Forgot your password?
typodupeerror
Television

Fox Moves To Use Aereo Ruling Against Dish Streaming Service 210

Posted by timothy
from the crossing-the-streams dept.
An anonymous reader writes A day after a surprise U.S. Supreme Court decision to outlaw streaming TV service Aereo, U.S. broadcaster Fox has moved to use the ruling to clamp down on another internet TV service. Fox has cited Wednesday's ruling – which found Aereo to be operating illegally – to bolster its claim against a service offered by Dish, America's third largest pay TV service, which streams live TV programming over the internet to its subscribers and allows them to copy programmes onto tablet computers for viewing outside the home.

Comment: Re:Surprisingly Infrequent (Score 3, Insightful) 564

We use SCCM extensively at my office, and yes, it's entirely possible to tell it to reimage every single computer. You just need to target the deployment at "All Systems" and make it mandatory. My guess is that some admin picked the wrong collection, which is fairly easy to do in SCCM 2007 (2012 has Collection folders, which helps with that), and there's no warning messages -- just a summary of "this deployment is going to these devices, click Finish to do it." Of course, most other mass management tools assume that the admins know what they're doing, so they don't have much in the way of guard rails either.

One of the more obnoxious elements of SCCM is that there's no real way to recall a command you send out; clients pick up policy at periodic intervals, and without manual intervention, they'll just grab the policy and do what it says even if you kill the server in question. You can block deployments by taking down distribution points (if the clients can't grab content, they won't run the deployment), but you still have to be fairly quick about it to stop it.

What we do to prevent these sorts of disasters is implement process around the use of the ConfigMgr console and ensure only the people who know how to use it actually use it. To prevent an OS reimaging incident, our OS deployments go through a static set of collections by process and are always optional (requiring a manual touch, either at PXE boot or in the UI) except for a specific set of collections that are segregated in their own folder and have names and descriptions with scary words that make it clear what's going to happen. For instance, in our "Clean Reimage" folder, we have a collection that says, "Windows 7 Reimage (Clean, PXE, Forced)" with a description to the effect of, "*** A computer placed in this collection will be REIMAGED and LOSE ALL LOCAL DATA. Local state is NOT preserved or transferred. ***" If we were a larger IT organization, we'd probably use SCCM's role-based security to limit access to clean reimages to a specific group of people.

Idle

North Korea: Male University Students Required To Get Kim Jong-un Haircuts 110

Posted by samzenpus
from the I'll-get-an-un dept.
An anonymous reader writes in with one more reason not to accept that full-ride scholarship to a North Korea University. "Male university students in North Korea are now required to get the same haircut as their leader Kim Jong-un, it is reported. The state-sanctioned guideline was introduced in the capital Pyongyang about two weeks ago, Radio Free Asia reports. It is now being rolled out across the country - although some people have expressed reservations about getting the look. 'Our leader's haircut is very particular, if you will,' one source tells Radio Free Asia. 'It doesn't always go with everyone since everyone has different face and head shapes.' Meanwhile, a North Korean now living in China says the look is actually unpopular at home because people think it resembles Chinese smugglers. 'Until the mid-2000s, we called it the "Chinese smuggler haircut",' the Korea Times reports."
PHP

The New PHP 254

Posted by Soulskill
from the less-filling-tastes-great dept.
An anonymous reader writes "This article at O'Reilly Programming suggests that PHP, a language known as much for its weaknesses as its strengths, has made steady progress over the past few years in fixing its problems. From the article: 'A few years ago, PHP had several large frameworks (e.g. CakePHP, CodeIgniter, and so on). Each framework was an island and provided its own implementation of features commonly found in other frameworks. Unfortunately, these insular implementations were likely not compatible with each other and forced developers to lock themselves in with a specific framework for a given project. Today the story is different. The new PHP community uses package management and component libraries to mix and match the best available tools. ... There are also exciting things happening with PHP under the hood, too. The PHP Zend Engine recently introduced memory usage optimizations. The memory usage in PHP 5.5 is far less than earlier versions.'"
United Kingdom

