Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
The Internet

Submission + - Demonoid back up, now blocking Canada

An anonymous reader writes: TorrentFreak has an update to the Demonoid story from last week. From the article, "The popular BitTorrent tracker Demonoid is back online after nearly a week of downtime. The website and the tracker are hosted on the same ISP, but Canadian traffic is blocked thanks to pressure from the Canadian Recording Industry Association (CRIA)". If you are a Canadian resident, you will now be redirected to this Demonoid page which has the following message: "We received a letter from a lawyer represeting [sic] the CRIA, they were threatening with legal action and we need to start blocking Canadian traffic because of this. If you reside in Canada, that is the reason you are being redirected to this message. Thanks for your understanding, and sorry for any inconvenience". It looks like TorrentFreak was right all along, Demonoid was indeed (temporarly) shut down by the CRIA.
Businesses

DSS/HIPPA/SOX Unalterable Audit Logs? 381

analogrithems writes "Recently I was asked by one of the suits in my company to come up with a method to comply with the new PCI DSS policy that requires companies to have write once, read many logs. In short the requirement is for a secure method to make sure that once a log is written it can never be deleted or changed. So far I've only been able to find commercial and hardware-based solutions. I would prefer to use an open source solution. I know this policy is already part of HIPPA and soon to be part of SOX. It seems like there ought to be a way to do this with cryptography and checksums to ensure authenticity. Has anyone seen or developed such a solution? Or how have you made compliance?"
Java

Submission + - The future of Open Source Java

An anonymous reader writes: Thanks largely to the open sourcing of the JDK, 2007 promises to be the most exciting year in Java programming. With the developer community in the driver's seat, expect to see Java programming propelled forward, backward, and sideways, probably all at once. This article takes a look at what's ahead for Java in Open Source and predicts what is coming for the Java platform.
Debian

Debian Gets Win32 Installer 232

An anonymous reader writes "Debian hacker Robert Millan has just announced the availability of a Debian-Installer Loader for win32. The program, inspired by Ubuntu's similar project, features 64-bit CPU auto-detection, download of linux/initrd netboot images, and chainloading into Debian-Installer via grub4dos. The frontend site goodbye-microsoft.com/ has been set up for advocacy purposes. Here are some screenshots."

Are IT Job Titles Getting Out of Control? 209

grudgelord asks: "Information technology jobs have always been difficult for those from non-technical disciplines to understand. However, in recent years it has become difficult for even IT professionals to divine the actual responsibilities of a given position's role as job titles become increasingly more nebulous and the descriptions more buzz-wordy. At one time, we all had a reasonable grasp of the role of a 'System Administrator' or 'Helpdesk Technician' but now such roles may actually have significant DBA or developer responsibilities bundled into a lesser job title (such as the recent trend of 'Desktop Support Techs' with SQL DBA responsibilities), often robbing the holder of a fair position (and traditionally better paid) title on the résumé. Are these trends a contrivance by corporations to get more 'value' from IT professionals by bundling responsibilities of higher paid jobs into lesser roles and to evade competitive salary by creating titles that have no analogue on pay-scale indexes? Has there ever been a proposed standard for information technology position titles (or at least some form of translation guide)? How do Slashdot job searchers contend with these wildly varying, and increasingly vague titles that seem to have saturated the industry, or worse, when they've been festooned with an inaccurate or absurd job title?"

How To Make Your Friends Call You More 233

B0bReader writes, "Simply sign up to something called jajah (a VOIP service that connects real telephones) using your friend's number (mobiles included), then log in and dial your own number. Your friend's phone will ring and after they hear a brief 'Jajah is connecting your call' they will be calling you and incur all charges. As an added bonus you will quite probably receive your friend's latest voice-mail message as your own (at least on Irish networks), which you may or may not wish to hear. There is even a Jajah Firefox extension — which at the time of writing is the Firefox featured add-on — so you can do it right from your browser. This is about the best example of a bad idea, with terrible implementation, that I have seen all day. And with the wonderful publicity the Firefox page offers it should reach a wide audience in no time."

Slashdot Top Deals

Why won't sharks eat lawyers? Professional courtesy.

Working...