Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Government

Submission + - Stream a YouTube video, go directly to jail (infoworld.com)

fysdt writes: "Welcome to the United States of the RIAA: A new bill that just flew through a U.S. Senate committee could make embedding copyrighted videos a crime, punishable by five years in the pokey.

In effect, the bill is pretty simple. Senate Bill 978 takes existing copyright laws that make the reproduction and distribution of copyrighted works a felony and adds the pungent phrase "public performances by electronic means" (that is, video streaming) to the list of things that can land you in the slammer."

Submission + - New quantum record: 14 bits! (nanowerk.com)

Tx-0 writes: Quantum physicists from the University of Innsbruck have set another world record: They have achieved controlled entanglement of 14 quantum bits (qubits) and, thus, realized the largest quantum register that has ever been produced. With this experiment the scientists have not only come closer to the realization of a quantum computer but they also show surprising results for the quantum mechanical phenomenon of entanglement.
By now the Innsbruck experimental physicists have succeeded in confining up to 64 particles in an ion trap. "We are not able to entangle this high number of ions yet," says Thomas Monz. "However, our current findings provide us with a better understanding about the behavior of many entangled particles." And this knowledge may soon enable them to entangle even more atoms.

Security

Submission + - ThinkPad Advanced Mini Dock Hack (youtube.com)

alek202 writes: European Hackers have demonstrated how to hack a ThinkPad Advanced Mini Dock in order to remove a docked and locked ThinkPad without damages from the Dock.

This is an excellent example how security by obscurity works — or doesn't.

Comment Re:Reasonable Choices. (Score 4, Informative) 105

In every debate using the worm here (Oz), at least one media organization always accuses the others of manipulating theirs, regardless of the result. So if you weren't already influenced then you had to ignore the deliberate media muddling of the issues. On top of the normal deliberate media muddling of course. But it doesn't stop commentators twittering them as a spectator sport anyway. This may be why we had a record 1.6% deliberate donkey vote in our last federal election.

The Almighty Buck

Submission + - NYT Paywall Cost $40million (harvard.edu)

An anonymous reader writes: Aside from wondering who will pay more than the cost of a Wall Street Journal subscription in order to subscribe to the New York Times, my biggest question right now is how the NY Times spent a reported $40-50 million writing the code (Bloomberg; other sources are consistent). Google was financed with $25 million. The New York Times already had a credit card processing system for selling home delivery. It already had a database management system for keeping track of Web site registrants. What did they spend the $40-50 million on?
Games

Why Do Videogames Struggle With Sex? 465

brumgrunt writes "Why do videogames still treat sex in such a two dimensional way? Why do they snigger at it, or treat it as a reward? Den Of Geek has been taking a look." I always figured it was some combination of games being made by our inner adolescent, marketed to the outer ones, and getting banned whenever they take sex seriously.
Security

Submission + - Linux distributor security list compromised (zdnet.com)

andrea.sartori writes: ZDNet reports that "Hackers have compromised a private e-mail list used by Linux and BSD distributors to share information on embargoed security vulnerabilities and used a backdoor to sniff e-mail traffic, according to the moderator of the list. In a note to Vendor-Sec's members, moderator Marcus Meissner said he noticed the break-in on January 20 but warned that it might have existed for much longer.
Immediately after Meissner's warning e-mail, the attacker re-entered the compromised machine and destroyed the installation."
Meissner has since killed the list: So everyone please consider vendor-sec@....de is dead and gone at this point, successors (or not) will hopefully result out of this discussion.
The H Security notes (link to the H's article) that this isn't the first compromise of the Vendor-Sec list. In 2005, black hat hackers reportedly hijacked a kernel exploit for root access from the list.

Slashdot Top Deals

If you think the system is working, ask someone who's waiting for a prompt.

Working...