Child Porn Arrest For Cameron Aide Who Helped Plan UK Net Filters 205

Posted by timothy
from the takes-one-to-know-one dept.
An anonymous reader writes "A senior aide to David Cameron resigned from Downing Street last month the day before being arrested on allegations relating to child abuse images. Patrick Rock, who was involved in drawing up the government's policy for the large internet firms on online pornography filters, resigned after No 10 was alerted to the allegations. Rock was arrested at his west London flat the next morning. Officers from the National Crime Agency subsequently examined computers and offices used in Downing Street by Rock, the deputy director of No 10's policy unit, according to the Daily Mail, which disclosed news of his arrest."
Security

Ask Slashdot: How To Protect Your Passwords From Amnesia? 381

Posted by Soulskill
from the train-a-friendly-dolphin-to-use-KeePass dept.
Phopojijo writes "You can encrypt your password library using a client-side manager or encrypted file container. You could practice your password every day, keep no written record, and do everything else right. You then go in for a serious operation or get in a terrible accident and, when you wake up, suffer severe memory loss. Slashdot readers, what do you consider an acceptable trade-off between proper security and preventing a data-loss catastrophe? I will leave some details and assumptions up to interpretation (budget, whether you have friends or co-workers to rely on, whether your solution will defend against the Government, chance of success, and so forth). For instance, would you split your master password in pieces and pay an attorney to contact you with a piece of it in case of emergency? Would you get a safe deposit box? Some biometric device? Leave the password with your husband, wife, or significant other? What can Slashdot come up with?"

Comment: Misleading summary (Score 5, Informative) 366

by FreelanceWizard (#45869353) Attached to: The SEC Is About To Make Crowdfunding More Expensive

If you actually bother to read the Federal Register text, you can see in the second paragraph of the introduction that the JOBS Act, and this subsequent regulatory structure, only applies to crowdfunding where the reward is a security. It specifically explains that this is different from the current model of crowdfunding in the U.S., where the donors receive some "token of value" related to the project, not a share of future financial returns. The SEC isn't trying to regulate the current system, but is trying (as directed by that law) to allow crowdfunding where the donor award is a security; the current regulatory structure, based on the Securities Act, largely makes this sort of model impossible due to the various requirements of public offerings.

So, there's nothing to get up in arms about. This is just a move by the SEC to allow something that isn't currently permissible under U.S. law, not an attempt to "tax Kickstarter" or "regulate Indiegogo" or whatever other nonsense people claim.

United States

An Anonymous US Law Enforcement Officer Claims US Wouldn't Arrest Julian Assange 399

Posted by Unknown Lamer
from the with-crossed-fingers dept.
McGruber writes "The Washington Post reports that 'Federal prosecutors have not filed a sealed indictment against WikiLeaks founder Julian Assange, despite persistent rumors that a nearly three-year grand jury investigation into him and his organization had secretly led to charges, according to senior law enforcement sources. ... "Nothing has occurred so far," said one law enforcement official with knowledge of the case. "If Assange came to the U.S. today, he would not be arrested. But I can't predict what's going to happen. He might be in six months." The law enforcement official providing this assurance chose to remain anonymous.'"
Internet Explorer

Google Ends Internet Explorer 9 Support In Google Apps 199

Posted by Unknown Lamer
from the if-only-they-did-that-with-ie6 dept.
An anonymous reader writes "Google has announced it is discontinuing support for Internet Explorer 9 in Google Apps, including its Business, Education, and Government editions. Google says it has stopped all testing and engineering work related to IE9, given that IE11 was released on October 17 along with Windows 8.1. This means that IE9 users who access Gmail and other Google Apps services will be notified 'within the next few weeks' that they need to upgrade to a more modern browser. Google says this will either happen through an in-product notification message or an interstitial page."

