×
Technology

Ask Slashdot: Dealing With Electrostatic Contamination? 197

interval1066 writes "I've generally made it a practice to blow the dust out of my devices 1) when I remember to do so 2) after about 3 or so years of use 3) when I can get inside the case. My monitor is very thin and difficult to open. When I did finally crack it open I didn't really notice a whole lot of dust, but I blew the thing out anyway and put it back together, and it's doing ok, as far as I can tell. I'd be interested in knowing other Slashdotters' experiences with maintaining their devices in this way and where possible. And I actually extending the life of my devices, or am I just wasting my time?"
Google

Google Keep Labelled "Delete" 221

judgecorp writes "The Google Keep note-keeping app has had a frosty reception. Analysts including Gartner have said its functionality is laughable compared to that of the rival Evernote (saying "it's like saying MSFT Paint is a threat to Photoshop") and other users have rejected it on the grounds that after the death sentence on Reader, Google can't be trusted not to pull the plug on a service which people have come to rely on."
Democrats

Internet Sales Tax Vote This Week In US Senate 434

SonicSpike excerpts from CNet's coverage of the latest in the seemingly inevitable path toward consistently applied Internet sales taxes for U.S citizens: "Internet tax supporters are hoping that a vote in the U.S. Senate as early as today will finally give them enough political leverage to require Americans to pay sales taxes when shopping online. Sens. Mike Enzi (R-Wy.) and Dick Durbin (D-Ill.) are expected to offer an amendment to a Democratic budget resolution this week that, by allowing states to 'collect taxes on remote sales,' is intended to usher in the first national Internet sales tax." There goes one of the best ways to vote with your dollars.
Botnet

New OS X Trojan Adware Injects Ads Into Chrome, Firefox, Safari 129

An anonymous reader writes "A new trojan specifically for Macs has been discovered that installs an adware plugin. The malware attempts to monetize its attack by injecting ads into Chrome, Firefox, and Safari (the most popular browsers on Apple's desktop platform) in the hopes that users will generate money for its creators by viewing (and maybe even clicking) them. The threat, detected as "Trojan.Yontoo.1" by Russian security firm Doctor Web, is part of a wider scheme of adware for OS X that has "been increasing in number since the beginning of 2013," according to the company."
The Internet

Post "Good Google," Who Will Defend the Open Web? 133

psykocrime writes "The crazy kids at Fogbeam Labs have started a discussion about Google and their relationship with the Open Web, and questioning who will step up to defend these principles, even as Google seem to be abdicating their position as such a champion. Some candidates mentioned include Yahoo, IBM, Red Hat, Mozilla, Microsoft and The Wikimedia Foundation, among others. The question is, what organization(s) have both the necessary clout and the required ethical principles, to truly champion the Open Web, in the face of commercial efforts which are clearly inimical to Open Source, Open Standards, Libre Culture and other elements of an Open Web?"
The Internet

Video The Non-Profit .Org Registry Works Behind the Scenes (Video) 21

ICANN.org says, "The DotOrg Foundation [update: Note that the organization is now known as the Public Interest Registry], along with its operating partners, is committed to stable, efficient and affordable management of the .org registry." Most of us don't spend a lot of time thinking about the Internet's basic "plumbing," and few spend much time thinking about .org and the group that is responsible for maintaining it. That group did, however, have a booth at SXSW. That's where Timothy Lord interviewed .org spokesperson Thuy LeDinh, who was happy to explain what the .org people do and why they do it.
Security

BBC Twitter Accounts Hacked By Pro-Assad Syrian Electronic Army 129

DavidGilbert99 writes "Following BBC Weather on Twitter seems like it wouldn't throw up too many surprises — possibly news of the odd blizzard now and again. But today, the account's 60,000 followers got a little more than 'chance of a light drizzle' when the pro-Assad Syrian Electronic Army hacked the account, along with a couple of other BBC accounts, in an apparent protest at what it sees as reports which don't show the Syrian regime in the best light." Also at the BBC itself.
Censorship

Apple Yanks "Sweatshop Themed" Game From App Store 184

First time accepted submitter danhuby writes "Apple have removed sweatshop-themed game Sweatshop HD by UK developers LittleLoud from their app store citing clause 16.1 — 'Apps that present excessively objectionable or crude content will be rejected.' According to the PocketGamer article, Littleloud's head of games, Simon Parkin, told Pocket Gamer that 'Apple removed Sweatshop from the App Store last month stating that it was uncomfortable selling a game based around the theme of running a sweatshop.'"
Government

Digging Into the Legal Status of 3-D Printed Guns 404

jfruh writes "Defense Distributed, a U.S. nonprofit that aims to make plans for guns available owners of 3-D printers, recently received a federal firearms license from the Bureau of Alcohol, Tobacco and Firearms. That license doesn't cover semi-automatic weapons and machine guns, though — and there are questions about whether the legislation that defines that license really apply to the act of giving someone 3-D printing patterns. Experts on all sides of the issue seemed to agree that no clarification of the law would happen until a high-profile crime involving a 3-D printed weapon was committed."
Android

