Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Censorship

UK Gov. Wants IWF List To Cover 100% of UK Broadband 281

wild_quinine writes "The UK government stated in 2006 that they wished to see 100% of UK consumer broadband ISPs' connections covered by blocking, which includes images of child abuse. 95% of ISPs have complied, but children's charities are calling for firmer action by the government as the last 5% cite costs and concerns over the effectiveness of the system. According to Home Office Minister Alan Campbell, 'The government is currently looking at ways to progress the final 5%.' With a lack of transparency in the IWF list, firm government involvement, and blocking that only 'includes' (but may not be limited to) images of child abuse, it looks like the writing is on the wall for unfiltered, uncensored Internet connections in the UK."
Space

First Evidence of Supernovae Found In Ice Cores 145

KentuckyFC writes "Supernovae in our part of the Milky Way ought to have a significant impact on the atmosphere. In particular, the intense gamma-ray burst would ionize oxygen and nitrogen in the mid to upper atmosphere, increasing the levels of nitrogen oxide there by an order of magnitude or so. Now a team of Japanese researchers has found the first evidence of a supernova's impact on the atmosphere in an ice core taken from Dome Fuji in Antarctica. The team examined ice that was laid down in the 11th century and found three nitrogen oxide spikes, two of which correspond to well known supernovae: one event in 1006 AD and another in 1054 AD, which was the birth of the Crab Nebula (abstract). Both were widely reported by Chinese and Arabic astronomers at the time. The third spike is unexplained, but the team suggests it may have been caused by a supernova visible only from the southern hemisphere or one that was obscured by interstellar dust."

Comment Re:Sarcasm misplaced (Score 1) 215

Such moderating! Only the inaccurate information was boosted! Maybe the metamoders
will see this, maybe they won't.

Brea means tarpits. (I expect the tarpits predate the ranch.)

Oh, and La means The.

They don't come up much in conversation, but a few people I know always
refer to them as "The The Tarpits Tarpits" when they speak. (Fortunately,
as I said, they doesn't come up too often in conversation!)

Comment This CallerID Trick has worked for years. (Score 1) 399

The only thing new here is that the service is being marketed, and the public is finding out about it.

If you call forward your landline to a toll-free number, which itself is programmed to forward the
calls it receives to a second number (say your cell), the callerID on the cell phone will display the number that would have been blocked if you had just taken the call at your landline.

I do not know whether ALL toll-free companies do this, or just some of them.

Here's how it all works.

Toll-free numbers have been around for decades longer than callerID. And it makes perfect sense that people who pay for a long distance call (the 800 number owner) should see the caller's number.

The mechanism used for doing this is called ANI, and it's been around since the 1960's at least.
There is no provision for blocking the calling party's number with this mechanism. (ANI stands for automatic number identification.)

Fast forward a few decades to the invention of something very new, Signaling System Seven (SS7).
It provides a whole new way to provide a caller's number to the called party, and it has various blocking options included. However, anytime a caller's number is supposed to be blocked, it really isn't -- it is always sent. However, a special one-bit flag is ALSO sent that says "Please
don't reveal this information even tho I am supplying you with it." Then if the equipment at the receiving end thinks it has a good enough reason, it strips out the "privacy requested" flag.

Now, there is nothing that says that an SS7 switch which is handling incoming 800 calls HAS TO
strip the privacy. The old ANI mechanism is still available, and SS7 does not have to treat 800 calls differently, but at least for some long distance companies, it does.

I have a question: does anyone know whether this SS7 privacy stripping on toll free calls is explicitly authorized? Or did companies exploit a loophole and just implement the SS7 software that way on purpose. A technical disadvantage to the old ANI system is that the calling number is not transmitted until AFTER the phone call is answered.

And then they're offering call recording also. When call recording is performed by a carrier, it doesn't necessarily wait for the call to be answered before it starts recording. I don't know about the Trap Call people. But there are services that will allow you to record what your caller
is saying about you before you answer the phone, while the caller is still hearing ringing.

