Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

Comment: Re:sailmail over HF (Score 1) 504

by Laith (#26439377) Attached to: Internet Communications While At Sea?

Actually I believe that the International conventions/regulations for Amateur Radio would make this apply regardless. Then there are the conventions of shipboard behavior... basically anything you do aboard ship is at the captain's permission...

Reciprocal licensing and such would potentially be an issue as well.


+ - The Dangers of Trusting Software Vendors

Submitted by twistymonkey
twistymonkey (1055268) writes "How can you really know that a program will secure your data as advertised? The problem is you can't — unless you are willing to take the program apart and check it yourself. did just that and explains how they bypassed protections in a program that advertises you can '...password protect your data from prying eyes' and that the data is '...always hidden regardless of settings'. They discovered that not only is the data easily accessible by anyone, but the password can also be decrypted thanks to a poor encryption scheme."

The Death of Domain Parking? 296

Posted by CmdrTaco
from the not-bloody-likely dept.
An anonymous reader found an article about the former CEO of MySpace moving into the domain parking biz. He says "I thought, it can't be that easy. So I talked to some domainers, and they said, 'We own 300,000 domains, we make $20 million a year, we have just four employees and some servers in the Caymans.'" The idea behind the business doesn't really seem any better to me than just having a parked name with a banner ad. At least, not for the internet as a whole.

+ - Advantages of Public APIs like Google's with Ajax

Submitted by Anonymous Coward
An anonymous reader writes "Add more functionality to your Web applications than just what your own Ajax scripts and server-side programs provide. It shouldn't be hard to build on what you learn here and start utilizing the Google API with your Ajax apps. More importantly, though, you will have a pretty good idea of how to use public APIs in general including the one from Amazon,, or anywhere else."

+ - Isn't standard email outdated?

Submitted by Anonymous Coward
An anonymous reader writes "Telnet was replaced by SSH for obvious reasons. Why hasn't standard email been replaced? There are more problems associated with standard email than there were with using services like Telnet, yet we managed to sweepingly switch out Telnet for SSH. Why not dump standard email for a better messaging implementation? We could cure SPAM and privacy issues in one fell swoop."
The Internet

+ - How Digg Combats Cheaters

Submitted by brunascle
brunascle (994197) writes "MIT Technology Review has an interesting article explaining how Digg uses visualization tools, developed by the design firm Stamen, to help combat cheating. Stamen was responsible for developing Digg Labs, which also produced the visualization tools Digg Swarm and Digg Stack. The article includes a graph of diggs, with the X axis representing users and the Y axis representing stories. Near-solid vertical lines describe atypical digging behavior, and may indicate the presence of a bot."

+ - Is Linking Illegal?

Submitted by
steveit_is writes "I run a popular and growing website called QuicksilverScreen that links to various videos found on DailyMotion, YouTube, Google Video, and a few of the smaller video services like Bolt. Recently I received a Cease and Desist from Fox claiming that I have been violating the law by linking to videos that they own the rights to. The EFF seems to think I'm probably OK, but Harvard Laws John Palfrey seems to think I'm in big trouble. Who's right, and why can't anyone give me a straight answer?"

+ - Stalked Via Your iPod

Submitted by Moduz
Moduz (666) writes "Wired is reporting that "If you enhance your workout with the new Nike+ iPod Sport Kit, you may be making yourself a surveillance target. A report from four University of Washington researchers to be released Thursday reveals that security flaws in the new RFID-powered device from Nike and Apple make it easy for tech-savvy stalkers, thieves and corporations to track your movements." — Run Forrest, run!"
The Internet

+ - Teen, preteen 'model' sites busted

Submitted by computational super
computational super (740265) writes "MSN is carrying the story of the federal arrest of the operators of what they refer to as a "preteen modeling site". The article refers to 'provocative' photos of kids, but goes on to say that "There are no semi-nude or nude images." From the article, it sounds to me like the operators were bending, but not quite breaking, US law. It will be interesting to see how this plays out."

+ - Firefox becomes Firewolf.

Submitted by zmanzero
zmanzero (908896) writes "For over 2 months now Firefox has been encouraging it's users to download tracking software by which is offered as the first choices in virtually every category of extension provided at it's official site — — go to extensions and click on Privacy and Security for an example. Poor Firefox, consumed by the wolves... there's a discussion on it here — 43"

Remember -- only 10% of anything can be in the top 10%.