Privacy

Identity Thief Apprehended By Victim 636

ewhac writes "Karen Lodrick was entering her sixth month of hell dealing with the repercussions of having her identity stolen and used to loot her accounts. But while she was waiting for a beverage, there standing in line was the woman who appeared on Wells Fargo security video emptying her accounts. What followed was a 45 minute chase through San Francisco streets that ended with the thief being taken into custody by police."
Media

Two US States Restrict Used CD Sales 500

DrBenway sends us to Ars Technica for a report that Florida and Utah have placed draconian restrictions on the sale of used music CDs; Wisconsin and Rhode Island may soon follow suit. In Florida, stores have to hold on to CDs for 30 days before they can sell them — for store credit only, not cash. Quoting: "No, you won't spend any time in jail, but you'll certainly feel like a criminal once the local record shop makes copies of all of your identifying information and even collects your fingerprints. Such is the state of affairs in Florida, which now has the dubious distinction of being so anal about the sale of used music CDs that record shops there are starting to get out of the business of dealing with used content because they don't want to pay a $10,000 bond for the 'right' to treat their customers like criminals."
Communications

What Can You Do to Stop Junk Faxes? 156

olddoc asks: "I am having a growing problem with junk faxes. Unlike email, it costs me money when I get a fax so junk faxes really tick me off. A while ago, I gave my number to a removal number and now I am getting more junk faxes than ever." What options are there for dealing with this? If you've also had this problem, what did you do and how effective was it in stopping unwanted faxes?
Google

Google Shareholder Proposal to Resist Censorship 100

buxton2k writes "Slashdot has had plenty of stories about technology companies like Google kowtowing to repressive political regimes such as China's. I'm an (extremely) small shareholder in Google, and I looked at their proxy statement today. Most of the time, shareholders' meetings don't deal with anything other than rubber-stamping the board of directors, but Google's upcoming meeting has a interesting shareholder proposal dealing with free speech and censorship to be voted on at the May 10 meeting."
Education

Student Attempting To Improve School Security Suspended 282

TA_TA_BOX writes "The University of Portland has handed a one-year suspension to an engineering major after he designed a program to bypass the Cisco Clean Access (CCA). According to the University of Portland's Vice President of Information Systems, the purpose of the CCA is to evaluate whether the computers are compliant with current security policies (i.e., anti-virus software, Windows Updates and Patches, etc.). Essentially the student wrote a program that could fool the CCA to think that the computers operating system and anti-virus were fully patched and up to date. 'In the design of his computer program, Maass looked at the functions CCA provides and identified vulnerabilities where it could be bypassed. He wrote a program that emulated the same functions as CCA and eliminated some security issues. He says that the method he chose is "one of six that I came up with." Maass says his intent was not malicious. Rather, the sophomore says he was examining vulnerabilities so that they could be fixed. "I was planning on going to Cisco with the vulnerability this summer," Maass says. '"
Security

What Electronic Door Lock Would You Buy? 97

zentigger asks: "I work for an ISP that supports internet in several dozen remote areas. Our POPs are typically fairly small shed-like structures, with a couple racks of equipment. For the most part, we can manage this stuff in-band, but frequently we need to have a local agent physically access the equipment for some minor maintenance work or adjustments. As time goes on, the shuffle of keys is becoming farcical and expensive. What we need is an electronic lock of some sort that can be reprogrammed remotely (preferably from a remote console via serial or directly via ethernet) that will stand up to extreme weather. Google certainly turns up lots of glossy brochures — although I don't see how they can -all- be 'The heaviest duty lock you can buy!' Does anyone have good experiences with any particular products or perhaps other means of dealing with the key shuffle?"

