Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Balance of power. (Score 1) 483

oh yeah? Wait until the patriotic rationalists sniff out your statement and come hollering down with bright examples (none) of police state paradises (Singapore?) where the gross imbalance of state-power has led to concrete reduction of crime... and teRRism...

you've got to love them, hapless and desperate as they are clinging on any available shred of hope that their world hasn't really capsized...
Security

The Secret China-U.S. Hacking War? 107

bored-at-IETF-ntp-session writes "In an article at eWeek Larry Seltzer examines the supposed hacking war between the US and China. He surmises 'Even if you can't prove that the government was involved ... it still bears some responsibility'. He quotes Gadi Evron who advised the Estonians during the Russian attacks. 'I can confirm targeted attacks with sophisticated technologies have been launched against obvious enemies of China ... Who is behind these attacks can't be easily said, but it can be an American cyber-criminal, a Nigerian spammer or the Chinese themselves.' Seltzer concluded 'It's just another espionage tool, and no more or less moral than others we've used in the past.'" This a subject we've also previously discussed.
Government

Lessig Campaign and the Change Congress Movement 409

GoldenShale wrote a follow up to last week's discussion about Lessig running for congress. He writes "Larry Lessig has created a Lessig08 website, and it looks like he is getting serious about running for congress. In his introduction video he proposes the creation of a national "Change Congress" movement which would try to limit the influence of money in the electoral and legislative processes. Having a technologically savvy representative and a clear intellectual leader to head this kind of movement is exactly what we need to counter the last 8 years of corporate dominance in government."
Cellphones

iPhones Produced in China Smuggled Right Back in 159

Ponca City, We Love You writes "Factories in China produce iPhones that are exported to the United States and Europe and then smuggled right back in helping explain why Apple says it sold about 3.7 million iPhones last year while only 2.3 million are actually registered in the United States and Europe. For Apple, the booming overseas market for iPhones is a sign of its marketing prowess but also a blow to Apple's business model, costing the company as much as $1 billion over the next three years, according to some analysts. Since negotiations between Apple and China Mobile, the world's biggest mobile-phone service operator with more than 350 million subscribers, broke down last month, the official release of the iPhone in China has been stalled producing a thriving gray market. Copycat models are another possible threat to Apple in China. Not long after the iPhone was released, research and development teams in China were taking it apart, trying to copy or steal the design and software for use in iPhone knockoffs, or iClones and some people who have used the clones say they are sophisticated and have many functions that mimic the iPhone. "A lot of people here want to get an iPhone," says Shanghai lawyer Conlyn Chan."
Education

Harvard Faculty Adopts Open-Access Requirement 147

Vooch writes "Harvard University's Faculty of Arts and Sciences adopted a policy this evening that requires faculty members to allow the university to make their scholarly articles available free online." I may not be smart enough to go to college, but at least I can pretend to have a Harvard eduction. I don't think that will be enough to get a gig as a Simpsons writer.
The Military

Air Force Seeking Geeks For 'Cyber Command' 524

An anonymous reader writes "Wired reports that the two-star general in charge of the US Air Force's new Cyber Command is looking for hacker-types to beef up its cadre of cyber warriors — no heavy lifting required. 'We have to change the way we think about warriors of the future,' General William Lord says. 'So if they can't run three miles with a pack on their backs but they can shut down SCADA system, we need to have a culture where they fit in.' The Cyber Command is the Air Force's first new Major Command since the early 1990s. Its purpose is to be able to win an electronic war with China and other potential adversaries."
Privacy

US Senate Votes Immunity For Telecoms 623

Ktistec Machine writes to let us know that the telecom companies are one step closer to getting off the hook for their illegal collusion with the US government. Today the US Senate passed, by a filibuster-proof majority of 67 to 31, a revised FISA bill that grants retroactive immunity to the telecommunications companies that helped the government illegally tap American network traffic. If passed by both houses and signed by the President, this would effectively put an end to the many lawsuits against these companies (about 40 have been filed). The House version of the bill does not presently contain an immunity provision. President Bush has said he will veto any such bill that reaches his desk without the grant of immunity. We've discussed the progress of the immunity provision repeatedly.
Windows

Hostile ta Vista, Baby 663

Frequent Slashdot contributor Bennett Haselton adds his experience to the litany of woes with Microsoft Vista. Unlike most commentators who have a beef with the operating system, Bennett does a bit of surveying to bolster his points. Read his account by clicking on the magic link.

