Please create an account to participate in the Slashdot moderation system


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×
Electronic Frontier Foundation

Submission + - Austrian Man Raided For Running Tor Node Exit ( 5

An anonymous reader writes: From William, the man affected: "Yes, it happened to me now as well — Yesterday i got raided for someone sharing child pornography over one of my Tor exits.

I'm good so far, not in jail, but all my computers and hardware have been confiscated.

If convicted i could face up to 6 years in jail, of course i do not want that and i also want to try to set a legal base for running Tor exit nodes in Austria or even the EU.


Submission + - GPL Compliance and Censorship (

mithrandir14 writes: The current maintainers of netatalk formed a commercial entity to provide support to corporate entities in an attempt to fund further development of the project. ( In January they posted a list of vendors who they felt should be paying them but were not to their news blog with a very disgruntled and petty tone. In June, apparently, since same vendors still were not paying them they closed all development on the project and withheld the source and binaries except to those customers who were paying them in an attempt to extort money out of consumer NAS vendors using their product. The code and binaries withheld included the necessary afp 3.3 implementation details to support time machine on the forthcoming OS X 10.7 release. Some very disturbing actions followed. We've come to expect this type of closed communication and censorship from corporate entities but to see it from the maintainers of a fairly popular GPL'ed project is disheartening. The code is once again available but appears to have taken steps to obscure the fact that they were pressured into doing so instead of doing so of their own accord. A timeline of events is located here:

Submission + - Identifying malware infested shopping carts (

An anonymous reader writes: Many shopping carts including OSCommerce have been hit hard in the past few months by malicious hackers. Its important to upgrade your installations and identify the malware in order to secure your site and protect your visitors and business. This article shows how to recover from a hacking incident.

Submission + - Scary USB marketing device 8

snookerhog writes: My boss just came back from a trade show and passed me one of these USB marketing devices. I assumed that it was just a micro flash drive that had some web links or PDFs on it so I stuck it in my computer. After a brief delay and quick driver install, my Run window (Windows 7) opened on its own and typed in a URL to the advertising company's website. This little device is not a storage media, but a crafty little keyboard emulator.

this tech is new to me and it seems pretty scary, especially since I am logged in to my computer with admin rights. Anyone else played with one of these?

Submission + - IANA releases reserved IPv4 addresses 1

klapaucjusz writes: The RFC Editor has just published RFC 5735, which allows allocation of much of the remaining IPv4 space: networks 14, 24, 39 and 128, which were previously reserved are no longer mentioned, and only remains.

While some of these deallocations are old news (network 14 was recovered in early 2008), this is perhaps a sign that the IPv4 address space is really getting exhausted, and that it's time to deploy IPv6.

Submission + - Displayport v1.2 to take giant leap over HDMI ( 2

An anonymous reader writes: With HDMI becoming increasingly common, Displayport has been slow to become a widely used connection interface, but a plethora of new features in the new v1.2 standard could see that change. As well as doubling the data rate of the existing v1.1a standard to 21.6 Gbps, the update allows for multiple monitors to be connected to a single Displayport connector and adds support for transporting USB data at up to 720Mbps, enabling embedded webcams, speakers and USB hubs over a single cable. Ethernet data is also supported. The improved data rate will allow for richer, larger and higher resolution displays and the new version is also backward compatible with the current display technology, so all the ports, cables and devices will be interchangeable, although they will revert to the lowest common denominator.

Submission + - Open source *process* for education? 1

danspalding writes: "I'm a community college ESL teacher in Oakland, California, and my workshop proposal on "How the open source process can help teachers" was accepted for staff development day. Now I actually have to create the workshop... Can fellow Slashdotters give examples of how the open source process — publishing often, frequent revision, and sharing freely — can help teachers meet students' needs? I'm focusing on education for adults, and on the process itself, not software or websites. Thank you!"

Submission + - South Korea Preparing For Cyber War (

An anonymous reader writes: South Korea is determined not to be caught off guard again when it comes to cyber attacks directed against her. Mimicking the US defensive steps, the South Korea Ministry of Defense set up a Cyber War Center, which along a cyber police force will be charged with protecting government organizations and economical subjects from hacker attacks. Every day, there are more and more attacks being deployed from Northern Korean locations. Hackers are trying to infiltrate the Southern Korean networks and steal as much data as possible, especially military information. It seems that the war that started in 1950 (and has never technically ended) is being continued by other means.

Submission + - EU IP Strategy Leaks: Increase Pressure on Canada (

An anonymous reader writes: The European Union and Canada are scheduled to resume negotiations on a free trade agreement with the EU hoping to pressure Canada into new IP and copyright reforms that include term extension, DMCA legislation, resale rights, and ISP liability. Now a negotiating strategy document has leaked revealing plans for increasing political pressure and dismissing a Canadian public consultation on copyright as nothing more than a "tactic to confuse."

Submission + - Goofle investigating Chinese employees (

BluePeppers writes: The Guardian is reporting that Google China is investigating it's staff in lieu of The Incident. ""We're not commenting on rumour and speculation. This is an ongoing investigation and we simply cannot comment on the details," a Google spokeswoman said. Security analysts told Reuters the malicious software or malware used in the attack was a modification of a trojan called Hydraq. A trojan is a hidden program allowing unauthorised access to a computer. The analysts said the sophistication in the attack was in knowing whom to attack, not the malware itself."

Intel Licenses NVIDIA SLI Technology For P55 Chips 63

adeelarshad82 writes "NVIDIA announced that Intel has licensed the company's SLI technology for inclusion in upcoming products — as have a slew of major hardware partners such as ASUS, EVGA, Gigabyte, and MSI. This means the P55 chipsets that power those new socket LGA 1156 motherboards, which are based around the next-gen Nehalem architecture, will let you build systems using two or four NVIDIA-powered GPUs. Specifically, the licensing agreement covers the Core i5 and Core i7 microprocessors."

Submission + - Illegal to even REPORT Child Pornography? ( 1

thbarnes writes: "I reported suspected Internet child pornography to the FBI and received the attached threatening voicemail from an FBI agent in Washington, DC at 12:30AM. Apparently, it is illegal to even accidentally encounter and report child pornography."

Submission + - Mac, BSD prone to decade old attacks 7

BSDer writes: An Israeli security researcher published a paper few hours ago, detailing attacks against Mac, OpenBSD and other BSD-style operating systems. The attacks, says Amit Klein from Trusteer enable DNS cache poisoning, IP level traffic analysis, host detection, O/S fingerprinting and in some cases even TCP blind data injection. The irony is that OpenBSD boasted their protection mechanism against those exact attacks when a similar attack against the BIND DNS server was disclosed by the same researcher mid 2007. It seems now that OpenBSD may need to revisit their code and their statements. According to the researcher, another affected party, Apple, refused to commit to any fix timelines. It would be interesting to see their reaction now that this paper is public.

"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard