Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Silicon Graphics

Submission + - fsdfsdfsdfsdfsd

suspectqa writes: gfsdgfsdgdgdfg dg dfg dfgdf gdfg dfg
Patents

Submission + - NYT editorial on software patents (nytimes.com)

sbma44 writes: "Tim Lee has a great editorial in the New York Times providing an overview of the case against software patents. There's not much that the /. crowd won't have heard before, but it's great to see the issue being covered in the Paper Of Record."
Microsoft

Submission + - Microsoft demands developer withdraw free software

An anonymous reader writes: ZDNet reports : "Microsoft has demanded that a London-based Windows developer withdraws a version of his free debugging tool from distribution, and is claiming that the tool breaches its licensing conditions."
Privacy

Submission + - Google likens Sweden to dictatorship

lobStar writes: Google criticizes the Swedish government heavily and does even go as far as liken it with dictatorship because of the proposed bill that would allow wiretapping of all data crossing the countries' borders. The proposal stems from a tradition begun by Saudia Arabia and China and simply has no place in a western democracy," says Peter Fleischer, Google spokesman. "Sometimes Google needs to take a clear stance and my impression is that everybody has listened very intently to what we have had to say," Although the bill has been delayed, not even a such strong statement from the search giant seems to make the government change it's mind.
Privacy

Submission + - Identification through Reverse DNS?

An anonymous reader writes: I've recently noticed that the reverse DNS name given to my IP from my ISP contains my mac address. It seems to me that regardless of IP address/dhcp logs that this could serve as a permanent unique identifier for a person. How many other ISPs do this? Are we clearing our google cookies periodically for nothing? Is this a privacy hole that should be closed up? I can see the ISPs internally being able to recognize their clients uniquely, but to the rest of the Internet is it a security violation for people to be tracked by an unchanging hostname?
Microsoft

Submission + - Microsoft - Linux patent immunity

An anonymous reader writes: http://www.groklaw.net/article.php?story=200705181 24020691 This is news indeed. Todd Bishop has the story. Eben Moglen is saying that the SUSE vouchers Microsoft is distributing have no expiration date! I didn't know this. It's huge. This is, according to Moglen's remarks, another defense to any patent infringement claim by Microsoft, and it may well bring that campaign to a screeching halt. Here's why. Someone, Moglen says, is bound to turn a voucher it got from Microsoft in after GPLv3 goes into effect and GPLv3 code is being distributed, and at that moment Microsoft comes under its terms. And that should mean the end of Microsoft's ability to successfully sue anybody over its alleged patents allegedly in Linux, or to phrase it more exactly, it provides a probable defense to all Linux users and vendors, not just Novell's paying customers, if Microsoft does sue.
AMD

Submission + - AMD will deliver open graphics driver

FrankNFurter writes: "According to this blog entry, Henri Richard, AMD's executive vice president of sales and marketing announced during his keynote at the Red Hat Summit that AMD will soon deliver open graphics drivers. What is lacking are details about which products will be supported, when the drivers will be available and how open the license will be."
Security

Submission + - Quantum Cryptography Hacked

mrbluze writes: Nature reports on a eavesdropping technique developed by researchers at MIT for intercepting quantum-encrypted messages:

To listen in, the team used a quantum-mechanical principle known as entanglement, which can link together two different traits of a particle. Using an optical setup, the team was able to entangle the transmitted photon's polarization with its momentum. The eavesdropper could then measure the momentum in order to get information about the polarization, without affecting the original polarization.
This stuff is beyond me, but I can't wait to read Slashdot's explanation!
User Journal

Journal SPAM: The Season Of Cherry Blossoms 2

The colour of flower is as white as the complexion of a pretty young woman.

The colour of trunk is as black as the colour of hair.

Those are two reasons cherry blossoms attract many Japanese.

Security

Submission + - Metasploit Framework 3.0 RELEASED!

Metasploit writes: "We are pleased to announce the immediate free availability of the Metasploit Framework version 3.0. Metasploit is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits 104 payloads 17 encoders and 3 nop modules. Additionally 30 auxiliary modules are included that perform a wide range of tasks including host discovery protocol fuzzing and denial of service testing.

HD Moore also gave an interview to Securityfocus to discuss what's new in release 3.0, the new license of the framework, plans for features and exploits development, and the links among the bad guys and Metasploit and the law. Here's a quote: "In the US, exploit regulation would kill research and lead to a degrading state of security for all US companies. Vendors patch because exploits are available, without "above ground" exploits that anyone can access, there is no motivation to patch flaws.""

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...