Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Submission + - Argentina Censors Millions Of Websites 3

bs0d3 writes: A judge in Argentina ordered ISPs to block two and . According to google many isps have simply blocked the ip instead of a targeted dns filter. Several million blogspot blogs are hosted at this ip.

Freedom of speech advocate Jillian York writes:

IP blocking is a blunt method of filtering content that can erase from view large swaths of innocuous sites by virtue of the fact that they are hosted on the same IP address as the site that was intended to be censored. One such example of overblocking by IP address can be found in India, where the IP blocking of a Hindu Unity website (blocked by an order from Mumbai police) resulted in the blocking of several other, unrelated sites. As Andrade points out, "There are other less restrictive technical procedures than the one used, which allow ISPs to comply with court orders fully, while affecting only the sites involved."


Submission + - Germany: Facebook Like Button Is Illegal

An anonymous reader writes: Facebook’s Like button today was found in violation of Germany’s strict privacy laws. Commissioner Thilo Weichert, who works for the Independent Centre for Privacy Protection (ULD) in the northern German state of Schleswig-Holstein, said the social network’s plugin, which allows Internet users to express their appreciation of something online, illegally puts together a profile of their Web habits.

Submission + - China wants your genes (

An anonymous reader writes: Beijing Genomics Institute (BGI) is looking for smart volunteers to donate their genes for analysis. They are seeking subjects with high intelligence, you can only qualify if you got a high score in SAT/ACT/GRE or got awards in competitions like Math/Physics Olympiads or TopCoder. They're also launching a drive to recruit US participants, their first stop appears to be Google, which has run into trouble with the Chinese government.

Also worth noting: BGI is registered in China as an "Institutional Organization", which by law requires it to report to a supervising governmental office or agency.

Submission + - Google discontinues Labs (

Expertus writes: goolge reports: "Last week we explained that we’re prioritizing our product efforts. As part of that process, we’ve decided to wind down Google Labs. While we’ve learned a huge amount by launching very early prototypes in Labs, we believe that greater focus is crucial if we’re to make the most of the extraordinary opportunities ahead.

In many cases, this will mean ending Labs experiments—in others we’ll incorporate Labs products and technologies into different product areas." Enjoy them while they last


Submission + - 8% of Android Apps Are Leaking Private Information ( 1

kai_hiwatari writes: "Neil Daswani, who is also the CTO of security firm Dasient, says that they have studied around 10,000 Android apps and have found that 800 of them are leaking private information of the user to an unauthorized server. Neil Daswani is scheduled to present the full findings at the Black Hat Conference in Las Vegas which starts on July 30th. The Dasient researchers also found out that 11 of the apps they have examined are sending unwanted SMS messages."

Submission + - Zeus Trojan Hits Android Devices ( 2

Trailrunner7 writes: The Zeus banking Trojan has jumped the bridge to the large and growing ecosystem of mobile devices powered by Google's Android operating system, according to security researchers at Fortinet.

Researchers say they have obtained a Zeus variant, dubbed "Zitmo," that can run on Android phones and that has the ability to intercept one time pass codes sent to mobile phones as an added, "two factor" security measure.


Submission + - Did Google Knowingly Violate Java Patents? (

jfruhlinger writes: "Opponents of software patenting have been rather heartened by recent developments in the Oracle-Google lawsuit, which have seemed to indicate that Oracle's patent case is weakening. But now the judge in the case has some sharp questions for Google, given that Google tried to negotiate with Sun over the patents in question before going on to develop Android without them."

Submission + - MS Bluetooth Exposes Even Disconnected PCs ( 1

An anonymous reader writes: Among the 22 security holes Microsoft issued updates to fix today is a critical kernel-level Bluetooth flaw that could let nearby attackers break into vulnerable systems even when the targeted computer is not connected to a network. An attacker could use the bug to gain access to any unpatched, Bluetooth-enabled Windows Vista or Win7 computer within 100 meters (or much further with specialized tools), all before the target system even gets an alert that another computer is requesting a Bluetooth connection.

Submission + - Twelve windows applications Microsoft should make (

rhyous writes: Why doesn’t Microsoft make more of their own projects available on CodePlex?

Microsoft could have many open source projects that could become large communities. One open source community that continues to gain popularity is Windows Install XML. It seems to be a large community now and is growing rapidly. Strangely it is actually hosted at, though it has some sort of presence on CodePlex.

How many Open Source project could Microsoft have?

