Image

Review: Halo: Reach Screenshot-sm 191

The launch of Halo: Combat Evolved in 2001 vaulted Bungie to the top of the game development industry and helped provide a stable foundation for the success of the original Xbox. Nine years later, having completed a trilogy and a standalone expansion for the Halo universe, Bungie has returned to the IP one last time for a prequel called Halo: Reach. They clearly wanted to do right by the fans and the franchise with their final sendoff, and the effort they put into the game reflects that. Read on for the rest of my thoughts.
Image

Eternal Sunshine of the Spotless Internet Screenshot-sm 92

MMBK writes "Our friends at JESS3 have unveiled The Ex-Blocker. It's a Firefox and Chrome plugin that erases all name and likeness of your ex from the Internet, even if they become a meme, or the president. You'll no longer have to threaten to delete your Facebook account or concoct an elaborate e-hoax to assuage the reality-shattering complications that are born from break-ups. Simply construct an Internet that omits bad vibes all together."
Privacy

Schneier On a Generation Gap In Privacy 166

goompaloompa writes "In the Japan Times, Bruce Schneier writes that a passing conversation online is not what it may seem and that maintaining your privacy is becoming even more difficult as social media and cloud computing become the norm. Furthermore, while users in Japan may think they are secure, their level of protection may vary when the computers that store their data are overseas. At the root of the problem is a new generation gap: old laws incapable of covering current-day scenarios. Quoting: 'Twenty years ago, if someone wanted to look through your correspondence, they had to break into your house. Now, they can just break into your ISP. Ten years ago, your voicemail was on an answering machine in your office; now it's on a computer owned by a telephone company. ... We need comprehensive data privacy laws, protecting our data and communications regardless of where it is stored or how it is processed. We need laws forcing companies to keep it private and delete it as soon as it is no longer needed, and laws giving us the right to delete our data from third-party sites. And we need international cooperation to ensure that companies cannot flaunt data privacy laws simply by moving themselves offshore."
Censorship

Why Doesn't the IWF Notify Those Whom They Block? 203

Frequent Slashdot contributor Bennett Haselton writes "What if the IWF notified site owners when it added their content to the UK's national 'child pornography' blacklist? Besides the blocking of the Virgin Killer cover art on Wikipedia, we don't know how many mistakes there might be on the IWF's list. But we would have a better idea, if content owners were notified of the IWF's determination and had the opportunity to challenge it publicly." Read on for Bennett's analysis.
Image

Learning Joomla! 1.5 Extension Development Screenshot-sm 73

Michael J. Ross writes "Every major content management system (CMS) offers considerable functionality for building Web sites out of the box. But to get the most out of any CMS, its functionality must be extended through the addition of modules, most of which are created by third-party developers. For instance, a given CMS may need to be supplemented by an e-commerce module in order to use that CMS for building an online store. Joomla, one of the most widely used CMSs, is no exception. Web developers interested in creating their own Joomla extensions can read Learning Joomla! 1.5 Extension Development, authored by Joseph LeBlanc." Read below for the rest of Michael's review.
Image

Ubuntu Kung Fu Screenshot-sm 253

Lorin Ricker writes "Back in the dark ages of windows-based GUIs, corresponding to my own wandering VMS evangelical days, I became enamored of a series of books jauntily entitled Xxx Annoyances (from O'Reilly & Assocs.), where "Xxx" could be anything from "Windows 95", "Word", "Excel" or nearly piece of software which Microsoft produced. These were, if not the first, certainly among the most successful of the "tips & tricks" books that have become popular and useful to scads of hobbyists, ordinary users, hackers and, yes, even professionals in various IT pursuits. I was attracted, even a bit addicted, to these if only because they offered to try to make some useful sense out of the bewildering design choices, deficiencies and bugs that I'd find rampant in Windows and its application repertory. Then I found Keir Thomas, who has been writing about Linux for more than a decade. His new "tips" book entitled, Ubuntu Kung Fu — Tips & Tools for Exploring Using, and Tuning Linux, and published by Pragmatic Bookshelf, is wonderful. Having only recently wandered into the light of Linux, open source software, and Ubuntu in particular, this book comes as a welcome infusion to my addiction." Read below for the rest of Lorin's review.

Wicked Cool PHP 131

Michael J. Ross writes "Web developers familiar with a particular programming language, such as PHP, typically turn to books and forums for assistance only when they confront a specific problem that they believe has probably been encountered by many of their peers in the past, and who have published their answers in print or online. Hence the growing popularity of programming "cookbooks", which eschew flowing narratives in favor of self-contained problem descriptions and solutions. One example of a book that combines both styles is Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems, by William Steinmetz with Brian Ward." Keep reading below for the rest of Michael's review.
Slashdot.org

Subterranean Slashdot Email Blues 267

If you can imagine working in the office of a school for gifted, troubled, and criminally insane children, inside an international airport, you can get a taste of what it is like to do support for Slashdot. I've worked here around 5 years now and have seen some crazy things. From a guy showing up at the office and offering me a car if I let him "reverse engineer Rob Malda's life", to people shaking and on the verge of tears because they got a Slashdot sticker. I was really tempted to take the car by the way but the thought of Rob spending his last few weeks in a hole, while this guy lowered a bucket of lotion and water down to him once a day, made me feel bad. Most of my time is spent answering email. Most days I receive about 50. When it's busy I can get well over a hundred. As everyone knows, people are precisely 500% more rude and angry online than they are in real life. Something about not having to see the tears or dodge the fist of the person you are swearing at brings out the worst in some people. We decided it would be fun to go through some of the more 'interesting' mails we've got through the years as part of our 10 year anniversary. Below you'll find some of my favorite rants, conspiracy theories and tantrums. (CT: Don't forget to put in your charity bid for the EFF- time is almost up.)
Slashdot.org

