Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Internet Explorer

Submission + - Is The Internet Explorer IQ Test A Fake? (itnews.com.au)

aesoteric writes: Internet Explorer users may not be so stupid after all. Whois records and web content comparisons have raised questions over the company behind a survey that garnered global headlines this week for claiming that Internet Explorer users were dummies. It was unclear how the company, AptiQuant, stood to benefit from the publicity it had generated, and the person who answered their phone declined to volunteer his identity. In addition, a French psychometric testing company has denied any link to AptiQuant.
Music

Submission + - IMSLP.org forced offline by MPA DMCA takedown (imslpjournal.org)

An anonymous reader writes: From the article:

The MPA, without notifying us, sent to our domain registrar GoDaddy a bogus DMCA takedown notice. GoDaddy took the entire IMSLP.ORG domain down. IMSLP has filed a DMCA counter notice with GoDaddy, however, the DMCA seems to require the registrar to wait no less than 10 days before restoring service. This means that IMSLP is inaccessible from IMSLP.ORG during this period of time. We will be working to restore service as soon as possible.

What is the MPA complaining about? Rachmaninoff’s Bells, which is public domain both in Canada and the USA: [link]. MPA’s claim is entirely bogus.

Music

Submission + - imslp.org Taken Down Thanks to MPA (imslpforums.org)

dsavi writes: The International Music Score Library Project's website imslp.org (A library of public domain scores and recordings of classical music) has been taken down by GoDaddy per a DMCA takedown request from the Music Publisher's Association. According to the MPA, a score of Rachmanioff's Bells is under copyright in the US, while according to IMSLP it is most definitely not. A DMCA counter-notice has been issued to GoDaddy by IMSLP, unfortunately there is a ten-day waiting period before the domain can be restored. While the imslp.org domain is down, the music library can still be accessed at PetrucciLibrary.org. Anyone who is interested in helping with counter-suing the MPA can email imslproject at yahoo dot ca.

Comment Re:Why wouldn't they charge for tethering? (Score 1) 326

"Because it is no different surfing the net with the iphone displaying the data or your laptop displaying the data."

I'm not sure I fully agree with that statement. Your behaviour is likely to differ between iPhone usage and what you do on your laptop. e.g. on your laptop you're more likely to exchange large documents via e-mail, download Windows updates, etc.

There will be some concept of what an "average" user does and their current tariffs will be priced accordingly. Changing the device being used is likely to change the assumptions.

Controversial suggestion: maybe what you want is a capped usage tariff that can be shared between iPhone and tethered devices, rather the current "all you can eat"....

Patents

Submission + - Vonage Admits no Workaround for Verizon Patents

Frosty Piss writes: "USA Today is reporting that Vonage has finally confirmed what many suspected: The company has no "workaround" to sidestep Verizon's VOIP patents. Moreover, Vonage isn't sure that such a plan is even feasible, given the expansiveness of Verizon's patents, which set out methods for passing calls between the Internet and conventional phone networks. Vonage has seen its shares plunge more than 80% since it went public last year. This year alone, its shares are down more than 45%. Is this the end for Vonage? How will this effect other VOIP providers?"
Security

Submission + - Tor Open to Attack

An anonymous reader writes: A group of researchers have written a paper that lays out an attacks against Tor, in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential attacks are: Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network. Yowza!

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...