More people develop using Windows than any other operating system. (Yes, phone OSes may have or may someday take that overbut that is besides the point). Think of all the software companies in the world. How many of them don’t develop for Windows. Even Apple spends a lot of time making iTunes work on Windows. There are so many developers that might contribute that it is impossible to count them all. Some may end up contributing as part of their job. Many developers might contirubte to a project because it makes their development lives easier. Many enterprise customers might contribute to lower the costs of managing their environment. Many consulting and contract companies might contribute for their own reasons.

So what applications should Microsoft start with?

Here are a list of applications that Microsoft should open source immediately.

#1

Submission + - TSA roadside internal US checkpoints ( 2

AHuxley writes: Inspectors from the Transportation Security Administration (TSA) will more involved in roadside inspections of commercial vehicles, according to TSA officials.
VIPR (Visible Intermodal Prevention and Response) started in the aviation sector and has now been expanded into surface transportation, bus terminals and train stations.
VIPR operations are conducted at weigh stations, rest areas with truck stop under consideration. Backscatter x-ray devices will be used on the trucks.


Submission + - Assange receives recognition down-under. (

c0lo writes: Australian Wikileaks founder Julian Assange stands alongside the Dalai Lama and Nelson Mandela: Assange has been chosen by the Sydney Peace Foundation to receive a rare gold medal for peace with justice ***.
In related news: this Friday, in Federation Square, Melbourne, Assange joins (over the net) a discussion on wikileaks and freedom of speech. The discussion is campaigned by the GetUp Australia foundation, an independent, grass-roots community advocacy organisation with over 400000 members.

*** peace with justice relates to a way of thinking and acting which promotes non-violent solutions to every day problems and contributes to the development of civil societies.

The Internet

Submission + - Internode preps production IPv6 environment (

An anonymous reader writes: Australian ISP Internode will move to a native internet protocol version 6 (IPv6) production environment later this year, following an extensive public trial that included more than 200 “power users”. The migration this year will enable dual stack IPv6 capability for all aspects of Internode’s broadband, Web, mail and hosting services. During the transition, new and existing Internode users must opt in to use the IPv6 environment, but the service provider intends to offer the service to users automatically by the end of the year.

Submission + - Microsoft outs Yahoo as bandwidth hog ( 1

markass530 writes: Microsoft and Yahoo have finally acknowledged that Yahoo is, as has long been suspected, culpable for Windows Phone 7's excessive data usage. Microsoft admitted to a problem a couple of weeks ago, faulting an a third-party service but infuriatingly refusing to specify which third party.

This silence was unfortunate, as it left users with no good way to avoid the problem: given the potential to run up substantial bills, this was indefensibly irresponsible of Microsoft. Now that Yahoo! Mail has been confirmed as the problematic provider, users can mitigate the issue by setting any Yahoo accounts to check for mail only manually.


Journal Journal: All browser except IE have supported supertags for years .. 7

I first discovered "super-tags" more than half a decade ago, when I wondered what would happen if I tried to create and style my own tags, instead of just using the ones that are pre-defined in the html spec.

Most browsers "do the right thing" (and no, you don't need a special doctype declaration or DTD to do this) - they recognize ALL tags between a < and a > as html, and let you style them via css.

The Media

Submission + - Some Wikileaks Contributions to Public Discourse 3

Hugh Pickens writes: "EFF reports that regardless of the heated debate over the propriety of Wikileaks actions, some of the cables have contributed significantly to public and political conversations around the world. The Guardian reported on a cable describing an incident in Afghanistan in which employees of DynCorp, a US military contractor, hired a "dancing boy," an underaged boy dressed as women, who dance for gatherings of men and is then prostituted — an incident that contributed important information to the debate over the use of private military contractors. A cable released by Wikileaks showed that Pfizer allegedly sought to blackmail a Nigerian regulator to stop a lawsuit against drug trials on children. A Wikileaks revelation that the United States used bullying tactics to attempt to push Spain into adopting copyright laws even more stringent than those in the US came just in time to save Spain from the kind of misguided copyright laws that cripple innovation and facilitate online censorship. An article by the New York Times analyzed cables released which indicated the US is having difficulties in fulfilling Obama's promise to close the Guantánamo Bay detention camp and is now considering incentives in return for accepting detainees, including a one-on-one meeting with Obama or assistance obtaining IMF assistance. "These examples make clear that Wikileaks has brought much-needed light to government operations and private actions," writes Rainey Reitman, "which, while veiled in secrecy, profoundly affect the lives of people around the world and can play an important role in a democracy that chooses its leaders.""

"Today's robots are very primitive, capable of understanding only a few simple instructions such as 'go left', 'go right', and 'build car'." --John Sladek