Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment When is yellow not yellow? (Score 1) 653

So the USPTO awards Fluke a trademark color scheme without defining the actual colors? How does that work? If Sparkfun's next batch of red DMM's is not "red enough" for Fluke's liking, can they claim that their red is actually just a very reddish yellow? How about green - that contains yellow too; technically, the only color not covered by this trademark is primary blue.

Submission Ask Slashdot: How to deal with a company that appears unconcerned that their use 3

jetkins writes: As the owner of my own mail domain, I have the luxury of being able to create unique email addresses to use when registering with web sites and providers. So when I started to receive virus-infected emails recently, at an address that I created exclusively for use with a well-known provider of tools for the Systems Administration community (and which I have never used anywhere else), I knew immediately that either their systems or their subscriber list had been compromised.

I passed my concerns on to a couple of their employees whom I know socially, and they informed me that they had passed it up the food chain, but I have never received any sort of official response, nor seen any public notification or acceptance of this situation.

When I received another virus-infected email at that same address this week, I posted a polite note on their Facebook page. Again, nothing.

If it was a company in any other field, I might expect this degree of nonchalance, but given the fact that this company is staffed by — and primarily services — geeks, I'm a little taken aback by their apparent reticence.

So, since the polite, behind-the-scenes approach appears to have no effect, I now throw it out to the group consciousness: Am I being paranoid, or are these folks being unreasonable in refusing to accept or even acknowledge that a problem might exist? What would you recommend as my next course of action?

Submission New peer-to-peer tracking technology?

jetkins writes: "The Melbourne, Australia, Age reports on a new "tracking program" which local police are using to pinpoint child pornography without the need for search warrants or other invasive techniques.

Is this simply a matter of seeding the PtP smut networks with digitally signed files, and then tracking the IP addresses of the peers that leech and seed them, or is this something new? One has to presume that if law enforcement agencies are using this for criminal investigations, the RIAA and MPAA surely can't be far behind."

Submission SPAM: Survey: US Residents Don't Want Targeted Ads

itwbennett writes: "A survey by the Berkeley Center for Law and Technology at the University of California Berkeley School of Law and the Annenberg School for Communication at the University of Pennsylvania finds that U.S. residents do not want to receive Web advertising tailored to their interests. 66% of those surveyed said they don't want tailored, or targeted, online ads and when asked if online ad vendors should deliver targeted ads by tracking customers' behavior across multiple Web sites, 86% of the 1,000 respondents said no. 35% percent of respondents said executives of companies that use personal information illegally should face jail time, and 18% said those companies should be put out of business. 'While privacy advocates have lambasted behavioral targeting for tracking and labeling people in ways they do not know or understand, marketers have defended the practice by insisting it gives Americans what they want: advertisements and other forms of content that are as relevant to their lives as possible,' the study said. 'In high percentages, [U.S. residents] stand on the side of privacy advocates.'"
Link to Original Source

Submission SPAM: Fake antivirus overwhelming scanners

ChiefMonkeyGrinder writes: "Rogue or bogus programs passing themselves off as real antivirus software have been one of the malware themes of 2009, but the APWG's numbers for the first half of the year show that the organisation's members detected 485,000 samples, more than five times the total for the whole of 2008."
Link to Original Source

Submission Canadian Minister Caught Lying About Net Surveilla->

An anonymous reader writes: The Canadian government has introduced Internet surveillance legislation that requires ISPs to disclose customer information without a warrant. Peter Van Loan, the Minister in charge, claims that a Vancouver kidnapping earlier this year shows the need for these powers. Michael Geist has done some digging and shows this to be a lie — the Vancouver police acknowledge that the case did not involve an ISP request and the suspect is now in custody.
Link to Original Source

Submission 2009 Ig Nobel Awards are Tonight!->

An anonymous reader writes: The Ig Nobel Prizes honor achievements that first make people laugh, and then make them think. The prizes are intended to celebrate the unusual, honor the imaginative — and spur people's interest in science, medicine, and technology. This year, the 19th First Annual Ig Nobel Prize Ceremony at Harvard's Sanders Theater will introduce ten new Ig Nobel Prize winners. The winners are traveling to the ceremony, at their own expense, from several continents. The Prizes will be handed to them by a group of genuine, genuinely bemused Nobel Laureates, assisted by a large number of assorted Ig personnel, all before a perpetually standing-room only audience. Best of all, it will be webcast live.
Link to Original Source

How Do You Deal With Sensitive Data? 226

imus writes "Just wondering how most IT shops secure sensitive data (customer records). Most centrally managed databases seem to be monitored and maintained very well and IT workers know when they are tampered with or when unauthorized access occurs. But what about employees who do legitimate selects from these databases and then load CSV files and other text files onto their laptops and PDAs? How are companies dealing with situations where the database is relatively secure, but end-use devices contain bits and pieces of sensitive business data, and sometimes whole segments? Does anyone use sensitive data discovery software such as Find_SSNs or Senf or other tools? Once found, how do you deal with it? Do you force encryption, delete it or prevent extracts?"
The Internet

How To Deal With Internet Bullies? 724

creyes123 writes "I run a free website with an online model airplane design calculator. The number of registered users has quickly climbed and I've gotten many compliments. Out of nowhere, a fellow shows up and proceeds to bad mouth the calculator in a posting in one of my forums. After I politely point out that he's mistaken and should have looked at the documentation before posting, he changes the subject and bad mouths a different 'flaw.' The cycle repeats a few more times, with no apparent end in sight. I want to encourage folks to share their opinions, but constructive criticism was clearly not his goal. I feel that the whole episode was just a massive time waster for me. What did I do to deserve this? Could I have handled this better?"

HD Radio Recording In the US? 303

unreceivedpacket writes "The public radio stations I listen to have been advertising their conversion to HD Radio format for some time. They advertise multiple channels, their second channel playing all classical, all the time. I am interested in purchasing a receiver so I can listen to this extra content, and was also hoping to find a receiver with a built-in recorder so I could time-shift programs that are not otherwise available as legal pod-casts. My initial queries have returned few models that support any kind of digital recording, and the existing ones seem out of production or sorely lacking features. Is this the state of Digital Radio in the US? Are there any legal recording devices for HD Radio? Any good solutions for recording and time-shifting, perhaps through Linux?"

Comment Re:Download DAY, Justin (Score 2, Insightful) 1080

Many folks are moaning because Mozilla made absolutely no mention of the start time until now. Enthusiastic supporters the world over have organized "download parties" on the evening of 6/16, ready to download FF3.0 en masse on the stroke of midnight in their local time zone. Silly, yes, because those organizers should have had enough nouse to realize that there was no way that it could be progressively made available around the world as there's no way to know what timezone any given requester is in, but there you go - that was the expectation.

Mozilla really dropped the ball on this. If they had detailed up front exactly when their "Day" was planned to start, then all this angst could have been avoided. Ideally they should have had a countdown timer on their site so that everyone was on the same page. Announcing the rules after the game has already kicked off was just plain stupid.

You are in the hall of the mountain king.