Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:But how many of those 700,000 are alive? (Score 1) 358

meeting in a club is no indication of how old is ham radio. There (We) are a lot of hamradio operators with 1/2 of the age you state..
Im 37... and being a ham since 18... but I do not like to go to clubs but investigate about antennas, CW and QRP.. visiting a club to gossip with other members is not my kind

Comment Re:I am. (Score 3, Interesting) 358

Everybody can talk, but CW is an art.
you are invited to join www.skccgroup.com to improve your CW skills step by step.

I learnt CW when I was 12, and got my first Ham license when I was 18, I returned to hamradio last year.. after more than 12 years not using it and after tasting digital modes.. Im back to CW.. it is sooo nice.

Submission + - WhiteHouse.gov hacked (zone-h.org)

epe writes: well, it seems security should concern everybody, a whitehouse.gov page was defaced today as it looks from zone-h.org site

Comment Re:Why it took so long (Score 5, Interesting) 184

besides that, SL-6 is not as close to RHEL as CentOS, for example, I was not able to install SL-6 as a domU into a Xen dom0 2 weeks ago.. right now I easily installed CentOS-6 as a domU in the very same dom0. SL simply forgets several things, CentOS people are much more closer to RHEL-6 in this way.

Security

Submission + - US Dept of Commerce Wants To Handle Your Passwords (uberreview.com)

Art Vanderlay writes: US Commerce Department has just disclosed plans for a national cyber-identity system that will let you use a single secure password and identity for all of your digital transactions. the National Strategy for Trusted Identities in Cyberspace (NSTIC) will be an opt-in system that is designed to protect users from online fraud and identity theft. It will be interesting to see if people will trust the government with their passwords. I, like many slasdotter's, will pass on this offer.
Privacy

Submission + - Someone else's data 5

Spudster writes: Recently I purchased a server on Ebay that was not properly wiped by the leasing company that sold it. The result is a server that boots up into someone else's operating system. In this day and age of data breaches and personal information disclosures, what is the proper course of action to report something like this?
GNOME

Submission + - Final Fedora 15 GNOME 3.0 Test Day this Thursday (fedoraproject.org)

AdamWill writes: "Over the last few months, the Fedora project has run a series of test events for the major new GNOME 3 release. The third and final GNOME 3 Test Day is coming up this Thursday, 2011-04-21. Now the final GNOME 3.0 release has been made, this event will focus on testing its integration into the upcoming Fedora 15 release and exposing any remaining bugs that can be fixed with minor updates. This is a great opportunity to test out the final GNOME 3.0 code on a late pre-release Fedora 15 base, and help the Fedora and GNOME teams to produce a great release. There will be live images available to make sure you can test easily and without the need for a permanent installation — there's no need to be a Fedora user to help out. There are comprehensive testing instructions on the Wiki page, and assistance from the Fedora QA and desktop teams in #fedora-test-day on Freenode IRC throughout the day (WebIRC link for those without an IRC client)."

Submission + - Android Devices Banned From Princeton Campus (nyud.net) 1

pmdubs writes: A major bug in the Android DHCP implementation has forced network administrators to (effectively) ban the use of such devices on the Princeton campus. In the last few months, Princeton has had to kick more than 400 Android devices off the campus network for using IP addresses well beyond the alloted DHCP lease (to the detriment of other users), sending invalid DHCPREQUEST messages after lease expiration, and a variety of other wacky behaviors. The link provides a clearly documented explanation of the buggy behavior, as does this largely neglected bug report [http://code.google.com/p/android/issues/detail?id=11236].

Without doubt, this buggy behavior is affecting other, less vigilant networks, and disrupting wifi traffic for android and non-android devices alike.

Android

Submission + - Apple sues Samsung over Galaxy Phone and Tablet (allthingsd.com)

mystikkman writes: In the latest patent suit to hit the smartphone industry, Apple is suing Samsung, alleging the Galaxy line of phones and tablets infringe on a number of the company’s patents. “Samsung’s Galaxy Tab computer tablet also slavishly copies a combination of several elements of the Apple Product Configuration Trade Dress,” Apple says in its suit, noting that Samsung’s tablet, like Apple’s uses a similar rectangular design with rounded corners, similar black border and array of icons. Apple previously sued HTC over Android. If Samsung is found infringing on the software, all the Android OEMs could be vulnerable.
Privacy

Submission + - Etsy.com Privacy Breach (etsy.com)

Anonymous Coward writes: "Etsy.com has recently made all users' real names and purchase history available on the web. They can be searched from google (I checked). They are also refusing to contact buyers to alert them to this change. They do allow names to be changed, but only with a two day waiting period. There is a thread on their forum about it herehttp://www.etsy.com/teams/7718/site-help/discuss/6811996/page/1 where they have refused to respond to serious concerns for customer privacy. Since Etsy is refusing to notify its' members, please help me get the word out to them by posting on your website. Thank you."

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...