Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Censorship

Own Your Own 128-Bit Integer 477

Byte Swapper writes "After all the fuss over the AACS trying to censor a certain 128-bit number that now has something over two million hits on Google, the folks at Freedom to Tinker would like to point out that you too can own your own integer. They've set up a script that will generate a random number, encrypt a copyrighted haiku with it, and then deed the number back to you. You won't get a copyright on the number or the haiku, but your number has become an illegal circumvention device under the DMCA, such that anyone subject to US law caught distributing it can be punished under the DMCA's anti-trafficking section, for which the DMCA's Safe Harbor provisions do not apply. So F9090211749D5BE341D8C5565663C088 is truly mine now, and you can pry it out of my cold, dead fingers!"
Portables

India Hopes to Make $10 Laptops a Reality 311

sas-dot writes "We all know Nicholas Negroponte's $100 OLPC. India, which was a potential market, rejected it. India's Human Resources Development ministry's idea to make laptops at $10 is firmly taking shape with two designs already in and public sector undertaking Semiconductor Complex evincing interest to be a part of the project. So far, the cost of one laptop, after factoring in labor charges, is coming to $47 but the ministry feels the price will come down dramatically considering the fact that the demand would be for one million laptops."
Internet Explorer

Submission + - IE7 and FF 2.0 share vulnerability

hcmtnbiker writes: Internet Explorer 7 and Firefox 2.0 share a logic flaw. The issue is actually more severe, as the two versions of the Microsoft and Mozilla browsers are not the only ones affected. The vulnerability impacts Internet Explorer 5.01, Internet Explorer 6 and Internet Explorer 7, and Firefox 1.5.0.9. "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, ".value" parameter cannot be set or changed, and any changes to .type reset the contents of the field," said Michal Zalewski, the person that discovered the IE7 flaw. There are Proof of concepts for both IE7 and firefox
Internet Explorer

Internet Explorer 7 on Linux 234

An anonymous reader writes to mention WebExpose is running a quick guide to get Internet Explorer 7.0 running on Linux. From the article: "Microsoft conditional comments do work, unlike the standalone version of IE on Windows, so you will be able to develop and test webpages across almost all major browsers (IE 5-7, Firefox, Opera) on one Linux box! Also note that we will avoid Microsoft's Genuine Advantage download validation checks, so pure-Linux users will be able to finish the process without having to find a genuine Windows machine to download the IE7 setup file (the check is avoided legitimately, by the way)."
IT

What Will Happen in IT in 2007? 318

An anonymous reader writes "ZDNet's Paul Murphy has set out his IT predictions for 2007. Featured among the completely predictable, OpenSolaris overtaking Linux is apparently inevitable within one year. From the article: 'By the end of the year the OpenSolaris community will be widely recognized as larger and more active than the Linux community.' Is 2007 the year of the OpenSolaris desktop? Other 'inevitables' include Microsoft's success with Vista, the continuing phase-out of Itanium, and the Cell processor powering most of the world's super-computers."
Security

Detecting Rootkits In GNU/Linux 142

An anonymous reader sends note of a blog post on rootkit detection in GNU/Linux. The article mentions only two utilities for ferreting out rootkits — the first comment to the blog post lists three additional ones — but it could be useful for those who haven't thought about the problem much. From the article: "A rootkit... is a collection of tools that a cracker installs on a victim's computer after gaining initial access. It generally consists of log cleaning scripts and trojaned replacements of core system utilities such as ps, top, ifconfig and so on."
Microsoft

Microsoft Looking to Run Windows on OLPC 392

pete314 writes "Microsoft has been provided with a number of test models of Nicholas Negroponte's One Laptop per Child computers and is trying to get Windows installed on them. The current design runs a custom version of Red Hat's Fedora Linux. Running Windows will take quite a bit of additional memory: the OLPC has 512Mb of Flash, where XP requires a minimum of 1.5Gb storage."