Poking Holes In Samsung's Android Security 107

Orome1 writes "Tired of waiting for Samsung to fix a string of critical flaws in their smartphones running Android, Italian security researcher Roberto Paleari has decided to inform the public about the seriousness of the matter and maybe make the company pick up the pace. Mindful of the danger that the vulnerabilities present to the users if they are exploited by malicious individuals, he decided not to share any technical details, but to just give a broad overview of what their misuse would allow. This includes a silent installation of highly-privileged applications with no user interaction and an app performing almost any action on the victim's phone."
DRM

WHSmith Putting DRM In EBooks Without Permission From the Authors 88

sgroyle (author Simon Royle) writes with an excerpt from an article he wrote about discovering that publisher WHSmith has been adding DRM to books without their authors' permission, and against their intent: "DRM had, without my knowledge, been added to my book. I quickly checked my other books; same thing. Then I checked the books of authors who, because of their vocal and public opposition, I know are against DRM – Konrath, Howey, and Doctorow, to name a few – same result. ALL books on WHSmith have DRM in them. Rather than assume WHSmith where at fault, I checked with my distributor, Draft2Digital. They send my books to Kobo, who in turn send my books to WHSmith. D2D assured me the DRM was not being added by them and were distressed to hear that this was the case. Kobo haven't replied to any of the messages in this thread: 'WHSmith putting DRM in books distributed via Kobo'. I'm not holding my breath." Update: 03/22 21:02 GMT by T : Problem resolved. Hanno Liem of the Kobo team wrote with good news that the DRM notices that were appended were done so in error, and since corrected: "The original site has been updated – it was just a bug on our site, and was resolved within a day I think. We're all slashdot readers here at Kobo Operations, and this is kinda painful :p" Thanks, Hanno.
Government

Declassified LBJ Tapes Accuse Richard Nixon of Treason 536

Hugh Pickens writes writes "After the Watergate scandal taught Richard Nixon the consequences of recording White House conversations, none of his successors has dared to do it. But Nixon wasn't the first. He got the idea from his predecessor Lyndon Johnson, who felt there was an obligation to allow historians to eventually eavesdrop on his presidency. Now David Taylor reports on BBC that the latest set of declassified tapes of President Lyndon Johnson's telephone calls show that by the time of the Presidential election in November 1968, LBJ had evidence that Nixon had sabotaged the Vietnam war peace talks — or, as he put it, that Nixon was guilty of treason and had 'blood on his hands'. It begins in the summer of 1968. Nixon feared a breakthrough at the Paris Peace talks designed to find a negotiated settlement to the Vietnam war that he knew would derail his campaign. Nixon therefore set up a clandestine back-channel to the South Vietnamese involving Anna Chennault, a senior campaign adviser. In late October 1968 there were major concessions from Hanoi which promised to allow meaningful talks to get underway in Paris. This was exactly what Nixon feared. Chennault was dispatched to the South Vietnamese embassy with a clear message: the South Vietnamese government should withdraw from the talks, refuse to deal with Johnson, and if Nixon was elected, they would get a much better deal. Meanwhile the FBI had bugged the ambassador's phone and transcripts of Chennault's calls were sent to the White House. Johnson was told by Defense Secretary Clark Clifford that the interference was illegal and threatened the chance for peace. The president gave Humphrey enough information to sink his opponent but by then, a few days from the election, Humphrey had been told he had closed the gap with Nixon and would win the presidency so Humphrey decided it would be too disruptive to the country to accuse the Republicans of treason, if the Democrats were going to win anyway. In the end Nixon won by less than 1% of the popular vote, escalated the war into Laos and Cambodia with the loss of an additional 22,000 American lives, and finally settled for a peace agreement in 1973 that was within grasp in 1968."
EU

Decade-Old Espionage Malware Found Targeting Government Computers 69

alancronin writes "Researchers have unearthed a decade-long espionage operation that used the popular TeamViewer remote-access program and proprietary malware to target high-level political and industrial figures in Eastern Europe. TeamSpy, as the shadow group has been dubbed, collected encryption keys and documents marked as 'secret' from a variety of high-level targets, according to a report published Wednesday by Hungary-based CrySyS Lab. Targets included a Russia-based Embassy for an undisclosed country belonging to both NATO and the European Union, an industrial manufacturer also located in Russia, multiple research and educational organizations in France and Belgium, and an electronics company located in Iran. CrySyS learned of the attacks after Hungary's National Security Authority disclosed intelligence that TeamSpy had hit an unnamed 'Hungarian high-profile governmental victim.'"

Slashdot Top Deals