Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Submission + - Comcast Warns Customers Suspected of Bot Infection (

eldavojohn writes: Comcast is pushing a new program nationwide that warns customers if they might have a bot infection. It puts a semitransparent overlay on the top of the website you're viewing warning you that you may have a bot installed if the provider detects botnet traffic from your residence. Of course, if you have multiple machines running behind a router or modem then you're going to have a difficult time pinning down which machine might have the infection.

Anti-Speed Camera Activist Buys Police Department's Web Domain Screenshot-sm 680

Brian McCrary just bought a website to complain about a $90 speeding ticket he received from the Bluff City PD — the Bluff City Police Department site. The department let its domain expire and McCrary was quick to pick it up. From the article: "Brian McCrary found the perfect venue to gripe about a $90 speeding ticket when he went to the Bluff City Police Department's website, saw that its domain name was about to expire, and bought it right out from under the city's nose. Now that McCrary is the proud owner of the site,, the Gray, Tenn., computer network designer has been using it to post links about speed cameras — like the one on US Highway 11E that caught him — and how people don't like them."

Submission + - IBM Granted Fill 'Er Up! Patent

theodp writes: The first mid-air refueling between two planes occurred on June 27, 1923, between two Airco DH-4B biplanes of the United States Army Air Service. But that didn't stop the USPTO from issuing a business method patent to self-purported business method patent foe IBM on Tuesday for Operating and Managing a Re-Fueling Business, an invention that Big Blue describes thusly: 'The method includes contracting with a customer to fuel a fuel consuming vehicle for the customer, providing a locking device with a fuel tank of the vehicle, the locking device being unlockable by the re-fueling business and the customer, and transporting a fuel containing structure from the re-fueling business to various locations of the customer's vehicle whenever a fueling of the vehicle is desirable to the business and the customer, the locations being remote of the business, unlocking the locking device of the fuel tank upon arrival at the locations, filling the fuel tank with an amount of fuel from the fuel containing structure upon the transporting of the fuel container to the locations, and re-locking the locking device after filling the fuel tank with the amount of fuel.'

Submission + - Cameras Unravel a Homicide, Frame by Frame 3

Pickens writes: "For years, the United Arab Emirates has been using its oil wealth to build up a defense and security infrastructure with over 10,000 surveillance cameras that allows law enforcement to track anyone, from the moment they get off an airplane, to the immigration counter where their passport is scanned, through the baggage claims area to the taxi stand where cameras record who gets into what cars, which log their locations through the city's automated highway toll system, all the way to their hotels, which also have cameras. Now the Los Angeles Times reports that a team of 20 investigators pored over 648 hours of surveillance videos using facial recognition software to sketch out a picture of 27 suspects involved in the murder of a 50-year-old Hamas commander wanted by Israel in the kidnapping and killing of two Israeli soldiers. In the end, a mixture of high-tech razzle-dazzle and old-fashioned investigative work cracked the case. "Dubai police are very good at piecing together crimes," says Theodore Karasik, a security analyst at the Institute for Near East and Gulf Military Affairs. "I've seen it before when you had robberies or murders occur and you'll forget about the story and then six months later the guys are arrested via Interpol brought back here and then they disappear into the system." The case has generated what most analysts consider unwelcome fallout for Israel, which many suspect of being behind the attack but if Mossad agents were involved, the operation blew the identities of 27 agents. "They'll never be able to go outside of Israel again, even with disguises," says Karasik. "Biometrics means all of the contours of your face are on file.""

Machines certainly can solve problems, store information, correlate, and play games -- but not with pleasure. -- Leo Rosten