Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:um.... (Score 2) 56

We do have all of that ... Skype was actually developed by a Dane and a Swede, but your ignorance is forgiven since you are american. The original investigation was carried out by swedish police who found the ties to the crime in Denmark. A Swedish judge has decided that the evidence is strong enough for a trial in Denmark. What he is accused for is a crime in both Sweden and Denmark and the offended part is a danish authority. The penalty is also similar in both countries so it makes sense the trial him in Denmark. He does have the right to stay silent, but he also has the right to defend himself, and compared to the cost of the investigation i don't think a couple of policemens salary and some plane tickets are going to matter much.
Data Storage

NSA's New Utah Data Center Suffering Meltdowns 241

linuxwrangler writes "NSA's new Utah data-center has been suffering numerous power-surges that have caused as much as $100,000 damage per event. The root cause is 'not yet sufficiently understood' but is suspected to relate to the site's 'inability to simultaneously run computers and keep them cool.' Frustrating the analysis and repair are 'incomplete information about the design of the electrical system' and the fact that "regular quality controls in design and construction were bypassed in an effort to fast track the Utah project."" Ars Technica has a short article, too, as does ITworld.
The Military

Red Cross Wants Consequences For Video-Game Mayhem 288

Nerval's Lobster writes "The International Committee of the Red Cross (ICRC) wants developers to consider building "virtual consequences" for mayhem into their video games. 'Gamers should be rewarded for respecting the law of armed conflict and there should be virtual penalties for serious violations of the law of armed conflict, in other words war crimes,' read the ICRC's new statement on the matter. 'Game scenarios should not reward players for actions that in real life would be considered war crimes.' Like many a concerned parent or Congressional committee before it, the ICRC believes that violent video games trivialize armed conflict to the point where players could see various brands of mayhem as acceptable behavior. At the same time, the ICRC's statement makes it clear that the organization doesn't want to be actively involved in a debate over video-game violence, although it is talking to developers about ways to accurately build the laws of armed conflict into games. But let's be clear: the ICRC doesn't want to spoil players' enjoyment of the aforementioned digital splatter. 'We would like to see the law of armed conflict integrated into the games so that players have a realistic experience and deal first hand with the dilemmas facing real combatants on real battlefields,' the statement continued. 'The strong sales of new releases that have done this prove that integrating the law of armed conflict does not undermine the commercial success of the games.'"

Comment Re:I dont use... (Score 1) 896

Basically, my advice to people who are relatively savvy is not to bother with antivirus. Once antivirus detects anything, it's generally too late. AV can be useful for people who have _no_ clue, but they're bound to get infected anyway sooner or later.

Wrong , if the AV software reacts it's normally because it's actually doing it's job and preventing infection. One or two times a year NOD32 informs me of an infected file and i let it delete it. At work i often get notifications from Trend Office Scan that a couple of files on some users computer have been infected,detected and deleted. So in my experience AV software is mandatory ..... even on my own machine, and i believe i know what i'm doing. What i don't understand is the obsession with free ..... nothing is free, really. I don't mind paying an unsubstantial amount of money for beeing protected against loss of data , and more important for me , the hassle and time involved in a format and réinstall.

Comment Re:SSD (Score 1) 611

It's not very scientific to take your own personal experience and expect the rest of the world to get the exact same results ! There is probably a very big variation in the quality of the CD's and DVD's out there !
Wii

Wii System Menu 4.0 Released 94

dougisfunny writes "The Wii System Menu 4.0 has been released. It adds a number of features that people have been waiting for, including the ability to use SDHC cards, as well as the ability to download and play things directly off of the SD/SDHC card rather than the internal memory. This was announced at GDC09 by Nintendo's President Saturo Iwata in his keynote address. More information can be found at Nintendo's website."
The Courts

Court Reinstates Proof-of-Age Requirement For Nude Ads 267

arbitraryaardvark writes "An Ohio swinger's magazine objects to keeping proof on file that its advertisers are over 18. I reported here in 2007 that the 6th circuit struck down U.S.C. Title 18, Section 2257 as a First Amendment violation. The full 6th circuit has now overturned that ruling. The case might continue to the Supreme Court. The Cleveland Plain Dealer reports."
Moon

Chandrayaan Enters Lunar Orbit 111

William Robinson writes "After an 18-day journey, Chandrayaan-1, the moon mission of India, has entered Lunar orbit. The maneuver was described as crucial and critical by scientists, who pointed out that at least 30 per cent of similar moon missions had failed at this juncture, resulting in spacecraft lost to outer space. The lunar orbit insertion placed Chandrayaan-1 in an elliptical orbit with its nearest point 400 to 500 kilometers away from the moon, and the farthest, 7,500 kilometers. By November 15, the spacecraft is expected to be orbiting the moon at a distance of 100 kilometers and sending back data and images (the camera was tested with shots looking back at Earth). The Chandrayaan-1 is also scheduled to send a probe to the moon's surface."
Security

Submission + - How do you handle abuse ?

Hafnia writes: I have an older machine running Debian to serve my Squeezebox and FTP. It's open to the internet for ssh and ftp. I don't really care or worry about it, but every once in a while i check the authlog and every time it's crowded with failed attempts to get in ! What do you do? Ignore it ? Report it ? Attack it ? And what should i do ? I'm fairly competent with computers , but not a pro sysadmin. Does it make sense at all to report it ?

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...