Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft

Office 2003 Service Pack Disables Older File Formats 555

time961 writes "In Service Pack 3 for Office 2003, Microsoft disabled support for many older file formats. If you have old Word, Excel, 1-2-3, Quattro, or Corel Draw documents, watch out! They did this because the old formats are 'less secure', which actually makes some sense, but only if you got the files from some untrustworthy source. Naturally, they did this by default, and then documented a mind-bogglingly complex workaround (KB 938810) rather than providing a user interface for adjusting it, or even a set of awkward 'Do you really want to do this?' dialog boxes to click through. And of course because these are, after all, old file formats ... many users will encounter the problem only months or years after the software change, while groping around in dusty and now-inaccessible archives."
It's funny.  Laugh.

Computer Glitch Halts Seattle New Year's Fireworks 202

supersat writes "At the stroke of midnight New Year's Eve, Seattle's fireworks show ground to a halt. The source of the problem is reported to be a corrupted file that wasn't checked until the last minute. After two reboots, the fireworks had to be detonated manually. And yes ... one blog commenter, claiming to have worked on prior shows, said that the shows run on Windows."
Portables

Notebook Makers Moving to 4 GB Memory As Standard 567

akintayo writes "Digitimes reports that first-tier notebook manufacturers are increasing the standard installed memory from the current 1 GB to 4GB. They claim the move is an attempt to shore up the costs of DRAM chips, which are currently depressed because of a glut in market. The glut is supposedly due to increased manufacturing capacity and the slow adoption of Microsoft's Vista operating system. The proposed move is especially interesting, given that 32-bit Vista and XP cannot access 4 GB of memory. They have a practical 3.1 — 3.3 GB limit. With Vista SP1 it seems that Microsoft has decided to fix the problem by reporting the installed memory rather than the available memory."
Security

Vulnerability Numerology - Defective by Design? 103

rdmreader writes "RDM has a point by point disassembly of the security vulnerability story phenomenon. We regularly see these, comparing various vulnerability lists for different operating systems. ZDNet's George Ou, for example, condemns Linux and Mac OS X by tallying up reported flaws and comparing them against Microsoft's. What he doesn't note is that his source, Secunia, only lists what vendors and researchers report. Results selectively include or exclude component software seemingly at random, and backhandedly claims its data is evidence of what it now tells journalists they shouldn't report. Is Secunia presenting slanted information with the expectation it will be misused?"
Windows

The Advantages of Upgrading From Vista To XP 765

An anonymous reader passes us a blog posting, which may be just a bit tongue-in-cheek, about the pros and cons of upgrading from Vista to XP. "...there is only one conclusion to be made; Microsoft have really outdone themselves in delivering a brand new operating system that really excels in all the areas where Vista was sub-optimal. From my testing, discussions with friends and colleagues, and a review of the material out there on the web there seems to be no doubt whatsoever that that upgrade to XP is well worth the money. Microsoft can really pat themselves on the back for a job well done, delivering an operating system which is much faster and far more reliable than its predecessor. Anyone who thinks there are problems in the Microsoft Windows team need only point to this fantastic release and scoff loudly."
Transportation

Auto Mileage Standards Raised to 35 mpg 746

Ponca City, We Love You writes "The Senate just passed a bill that will increase auto mileage standards for the first time in three decades. The auto industry's fleet of new cars, sport utility vehicles, pickup trucks and vans will have to average 35 mpg by 2020, a significant increase over the 2008 requirement of 27.5 mpg average. For consumers, the legislation will mean that over the next dozen years auto companies will likely build more diesel-powered SUVs and gas-electric hybrid cars as well as vehicles that can run on 85 percent ethanol. Automakers had vehemently opposed legislation in June that contained the same mileage requirements and Fortune magazine reported that American automakers were starting the miles-per-gallon race far behind Japan and that the new standards could doom US automakers. At the time, Chrysler officially put the cost of meeting the proposed rules at $6,700 per vehicle. The White House announced the President will sign the bill if it comes to his desk."
Security

Video Surveillance Identifies Threat Patterns 132

Ponca City, We Love You writes "When the 2008 Olympic Games kick off in Beijing next year, organizers will be using a sophisticated computer system to scan video images of city streets looking for everything from troublemakers to terrorists. The IBM system, called the Smart Surveillance System, uses analytic tools to index digital video recordings and then issue real-time alerts when certain patterns are detected. It can be used to warn security guards when someone has entered a secure area or keep track of cars coming in and out of a parking lot. The system can also search through old event data to find patterns that can be used to enable new security strategies and identify potential vulnerabilities. IBM is also developing a similar surveillance system for lower Manhattan, but has not yet begun deploying that project. "Physical security and IT security are starting to come together," says Julie Donahue, vice president of security and privacy services with IBM. "A lot of the guys I'm meeting on the IT side are just starting to get involved on the physical side.""
Data Storage

New Seagate Drives Have Real Difficulties With Linux 361

wtansill writes "Seagate's Free Agent series of drives are not intended to be compatible with the Open Source operating system Linux. The Inquirer reports on the problem: an unhelpful power saving mode. 'The problem is to do with the power-saving systems on Seagate's latest range of drives and the fact that it is shipped already formatted to NTFS. The NTFS is only a slight hurdle to Linux users who have a kernel with NTFS writing enabled or can work mkfs. But the "power saving" timer is a real bugger. It will shut the drive off after several minutes of inactivity and helpfully drop the USB connection. When the connection does come back it returns as USB1 which is apparently as useful as a chocolate teapot.' Via Engadget, though, there is a solution!
Transportation

