Switzerland, like probably some other countries in Europe, has privacy of its citizen written in the law. That means that, by default, you are not allowed to take pictures of home gardens without prior approval (with or without fence). You also cannot also take picture of, or interview, individuals without their prior consent.
What, there is no [Like] button on Slashdot?
Where do I download Quake 8.9? I'm still at version 4...
PlasticCap writes: Gregory D. Evans, the questionable information security personality, and his company, Ligatt Security International, have been compromised. The attackers obtained Gregory's inbox and other information, including the password to his Twitter account, then put that data inside a 4.5 GB 7Zip archive and created a torrent of it. You may remember Gregory from when he released a book, "How to Become the World's #1 Hacker," which largely plagiarized actual respected security researchers, their own books, and their websites.
Link to Original Source
Link to Original Source
An anonymous reader writes "The blog post shows an embedded device cold booting Linux to a QT application all in just one second. This post also includes a link which describes what modifications were made to achieve this."
An anonymous reader writes with this quote from Eurogamer: "Gamers who download upcoming PC exclusive The Witcher 2 illegally could receive a letter demanding they pay a fine or face legal action. If gamers refuse to pay the fine, which will be more than the cost of the game, they could end up in court, developer CD Projekt told Eurogamer. 'Of course we're not happy when people are pirating our games, so we are signing with legal firms and torrent sneaking companies,' CD Projekt co-founder Marcin Iwiski said. 'In quite a few big countries, when people are downloading it illegally they can expect a letter from a legal firm saying, "Hey, you downloaded it illegally and right now you have to pay a fine." We are totally fair, but if you decide you will not buy it legally there is a chance you'll get a letter. We are talking about it right now.' Interestingly, The Witcher 2 will be released free of digital rights management – but only through the CD Projekt-owned digital download shop GOG.com. That means owners will be able to install it as many times as they like on any number of computers – and it will not requite an internet connection to run."
Isarian writes with a story, as reported on Gawker and many other places, that "Cooks Source Magazine is being raked over the coals today as word spreads about its theft of a recipe from Monica Gaudio, a recipe author who discovered her recipe has been published without her knowledge. When confronting the publisher of the offending magazine, she was told, 'But honestly Monica, the web is considered "public domain" and you should be happy we just didn't "lift" your whole article and put someone else's name on it!' In addition to the story passing around online, Cooks Source Magazine's Facebook page is being overwhelmed with posts by users glad to explain copyright law to the wayward publisher."
= LogMeIn + Dropbox. What else? Weave on Firefox. That's it.
An anonymous reader writes "Echelon, Microsoft, Intel, Sun and the Electronic Industries Alliance have been trying to create a home automation standard for two decades — to no avail. Now the ZigBee Alliance, proprietor of a low-rate two-way wireless mesh networking technology, says it will prevail. In six weeks, automation vendor Control4, which has about one million ZigBee nodes installed, will flip the switch on the new ZigBee Pro, which promises interoperability among light switches, thermostats, door locks, motorized shades, security systems, remote controls and some 36 million electric meters."
Elektroschock writes "For 4 years MEP Marco Cappato tried to get access to the EU Council's 2005 open source migration study because he is a member of a responsible IT oversight committee in the European Parliament. His repeated requests for access were denied. Now they have finally been answered because the Council's study has escaped into the wild (PDF in French and English). Here is a quick look. It is embarrassing! Gartner, when asked if there were any mature public Linux installations in Europe, claimed that there were none. Michael Silver said, 'I have not spoken to any sizable deployments of Linux on the desktop and only one or two StarOffice deployments.' Gartner spread patent and TCO FUD. Also, the European Patent Office participated in the project, although it is not an EU institution."
An anonymous reader writes "Chris Walters writes about Facebook's new terms of service. 'Facebook's terms of service (TOS) used to say that when you closed an account on their network, any rights they claimed to the original content you uploaded would expire. Not anymore. Now, anything you upload to Facebook can be used by Facebook in any way they deem fit, forever, no matter what you do later. Want to close your account? Good for you, but Facebook still has the right to do whatever it wants with your old content. They can even sublicense it if they want.'" Oh no! Now they'll be able to license your super flair goblin poke 25 tag history!
Heise Security reports that a 'team of researchers from Bonn University and RWTH Aachen University have analysed the notorious Storm Worm botnet, and concluded it certainly isn't as invulnerable as it once seemed. Quite the reverse, for in theory it can be rapidly eliminated using software developed and at least partially disclosed by Georg Wicherski, Tillmann Werner, Felix Leder and Mark Schlösser. However it seems in practice the elimination process would fall foul of the law.'
Flavien writes: "A team from the Security and Cryptography Laboratory (LASEC) in Lausanne, Switzerland, found 4 different ways to fully or partially recover keystrokes from wired keyboards at a distance up to 20 meters, even through walls. They tested 11 different wired keyboard models bought between 2001 and 2008 (PS/2, USB and laptop). They are all vulnerable to at least one of our 4 attacks. While more information on these attacks will be published soon, a short description with 2 videos is available."
Link to Original Source
Link to Original Source
pondlife writes "A friend asked me today about using some Microsoft server components from Perl. Over the years he's built up a large collection of Perl/COM code using Win32::OLE and he had planned on doing the same thing here. The big problem is that as with many current MS APIs, they're available for .NET only because COM is effectively deprecated at this point. I did some Googling, expecting to find quickly the Perl equivalent of IronPython or IronRuby. But to my surprise I found almost nothing. ActiveState has PerlNET, but there's almost no information about it, and the mailing list 'activity' suggests it's dead or dying anyway. So, what are Perl/Windows shops doing now that more and more Microsoft components are .NET? Are people moving to other languages for Windows administration? Are they writing wrappers using COM interop? Or have I completely missed something out there that solves this problem?"
PatrickByrne writes "This is The Register's world-class investigative piece concerning one aspect of the meltdown on Wall Street ('naked short selling') and how the criminals engaged a journalist to distort Wikipedia to confuse the discourse. The article explicitly and formally accuses a well-known US financial journalist, Gary Weiss, of lying about his efforts to distort a Wikipedia page under assumed names, and accuses the Powers That Be in Wikipedia (right up to and including Jimbo Wales) of complicity in protecting Weiss. This is not another story about a 15-year-old farm kid in Iowa pretending to be a professor. This is like the worst Chomskian view of Elites manipulating mass opinion. But it is all documented." We discussed the alleged Wikipedia manipulation when The Register first wrote about it last December. The submitter is the CEO of Overstock.com and a major player in this drama from the beginning.