Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

Submission + - UK Goverment to outsource data snooping (guardian.co.uk)

bone_idol writes: The Guardian is reporting that The private sector will be asked to manage and run a communications database that will keep track of everyone's calls, emails, texts and internet use under a key option contained in a consultation paper to be published next month by Jacqui Smith, the home secretary. Also covered on the BBC
Google

Submission + - Google tells users to drop IE6 (tgdaily.com)

Kelly writes: "Google is now urging Gmail users to drop Internet Explorer 6 (IE6) in favor of Firefox or Chrome. Google recently removed Firefox from the Google Pack bundle, replaced it with Chrome, then added a direct download link for Chrome on Google and YouTube. Google's decision to list IE6 as an unsupported Gmail browser does not affect just consumers: Tens of thousands of small- and mid-sized businesses that run Google Apps hosted services may dump IE6 as well. What's especially interesting is the fact that Mozilla is picking up two out of three browser users that Microsoft surrenders."
Programming

Submission + - Future of Compiz Uncertain 1

dov_0 writes: "Kristian Lyngstol from the Compiz project has shared some pretty big worries about the health of the Compiz/compiz-fusion project. He cites a lack of direction, organisation and a dropping number of programmers as major areas of concern. Responses from the compiz community to his mailing list post have not been overwhelming, with only one person posting in his support so far.

If Compiz was gone, surely someone else would pick up the pieces? Distros like Ubuntu have made it a notable feature of their desktop setup. Haven't we all enjoyed the glazed over eyes and admiring stares of onlookers as we spin our desktop cubes and pull out bling that makes Vista desktop effects fade by comparison?

Is the compiz project already dead without knowing it and who will pick up pieces and keep our desktop cubes spinning?"

Comment Re:Obfuscation 101 (Score 5, Informative) 101

Best Use of Light and Spheres:

        Anders Gavare
        Gibraltargatan 82-156
        SE-412 79 Gothenburg
        Sweden

        http://www.mdstud.chalmers.se/~md1gavan/

Judges' Comments:

        To build:

        make gavare

        To run: ./gavare > ioccc_ray.ppm

        For users of systems that distinguish between text and binary mode
        (you know who you are), add a library call that specifies binary mode
        for stdout as the first statement of main(),
        or use freopen("ioccc_ray.ppm", "wb", stdout) and do not use redirection.

        A freely distributable command-line version of Microsoft Visual C
        exhibits an optimizer bug when compiling this entry. Disable /Og for
        best results.

        The judges were able to figure out how to control position
        (in all 3 coordinates), size, and color (to some extent) of the balls.

Selected Author's Comments:

        It is possible to write some kinds of programs in C without using reserved
        words. For very short and trivial programs, it usually isn't very hard to
        write a variant using no reserved words, but with this program I want to
        show that also non-trivial programs can be written this way. This IOCCC
        entry contains no reserved words (I don't count 'main' as a reserved word,
        although the compiler gives it special meaning) and no preprocessor
        directives.

        The program is a small ray-tracer. The first line of the source code may
        be modified if you want the resulting image to be of some other resolution
        than the predefined. The 'A' value is an anti-alias factor. Setting it to
        1 disables the anti-aliasing feature (this makes the output look bad), but
        setting it too high makes the trace take a lot more time to complete.

        The ppm image can then be viewed using an image viewer of your own choice.
        (Running the ray-tracer may take several minutes, even on fast machines,
        so be patient.)

        I am very much aware about the fact that I'm breaking the guidelines. For
        example, the word 'int' is a reserved word and therefore all variable
        declarations are implicit. There will no doubt be _lots_ of warnings,
        no matter which compiler is used. Still, the source code should be word-
        length-independent and endianess-independent.

        Another reason for writing code without using reserved words is that many
        text editors will make all reserved words turn BOLD when printed on
        paper. Since I care for the global environment, we shouldn't waste any
        more laser toner, or ink, than necessary. Everyone should write C code
        with no reserved words, and our world will be a better place.

Security

Submission + - What to do about suspected network attack

An anonymous reader writes: I help volunteer manage a community open access wireless network covering an innercity area of the United Kingdom.

As well as providing open access internet access via wireless, the network is used to provide internet access to some residential and business properties, where computers connect more conventionally with cat 5 cable

We transparently proxy with squid outgoing http traffic, and recently noticed a number of 'hacking' tools being downloaded to an ip address at a local business / housing coop. Out of interest I ssh'd into the local router at that site, and ran tcpdump on that segment. The pc that had downloaded the tools was spoofing the arp replies of another PC on the local LAN. This looked to me like an attempt to capture data destined to another user there.

What should I do ? I don't manage or have any direct influence on IT at the business where this happened, but I could contact someone who lives there and pass the information on, or I could just ignore it, after all its not really my business, and the traffic does not impact on the wider wireless network.

Slashdot Top Deals

For large values of one, one equals two, for small values of two.

Working...