Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
It's funny.  Laugh.

Submission + - The Federal Government vs. The Simpsons (10zenmonkeys.com)

destinyland writes: "In 1990, the federal "drug czar" for President Bush warned patients at a drug treatment center that watching the Simpsons was "not going to help you." Before Friday's movie cements the cartoon's hold on the mainstream media, it's worth noting that it continued challenging federal drug policy for the next 17 years. (And it isn't stopping; the movie's trailer shows Homer demanding more psychotropes...) Just remember that it was at the height of the war of drugs when the Simpsons first began proving that Freedom of speech is a wonderful thing. In 1990 Matt Groening even issued a response to the drug czar on behalf of Bart Simpson. "If our drug czar thinks he's going to have a conversation with a cartoon character, he must be smoking something.""
Networking

Submission + - Last-Minute Senate Amendment to appease RIAA

Rodrigo writes: Senate Majority Leader Harry Reid has found the time to forget about fighting that pesty Iraq War and focus on the issues that really matter: making the influence of the RIAA and MPAA a mainstay in our college campuses. The EFF has put a call to arms against the proposed Senate amendment to the Higher Education Act. The amendment aims to force certain schools to police their network or risk losing federal funding for student aid. Naturally, this policing will come at the school's expense and through "technology-based deterrents," which raise privacy concerns. Please call your representatives and make sure they know what they're voting for under Senate Amendment 2314.
Software

Submission + - Review of Windows Home Server RC1 on Via C7 (terracode.com)

VasR writes: "Windows Home Server has been touted to be able to run on minimal hardware. This article provides an overview of WHS features and a look at the Media Streaming and remote access performance. Overall the impressions were quite positive for it's ability to work quite well on a 2 Ghz Via C7 based computer. http://www.terracode.com/WHS/WHS_on_Book_Server.ht ml"
Announcements

Submission + - Harry Potter Leak is Authentic! (No Spoilers Here)

CantSleepBusyReading writes: "Well, It seems that the leaked Harry Potter Pictures/Book is authentic! The New York Times (Which acquired an early copy legally) has compared the potential fake release with the book itself. The verdict? Its a keeper — the widely available and greatly discouraged leaked copy is not a fake.

Its good to know that I didn't just waste 8 hours reading it.

http://www.nytimes.com/2007/07/20/arts/20bpott.htm l"
Google

Submission + - Which Google Should Congress Believe? 1

theodp writes: "In Congressional testimony last month, Google's VP of People Operations told the House Judiciary Subcommittee on Immigration that, due to limits on the number of H-1B visas, Google is regularly unable to pursue highly qualified candidates. But as Google stock tumbled in after hours trading Wednesday, Google's CEO blamed disappointing profits on a hiring binge and promised Wall Street analysts that the company would keep a careful eye on headcount in the future. So which Google should Congress believe?"
Security

Submission + - iPhone/Yahoo mail security vulnerability (isode.com)

Will Sheward writes: "Whilst trying to figure out how the iPhone was doing it's 'push' email with Yahoo (it seems it doesn't — but that's another story) we came across another security flaw. The iPhone authenticates with Yahoo using a private protocol called XYMPKI, used in conjunction with IMAP. Yahoo do not provide a general IMAP service — they use IMAP only for iPhone access. Although the iPhone supports TLS (Transport Layer Security) Yahoo! IMAP doesn't, which can lead to a replay attack. Anyone able to eavesdrop on the authentication exchange, such as when using any open (public or private) wi-fi service, can easily gain full access to the user's email account until the user changes their password. We would advise against using the Yahoo service with an iPhone, because of this security risk. Full details here"
United States

Submission + - EFF reports more USA PATRIOT act abuse

A Name Similar to Di writes: From the EFF website:

In the wake of the inspector general's report, EFF filed a Freedom of Information Act lawsuit seeking fundamental information about the FBI's misuse of the NSL authority, and a federal judge recently ordered the Bureau to release information responsive to EFF's request on a rolling basis.

On Friday, July 6, the FBI made its first disclosure of 1,138 pages of documents, all of which you can view here. (Please keep in mind that this is the first of many sets of documents we'll be receiving, so this material does not present a complete picture.) Here's what we've spotted that we think is most interesting so far.
Networking

Submission + - 10 Ways to Tick off Your IT Dept. (pcmag.com)

Rinne writes: "Sit down, this may be shocking: Your company's network bandwidth and storage are finite resources. And the hall monitors for those resources are in your friendly, neighborhood IT department. There are things they like us to do — say, not back up our music on the server — and then there are the things they wish we didn't know how to do. Here are the top ten things you probably would love to do on your work PC that IT wishes you didn't know about."
Security

Submission + - It's Official, the iPhone has been Hacked (iPwned) (beskerming.com)

SkiifGeek writes: "It took them less than two weeks, but the researchers who recently gained a bootloader shell on the iPhone have now completely unlocked the iPhone, managing to escape the chroot jail that was halting forward progress. Despite the promise of their earlier bootloader work, it was a dead end when it was realised that code could not be arbitrarily loaded without signing by Apple's 1024-bit private RSA key."
Privacy

Submission + - The intimate data search engines store about you (computerworld.com)

Lucas123 writes: "Computerworld's Mary Brandel has written a story about everything search engines store about their users, which includes the type of search someone performs — image, Web, local — and things such as their e-mail addresses, social networks, calendars, etc. 'Search engines such as Google, Yahoo and Microsoft Live Search all record and retain in their vast data banks any term that you query, in addition to the date and time your query was processed, the IP address of your computer and a cookie-based unique ID. Reporters at The New York Times didn't even need an IP address to track down the identity of an AOL user when AOL published anonymous search logs of 500,000 users over a three-month period.'"

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...