Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment The RISKS Digest covered this in 2006 (Score 1) 469

I'm surprised that I do not see a link to the RISKS article about how a motorist was trapped in a traffic circle for 14 hours yet.

The technology in the RISKS entry was a bit more advanced (lane occupation detection) than what seems to be described in this article.

(And if someone cannot it figure out from the date, the RISKS entry was an April fool's joke; but a lot of people took it seriously at the time.)

Comment Article is about IP Address sales, not DNS/WHOIS (Score 3, Insightful) 63

I don't think many people are getting the point of this article, although I admit it is a bit confusing. While it is true that the article talks about alternative DNS systems and WHOIS; what Paul really seems concerned about is the part of the WHOIS system used to look up who is currently allowed to use a given IP address range, and is responsible for activity originating from it.

The current authorities which run this part of the WHOIS system have rules and restrictions about how and why IP address blocks on the Internet can be assigned from one party to another. Among the things cited by the article which currently are not permitted are obtaining IP address for perceived future needs when you have not already exhausted what you have, or simply buying IP addresses for no use at all speculating they can be sold for more money later.

Some parties do not like these rules, and want to establish their own system for buying and selling IP addresses which is not subject to the rules currently in place. They could kind-of do this right now, but the transfer of ownership would not be recorded in the old system.

This is potentially a bad thing, as suppose someone attacks you from IP address 1.2.3.4. And for some reason, reverse DNS on that IP address fails to work. If there is more than one system tracking ownership of who currently has the right to use this IP address, how do you find the right administrator to contact? And what if someone updated their contact information or the fact the IP block had been sold in one system, but forgot to do so in another?

Piracy

No Pirate Bay for Comcast Customers 230

An anonymous reader writes with a PC World article, according to which "The Pirate Bay is unavailable for customers of Comcast, even as the torrent site remains online for other users. Problems began early Thursday morning, when several Comcast users told TorrentFreak that they were having issues with The Pirate Bay. Commenters at Techland and Engadget are confirming that they can't access the site." Right now, I'm on a Comcast connection in Pennsylvania, and get an "Ooops, could not connect" message when I try to reach The Pirate Bay.
Microsoft

Submission + - Microsoft to acquire Skype for $8.5 billion (bbc.co.uk)

An anonymous reader writes: According to BBC news "Microsoft has confirmed that it has agreed to buy internet phone service Skype. The deal will see Microsoft pay $8.5bn (£5.2bn) for Skype, making it Microsoft's largest acquisition."

What will this mean for Mac OS X and linux versions of Skype? Does this confirm the rumors that Skype is evil?

Cellphones

FCC Requires Data-Roaming Agreements 101

itwbennett writes "The FCC has voted to require data roaming agreements between carriers in a move largely targeting AT&T and Verizon, the two largest mobile carriers in the US. 'What good is [a] smartphone if it can't be used when a subscriber is roaming across the country or even across the county?' said Commissioner Michael Copps. 'Our regulations must reflect today's reality and not make artificial distinctions between voice and data telecommunications.'"

Comment May have to do with Student Loans and Refunds (Score 4, Informative) 554

If you have any student loans, universities in the United States are required to report your last date of attendance, if you are attending at least half time or not, and other information to the National Student Loan Data System. This may be an automated way that they are trying to get information for this.

While I imagine universities are not going to rush to using the last date you showed up in class versus the current date for refund and grading (withdrawal with no grade versus withdrawal-failing/withdrawal-pass, etc.), I could easily see universities using this data in the event of a grade dispute or similar issue.

Submission + - Novell Board Declines Elliot's Offer

FlyingGuy writes: "In an e-mail sent to partners and VARS ( of which I am one ), CEO Ron Hovsepian sent the the following:

Dear Valued Partner,

As you may know, on March 2nd, Elliott Associates, L.P. announced an unsolicited, conditional proposal to acquire Novell. Today we issued a press release announcing that our Board of Directors has concluded, after careful consideration, including a review of the proposal with its independent financial and legal advisors, that Elliott's proposal is inadequate and that it undervalues the Company's franchise and growth prospects.

Additionally, we announced that our Board has authorized a thorough review of various alternatives to enhance stockholder value.

Our relationship with you is extremely important to all of us at Novell, and I want to assure you that you can remain confident that we are committed to serving you as we always have. I also want to reaffirm to you that it remains business as usual at Novell, and we do not intend for there to be any changes in our relationship with you. Please do not hesitate to contact me or other members of our team at any time; we always strive to be available to provide you the best solutions for your needs.

