Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Slashdot experiences total loss of Internet viewers over April Fools

Submitted by JohnnyDoesLinux
JohnnyDoesLinux (19195) writes "There were many warnings about the April Fool's day stories, but nobody believed them. A witness says, "It was if the new beta had taken over the minds of the people running the site, and they just shrugged off good advice".

See for yourself:
So now people are mourning the total loss of Slashdot as a viable website for Nerds, now it is "News for Nincompoops"."

+ - Government Says Big Pharma Kills More People Than All Illegal Drugs Combined->

Submitted by abhishekmdb
abhishekmdb (4015829) writes "A new study has shown that pharmaceutical drugs cause more overdoses and more deaths than all of the illegal drugs on the market combined. According to the government’s own statistics, listed on the Centers for Disease Control and Prevention (CDC) website, deaths relating to pharmaceutical drugs rose to roughly 23,000 last year, which accounts for over half of the total overdose deaths in the country for that time period.

Additionally, a recent study conducted by researchers with the University of Virginia, University of Arkansas, the Partnership for Drug Free Kids, and the American Institutes for Research reconfirmed the known dangers of pharmaceutical drug abuse.

The study concluded that, “Teens need help before they reach these tipping points for prescription drug abuse. Adults spotting teens with very high levels of anxiety and at least moderate use of other restricted substances should realize that these are students with a high likelihood of prescription abuse. Male teens with a high need to be popular and teens in general appear to be at exceptional risk. Campaigns must target parents as well, since they clearly underestimate both the physical risks of prescription drugs and the likelihood that their children will abuse these drugs.”
Sadly, the authors of the study described any average teenager, however, it does give us some insight into the root causes of teenage drug abuse."

Link to Original Source

Comment: Re:Delete stuff. (Score 1) 271

by Em Adespoton (#49387407) Attached to: Ask Slashdot: Dealing With User Resignation From an IT Perspective?

claiming something doesn't make it false -- in this case it would be true.

However, the gear isn't theirs -- as I originally pointed out, it's the company's, which is why it is being respected as the company's gear, and is being reimaged to be in compliance with company policy.

However, this doesn't work as well with BYOD, which is increasingly common. In those cases, you need other ways of fencing off company data from personal data.

Comment: Re:Do It, it worked in AZ (Score 1) 886

by Em Adespoton (#49387365) Attached to: Gen Con Threatens To Leave Indianapolis Over Religious Freedom Bill

Ah; but 1) I don't stand on the female golfer at all
and 2) I *can* have it both ways, as these things are open to context and interpretation.

Since there's really nothing differentiating a male golfer from a female golfer other than gender, I see no problem with her joining. On the other hand, there's lots of other clubs she could have joined.

So I'm on both sides, and feel that they should have been able to amicably work it out between them instead of bringing it to court. There are always exceptions to the rules.

Comment: Re:Copyright (Score 1) 99

by Em Adespoton (#49387347) Attached to: Mario 64 Remake Receives a DMCA Complaint From Nintendo

The point here is that in order to sell new games, they would need to advance the progress of science and the useful arts. That's what copyright is all about.

A new game that's like an old game, but can run on different hardware, with slightly improved graphics, slightly improved sound, and in-game purchases, does not advance the progress of science and the useful arts.

Basically, history shows that people are willing to pay for products that achieve what copyright sets out to achieve. People tend to find alternate ways of preserving their societal history when copyright is used as a means of artificial monopoly for the sake of holding our social heritage hostage.

+ - Angry Boss Phishing Emails Prompt Fraudulent Wire Transfers->

Submitted by chicksdaddy
chicksdaddy (814965) writes "Lots of studies have shown that assertiveness works ( in the professional as well as personal sphere. It turns out to work pretty well in the cyber criminal sphere, also (

Websense Labs has posted a blog warning of a new round of spear phishing attacks that rely on e-mail messages posing as urgent communications from senior officers to lower level employees. The messages demand that the employees wire funds to a destination account provided in the message. (

According to Websense, these attacks are low tech. The fraudsters register “typo squatting” domains that look like the target company’s domain, but are subtly different. They then set up e-mails at the typo squatted domain designed to mirror legitimate executive email accounts.
Like many phishing scams, these attacks rely on the similarities of the domains and often extensive knowledge of key players within the company, creating e-mails that are highly convincing to recipients.

