Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Swedish Hackerspace raided by the police (forskningsavd.se) 4

intedinmamma writes: At 20.45 on Saturday the 28th of November the police raided the social centre Utkanten in Malmö, where the hackerspace Forskningsavdelningen is housed. Twenty officers in full riot gear and ski masks broke into the space, using crowbars. The official reason for the raid was to do a “pub check” because of the suspicion that there was illegal selling of alcohol going on at a punk concert. After the raid the cops confiscated a lot of stuff, being indiscriminate as to whose effects were removed. A lot of equipment from Forskningsavdelningen were taken, and also some personal belongings, even though the hackerspace was unaffiliated with the group arranging the concert downstairs.
Censorship

UK Gov. Clueless About Own Internet Blacklist 203

spge writes "Computer Shopper magazine has interviewed the UK Home Office about its relationship with the Internet Watch Foundation and discovered that the government doesn't actually know what the IWF does, although it still plans to force UK ISPs to subscribe to the IWF's blacklist. The main story makes for interesting reading, but the best bit is the full transcript of the interview. Short version: the IWF investigates suspected child porn websites and adds any it finds to a list that ISPs can use to block these sites; uk.gov wants ISPs to use this list; however, the IWF is not an official government organization, does not appear to have legal permission to view child pornography, and quite possibly is breaking the law by doing so."
Image

Chimp Found Plotting Against Zoo Guests Screenshot-sm 435

rjshirts writes "In further proof that Planet of the Apes is coming to pass, researchers in Stockholm, Sweden have proof that primates can plan ahead. From the article: 'Santino the chimpanzee's anti-social behavior stunned both visitors and keepers at the Furuvik Zoo but fascinated researchers because it was so carefully prepared. According to a report in the journal Current Biology, the 31-year-old alpha male started building his weapons cache in the morning before the zoo opened, collecting rocks and knocking out disks from concrete boulders inside his enclosure. He waited until around midday before he unleashed a "hailstorm" of rocks against visitors, the study said.'"
Security

Self-Encrypting Hard Drives and the New Security 205

In a recent blog post, CNet's Jon Oitsik has called for a policy shift with respect to data encryption. A new standard by the Trusted Computing Group promises the availability of self-encrypting hard drives soon, leading some to call for immediate adoption. Will this create even more security problems due to lazy custodians, or should someone responsible for keeping your information safe be required to move to the new hardware? Hopefully the new hardware comes with a warning to continue to use other data protection measures as well.
The Internet

Wolfram Promises Computing That Answers Questions 369

An anonymous reader writes "Computer scientist Stephen Wolfram feels that he has put together at least the initial version of a computer that actually answers factual questions, a la Star Trek's ship computers. His version will be found on their Web-based application, Wolfram Alpha. What does this mean? Well, instead of returning links to pages that may (or may not) contain the answer to your questions, Wolfram will respond with the actual answer. Just imagine typing in 'How many bones are in the human body?' and getting the answer." Right now, though the search entry field is in place, Alpha is not yet generally available -- only "to a few select individuals."

Comment The first result for my name is a banjo player (Score 1) 205

I'm going to sue!

But seriously, if we combine this with that recent request for help from the fellow whose name brings up a paedophile ... surely we can sue for defamation of character whether the comments are referring to ourselves or not? That would be my logical conclusion without reading TFA.

Comment The blocking is secret from the user's POV too (Score 1) 203

One thing I noticed when looking at the Virgin Killers page while it was being blocked was that it pretended to be a 404 error (a very unconvincing one). This is presumably part of their "don't alert people" ploy too, but it confounds the majority of people from being able to discover that it's being blocked.

Privacy

Bill Would Require ISPs, Wi-Fi Users To Keep Logs 857

suraj.sun notes CNet reporting on bills filed in the US House and Senate that would require all ISPs and operators of Wi-Fi hotspots — including home users — to maintain access logs for 2 years to aid in law enforcement. The bills were filed by Republicans, but the article notes that the idea of forcing data retention has been popular on both sides of the aisle over the years. "Republican politicians on Thursday called for a sweeping new federal law that... would impose unprecedented data retention requirements on a broad swath of Internet access providers and is certain to draw fire from businesses and privacy advocates. ... Each [bill] contains the same language: 'A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user [i.e., DHCP].'"
Programming

Web-based IDEs Edge Closer To the Mainstream 244

snitch writes "Last week Mozilla released Bespin, their web-based framework for code editing, and only a few days later Boris Bokowski and Simon Kaegi implemented an Eclipse-based Bespin server using headless Eclipse plug-ins. With the presentation of the web-based Eclipse workbench at EclipseCon and the release of products like Heroku, a web-based IDE and hosting environment for RoR apps, it seems that web-based IDEs might soon become mainstream."

Comment If somebody else clicks "agree" (Score 1) 874

I regularly use software with EULAs to which somebody else has agreed.

Does that mean I would be eligable to sue the company for something which the EULA-clicker supposedly no longer has the right to do?

And does it make a difference as to who owns the hardware? (i.e. sysadmin agreeing on a university computer, compared to a cat agreeing to something running on my hardware).

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...