Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Submission + - Orange claims to have forced Google to pay for traffic

Dupple writes: The head of French telecoms operator Orange said on Wednesday it had been able to impose a deal on Google to compensate it for the vast amounts of traffic sent across its networks.

Orange CEO Stephane Richard said on France's BFM Business TV that with 230 million clients and areas where Google could not get around its network, it had been able to reach a "balance of forces" with the Internet search giant.

Richard declined to cite the figure Google had paid Orange, but said the situation showed the importance of reaching a critical size in business.

Network operators have been fuming for years that Google, with its search engine and You Tube video service, generates huge amounts of traffic but does not compensate them for using their networks.

There is an interesting editorial piece at gigaom

It turns out that Google, the great proponent of net neutrality, is paying Orange to handle its traffic on the carrier’s mobile networks. That’s an unwelcome development, and here’s why...
Data Storage

Submission + - Kim Dotcom's 'Mega' Storage Site Arrives (arstechnica.com)

An anonymous reader writes: After months of hype riding the coattails of the MegaUpload controversy, Kim Dotcom's new cloud storage site, Mega, is finally going live. Available to early adopters already, it's open to the public tomorrow with 50GB of free storage and end-to-end encryption. Several outlets have posted early hands-on reports for the service, including Ars Technica and The Next Web. In an interview, Dotcom spoke about how Mega's encryption scheme benefits both the users and the company: 'The Mega business plan will be a distributed model, with hundreds of companies large and small, around the world, hosting files. A hosting company can be huge or it can own just two or three servers Dotcom says—just as long as it’s located outside the U.S. "Each file will be kept with at least two different hosters, [in] at least two different locations," said Dotcom. "That’s a great added benefit for us because you can work with the smallest, most unreliable [hosting] companies. It doesn't matter because they can’t do anything with that data." More than 1000 hosts answered a request for expressions of interest on the Mega home page. Dotcom says several hundred will be active partners within months.' On top of that, the way it's designed will protect Mega from legal problems: 'It's all about the plausible deniability. Mega doesn't know what you're uploading. ... Mega isn't so much securing your files for you as it is securing itself from your files. If Mega just takes down all the DMCAed links, it will have a 100 percent copyrighted material takedown record as far as its own knowledge is concerned. It literally can't know about cases that aren't actively pointed out to it, complete with file decryption keys.'
Operating Systems

Submission + - Chromebook'OS: New era for hardware manufacturers ? (google.co.uk)

aissixtir writes: As most of you out there, I was surprised to see a good laptop at the price of $200.Though, it somehow made sense since there was no windows or apple involved.

It seems as if hardware manufacturers try to find alternatives themselves rather than wait for Linux to evolve. What do you think?

Social Networks

Journal Journal: Internet Bravery 5

I should very much like to demand satisfaction from people who are badly in need of correction. Namely, those who use insults against me in lieu of argument. (I am not above answering insult with insult, of course.) When are we going to get internet VR boxing, so that I can realistically challenge some random dipshit who talks a lot of shit to a boxing match and announce his cowardice should he decline?


Submission + - Remote Access Trojan Makes Its Traffic Look Legitimate (net-security.org)

An anonymous reader writes: RATs — Remote Access Trojans — are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their owners. But, in order to do that and not be spotted, RATs must employ a series of obfuscation techniques. Take for example the FAKEM RAT variants recently analyzed by Trend Micro researchers: in order to blend in, some try to make their network traffic look like Windows Messenger and Yahoo! Messenger traffic, and others as HTML.

Comment Set Samba to require NTLMv2 hashes (:-)) (Score 2) 155

See https://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#NTLMAUTH

If you set ntlm auth = no, then Samba will reject plain NTLM and require either NTLM v2 (the normal case) or LANMAN (if you have bizzarely backdated your XP box). There is a risk that some software w2ill fail, so it's probably best if you create a pair of virtual servers, and set one up to use NTLMv2. As you find out what fails, you can move the unbroken services to the v2 server.


Comment Re:Right, yep, sure... uhuh. (Score 2) 24

There is a duopoly of ISPs in Canada, so anything Bell Telephone or Rogers* Cable does affects a huge number of people, and an attempt to require anything that could be characterized as spyware would cause complaints to the Cabinet**.

* or any of the other local cable monopolies
** the Prime Minister and his heads of department

Comment Re:Can't America get its acts together ? (Score 1) 1059

I think you're forgetting some of the benefits of paying someone else to do the work. I help maintain the cottage road, with a rake and shovel, and about ever 5 or 10 years we get a bulldozer and a load of gravel. I'd much prefer to pay the county a little bit every year in taxes, and get the road-grader to make an annual pass up and down the road.

Comment Re:Solved problem in computer science (Score 1) 510

They are a danger when you allow others to set controls on things you care about. The obvious example is UEFI boot, which is fine if you use it to select who can boot, and bad when Microsoft is making the decision about your device.

In the context of BYOD, I will happily grant MAC access over the camera and gps to an employer when I'm on their network, but they need to publicly agree with me on what they're doing. I and many other people will likely grant an employer the right to encrypt the company's files, so long as they agree not to encrypt or delete mine on the same device.

The asymmetry of power poses a risk even in the acceptable cases, so arguably one should only use mac-implementing programs from a trusted third party, like a Google or Apple.

Comment Solved problem in computer science (and practice) (Score 1) 510

Various companies happily allow BYOD phones, and allow one to expense a proportion of one's bill to the company. A subset of them expect BYOD pads and laptops.

In general, a company could permit almost any device if it provides "mandatory access controls", such as lockouts for the camera when in the office network, and encrypt-all-corporate-data using a company key. The general case was figured out circa 1985 (orange book) and encryption-as-MAC by the personal electronic health care records in the last few years.

Comment Re:Tied sale, supposedly illegal in the U.S. (Score 1) 561

It's more tied than that: I physically can drop the new engine into the Ford, but the surface had hardware to keep me from doing so. I have to use a motorcycle example for this: removing the engine from a Vincent black shadow renders it unrunnable, as the engine is a required part of the frame. Non-identical engines can't be substituted (unlike featherbed Nortons).

Personally, I want the better of the two Surface keyboards, which a colleague described as the best small keyboard he'd ever used. Alas, the keyboard is tied to the platform, which is tied to Windows 8. I suspect they'll only be available via purchasing a Surface for some considerable time, thus the interest in making the whole surface run Linux. I will definitely investigate the "plus", which reportedly does have an Intel processor, and may have the keyboard...


Slashdot Top Deals

Nobody's gonna believe that computers are intelligent until they start coming in late and lying about it.