Quote:

"Oh Mr. Hoover, you just don't understand. We are not subject to city, state or federal regulation. We are Omnipotent. OMNIPOTENT! That's PO-TENT with an OMNI in front of it."

                      -- Lily Tomlin portraying power-mad telephone operator "Earnestine" from the album
                                                    "This is a Recording". Mr Hoover is J. Edgar ("Jedgar") Hoover,
                                                                                                    Director of the FBI.

Comment After carefully considering over 300 replies, I'd: (Score 1) 564

This is an interesting and tricky problem to solve. The danger comes from people who might google your name, see the bad guy thing and go "yuck" -- and then pass you by. People like this can even
fully realize you aren't the bad guy, just someone with the same name, and still the "yuck" causes
them to pass your resume by. But if you make a big deal out of the co-incidence, including an affidavit or side-by-side photos of yourself and the bad guy, you'll make the co-incidence be more memorable than the rest of the resume. And of course you have to be upbeat and polite and not condescending too.

Here's how I'd do it:

At the top I'd put an asterisk after my name. This arouses curiosity. If you think the people might be extra stupid, use two asterisks, so they can't miss it. At the very end of the resume,
perhaps after "References: Available on request", put your footnote.

* Google Goofs to avoid. If they're a bit more formal, say
* Google Gaffes to avoid. (If this catches on, there will come to be an internet slang expression
for this section of a resume. If such an expression develops, use it.)

*Google Gaffe to avoid: Mistaken Identity. The applicant has no connection to the John Q. Public whose posts to the such-and-such forum pop up in a Google search by name.

Don't include the word pedophile, or even "bad guy" if you can help it. Your goal is to instruct the lazy and stupid not to jump to conclusions, without telling them that they are lazy and stupid.

You want to say "don't fall into the trap" without painting a big picture of a trap in their head that will dominate their memory of you. Don't even bring up the subject in your interview. Assume that if they've read your resume they know enough about the story.

Your best win here is not to be someone saddled with a huge hassle that you make a great noise about and then, finally, triumph over. Your best win here is to make the hassle seem miniscule,
as measured in how few seconds of conversation in the interviewer's mind are occupied by the hassle and how many minutes are occupied with other aspects of you and the interview.

Best of luck to you.

Privacy

Repairing / Establishing Online Reputation? 564

illini1022 writes "I'm currently a senior nearing graduation from college. With studies focusing on power and energy I believe I have set myself up extremely well for post-graduation employment. I have one concern. The top search result on Google for my full name is a blog posting regarding an article about a pedophile that happens to bear the same name as myself. The blog also originates from a city I lived in during one summer (specified on my resume). Upon closer inspection, it would become quickly apparent that the subject in question is not me. The person of interest was in the military, and I have never been. However, I fear this unfortunate coincidence might cost me chances at employment with companies I'm now applying to. I have absolutely no issue with any employer finding anything I've put on the Internet; I have been careful to protect my reputation. My concern is with an employer mistaking me for someone else, and disqualifying me from recruitment. I've attempted to contact the blog owner to no avail. What are my options? Am I overreacting? Should I attempt to set up my own site that would steal the top Google search from this blog posting? I appreciate any insight/advice."

Comment Re:One way to get more registered voters (Score 1) 1088

That anyone even has to ask this is a perfect example of what is wrong with the country. The
answer is, first of all that Democracy requires the people to be educated. And then, this educated
electorate is supposed to think about who would be the best person for the office, rather than the person they'd vote for in an actual contest of "popularity".

To make it more obvious, suppose you're a boss in a company who has to pick one of your employees to get a promotion. Who should you pick? The employee that you believe is more qualified to handle the new job? Or the one you'd enjoy "having a beer with"? If you make your judgement based on pretty much anything other than how competently they'd handle the new position, your aren't doing the company much of a favor.

Minus the reference to beer drinking, I was taught in elementary school when voting for the president of the fourth grade, say, to be sure to think who would be best, not necessarily most popular.

Thanks very much for posing the obvious question; it allowed me to make my point.

