Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Submission + - Creative asks driver modder to cease and desist (creative.com)

Rinisari writes: "Creative Labs message boards user Daniel_K had been modifying the Vista driver to re-enable functionality which was apparently available on Windows XP but disabled for Vista. In a somewhat DMCA-like claim this past Friday, Phil O'Shaughnessy, VP Corporate Communications at Creative Labs, wrote a message on Creative's message boards asking using user Daniel_K "to respect our legal rights in this matter and cease all further unauthorized distribution of our technology and IP." This created an immense outcry from folks who have paid a premium for Creative's X-Fi line of sound cards, which is "intentionally crippled" on Vista. Creative doesn't seem to care, though. "If we choose to develop and provide host-based processing features with certain sound cards and not others, that is a business decision that only we have the right to make." It appears that the modified drivers are still available, but will no longer be updated as per Creative's request."
The Almighty Buck

Submission + - Creative Labs C&D's Vista Driver Creator (creative.com)

FishWithAHammer writes: For some time now, users of Creative Labs' sound cards have been almost entirely unable to use them due to Creative's lack of proper Vista drivers. An end user known as Daniel_K decided to take it upon himself to release working Vista drivers. Creative, apparently, takes a dim view of this, ordering him to stop distributing the only drivers that have made Creative hardware workable on Vista. Daniel_K, in his response, accuses Creative Labs of intentially crippling the Vista version of their drivers; other Creative customers have speculated that this is in order to sell new "Vista-compatible" cards in the near future.

I guess we know what companies care about keeping their customers, don't they?


Radiation Absorbing Mineral Found In the Arctic 351

An anonymous reader writes "A mineral has recently been found that exhibits the astounding property of being able to remove radiation from water-based solutions. 'After coming into contact with the mineral, radioactive water becomes completely safe. Had this mineral been available to physicists after the Chernobyl or Three Mile Island disasters, the consequences might have been very different, as both accidents resulted in contamination from radioactive water.' Also, the article notes that although only grams of the material have been found, tons of it are needed; they are confident they could artificially reproduce it."

Server Benchmarking Lone Wolf Bites Intel Again 90

Ian Lamont writes "Neal Nelson, the engineer who conducts independent server benchmarking, has nipped Intel again by reporting that AMD's Opteron chips 'delivered better power efficiency' than Xeon processors. Intel has discounted the findings, claiming that Nelson's methodology 'ignores performance,' but the company may not be able to ignore Nelson for much longer: the Standard Performance Evaluation Corp., a nonprofit company that develops computing benchmarks, is expected to publish a new test suite for comparing server efficiency that Nelson believes will be similar to his own benchmarks that measure server power usage directly from the wall plug."

Submission + - Multiple .gov web sites hacked, serving exploits (blogspot.com)

cottagetrees writes: Security researcher Roger Thompson has discovered at least a dozen freshly hacked .gov web sites — all cities — hosting driveby-downloaded exploits and malware. Thompson blogged about his discovery here: http://explabs.blogspot.com/ and he posted a YouTube video documenting the hack here: http://www.youtube.com/watch?v=G_jh8lHb49w "The attacking pages seem to try one of three things. First they try an exploit to install their malware, and if that doesn't work, they try to trick you into installing a fake codec, and if that doesn't work, they run a fake antispy scan, and try to convince you that your machine is already compromised, but their software can fix it... just click the install button." According to the video, updated security patches will protect you from the driveby downloaded exploit, but won't protect victims of the social engineering ploy that tries to get them to download the fake codec, or install the fake anti-spyware.

It is easier to change the specification to fit the program than vice versa.