Forgot your password?
typodupeerror
The Courts

Japanese Ruling Against Winny Dev Overturned On Appeal 82

Posted by timothy
from the pass-some-of-that-wisdom dept.
Joren writes "In Japan, in a case that has been five years running, the Osaka High Court on Thursday overturned a lower court ruling that had convicted and fined the developer of controversial file-sharing software Winny of assisting violations of the Copyright Law. Originally charged in 2004, Isamu Kaneko, 39, a former research assistant at the University of Tokyo, was declared not guilty, and will not be required to pay a 1.5 million yen fine levied by a December 2006 Kyoto District Court ruling. 'Merely being aware of the possibility that the software could be abused does not constitute a crime of aiding violations of the law, and the court cannot accept that the defendant supplied the software solely to be used for copyright violations,' presiding judge Masazo Ogura said. Furthermore, in siding with the defense, the appeal ruling stated that 'Anonymity is not something to be looked on as illegal, and it is not something that applies specifically to copyright violations. The technical value of the software is neutral.'"

Comment: Re:koster again (Score 1) 78

by TiredGamer (#21059371) Attached to: The Barbarians At The MMOG Gates
"Sure Warcraft has a raid-game end-game to cater to the 'hard core' but most people don't go there, and really, to really suceed in Warcrafts raid game you just have to be -there-, you don't have to be -good-."

This is a stereotype of the older, larger raids (20 and 40 person teams). New raids in WoW are much smaller (10 and 25 person teams) and thus require better players to succeed as a whole.
Encryption

+ - AACS Attack: a Clear and Present Danger to DRM

Submitted by Anonymous Coward
An anonymous reader writes "The group representing AACS has downplayed muslix64's attack on their highly touted DRM scheme. "The large size of the files and the high cost of writable hi-def discs make large-scale copying of high-definition DVDs impractical, but the attacks on the new format echo the early days of illegal trafficking in music files," Michael Ayers, spokesman of AACS said on Thursday.

However, Slyck.com is running an article that points the fragility of AACS, and how muslix's exploit is a real danger to its longevity.

"In other words, one could argue that AACS has not been attacked directly — which in the strictest and most literal interpretation is true. However this is much like saying four stolen tires is not an attack on a car's engine. Either way, the individual is stuck — and like AACS, it has been merely ignored in exchange for the ultimate goal. In many ways, not attacking AACS directly is much worse than a direct assault, as it highlights the irrelevance of this once highly regarded copy "protection" scheme.""
Enlightenment

+ - string theory

Submitted by
R. Mirman
R. Mirman writes "String theory has been proven with mathematical rigor to be wrong. It has long been known that physics (a universe)would be impossible in any dimension but 3+1. Also there is a quantum theory of gravity, the only possible one since it is required by geometry: GR. The description of the books showing this is at impunv.blogspot.com. For the dimension see

Our Almost Impossible Universe:
Why the laws of nature make the existence of humans extraordinarily unlikely
R. Mirman

and for the derivation of GR from geometry (the Poincare group) and quantum gravity see Massless Representations of the Poincare Group electromagnetism, gravitation, quantum mechanics, geometry
R. Mirman.
The proofs are rigorous and verified by others."
Intel

Intel, IBM Announce Chip Breakthrough 112

Posted by kdawson
from the dueling-press-releases dept.
Intel announced a major breakthrough in microprocessor design Friday that will allow it to keep on the curve of Moore's Law a while longer. IBM, working with AMD, rushed out a press release announcing essentially equivalent advances. Both companies said they will be using alloys of hafnium as insulating layers, replacing the silicon dioxide that has been used for more than 40 years. The New York Times story (and coverage from the AP and others) features he-said, she-said commentary from dueling analysts. If there is a consensus, it's that Intel is 6 or more months ahead for the next generation. IBM vigorously disputes this, saying that they and AMD are simply working in a different part of the processor market — concentrating on the high-end server space, as opposed to the portable, low-power end.
The Internet

+ - Charter Communications Hijacks Windows Live Search

Submitted by
Tony Bradley
Tony Bradley writes "Charter Communications introduced a new "service". Some might call it browser hijacking. The new "feature" from Charter will intercept traffic to your default search engine and redirect you to their Charter-branded, 'powered by Yahoo!' search engine. Charter calls the new feature an opt-in service, however they opted everyone in by default with no notice and force you to allow a cookie to be installed if you wish to stay opted out. They provide a link to visit if you wish to change your settings, but the link is dead. There is no such site. Oh! Charter also feels that only users of Windows Live Search need the benefit of their new feature. Searches aimed at Google, Yahoo or AOL are not redirected, but searches directed to Microsoft's search engine are hijacked unless you have the opt-out cookie. You can get more details, along with screen shots, in this article on About.com: http://netsecurity.about.com/od/webbrowsersecurity /ss/charterhijack.htm"
Windows

Inside the Windows Vista Kernel 298

Posted by kdawson
from the deep-tech dept.
Reader trparky recommends an article on Technet (which, be warned, is rather chaotically formatted). Mark Russinovich, whose company Winternals Software was recently bought by Microsoft, has published the first of a series of articles on what's new in the Vista kernel. Russinovich writes: "In this issue, I'll look at changes in the areas of processes and threads, and in I/O. Future installments will cover memory management, startup and shutdown, reliability and recovery, and security. The scope of this article comprises changes to the Windows Vista kernel only, specifically Ntoskrnl.exe and its closely associated components. Please remember that there are many other significant changes in Windows Vista that fall outside the kernel proper and therefore won't be covered."
Handhelds

+ - RFID cosmetics trial in Tokyo

Submitted by
Roland Piquepaille
Roland Piquepaille writes "Two Mitsukoshi department stores in Japan, including its main store in Tokyo's Ginza district, are testing RFID tags for two weeks. This experiment, which is far smaller than the ones from Wal-Mart, just wants to help shoppers to choose cosmetics, such as lipstick, eye shadow and blush. In this short article, IDG News Service reports that a kiosk can provide a simulation of what will happen if you choose a special lipstick. Of course, the store also wants to know what products are the most popular. Read more for additional details and pictures of the devices which are being tested in Japan."

"Falling in love makes smoking pot all day look like the ultimate in restraint." -- Dave Sim, author of Cerebrus.

Working...