The key element of their attack is – simply – “obeisance,” Websense notes. “When the CEO or CFO tells you to do something, you do it.” Specifically, the attackers sent emails to lower level employees that appeared to come from executives. The messages were brief and urgent, included (phony) threads involving other company executives and demanded updates on the progress of the transfer, making the request seem more authentic. Rather than ask the executive for clarification (or scrutinize the FROM line), the employees found it easier to just wire the money to the specified account, Websense reports.

Websense notes the similarities between the technique used in the latest phishing attack and the grain trading firm Scoular in June, 2014. That company was tricked into wiring some $17 million to a bank in China, with employees believing they were acting on the wishes of executives who had communicated through e-mail. ("

Link to Original Source

Comment: Re:Copyright (Score 4, Insightful) 99

by Em Adespoton (#49382543) Attached to: Mario 64 Remake Receives a DMCA Complaint From Nintendo

This one's easy: Nintendo still sells games. They're afraid that if people start playing conversions of their old games (or even just start watching videos of other people playing old games), they'll have no incentive to go out and by their newer games/consoles.

The reality probably includes that, but also includes the fact that since IP goes so deep, any Nintendo games are likely to include IP licensed from others, with specific contract details outlining how the IP can be used. If some third party starts duplicating/redistributing this IP, things get messy.

Not the way it *should* be, but it's the way it *is*. Shortening copyright to 14 years for digital works would fix a lot of this.

Comment: Re: Delete stuff. (Score 1) 271

I think you've just proven that it's good advice in the UK too -- because if the email is personal rather than business, you will be in a lot of trouble via the privacy act if you let those personal emails fall into the hands of the co-workers of the individual who left. So you MUST back up everything (without looking at it to see what's personal and what isn't) and MUST then clear out all the personal email before allowing other co-workers to look at the archive. Failure to do either is a criminal offense in the UK.

Comment: Re:Delete stuff. (Score 1) 271

You summed this up nicely -- including my propensity to use closely matched mnemonic clauses :) I almost switched from "on the company time" to "the company's business" but it sounded clunky, and I figured everyone already knew what I was talking about and just needed a friendly reminder.

Obviously at least one person needed it spelled out in more detail :)

Comment: Re:Remove access ASAP (Score 2) 271

Security is already done or not when the notice goes in... but shutting off access, as the GP pointed out, is done as a simulated test environment. Basically, it's a "What would things be like if he wasn't here?" while he's still around to help out if it turns out something was missed. The alternative is assuming that everyone has a perfect memory and that all systems have been adjusted appropriately, all project migrated properly, and no further questions need to be asked (in which case, why not give him 2 weeks paid vacation, if he isn't needed anymore?).

Comment: Re:Delete stuff. (Score 4, Insightful) 271

And beyond this... if it's on the company computer, it's on the company's time, and is the company's business. A lot of people forget this and use company systems for personal stuff, but it's still company data, and has been proven to be so in court.

So yeah; back up everything now, and then provide a sanitized version for others to look through as need arises.

The truth is, even if there's something critical in the backup, it's likely that nobody will ever know its there and so have reason to go looking for it. But CYA is always important for IT.

Comment: Re:Complete fail (Score 1) 54

by Em Adespoton (#49372401) Attached to: Apple Extends Its Trade-In Program

Now that that's out of the way... I've got devices from 2009. I can't find any way to even trade them in.

Back in 2011, I had an iOS device failure out of warranty, and I got a $50 value for bringing in the back cover of my previous device. Didn't need to bring in the rest, just the back cover, and I got $50 off the replacement. This probably kept me from going with an Android device at the time, and now I'm locked into the iOS App walled garden.

So not sure about how they've adjusted the program now, but the old way definitely has affected my buying decisions.

Comment: Re:Results? (Score 1) 61

by Em Adespoton (#49358275) Attached to: Hoax-Detecting Software Spots Fake Papers

Well why not automate the process? SCIgen should just subscribe to the SciDetect source repo, and auto-update its copy when the trunk updates. SciDetect should then subscribe to the SCIgen source repo, and ensure that it detects any newly missed sets.

Leave this system alone for a while, and we won't need to write articles anymore, as SCIgen should do a better job of producing insightful but unintelligible drivel than you'd get from any peer-reviewed journal -- and it would detect itself to boot!

"Most of us, when all is said and done, like what we like and make up reasons for it afterwards." -- Soren F. Petersen