theodp writes "Robert X. Cringely speculates about The Final Days of Google, making a compelling case that when the end comes, it is going to be an inside job. To find the founders of a Google-beating start-up, Cringely suggests looking no further than the thousands of entrepreneurial geniuses currently working for Google, who will inevitably be driven to leave the company to realize the dreams of their rejected ideas."
odyaws writes "The New York Times has an article about the history department at Middlebury College banning Wikipedia citations as a research source, which came after a professor noticed half a dozen students making the same factual error on an exam. I'm as big a fan of Wikipedia as anyone, but as an academic I find the notion of citing it absurd. Does anyone think Wikipedia (or any encyclopedia) suitable for anything but casual information gathering or as a place to find links to source material?"
darkreadingman writes "IT people often create their own security problems by choosing administrative passwords that are easily hacked. Here's a list of hackers' ten most frequently-guessed passwords, along with some suggestions on better ways to create and maintain strong passwords. http://www.darkreading.com/document.asp?doc_id=11
Chouonsoku writes "Before yesterday, PlayStation 3 owners had to be running the latest system firmware in order to access the PlayStation Network. The PlayStation Network allows users to play their games online, download demos, trailers and add-ons for their games. However, with a simple DNS request redirection, the firmware check becomes null and void, allowing users to access the PlayStation Network from any firmware, up-to-date or not."
yuna49 writes "Thieves recently stole a laptop belonging to the estranged wife of a computer programmer in Minnesota. Luckily the husband had installed SETI@Home on the machine. He saw the computer appear on the SETI site three times in a week and gave the IP address to the authorities. This lead to the recovery of the laptop and a reconciliation between the estranged couple."
twistedmoney99 writes "Anyone who has upgraded their digital camera probably has a few older incompatible media cards lying around — so why not post them on Ebay? Well if you do, be sure to properly wipe them because the digital voyeurs are watching. Seth Fogie at InformIT.com purchased a bunch of used cards from Ebay and found recoverable data on most of them. Using the freely available PhotoRec, he was able to extract pictures, movies, and more from apparently formatted cards. The picture is clear — wipe anything that can store digital data before getting rid of it."
xymog writes "I'm increasingly seeing people with printers that stop working and provide a "toner out" message, even though the end user swears they are using a new cartridge. Though they are not using Lexmark printers, I am pretty sure they are using a printer and cartridge combination that uses so-called toner level chips. These are discussed in http://en.wikipedia.org/wiki/Lexmark_Int'l_v._Sta
t ic_Control_Components. The chips allow manufacturers to lock users into using their cartridges, rather than using OEM or toner refill programs. Good for the manufacturer, bad for consumers and consumer choice.
In my bumbling way I've tried locating more information, or even a list, of personal or small workgroup printers that use these manufacturer lock-in techniques, but wasn't able to find such a list. Any Slashdot readers have anecdotal suggestions or even a pretty-darn-sure list I could refer to?"