TrueCrypt 5.0 Released, Now Encrypts Entire Drive 330

A funny little man writes "The popular open source privacy tool, TrueCrypt, has just received a major update. The most exciting new feature provides the ability to encrypt an entire drive, prompting the user for a password during boot up; this makes TrueCrypt the perfect tool for non-technical laptop users (the kind who are likely to lose all of that sensitive customer data). The Linux version receives a GUI and independence from the kernel internals, and a Mac version is at last available too."
Communications

Cellphone App Developed that Could Allow For 'Pocket Supercomputers' 73

Jack Spine writes "A robotics researcher at Accenture has given a demonstration of a 'Pocket Supercomputer' — a phone behaving like a thin client. It can be used to send images and video of objects in real time to a server where they can be identified and linked to relevant information, which can then be sent back to the user. 'The camera on the phone is used to take a video of an object — such as a book ... By offloading the processing from a mobile device onto a server, there are few limits on the size and processing power available to be used for the storage and search of images.' To pinpoint the features necessary to identify an object, the image is run through an algorithm called Scale-Invariant Feature Transform, or SIFT, a technology developed by academic David Lowe. The software extracts feature points from a jpeg and makes a match against images in the database. If a match exists then the software on the server retrieves information and sends it back to the user's phone. A 'three-dimensional' image of an object can also be uploaded onto the phone, to look at the virtual object from different angles. The motion-tracking technology Accenture uses for this is a free library of algorithms called Open Computer Vision."
Microsoft

Time for a Vista Do-Over? 746

DigitalDame2 writes "'There's nothing wrong with Vista,' PC Mag editor-in-chief Lance Ulanoff tells a Microsoft rep at this year's CES. 'But you guys have a big problem on your hands. Perception is reality, and the perception is that Vista is a dud.' He goes on to confess that the operating system is too complex and burdened by things people don't need. Plus, Vista sometimes seems so slow. Ulanoff gives four suggestions for a complete Vista makeover, like starting with new code and creating a universal interface table. But will Microsoft really listen?"
Privacy

Telco Immunity Goes To Full Debate 154

Dr. Eggman notes an Ars Technica analysis of the firefight that is the current Congressional debate over granting retrospective immunity to telecoms that helped the NSA spy on citizens without warrants. A Republican cloture motion, which would have blocked any further attempts to remove the retroactive immunity provision, has failed. This controversial portion of the Senate intelligence committee surveillance bill may now be examined in full debate. At the same time, a second cloture motion — filed by Congressional Democrats in an effort to force immediate vote on a 30 day extension to the Protect America Act — also failed to pass. The Protect America Act has been criticized for broadly expanding federal surveillance powers while diminishing judicial oversight. While the failure of this second cloture motion means the Protect America Act might expire, a vote tomorrow on a similar motion in the House will likely bring the issue back into the Senate in time. It seems, according to the article, that both parties feel that imminent expiration of the Protect America Act is a disaster for intelligence gathering, and each side blames the other as progress grinds to a halt."

Software Tool Strips Windows Vista To Bare Bones 472

Preedit writes "A free download that can cut Windows Vista's gargantuan footprint by half or more is developing a big following on the Internet. vLite is a configuration tool that lets users automatically delete a lot of unnecessary Vista components — such as Windows Media Player and MSN installer — to pare the OS down to a reasonable size. The software is catching on. An InformationWeek story notes that a forum that asks users to suggest new features has drawn nearly 50,000 page views. Meanwhile, Microsoft officials have themselves conceded that Vista is "bloated" and are developing the next version of Windows on a core called MinWin, which is smaller than Vista by an order of magnitude."
Space

Speculation On the Doomed Satellite 229

scim writes "Intelligent speculation has led one knowledgeable observer to believe the satellite recently announced to have failed is a radar satellite named USA 193. According to an earlier story on the satellite: 'The experimental L-21 classified satellite, built for the National Reconnaissance Office at a cost of hundreds of millions of dollars, was launched successfully on Dec. 14 [2006] but has been out of touch since reaching its low-earth orbit.'" The ArmsControlWonk story leads off with what purports to be a photo from the ground of USA 193.
Cellphones

Cell Phone Radiation Detectors Proposed to Protect Against Nukes 238

crosshatch brings us news out of Purdue University, where researchers are developing a radiation detection system that would rely on sensors within cell phones to locate and track potentially hazardous material. From the Purdue news service: "Such a system could blanket the nation with millions of cell phones equipped with radiation sensors able to detect even light residues of radioactive material. Because cell phones already contain global positioning locators, the network of phones would serve as a tracking system, said physics professor Ephraim Fischbach. 'The sensors don't really perform the detection task individually,' Fischbach said. 'The collective action of the sensors, combined with the software analysis, detects the source. Say a car is transporting radioactive material for a bomb, and that car is driving down Meridian Street in Indianapolis or Fifth Avenue in New York. As the car passes people, their cell phones individually would send signals to a command center, allowing authorities to track the source.'"

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...