On behalf of the Board and management team, I thank you for your ongoing commitment to Novell.

Sincerely,

Ron Hovsepian
President and CEO

"

Comment Re:T-Mobile, UMA, and $0.10 per minute (Score 2, Interesting) 395

A slightly clarification here:

UMA service with T-mobile is basically a way to use 802.11 access points as an alternative "cell phone tower" with T-mobile. Nothing stops you from using a UMA-capable phone with standard GSM cell phone towers (unless you tell the phone not to).

In general, T-mobile bills UMA calls *the same* as calls started on the cell phone network. So if you have a post-paid plan, UMA usage typically comes out of your normal minute bucket(s); if you are using a $0.10/minute pre-paid plan, you pay $0.10/minute (as the previous poster mentioned).

There are NO additional fees required for UMA calling versus GSM calling. Turning on 802.11 support might reduce your phone's battery life between charges though.

That said, there used to be some add-on plans which allowed unlimited UMA-initiated calls for a flat rate. But these no longer seem to be offered. In general, the future of T-Mobile's UMA service is unknown, as it is primarily Blackberry phones that tend to support it.

Comment Cloud Computing Security Is Another Name for DRM (Score 1) 93

While they may sound different, the Cloud Computing security problem seems to be almost identical to any other Digital Rights Management problem. Both are concerned with only exposing what the information owner wants exposed to the underlying hardware/provider/user/etc.

It's just a question of whose "Cloud" you are trying to secure information on, and who the "user" of said information is supposed to be.

Security

Submission + - Credit Card Security

facon12 writes: I work on an IT helpdesk for a rather large corporation and I have recently discovered a rather troubling fact about how our credit card information from our customers is stored. We have an many locations around the country where customers can go to purchase our products/services and at these locations credit card data is stored for months before being purged. Beyond that the data is encrypted using a simple letter only password that wouldn't take a brute force attack very long at all to break. If this were discovered by the wrong individuals it would mean that thousands of credit card numbers could easily be stolen. The computers this data is stored on are not very secure either; they also are protected only by basic passwords and are easily accessible remotely via the internet. I want to bring this concern to my boss but I do not think it will be taken seriously. Also I am concerned about being terminated or reprimanded in some way for making accusations about the company's IT policies. I would like to demonstrate the vulnerability for the management team to show them the risk at hand but I do not believe they will give me permission to do so. I was wondering what Slashdot users would suggest I do in this case as I feel I must do something because of the number of consumers that could be harmed. Should I go to my management despite the fact that I think they won't listen, and how should I approach them? If that yields no results should I leave the issue alone or is there an authoritative body I need to report this to?
Sun Microsystems

Submission + - I.B.M. Reportedly Will Buy Rival Sun for $7 Billio (nytimes.com)

NotAgent86 writes: From the article: "I.B.M. appears on the verge of acquiring Sun Microsystems, a longtime rival in the computer server and software markets, for nearly $7 billion. The two companies have been negotiating for weeks, ironing out terms of an agreement that would turn I.B.M. into the dominant supplier of high-profit Unix servers and related technology."

Comment Re:LED Pay Phone Tap (Score 1) 179

Having seen devices like these in the past, chances are it is a telecommunications device for the deaf, in this case designed for payphones.

I presume there would have been instructions printed on the front of the device that would go something like this: If a deaf or hard-of-hearing person wants to make a phone call, they insert coins, then dial the number of interest. When they see the light on the other end flashing randomly (i.e. not a ringing or busy signal), they can press a key on the payphone's touch-tone pad a few times to cause a prerecorded voice to announce the TTD's presence.

If the party on the other side starts typing with their own Teletype device, the TTD on the payphone will then open up to reveal its own display and keyboard. The reason it cannot be opened up without hearing a remote TTD first (at least on the units I have seen) is to prevent vandalism on what is obviously an uncommon and slightly expensive piece of equipment.

OS X

Mac OS X 10.5.2 Update Brings Welcome Fixes 433

jetpack writes to make sure we're aware that Apple's OS X 10.5.2 update is available and that it contains plenty of improvements and fixes that users have been asking for. Macworld enumerates some of the big ones, saying that the update "shows Apple listens to users" (sometimes). A couple of the new features simply restore Tiger (10.4) capabilities that Leopard (10.5) had inexplicably withdrawn. You can now shut off the much-maligned transparency of the menu bar, and organize your Dock stacks hierarchically and display them as folders. And Apple has provided welcome access to common Time Machine functions in the menu bar.

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...