Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
If indymedia did offer to co-operate with the police, or the police didn't seek thier co-operation first before getting a warrant then this was heavy handed and the police are in the wrong. If the reverse is the case and indymedia just refused to help the police then the police have done exactly what they are supposed to do. Get a warrant!
Indymedia couldn't cooperate with the police, as
1) They don't keep IP logs
2) this machine was a mirror
3) The police knew this.
Its not illegal to NOT keep IP logs ( yet ), but it does seem not doing so means your server can be pulled at anytime.
If you read the article you'd have seen that the personal details were removed by an Indymedia moderator as soon as they were aware of them.
Indymedias policy of not logging IP addresses is well known to the Police.
Its difficult to see what reason they could have for pulling this machine, other than low level harrasssment.
Link to Original Source
Link to Original Source
If Compiz was gone, surely someone else would pick up the pieces? Distros like Ubuntu have made it a notable feature of their desktop setup. Haven't we all enjoyed the glazed over eyes and admiring stares of onlookers as we spin our desktop cubes and pull out bling that makes Vista desktop effects fade by comparison?
Is the compiz project already dead without knowing it and who will pick up pieces and keep our desktop cubes spinning?"
Survival means every man for himself.
Statistically more people survive if they think only of themselves.
Do not attempt to rescue friends, relatives, loved ones.
Best Use of Light and Spheres:
SE-412 79 Gothenburg
For users of systems that distinguish between text and binary mode
(you know who you are), add a library call that specifies binary mode
for stdout as the first statement of main(),
or use freopen("ioccc_ray.ppm", "wb", stdout) and do not use redirection.
A freely distributable command-line version of Microsoft Visual C
exhibits an optimizer bug when compiling this entry. Disable
The judges were able to figure out how to control position
(in all 3 coordinates), size, and color (to some extent) of the balls.
Selected Author's Comments:
It is possible to write some kinds of programs in C without using reserved
words. For very short and trivial programs, it usually isn't very hard to
write a variant using no reserved words, but with this program I want to
show that also non-trivial programs can be written this way. This IOCCC
entry contains no reserved words (I don't count 'main' as a reserved word,
although the compiler gives it special meaning) and no preprocessor
The program is a small ray-tracer. The first line of the source code may
be modified if you want the resulting image to be of some other resolution
than the predefined. The 'A' value is an anti-alias factor. Setting it to
1 disables the anti-aliasing feature (this makes the output look bad), but
setting it too high makes the trace take a lot more time to complete.
The ppm image can then be viewed using an image viewer of your own choice.
(Running the ray-tracer may take several minutes, even on fast machines,
so be patient.)
I am very much aware about the fact that I'm breaking the guidelines. For
example, the word 'int' is a reserved word and therefore all variable
declarations are implicit. There will no doubt be _lots_ of warnings,
no matter which compiler is used. Still, the source code should be word-
length-independent and endianess-independent.
Another reason for writing code without using reserved words is that many
text editors will make all reserved words turn BOLD when printed on
paper. Since I care for the global environment, we shouldn't waste any
more laser toner, or ink, than necessary. Everyone should write C code
with no reserved words, and our world will be a better place.
As well as providing open access internet access via wireless, the network is used to provide internet access to some residential and business properties, where computers connect more conventionally with cat 5 cable
We transparently proxy with squid outgoing http traffic, and recently noticed a number of 'hacking' tools being downloaded to an ip address at a local business / housing coop. Out of interest I ssh'd into the local router at that site, and ran tcpdump on that segment. The pc that had downloaded the tools was spoofing the arp replies of another PC on the local LAN. This looked to me like an attempt to capture data destined to another user there.
What should I do ? I don't manage or have any direct influence on IT at the business where this happened, but I could contact someone who lives there and pass the information on, or I could just ignore it, after all its not really my business, and the traffic does not impact on the wider wireless network."