Security

Next Pwn2Own Contest Targets IE8, Firefox, iPhone 64

Windows Secrets writes "After two straight years of taking dead aim at Macbooks and Windows-powered machines, hackers at this year's CanSecWest conference will have shiny new targets: Web browsers and mobile phones. According to CanSecWest organisers, there will be two separate Pwn2Own competitions this year — one pitting hackers against IE8, Firefox 3 and Safari and another targeting Google Android, Apple iPhone, Nokia Symbian and Windows Mobile."
Be

BeOS Successor Haiku Keeps the Faith 448

kokito writes "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and 'personality,' boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general." (More below.)
Medicine

New Success For Brain-Controlled Prosthetic Arm 81

An anonymous reader writes "A number of amputees are now using a prosthetic arm that moves intuitively, when they think about moving their missing limb. Todd Kuiken and colleagues at the Rehabilitation Institute of Chicago surgically rearrange the nerves that normally connect to the lost limb and embed them in muscles in the chest. The muscles are then connected to sensors that translate muscle movements into movement in a robotic arm. The researchers first reported the technique in a single patient in 2007, and have now tested it in several more. The patients could all successfully move the arm in space, mimic hand motions, and pick up a variety of objects, including a water glass, a delicate cracker, and a checker rolling across a table. (Three patients are shown using the arm in the related video.) The findings are reported today in Journal of the American Medical Association."
Power

Scientists Harvest Nano-Power From Hamsters 90

Al writes "Researchers at Georgia Tech have come up with the ideal way to test a new peizo-electric device that efficiently harvests power from bio-movement — attaching it to a hamster. The device contains a series of zinc-oxide nanowires mounted on top of a flexible plastic surface. As the plastic bends, the wires generate around a nanowatt of power. The Georgia Tech team, led by Zhong Lin Wang, wanted to show that their device could produce power from irregular movements so they attached it to a tiny hamster jacket. They also tried attaching it to a volunteer's finger. Here's a video of the hamster wearing his piezo-power outfit."
Hardware Hacking

Hackable Microcontroller-Powered Valentine's Card 133

compumike writes "If you have a significant other to impress this Valentine's Day, consider putting your programming skills to use. This video tutorial shows how to build an LED Heart Valentine's card, powered by a microcontroller running C code, with a neat randomized 'twinkling' effect in an interrupt handler. Think about it: how many ladies can say that their Valentine's card runs at 14 MHz?"
Announcements

Slashdot.org Self-Slashdotted 388

Slashdot.org was unreachable for about 75 minutes this evening. Here is the post-mortem from Sourceforge's chief network engineer Uriah Welcome. "What we had was indeed a DoS, however it was not externally originating. At 8:55 PM EST I received a call saying things were horked, at the same time I had also noticed things were not happy. After fighting with our external management servers to login I finally was able to get in and start looking at traffic. What I saw was a massive amount of traffic going across the core switches; by massive I mean 40 Gbit/sec. After further investigation, I was able to eliminate anything outside our network as the cause, as the incoming ports from Savvis showed very little traffic. So I started poking around on the internal switch ports. While I was doing that I kept having timeouts and problems with the core switches. After looking at the logs on each of the core switches they were complaining about being out of CPU, the error message was actually something to do with multicast. As a precautionary measure I rebooted each core just to make sure it wasn't anything silly. After the cores came back online they instantly went back to 100% fabric CPU usage and started shedding connections again. So slowly I started going through all the switch ports on the cores, trying to isolate where the traffic was originating. The problem was all the cabinet switches were showing 10 Gbit/sec of traffic, making it very hard to isolate. Through the process of elimination I was finally able to isolate the problem down to a pair of switches... After shutting the downlink ports to those switches off, the network recovered and everything came back. I fully believe the switches in that cabinet are still sitting there attempting to send 20Gbit/sec of traffic out trying to do something — I just don't know what yet. Luckily we don't have any machines deployed on [that row in that cabinet] yet so no machines are offline. The network came back up around 10:10 PM EST."

Slashdot Top Deals

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...