Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption

U.S. Gov't To Use Full Disk Encryption On All Computers 371

To address the issue of data leaks of the kind we've seen so often in the last year because of stolen or missing laptops, writes Saqib Ali, the Feds are planning to use Full Disk Encryption (FDE) on all Government-owned computers. "On June 23, 2006 a Presidential Mandate was put in place requiring all agency laptops to fully encrypt data on the HDD. The U.S. Government is currently conducting the largest single side-by-side comparison and competition for the selection of a Full Disk Encryption product. The selected product will be deployed on Millions of computers in the U.S. federal government space. This implementation will end up being the largest single implementation ever, and all of the information regarding the competition is in the public domain. The evaluation will come to an end in 90 days. You can view all the vendors competing and list of requirements."
The Media

Time Magazine Person of the Year — It's You 244

Thib writes to point out that Time Magazine has picked you — or us, or the Internet — as Person of the Year because you control the Information Age. From the article: "But look at 2006 through a different lens and you'll see another story, one that isn't about conflict or great men. It's a story about community and collaboration on a scale never seen before. It's about the cosmic compendium of knowledge Wikipedia and the million-channel people's network YouTube and the online metropolis MySpace. It's about the many wresting power from the few and helping one another for nothing and how that will not only change the world, but also change the way the world changes."

Creating Web Pages With Ajax 146

Ravi writes "Asynchronous Javascript And Xml, popularly known as Ajax, is a combination of Javascript, XML and some coding on the server side. Even though this technology existed for years, many believe it was Google which brought it to the front by implementing it on its sites and thus raising it to the cult status it enjoys now. There is something magical in seeing a website update its content without reloading the whole page, which is the visual essence of Ajax." Read the rest of Ravi's review.

Google Image Labeler 389

vandalman writes to tell us that Google is betting on the obsessive compulsive need for many users to see big numbers next to their name with a new beta service called Google Image Labeler. From the description: "You'll be randomly paired with a partner who's online and using the feature. Over a 90-second period, you and your partner will be shown the same set of images and asked to provide as many labels as possible to describe each image you see. When your label matches your partner's label, you'll earn some points and move on to the next image until time runs out. After time expires, you can explore the images you've seen and the websites where those images were found. And we'll show you the points you've earned throughout the session."

Molecules Spontaneously Form Honycomb 106

Science Daily is reporting that University of California Researchers have discovered a new process in which molecules assemble into complex patterns without any outside guidance. From the article: "Spreading anthraquinone, a common and inexpensive chemical, on to a flat copper surface, Greg Pawin, a chemistry graduate student working in the laboratory of Ludwig Bartels, associate professor of chemistry, observed the spontaneous formation of a two-dimensional honeycomb network comprised of anthraquinone molecules."

Jack Thompson Files Take-Two, Rockstar Lawsuit 451

rtt writes "Jack Thompson is back on the video game scene and has followed through with his threat to file a law suit against Rockstar, Take-Two and Walmart for Rockstar's upcoming "Bully" title. bit-tech was sent a copy by the man himself which started as follows "Take-Two has until five o'clock p.m., Eastern time, Monday, August 14, 2006, to inform me in writing that it will forthwith provide me with a copy of Bully so that I and others can analyze it to determine whether it still poses a threat of copycat violence in our schools.""

Vermont Launches 'Cow Power' System 400

odyaws writes "Central Vermont Public Service has launched Cow Power, a system by which power users can opt to buy 25, 50, or 100% of their electricity from dairy farms that run generators on methane obtained from cow manure. Cow Power costs only 4 cents/kWh more than market price, so a household like mine would only pay $5-6/month more at 100% usage. The big question now is whether Vermont-based Ben & Jerry's Ice Cream will use power generated from the manure of cows treated with Recombinant Bovine Growth Hormone."