Mystery of Ancient Calculator Finally Cracked 241

jcaruso writes, "It's been more than 100 years since the discovery of the 2,000-year-old Antikythera Mechanism, but researchers are only now figuring out how it works." From the article: "Since its discovery in 1902, the Antikythera Mechanism — with its intricate and baffling system of about 30 geared wheels — has been an enigma... During the last 50 years, researchers have identified various astronomical and calendar functions, including gears that mimic the movement of the sun and moon. But it has taken some of the most advanced technology of the 21st century to decipher during the past year the most advanced technology of the 1st century B.C."

French National Assembly Embraces Open Source 88

eldavojohn writes "The French National Assembly is in the news as they have recently switched to Linux, OpenOffice.org & open source software at the request of several deputy members. Bernard Carayon wrote it it into the proposal entitled 'On Equal Terms' [French PDF]. From the article, 'IT staff at the National Assembly have almost six months to prepare the switch to open source.' The same document urged France to adopt ODF as a standard. Hopefully things go more smoothly for them than the Birmingham library effort."

More Voting Shenanigans in Florida 680

stewwy writes "It looks like the the shenanigans have started already, the Register is running a story about the difficulty early voters are having with casting votes for Democrats." From the article: "The touch-screen gizmos seem strangely attracted to Republican candidates. One voter needed assistance from an election official, and even then, needed three tries to convince the machine that he wanted to vote for Democrat Jim Davis in the gubernatorial race, not his Republican opponent Charlie Crist."

Diebold Disks May Have Been For Testers 182

opencity writes "The Washington Post reports on the two Diebold source disks that were anonymously sent to a Maryland election official this past week. Further investigation has lead individuals involved to believe the disks came from a security check demanded by the Maryland legislature sometime in 2003." From the article: "Critics of electronic voting said the most recent incident in Maryland casts doubt on Lamone's claim that Maryland has the nation's most secure voting system. "There now may be numerous copies of the Diebold software floating around in unauthorized hands," said Linda Schade, co-founder of TrueVoteMD, which has pressed for a system that provides a verifiable paper record of each vote."

Bug Hunting Open-Source vs. Proprietary Software 244

PreacherTom writes "An analysis comparing the top 50 open-source software projects to proprietary software from over 100 different companies was conducted by Coverity, working in conjunction with the Department of Homeland Security and Stanford University. The study found that no open source project had fewer software defects than proprietary code. In fact, the analysis demonstrated that proprietary code is, on average, more than five times less buggy. On the other hand, the open-source software was found to be of greater average overall quality. Not surprisingly, dissenting opinions already exist, claiming Coverity's scope was inappropriate to their conclusions."

Public Betas For CrossOver Mac and Linux 183

Jeremy White writes, "I am happy to announce that we have put up a new version of our public beta of CrossOver Mac as well as an equivalent public beta of CrossOver Linux. For Mac users, this release includes fixes to Internet Explorer, fixes for many cases where programs would crash when run (e.g. Microsoft Office 2000 and similar older applications), fixes for Outlook 2003, and a range of other improvements. For Linux users, the big highlights are support for World of Warcraft and many Steam based games (including Half Life 2 and Counterstrike), as well as support for Outlook 2003. Version 6 also represents a major improvement in the core of Wine since version 5 of CrossOver, so you may be pleasantly surprised as you try running unsupported applications."

Firefox To Be Renamed In Debian 625

Viraptor writes, "Debian is ready to change the name of Firefox in its distributions, beginning with Etch. They say it can be done within a week. The reasons stem from Mozilla's recent insistence on trademark fidelity and its preferences regarding Firefox patches. Debian doesn't want to accept the original trademarked fox & globe logo; they don't see it as really 'free' to use. On the other hand, Mozilla doesn't want Firefox distributed under that name if it lacks the logo. Mozilla also wants Debian patches to be submitted to them before distribution, and claims that's what others (Red Hat and Novell) are already doing. But some believe development and releases will slow down if distribution-specific patches have to be checked and accepted first. We will surely see more clashes between copyright claims and 'really free' distros such as Debian. Ubuntu is also asking similar questions." No word yet what the new name will be or what the logo will look like.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...