Proving You Are Not a Spammer? 127

tfinniga asks: "A spammer has recently started using my domain name as 'From:' addresses when sending out spam. I'm worried about my domain being blacklisted, and I'm annoyed by the bounces — I'm getting about 1000 bounce messages a day. Unfortunately, I give out a different email address to each site I visit: slashdot@example.com, paypal@example.com, amazon@example.com, etc., and the spammer is using a different address for each mail, so simple address filtering doesn't work. What is the best way of avoiding being put on a blacklist, and dealing with the flood of bounces?"
The Courts

Anti-Spam Suits and Booby-Trapped Motions 397

Slashdot contributor Bennett Haselton writes in to say "The last few times that I sued a spammer in Washington Small Claims Court, I filed a "booby-trapped" written legal brief with the judge, about four pages long, with the second and third pages stuck together in the middle. I made these by poking through those two pages with a thumbtack, then running a tiny sliver of paper through the holes and gluing it to either page with white-out. The idea was that after the judge made their decision, I could go to the courthouse and look at the file to see if the judge read the brief or not, since if they turned the pages to read it, the tiny sliver of paper would break. To make a long story short, I tried this with 6 different judges, and in 3 out of 6 cases, the judge rejected the motion without reading it." The rest of this bizarre story follows. It's worth the read.
Space

Mars Global Surveyor Died from Single Bad Command 141

wattsup writes "The LA Times reports that a single wrong command sent to the wrong computer address caused a cascade of events that led to the loss of the Mars Global Surveyor spacecraft last November. The command was an orientation instruction for the spacecraft's main communications antenna. The mistake caused a problem with the positioning of the solar power panels, which in turned caused one of the batteries to overheat, shutting down the solar power system and draining the batteries some 12 hours later. 'The review panel found the management team followed existing procedures in dealing with the problem, but those procedures were inadequate to catch the errors that occurred. The review also said the spacecraft's onboard fault-protection system failed to respond correctly to the errors. Instead of protecting the spacecraft, the programmed response made it worse.'"
The Courts

Principal Cancels Classes, Sues Over MySpace Prank 520

Earnest writes "A prank MySpace page has led to a barrage of lawsuits and the misuse of school resources as the principal targeted by the pranksters attempted to find the perpetrators. In 2005, students at Hickory High School in Pennsylvania created a fake MySpace profile of principal Eric Trosch. As a result, the school's IT staff spent about 25 percent of his work time dealing with the issue and finding the culprits. That's not all. 'Trosch kept at it, even taking measures that led to the "cancellation of computer programming classes as well as usage of computers for research for class projects." Now the basic educational mission of the school was being compromised in order to keep students from visiting these profiles during school hours (students were still free to look at the profiles from home, of course).'"
The Internet

Dealing With Venom on the Web 326

theodp writes "In a world where nastiness online can erupt and go global overnight, BusinessWeek finds Corporate America woefully unprepared and offers suggestions for how to cope, including shelling out $10,000 to companies like ReputationDefender.com to promote the info you want and suppress the news you don't. And in what must be a sign of the Apocalypse, BW holds Slashdot's moderation system up as a model for maintaining civility in message boards."
XBox (Games)

Live 'Hacking' Clarified as Pretexting 51

1up reports on a clarification of last week's Xbox Live security scare. Though there are no technical problems with the service, there is a service problem with the service: account information was obtained via pretexting. Essentially, social engineers called up Xbox Live tech support and lied, saying they were users of certain accounts. Thanks to the sloppy training and privacy consciousness of Live's customer service operators, information was given out that allowed these pretexters onto accounts. "That probably means calling in to deal with customer support about the nitty gritty of your Xbox Live account will become both much more secure and potentially a bit more time-consuming and annoying. That may be the necessary price for full security, although as long as we're dealing with humans (and information that can slip into others' hands), there's sure to be the occasional case of successful pre-texting."
Book Reviews

Pro Java ME MMAPI 20

Cory Foy writes "Several months ago Vikram Goyal emailed me letting me know he had a new book coming out from Apress, Pro Java ME MMAPI: Mobile Media API for Java Micro Edition. Having done mobile device development using J2ME, I knew how difficult it can be to do, or explain, some of the tricks in device development. So I wanted to see if this book could rise up to the challenge." Read below for the rest of Cory's review.
Book Reviews

IT Manager's Handbook 129

An anonymous reader writes "I have managed a lot of technical people in my career, and one thing I know: managing geeks is hard. Rewarding, interesting, challenging — and hard. Hard to do well. Dealing with all of the complexities of a modern IT environment is extremely difficult. There is precious little time, even less (skilled) help, and many, many "mission-critical" demands. This book is written for that over-worked, tech-savvy (and perhaps business newbie) IT Manager (and IT Manager wannabee.) It discusses both sides of the IT department equation: both the technical, as well as the business issues. It talks about not only how to write a good SLA but also how to avoid burnout in your employees." Read below for the rest of the review.
Businesses

