Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Networking

A Brief History of Modems 249

Ant points out this two-page TechRadar article about the history of modems; the photographs of some behemoth old modems might give you new respect for just how much is packed into modern wireless devices.

Submission + - Gnome switches Nautilus back to browser mode

An anonymous reader writes: In one of the ( Do the developers actually use their own software?) decisions in the Linux Desktop World , back in 2004 Gnome switched to the "Spacial" view by default with their Nautilus file manager opening a new window with each new folder viewed. Many derided the decision as poor design or be different for the sake of being different. Well, after 5 long years the Gnome powers that be have decided to switch back to browser mode

Submission + - SPAM: FBI issues code cracker challenge

coondoggie writes: The FBI today posted a pictogram on its site and challenged code crackers to solve its mysteries. In the bureau's challenge it is using pictogram symbols based on Native American motifs. The challenge offers over 50 words to decipher.
Link to Original Source

Comment Other consideration (Score 1) 325

The manufacturing of said batteries, in addition to being expensive (working against the return-on-investment aspect of the house battery), is rather detrimental to the environment (kind of like solar cells, especially the old ones). One has to wonder whether building and using this system will result in a net benefit to the environment, let alone your pocket.

Mozilla

French Military Contributes To Thunderbird 3 379

fredboboss sends news about Mozilla's email client Thunderbird 3, whose release we noted last week. "Thunderbird 3 contains code from the French military, which decided the open source product was more secure than Microsoft's rival Outlook. The French government is beginning to move to other open source software, including Linux instead of Windows and OpenOffice instead of Microsoft Office. Thunderbird 3 used some of the code from TrustedBird, a generalized and co-branded version of Thunderbird with security extensions built by the French military."

Comment Re:ok what? (Score 5, Informative) 151

A little addendum: the final fine may vary from the stated amount. According to the document, the maximum fine may be increased to twice the amount illegally gained by the company or twice the amount of loss suffered by the victims. While 860 million USD seems a bit low, I expect the final number to be higher. (Or the given number could be a sort of "plea bargain" amount. I'm not sure.)

Transportation

Lotus Teases With a Fuel-Agnostic Two-Stroke Engine 269

JohnnyBGod writes "Lotus claim to have invented a new, more efficient engine design. The two-stroke, flex-fuel engine can achieve, according to the surprisingly technical press release, 'approximately 10% better [fuel consumption] than current spray-guided direct injection, spark ignition engines.' The engine has a sliding puck arrangement to control its compression ratio, and has direct injection and a wet sump, to eliminate fuel leakage to the exhaust and the need to mix oil with the fuel, two common problems with two-stroke engines. Lotus engineering have released a video explaining the engine's operation."
Privacy

Best Way To Clear Your Name Online? 888

An anonymous reader writes "About fifteen years ago, I did something that I've come to regret on a university computer system. I was subsequently interviewed by a Federal law enforcement agency, although no charges were pressed and I have no criminal record as a result of my actions. At the time, I discussed the matter with a friend of mine who went on to mention it briefly in a text file zine with a small distribution list. I've generally tried to keep a low profile online and until recently there's been very little information about me available from the major search engines. Unfortunately, that zine mention was picked up by textfiles.com at some point and mirrored across the world. I've tried to address this with the owner of the site, but couldn't get anywhere. Even if my name in the source file is altered, cached copies will continue to link me with my youthful mistake. Have any other Slashdot readers had a similar experience? What practical steps would your readers recommend to prevent this information from hurting me? I am concerned that future employers may hold my past actions against me should they look for me online as part of their screening process."

Comment Ideal environment (Score 5, Funny) 87

perfect environment for electronic documents

Kernel Butler: Would you like a defragmentation this evening, sir?
Document: No thank you. I would however like an integrity scan.
Kernel Butler: Right away sir. Anything for Mrs. Backup?
Backup: No thank you. I just got all my bits redone at the BZip2 fitness center. I've been trying to watch my size and nothing's been working until -
Document: Oh, do be quiet. You've been prattling on about your size for ages. Nothing's wrong with size. I've just cleared 1MB and I'm none the worse for it.
Kernel Butler: Anything else, sir or madame?
Document: No, that will be all.
Kernel Butler: Thank you. I will schedule your scan immediately, sir. Goodnight.

Comment Re:Not surprised (Score 1) 137

There is nothing white hat about this.

Just a little clarification:

My original point with the "black hat/white hat" thing was to forestall people who would take my "criminals stealing from criminals" to mean "all hackers are criminals" (which is not what it meant). Some hackers are criminals, others not. That's all I was trying to convey.

Comment Not surprised (Score 4, Insightful) 137

Criminals stealing from criminals? Doesn't surprise me. It happens all the time in the physical world.

(Before the deluge of malice-laden replies regarding "how I make all hackers out to be villians," yes, I know the difference between white hat and black hat.)

Comment Re:Why wouldn't they? (Score 5, Interesting) 135

Many companies also perform such searches whilst screening potential employees. They often get junior (junior as in position, not necessarily age) employees to befriend said candidates in order to dig up any "dirt" they can on you. (Hence a warning to those of you looking for a job: beware what you post online.) The feds would be foolish not to do so as well.

Slashdot Top Deals

"By the time they had diminished from 50 to 8, the other dwarves began to suspect "Hungry." -- a Larson cartoon

Working...