Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Portables (Apple)

Macbook Owner With Defective GPU Beats Apple In Court 280

New submitter RockoW writes "A few years ago, Apple sold defective computers of the MacBook Pro line. They had the defective Nvidia 8600M GT GPU. In this case Apple refused to take the computer back and issue me a refund. Instead, they promised to replace the 8600M GT boards when they failed, up to four years from the date of purchase. Three years later, the MacBook Pro failed and they refused to replace it. This guy took them to the court and won by their own means."
The Courts

Zynga Sues Brazilian Dev For Copying Its Games 115

An anonymous reader writes "In what can only be described as a case of the pot calling the kettle black, Zynga has launched and settled a lawsuit against Brazilian game developer Vostu after accusing Vostu of copying their games. The settlement resulted in the loss of jobs for many Vostu employees. How Zynga managed to carry out such actions while keeping a straight face after dealing with similar allegations remains to be seen."

Comment Re:not the least bit surprised (Score 4, Informative) 117

I was on their site last weekend, looking for a new BIOS and drivers. Their support web server was completely down. I called up to complain, and their tech support told me that they are aware of it, and have been having problems with it for a couple weeks now as they are changing their infrastructure. A couple weeks!!! Even their tech support couldn't access it, or even tell me what the BIOS version number was. This compromise is probably a result of an incorrectly configured server, which is a result of incompetent admins. All this results in them losing me as a customer. Good riddance Asus.

Point and Click Cracking 105

An anonymous reader writes "Washingtonpost.com is running a story about a number of botnets and keylogger operations being controlled by Web-sites with point-and-click type front-end software interfaces. The sites mentioned in the story look like fairly slick PHP pages designed to sort through password data from keylog victims and update infected computers with new code or instructions. From the story: 'The hacking software also features automated tools that allow the fraudsters to make minute adjustments or sweeping changes to their networks of hacked PCs. With the click of a mouse or a drag on a pull-down menu, users can add or delete files on infected computers.'"

Slashdot Top Deals

If all else fails, lower your standards.

Working...