Apple Care Efficiency When Macs Break? 232

cyber-dragon.net asks: "I have long been a staunch supporter of Apple and Macs, however my recent experience with trying to bring them into my department, at work, has been disappointing. We had a Mac Pro (the big quad processor monster) die after four days. Of course, this kind of stuff happens, and everything else has worked flawlessly. I even dealt with the inevitable teasing about the shiny new Mac being a lemon. Almost four hours dealing with Apple Care, three hours dropping off and picking up my computer at different stores, as per their instructions, trying to get this done quickly — I am beginning to wonder if Apple really wants business customers to rely on these machines. Much as I may dislike Dell, when my Linux box died it was fixed in four hours, and I spent maybe 20 minutes of my time setting up the repair. I have spent seven hours of my time so far on this Mac, and it still will not power up. Is this just me or have other people lost critical business machines to the depths of Apple Care inefficiency and lack of business level support?"

Canada Rejects Anti-Terror Laws 507

Coryoth writes "The Canadian parliament has voted against renewing anti-terror laws that had been introduced after September 11, 2001. The rejected laws included provisions to hold terror suspects indefinitely, and to compel witnesses to testify, and were in some sense Canada's version fo the Patriot Act. The laws were voted down in the face of claims from the minority Conservative government that the Liberal Party was soft on terror, and despite the fact that Canada has faced active terrorist cells in their own country. The anti-terror laws have never been used, and it was viewed that they are neither relevant, nor needed, in dealing with terrorist plots. Hopefully more countries will come to the same conclusion."
The Media

A Unique Perspective on a 'Game-Related' Tragedy 378

Megnatron writes "Penny Arcade has a letter from the stepmother of one of the kids who was recently charged with killing a homeless man. Her article is an extremely sobering tale of the problems dealing with troubled teen. She explains how, in this situation, the parents did everything they possibly could. And, in a refreshing twist, she absolves the games industry of any blame for the tragedy these kids perpetrated. From her missive: 'Video games DID NOT make this kid who he was, and it's unfortunate that the correlation is there. The thing that really gets me with this whole thing is that the kid knows full well that by equating what he's done to a video game, that he will generate controversy and media coverage. It makes me sick that the media is jumping all over this, because that is exactly the result that he wants. The only good thing (if there is such a thing) that has come out of this whole ordeal is that the kid is behind bars. That is exactly where he needs to be.'" Her letter is a passionate, troubling story, but well worth reading.
The Courts

IBM Sued for Firing Alleged Internet Addict 341

A user sent us a link to a CNN article covering a trial with a unique defense. James Pacenza, a 58 year old Alabama man, has been fired from his position at IBM for visiting adult sites during working hours. The man is now suing the company for $5 Million, alleging that he is an internet addict. The plaintiff claims he visits these sites as a way of dealing with traumatic stress incurred in the Vietnam War. He claims that while he is addicted to sex and the internet, he never visited adult sites at work. Age-related issues, he says, are the cause of his filing. IBM, on its part, says that Pacenza was warned during a similar incident several months ago. Pacenza denies this as well.

Windows Vista: the Missing Manual 220

John Suda writes "It's been over five years in the making and its nearly perfect. No, Im not referring to Microsoft's vast new operating system named Windows Vista, but to the reference book Windows Vista: the Missing Manual, by author David Pogue. The book is the latest, and perhaps best, in the Missing Manual series published by Pogue Press / O'Reilly Media, Inc. The Missing Manual series is the benchmark of quality for computer manuals. Unless youre a system administrator, programmer, or uber-geek, this is probably the only reference source you'll need to learn Microsofts Vista." Read below for the rest of John's review.
User Journal

Captain Copyright Expires 114

The Canadian superhero Captain Copyright has finally expired, not due to pirates or to the passage of 50 years after the death of the author, but because "the current climate around copyright issues will not allow a project like this one to be successful." The cartoon was intended to provide an education in copyright law for children, but it became a focus for criticism when even the Canadian Library Association condemned it for lacking balance because it ignored issues like Fair Dealing (Canada's version of Fair Use). Personally, I was hoping we'd see them get sued by DC & Marvel, who claim to own the trademark on the word "superhero", and vanish in a puff of logic.

Slashdot Top Deals