A Brief History of Slashdot Part 2, Explosions 216

When last we left off, Slashdot had grown beyond my ability to maintain it as a hobby, as well as beyond the simple DEC Alpha Multia 166 that had served it so well for the first week or two, and then immediately buckled under the traffic. Here in Part 2, we ride the wave of Slashdot's growth from early '98 until whenever my wrists get tired enough that I stop yakking until next week.

One Man's Spam Is Another Man's Art 117

mytrip writes "Most people see Viagra ads and Nigerian scams as simply more e-mail to delete. Alex Dragulescu sees art. For the last several years, the Romanian-born computer artist has applied techniques in computational modeling and information visualization to invent a new form of artistic expression. One of his more notable projects involved creating what he calls Spam Plants. He wrote algorithms that analyzed various text and data points of junk e-mail to produce "organic" images of plantlike structures that spontaneously grew based on incoming spam. "
Operating Systems

Linux Cookbook 126

norburym (Mary Norbury-Glaser )writes "Carla Schroder's Linux Cookbook (O'Reilly) is an extremely dense volume packed with valuable information. The author writes with precision and detail and with a conversational style that handles the topic with a wry humor making this book a pleasure to read. The Linux Cookbook is command-line based so some familiarity with a Linux system, the inherent power of using the command-line and the dangers of using root are necessary." Read on for the rest of Norbury-Glaser's review.

The Early History of Nupedia and Wikipedia, Part II 140

Today, read the continuation of Larry Sanger's account of the early history of Nupedia and Wikipedia (below), in which Sanger talks about the difficulties of governance in a large, free-wheeling project, some final attempts to save Nupedia, and how he came to resign from the organization. (And if you missed it, you might want to start with yesterday's installment.)
Slashback

Slashback: Pie, Election, Alarm 158

Slashback this evening with another batch of updates and responses to previous Slashdot posts, including: how Firefox users can avoid post-cookie Web tracking (for now), more on open-source graphics drivers, and an alarm clock that sounds perfect for annoying a spouse. Read on for the details.
Media (Apple)

Rob Glaser Responds, Talks Up Real Networks 464

The 10 questions we sent Real Networks CEO Rob Glaser were selected from 37 that were moderated +5 about 24 hours after we posted the "call for questions" last week. As promised, Glaser answered them himself rather than through PR people, but since part of a CEO's job is to be his company's number one booster it's not surprising that his answers have a high PR component to them; yours would too if you were in his position.
Spam

Malicious E-Cards - An Analysis of Spam 482

smashr writes "I ran across this article the other day which is a rather clear analysis of a piece of malicious spam the author received. While most of us simply hit the delete key, the author has taken the time to see exactly what is going on when an innocent user clicks on one of these fake e-cards that are going around. From Russian spyware sites to over-writing wmplayer.exe this particular piece of spam is a rather nasty one."
Programming

SQL: Visual QuickStart Guide 198

objectboy writes with a review of Chris Fehily's SQL: Visual QuickStart Guide, writing "This book teaches ANSI SQL-92 programming to database beginners and intermediates. The publisher, Peachpit Press, publishes mostly end-user and novice titles that usually go unnoticed by professional programmers. Its Perl and PHP books, for example, are of little practical or tutorial use to an experienced developer. In fact, I noticed this SQL book only because a junior developer was using it for a course. The book's table of contents, index, and a sample chapter are posted on Amazon.com. The book's official web site contains errata and other information." Objectboy's review continues below.
Music

RIAA Plans Cyberwar Effort 669

Richie Z writes "This article at the New York Times talks about new anti-piracy efforts from the music industry, some of questionable legality. One idea simply redirects users to a website with legal downloads. But two other programs freeze the user's system or delete music files determined to be illegal. Another proposed idea is basically a DoS attack against downloaders. I guess the RIAA believes the law only applies to their enemies." They had a solution to illegality planned.
The Courts

Larry Rosen on the Microsoft Penalty Ruling 289

Some excellent questions got asked. And these answers, from Larry Rosen, an attorney who works heavily on open source licensing matters, ought to give you a bit of insight into what the Microsoft "final judgement" means in the context of open source development and the software marketplace in general.
News

H2K2 Wrapup 138

Your intrepid reporter took a jaunt down to the H2K2 conference this past weekend, held in the lovely Hotel Pennsylvania. The conference had much more floor space than they had two years ago, and it seemed like more attendance as well. Wireless networks were available, though overcrowded, and if you didn't encrypt your communications, well, you've probably already paid the price. My notes on the conference and the sessions I attended are below, followed by a couple of reader submissions.
Programming

Kent M. Pitman Answers On Lisp And Much More 346

A few weeks ago, you asked Kent M. Pitman about Lisp, Scheme, standards, and other things -- He's answered your questions below, at length. At such length, in fact, that only the first eleven of his answers are shown below -- expect more shortly! Thanks, Kent.

Slashdot Top Deals