Comment: Source control (best) or Offline Files (okay) (Score 1) 238

You have programmers. You have multiple projects. They might be working offline. For this, you really need a Distributed Source Control system such as git or mercurial. I personally recommend mercurial as it's got good Windows tools (TortoiseHg and HgScc for Visual Studio integration). You can put your "pure" repository on your share, then have the programmers push to it -- or, better yet, have an "incoming" for each project to which anyone can push, then a "pure" to which only project leads have write access and into which they can push approved versions.

If, for some reason, you simply can't run source control, Windows offers Offline Files functionality that can sync individual folders if you set them up correctly. What this means is that you need to ditch this "shared drive" concept and set up your file shares correctly -- by which I mean having multiple shares, one for each project. Users then connect to the share in question and choose to make it offline, or you create drive maps and enforce offline files using group policy.

Social Networks

Canadian Hotel Sues Guest For $95K Over Bad Review, Bed Bugs 432

Posted by samzenpus
from the don't-let-the-connoisseurs-bite dept.
An anonymous reader writes "A guest at at Quebec hotel was bitten by bed bugs, brought some down to the front desk and asked for new room. While the fully booked hotel offers to get him another room in a different hotel, he stays out the night then leaves — telling people at the hotel — some of whom also check out. When he wrote about it on Trip Advisor, the hotel demanded he take it down and when he did they sued him for $95,000."
Facebook

Internet.org: Altruistic, Or the Ultimate In Cynicism? 174

Posted by Unknown Lamer
from the something-like-that dept.
Nerval's Lobster writes with one take on an effort to "make Internet access available to the two-thirds of the world who are not yet connected": "In conjunction with a variety of partners (including Nokia, Opera, Qualcomm and Samsung), Facebook is launching Internet.org, which will try to make Internet access more affordable to more people. The partnership will also work on ways to lower the amount of data necessary to power most apps and Internet experiences, which could help people in areas with poor connectivity access online services, and devise incentives for businesses and manufacturers to offer customers more affordable access. Why would Facebook and its partners want to connect another 5 billion people to the Internet? Sure, there are altruistic reasons — people online can access information that will improve or even save their lives. But for Facebook, more people online equals more ad revenue, which equals more profit. Social networking in the developed world is reaching a saturation point, with a significant percentage of the population already on one (or more) social networks; only by expanding into developing nations can Facebook and its ilk maintain the growth rates that Wall Street demands. In a similar vein, building devices and services accessible via weaker Internet connections would open up a whole new customer base for the app developers and manufacturers of the world. In theory, Internet.org plans on enlisting a variety of nonprofits and 'experts' to help in its effort; but the initial announcement only lists for-profit companies among its constituency. NGOs, academics and the aforementioned experts will apparently arrive 'over time.' So is this effort really charitable, or a cynical attempt to break into new markets?"

Comment: Re:From the ashes into the fire? (Score 4, Informative) 253

Actually, as the people who found the first RT jailbreak noticed, the only thing keeping Windows RT from running ARM compiled applications (which you can create in Visual Studio, even!) is a policy that mandates that only Microsoft-signed executables can run outside of the WinRT environment. If Microsoft removed that restriction by changing a single registry key, all of that compatibility would suddenly appear. In fact, .NET apps distributed in PE form and compiled for Any CPU would be able to run without being recompiled at all.

Comment: Re:Sounds good, But! (Score 3, Informative) 341

by FreelanceWizard (#44473563) Attached to: Microsoft Cuts Surface Pro Price By $100

Yes. Turn off Secure Boot in the UEFI firmware menu (accessed through Advanced Startup), then boot off the USB Linux boot device of your choice. I expect a modern distribution of Linux will have drivers for most of the hardware inside the Pro. Alternatively, run it in Hyper-V (or VMware, or VirtualBox, or the hypervisor of your choice), since it's an x86 Windows 8 device with hardware virtualization support.

Only the RT has the "permanently locked" Secure Boot setting. The Pro is a full-fledged i5 device that can run Linux just fine.

You can do more with a kind word and a gun than with just a kind word. - Al Capone

Working...