SCO to Unix developers, We want you back 427

NoGuffCheck writes "CRN is reporting that Darl McBride is looking to get Unix developers back onboard with cash incentives for completing training in SCO's new mobile application kit; EdgeBuilder. It doesn't stop there; there's a 12-cylinder BMW or $100,000 dollars for the development of the best wireless application."

A DNA Database For All U.S. Workers? 625

fragmer writes "New York City Mayor Michael Bloomberg suggested a plan on Wednesday that would establish a DNA or fingerprint database to track and verify all legal U.S. workers. The mayor said DNA and fingerprint technology could be used to create a worker ID database that will 'uniquely identify the person' applying for a job, ensuring that cards are not illegally transferred or forged. Bloomberg compared his proposed federal identification database to the Social Security card, insisting that such a system would not violate citizens' privacy and was not a civil liberties issue."

Law Enforcement Requests for Net Data Multiply 135

Carl Bialik from WSJ writes "It's not just phone companies grappling with reported potentially privacy-intruding requests from the NSA and other branches of government: Banks, Internet-service providers and other companies that possess large amounts of data on their customers say that police and intelligence agencies have been increasingly coming to them looking for tidbits of information that could help them stop everything from money launderers to pedophiles and terrorists, the Wall Street Journal reports. From the article: 'According to AOL executives, the most common requests in criminal cases relate to crimes against children, including abuse, abductions, and child pornography. Close behind are cases dealing with identity theft and other computer crimes. Sometimes the police requests are highly targeted and scrupulously legalistic, while other times they were seen by the company as little more than sloppy fishing expeditions. AOL says that most requests get turned down.'"

UK Government Wants Private Encryption Keys 822

An anonymous reader writes "Businesses and individuals in Britain may soon have to give their encryption keys to the police or face imprisonment. The UK government has said it will bring in the new powers to address a rise in the use of encryption by criminals and terrorists." From the article: "Some security experts are concerned that the plan could criminalise innocent people and drive businesses out of the UK. But the Home Office, which has just launched a consultation process, says the powers contained in Part 3 are needed to combat an increased use of encryption by criminals, paedophiles, and terrorists. 'The use of encryption is... proliferating,' Liam Byrne, Home Office minister of state told Parliament last week. 'Encryption products are more widely available and are integrated as security features in standard operating systems, so the Government has concluded that it is now right to implement the provisions of Part 3 of RIPA... which is not presently in force.'"

Sun Says Java Source Already Available 304

mjdroner writes "In an InfoWorld article, Java CTO James Gosling says that source code for Java has been available for 10 years. Gosling claims Java is close to an open source model, though discounts Sun joining the Eclipse Foundation. He goes on to say that Eclipse's endorsement of the standard widget toolkit destroyed interoperability, saying it's based on the windows API, making it problematic to run on other platforms."

John Dvorak's Eight Signs MS is Dead in the Water 711

j79 writes "John Dvorak has written an opinion piece on why he believes Microsoft is dead in the water. He discusses Vista, Office 2007, MSN and MSN search, the Xbox 360, Pad-based computing, .Net, and Microsoft's obsession with Google. "

Apple Sets Tune for Pricing of Song Downloads 396

PygmySurfer writes "Apple Computer on Monday revealed it had renewed contracts with the four largest record companies to sell songs through its iTunes digital store at 99 cents each. The agreements came after months of bargaining, and were a defeat for music companies that had been pushing for a variable pricing model."

Colbert New Comic-in-Chief 939

scottzak writes "Hail to the Chief! Stephen Colbert addressed the White House Correspondents Dinner Saturday (attended by the President, the elite of Washington politics, and the White House Press Corps) and told the truth. Jaws dropped. Eyes popped. The live audience gasped. Scalia laughed his ass off. You want to see a brilliant comic display some real courage? Look no further. Enjoy the reaction shots, and Colbert's audition for Press Secretary job." The BBC covers the act just prior to Mr. Colbert's, where the President and a look-alike took turns making fun of his speaking skills.

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...