Airlines to Offer In-Flight Internet Service 181

Ponca City, We Love You writes "JetBlue Airways will soon begin testing a free e-mail and instant messaging service on one aircraft, while American Airlines, Virgin America and Alaska Airlines plan to offer a broader Web experience in the coming months, probably priced at about $10 a flight. A recent survey found that 26 percent of leisure travelers would pay $10 for Internet access on a two-to-four-hour flight and 45 percent would pay that amount for a flight longer than four hours. The airlines plans to turn their planes into the equivalent of a wireless hot spot once the aircraft reaches its cruising altitude but service will not be available on takeoff and landing. While the technology could allow travelers to make phone calls over the Internet, most carriers say they have no plans to allow voice communications."
Social Networks

Secret Mailing List Rocks Wikipedia 531

privatemusings writes "Wikipedians are up in arms at the revelations that respected administrators have been discussing blocking and banning editors on a secret mailing list. The tensions have spilled over throughout the 'encyclopedia anyone can edit' and news agencies are sniffing around. The Register has this fantastic writeup — read it here first." The article says that some Wikipedians believe Jimbo Wales has lost face by supporting the in-crowd of administrators and rebuking the whistle blower who leaked the existence of the secret mailing list.
Security

Microsoft Admits XP Has Same Bug As Win2K 161

Arashtamere sends in a Computerworld story on a security flaw in the Windows 2000 pseudo-random number generator published by Israeli researchers earlier this month. Microsoft has now admitted that the flaw is present in XP too. Microsoft denies that the bug is a security vulnerability, since an attacker would have to have gained administrative access to a system before exploiting it. (The Israeli researchers point out that many common exploits provide admin access.) This stance apparently lets them off the hook for patching Win2K, which is in "extended support" mode, though it powers about 9% of US and EU business computers. Microsoft said that XP SP3, due in the first half of next year, will fix the bug. The company said that Vista, Windows Server 2003 SP2, and the new Windows Server 2008 are not vulnerable.
Security

Multiple FLAC Vulnerabilities Affect Every OS 360

Enon writes "eEye Digital Security has discovered 14 vulnerabilities in the FLAC file format that affect a huge range of media players on every supported operating system (Windows, Mac OS, Linux, Unix, BSD, Solaris, and even some hardware players are vulnerable). Heise points out a number of vulnerable apps that use the open source libavcodec audio codec library, which in turn relies on the flawed libFLAC library. These vulnerabilities could allow a person of ill will to trojanize FLAC files that could compromise your computer if they are played on a vulnerable media player. eEye worked with US-CERT to notify vulnerable vendors."
Security

The Fine Line Between Security and Usability 195

SkiifGeek writes to ask, "Where should vendors be required to draw the line when supporting deprecated file formats and technology? In a recent case independent security researcher cocoruder found a critical bug with the JET engine, via the .mdb (Access) file format, he reported it to Microsoft, but Microsoft's response came as a surprise to him — it appears that Microsoft is not inclined to fix a critical arbitrary code execution vulnerability with a data technology that is at the heart of a large number of essential business and hobby applications."
Privacy

FBI May Have Datamined Grocery Stores With Help From Credit Companies 442

An anonymous reader writes "Recent media reports indicate that in 2005-06, the FBI went trawling through grocery store records in order to track down Iranian terror cells. They hoped to locate 'Middle-Eastern terrorists' through the purchase of specific food items. Many of these items, though, are not sold through big-box supermarket chains, and the majority of mom and pop ethnic markets do not have the detailed computer purchase histories that Safeway or Whole Foods have. What the FBI seems to have done is instead put together a list of everyone who shopped at a Middle Eastern food market. All signs point to the credit card companies providing this data, and not the individual stores. If so, this could be the tip of a (potentially illegal) data-mining iceberg."
The Media

Expanding Fair Use To Reform Copyright Law 229

Hugh Pickens writes "Gigi Sohn, President of Public Knowledge, presented a six-step program for reforming outdated US copyright laws in a speech at the New Media conference at Boston University. Sohn expressed no patience with the 'disconnect between the law and the technology' of media production and distribution. He puts Fair Use at the top of the list for changes that will help return balance to copyright laws that have limited innovation, scholarship, creativity, and free speech. In addition to the four-part legal test for fair use currently on the books, Sohn recommends that Congress add incidental, transformative, and non-commercial personal uses to the list of fair uses enumerated in copyright law, and in addition expressly provide that making a digital copy for the purpose of indexing searches is not an infringement. Beyond Fair Use reform, Sohn advocates punishing copyright holders who 'knowingly or recklessly' send out false takedown notices, protecting the manufacturer of a technology from liability for the infringing activity of others if the technology has substantial non-infringing uses, promoting fair and accessible licensing of copyrighted works, limiting damages for the use of orphan works, and requiring copyright holders to provide notice of any limitations on users' ability to make fair or lawful uses of their products."

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...