Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Submission + - McAfee Admits GPL Violation Publicly... oops! (wordpress.com)

Spinlock_1977 writes: "The Inquirer (UK) is running an article on a recent public statement by McAfee effectively admitting they've stolen GPL-licensed code, and are now concerned that their products that include it could pose a liability. One could argue which demonstrates greater stupidity: Using GPL'd code without abiding by the terms of the GPL license, or admiting it publicly. Either way, McAffee's management could now face a litany of legal actions ranging from a GPL suit to a shareholder class-action-mismanagment-angst one. From the article:

"To the extent that we use 'open source' software, we face risks," McAfee stated.

McAfee explained: "Use of GPL software could subject certain portions of our proprietary software to the GPL requirements, which may have adverse effects on our sales of the products incorporating any such software."

That statement says several things. First, it reveals that McAfee does use at least some open source software derived code in its products. Second, it betrays that McAfee has misappropriated that open source software and thus is committing copyright infringement, because it doesn't distribute that open source software derivative source code.
"

PC Games (Games)

Submission + - 10 games that changed the world 1

An anonymous reader writes: If you've ever wondered where the games you play today came from, check out this list of the ten most important games of all time. Whether you agree with all of them or not, it can't be denied that each one on this list moved its respective genre forward, pushing developers to create even better games. Well worth a read, even if just to debate what's missing from the list! http://www.trustedreviews.com/gaming/review/2007/11/28/The-10-Most-Important-Games-Ever/p1
The Courts

Indecent Game Sales Now A Felony In New York 398

Gamespot reports on the final passing of New York senate bill A8696, legislation proposed just last week, that now makes it a serious felony to sell or rent a violent game to minors. The bill makes it illegal to sell a console without parental control options and establishes a group to second guess the ESRB's rating decisions. "'This bill is impermissibly vague,' EMA president Bo Andersen said in a statement. 'A8696 seeks to apply real-world standards of violence to the fictional and fanciful world of video games, an environment in which they have no meaning. As a result, retailers and clerks will not and cannot know with certainty which video games could send them to jail under A8696. It was depressing to hear members of the Assembly note the constitutional problems with the bill and then state that they were voting for it.'" The senate seems to have no fear of possible overturn of the bill, and claims it's only thinking of the children.
Windows

Submission + - Vista restricts GNU GCC apps to 32 MB

An anonymous reader writes: Executable images created for the DOS/Wintel environment, using the GNU GCC compilers and language standards (but not linking to the Win32 API), are subject to failure (or performance degradation) when executed in Microsoft Windows Vista, because Vista arbitrarily restricts the memory space for the GCC executable to 32 MB (33,554,432 bytes). Attempts to allocate more memory than this using the malloc(...) function (or related functions, such as calloc(...)) will fail. This limitation applies whether the application is executed with the Run command, within a Command Prompt box (DOS box), or with the Start command. This limitation does not appear in Windows XP, Windows 98SE, or standalone DOS; the exact same executable, running under Windows XP SP2 or Win98SE, is capable of allocating several hundred megabytes of physical memory (if present on the machine). The limitation appears to apply to any compiler and linker not employing Microsoft's proprietary Win32 API.
Here is the complete story.
Patents

Submission + - Sony sued for AACS

liam193 writes: Ars Technica is running a story about a Canadian encryption vendor which claims that AACS violates two of their patents. At this point, the company has filed suit against Sony, but the article indicates that the alleged infringement is with AACS itself. As such, it could potential affect vendors providing HD-DVD and Blue-ray technology.
Microsoft

Submission + - Microsoft bullies UK developer (zdnet.co.uk)

ZDOne writes: "Microsoft has shown that once again despite having a near bottomless marketing budget — it is supremely talented at coming across as ruthless and uncaring. The boys at Redmond have demanded — with very unsubtle lawyers' letters — that a London-based Windows developer withdraws a version of his free debugging tool from distribution, and is claiming that the tool breaches its licensing conditions. What's this about Microsoft finally seeing the light around the benefits of an open source community approach to software development — we are not convinced.

Microsoft angered by UK developer

http://news.zdnet.co.uk/software/0,1000000121,3928 7310,00.htm"

Media

Submission + - Mass outage hits XM

An anonymous reader writes: XM Satellite Radio is experiencing a major outage right now, having lost one of its satellites and a massive number of repeaters. Listeners on the East Coast are mostly affected since XM's second satellite doesn't have a national footprint. Customer service reps are saying anywhere from 2 hours to 2 days for service to be restored.

The cause to all this mayhem? A software update.
Editorial

Submission + - Shouldn't copyrights last forever?

proxima writes: Mark Helprin, author and fellow at the Claremont Institute, writes an op-ed piece in today's New York Times. He responds to the argument about expiration being for the public good by saying, "it might also be for the public good were Congress to allow the enslavement of foreign captives and their descendants (this was tried);" He argues that Congress should extend the length of copyright again, "as far as it can throw". This is certainly a striking position compared to many on Slashdot and fellow guest columnist Lawrence Lessig (access to archives required).
Hardware Hacking

Journal Journal: Is it time for Open Source Hardware?

It seems that big business has always been keen on controlling the public through their control of the media. Now that the Internet is truly becoming an open forum for the free exchange of ideas and innovations it seems that big business must maintain their control in the age of the 'Blogosphere' and 'Web 2.0'.
Operating Systems

Submission + - Linux Training

Spritzer writes: I work for a rather large corporation with multiple divisions around the world. Nearly all user computers in the company are Windows systems, and there is no plan to move to Linux in the future. However, a good many of our products are now designed to run on Linux systems for security and stability purposes. Obviously, the design/development teams are knowledgeable in the use of Linux operating systems.Unfortunately my field service teams are not, and their is no in-house training program. This has begun to affect our ability to provide efficient, quality service to customers when in the field.

What training services have you used in the past to get people trained in the basics of using? I'd prefer to stay away from online, self-paced courses and get my people some hands on training with an instructor.
Security

$16,000 Bounty for Sendmail, Apache Zero-Day Flaws 173

Famestay writes "Verisign's iDefense is putting up a $16,000 prize for any hacker who can find a remotely exploitable vulnerability in six critical Internet infrastructure applications. The bounty is for a zero-day code execution hole on the following Internet infrastructure technologies: Apache httpd, Berkeley Internet Name Domain (BIND) daemon, Sendmail SMTP daemon, OpenSSH sshd, Microsoft Internet Information (IIS) Server and Microsoft Exchange Server. 'Immunity founder Dave Aitel, who also purchases flaws and exploits for use in the CANVAS pen testing tool, says its doubtful iDefense will get any submissions from hackers. "It's very hard to exploit [those listed applications]," Aitel said. "IIS 6 hasn't had a public remotely exploitable bug in it. Ever." Several other hackers I spoke to had very much the same message, arguing that $16,000 can never equate to the amount of work/expertise required to find and exploit a hole in the six targeted technologies.'"
Yahoo!

Submission + - Yahoo's uptime earns that exclamation point!

netbuzz writes: "The Yahoo Search site may have been down for a spell this morning, but the company's main site — Yahoo.com — is on quite a roll of uninterrupted uptime: 266 days to be precise. That makes Yahoo the reigning uptime champ among the Internet's 20 most trampled Web sites, according to Pingdom. Google does great, too, but those additions to the Google family — YouTube and Blogger — have had little to brag about in this regard.

http://www.networkworld.com/community/?q=node/1530 2"

Slashdot Top Deals

Happiness is twin floppies.

Working...