps the Faith 448

kokito writes "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and 'personality,' boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general." (More below.)

Comment Focus on the methodology rather than the company (Score 1) 93

I do not think anyone can recommend the "best" company as the criteria for "best" depend on your business needs.
That being said, I would recommend sending a request for proposal (or call for tender, I never know the correct name for this) to 5 companies with local offices so you can meet the ethical hackers if needed. This is good to avoid relying on a bunch of "not so white hackers" with little knowledge of collateral damages and potential impact of the pentest on the information system.

Make sure the intruders do not rely on automated tools. I have seen Eeye/ISS reports labelled as actual pentests reports, sold at pentest prices. A good pentest on a 3/3 application requires at least 8-10 days from my experience. These figures should be adapted to the complexity of the infrastructure of course.

I would also ask for information regarding
- system tests vs application tests. The latter cannot be automated to be effective, but both are necessary for a pentest to be meaningful
- the pentest methodology (do they have anything set or do they do it "as they feel" for each project),
- audit trails gathering (all traffic between the pentest lab and your information system should be archived)
- alert processes (what should they do if a critical vulnerability is discovered) and so on

Many companies with little knowledge of professional penetration testing sell intrusion services, from my point of view it is your job to select the best one, nobody on Slashdot can do that for you.

The Courts

SCO Proposes Sale of Assets To Continue Litigation 290

gzipped_tar sends in this excerpt from the Salt Lake Tribune: "The embattled SCO Group Inc. is proposing to auction off its core products and use proceeds to continue its controversial lawsuits over the alleged violations of its copyrights in Linux open-source software. The Lindon company has filed a new reorganization plan with the federal court in Delaware where it sought bankruptcy protection from creditors after an adverse ruling in the Linux litigation. If approved by a bankruptcy judge, the plan could mean SCO's server software and mobile products lines are owned by other parties while SCO itself remained largely to pursue the lawsuits under the leadership of CEO Darl McBride. 'One goal of this approach is to separate the legal defence of its intellectual property from its core product business,' McBride said in a letter to customers, partners and shareholders. Jeff Hunsaker, president and COO of The SCO Group, said the litigation had been distracting to the company's efforts to market its products. 'We believe there's value in these assets and in order for the business to move forward it's imperative we separate it from our legal claims and we allow our products business to move forward,' he said Friday."
Image

Sleep Mailing Screenshot-sm 195

Doctors have reported the first case of someone using the internet while asleep, when a sleeping woman sent emails to people asking them over for drinks and caviar. The 44-year-old woman found out what she had done after a would be guest phoned her about it the next day. While asleep the woman turned on her computer, logged on by typing her username and password then composed and sent three emails. Each mail was in a random mix of upper and lower cases, unformatted and written in strange language. One read: "Come tomorrow and sort this hell hole out. Dinner and drinks, 4.pm,. Bring wine and caviar only." Another said simply, "What the......." If I had known that researchers were interested in unformatted, rambling email I would have let them read my inbox. They could start a whole new school of medicine.

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...