There's a tremendous difference between chatting with a passenger and having a conversation on the phone (whether you use hands-free or not). The passenger will notice when things are happening around the vehicle and the conversation will quiet down and then resume once it's safe to do so. The person you're talking to the phone doesn't do that. And as others mentioned in other posts, children are just as much of a traffic hazard as cell phones in this regard, but most are willing to accept that it's a necessary risk. Phones, less so.
Which just happens to be 9 days after Sweden's next election. They've learned from the EU election - can't risk giving the Pirate Party all that attention before the national election are held.
andylim (1618383) writes "It seems that developers are taking advantage of the fact that AIR 2.0 has support for UDP sockets, which allows you to send and receive messages using the universal datagram protocol. Joe Winder, for example, has tuned his Android phone into a game controller that controls a paper plane using his G1's accelerometer, and a developer nicknamed bioRex21 has created an app that allows him to draw on his desktop computer using his DS and its stylus."
An anonymous reader writes "Developer 2D Boy has written that they are seeing an 82% piracy rate for everyone's favorite DRM-free physics puzzler, World of Goo . Surprisingly, this rate is in-line with what they were expecting. The article also features a fascinating comparison with the piracy rate of another game that was shipped complete with DRM, at 92%. There seemed to be no major difference in the outcomes of the rate regardless of whether DRM was used or not ... well, no difference other than the cost to implement such nonsense."
narramissic writes "Back in March 2001, a hacker named Josh Buchbinder (a.k.a Sir Dystic) published code showing how an attack on a flaw in Microsoft's SMB (Server Message Block) service worked. Or maybe the flaw was first disclosed at Defcon 2000, by Veracode Chief Scientist Christien Rioux (a.k.a. Dildog). It was so long ago, memory is dim. Either way, it has taken Microsoft an unusually long time to fix. Now, a mere, seven and a half years later, Microsoft has released a patch. 'I've been holding my breath since 2001 for this patch,' said Shavlik Technologies CTO Eric Schultze, in an e-mailed statement. Buchbinder's attack, called a SMB relay attack, 'showed how easy it was to take control of a remote machine without knowing the password,' he said."
Link to Original Source
Link to Original Source