Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: I should point out that WA has stronger privacy (Score 2) 428

by WillAffleckUW (#48610255) Attached to: Federal Court Nixes Weeks of Warrantless Video Surveillance

I should point out that citizens of Washington State have a State Constitution which specifically gives us stronger privacy rights than most Americans.

You can't even use GPS trackers on our cars without a specific court order, even though you can do this in most states.

Same goes for our cell phone data.

Same goes for our front yards.

Now turn off your cop cam you're recording my lawn illegally, copper!

Comment: Maps are limited by the cartographic method (Score 1) 142

A map by territory shows places that are pretty empty but have a common language.

A map by population has problems handling multiple languages in use in one location.

A map by language density using vertical bars or color shading to imply pop density might work, if dithered properly.

+ - Linking drought and climate change: difficult to do->

Submitted by Geoffrey.landis
Geoffrey.landis (926948) writes "An article about the current California drought on 538 points out that even though global climate warming may exacerbate droughts, it's nearly impossible to attribute any particular drought to climate warming: The complex, dynamic nature of our atmosphere and oceans makes it extremely difficult to link any particular weather event to climate change. That’s because of the intermingling of natural variations with human-caused ones. They also cite a Nature editorial pointing out the same thing about extreme weather:"
Link to Original Source

+ - The GPLv2 goes to court->

Submitted by Jason Baker
Jason Baker (3502325) writes "Despite its importance, the GPLv2 has been the subject of very few court decisions, and virtually all of the most important terms of the GPLv2 have not been interpreted by courts. This lack of court decisions is about to change due to the five interrelated cases arising from a dispute between Versata Software, Inc. ("Versata") (its parent company, Trilogy Development Corporation, is also involved, but Versata is taking the lead) and Ameriprise Financial, Inc. ("Ameriprise"). The courts in two separate cases issued decisions on November 25, just before Thanksgiving.

These cases are dealing with four important terms in the GPLv2: 1) What are the remedies for breach of the terms of the GPLv2? 2) What is a "distribution" under the GPLv2 that triggers the obligations under the GPLv2? 3) Does the GPLv2 include a patent license? 4) What type of integration between proprietary code and GPLv2 licensed code will result in creating a “derivative work” and subject such proprietary code to the terms of the GPLv2?"

Link to Original Source

+ - Shellshock Worm Exploiting Unpatched QNAP NAS Devices->

Submitted by msm1267
msm1267 (2804139) writes "A worm exploiting network attached storage devices vulnerable to the Bash flaw is scanning the Internet for more victims.

The worm opens a backdoor on QNAP devices, but to date it appears the attackers are using the exploit to run a click-fraud scam, in addition to maintaining persistence on owned boxes.

“The goal appears to be to backdoor the system, so an attacker could come back later to install additional malware,” said Johannes Ullrich, head of the Internet Storm Center at the SANS Institute.

QNAP of Taiwan released a patch in October for the Bash vulnerability in its Turbo NAS products. Like many other vulnerable products and devices, owners may not be aware that Bash is present and exposed. Bash was among a litany of Internet-wide vulnerabilities uncovered this year; the flaw in Bash, or Bourne Again Shell, affects Linux and UNIX distributions primarily, but also Windows in some cases. Bash is accessed, often quietly, by any number of functions which makes comprehensive patching difficult even though all major Linux distributions and most vendors have issued patches."

Link to Original Source

If it's worth hacking on well, it's worth hacking on for money.