Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Novell Won't Pursue Unix Copyrights (

calcutta001 writes: ""We're not interested in suing people over Unix," Novell spokesman Bruce Lowry said. "We're not even in the Unix business anymore."

A judge Friday upheld Novell's claims to Unix copyrights that SCO said it owned. Those copyrights were the basis for SCO's highly controversial and ongoing Linux patent-infringement suit against IBM Corp.

Lowry said the ruling means "the cloud has lifted over Linux." Users and distributors of the open-source OS finally can breathe a sigh of relief that they are not in violation of Unix copyrights."


Submission + - Apple-Orange deal signed?

An anonymous reader writes: Citing MacScoop as well as other sources, French newspaper Le Figaro claims Orange has won the iPhone deal for the French market.

Submission + - WinXP wireless : potential security nightmare?

robotsrule writes: "Even though I'm a heavy duty nerd I only just recently got a laptop. I soon got into setting up a wireless access point for my home network. I did all the right things, disabled SSID broadcasting and required a key for network access, selected good encryption, and set up a MAC address filter for network nodes.

But this morning I noticed something strange. When my laptop with an 802.11 b/g WLAN card booted up, I noticed that I was soon connected to an unsecure network. I ran upstairs and disconnected my wireless access point wondering what was going on. When I came back to my laptop I was still connected.

It turns out that Windows XP's default wireless network detection module seeks out any wireless access point first, even if you have set up secure network connections. You have to go into the Network Connections screen and disable automatic access to "open" wireless networks, or at the very least put it at the end of your preferred network connection chain.

So is this a potential threat in the making for a reverse honeypot; one that traps innocent folk instead of hackers? I could see someone knowing this security hole setting up an unsecured network, just to trap people who think they have a secure network set up in their homes or apartments. Then they put a traffic sniffer on the wireless access point and they could capture the unsuspecting user's logins and passwords effortlessly; even though the user thinks they are currently connected to their secure and encrypted home network.

Is this as bad as I think it is? Or am I missing something?"

Submission + - Comcast Caches Web Pages 1

not-admin writes: "A little over five years ago, Comcast received some major consumer backlash for their policy of caching web pages that users requested, along with the IP address of the requesting user. It appears now that this policy has been reinstated, at least for personal customers. While this does make practical sense for an ISP, it is unpractical in many cases where site content is generated on-demand. In situations like that a cache can cause problems, making a site cumbersome or even useless. In the evolving "Web 2.0" world of today, is caching a practical solution for ISPs or just another hassle for the consumer?"

Submission + - Data Ticking Time Bomb (

Moe1975 writes: "According to the chief executive of the UK National Archives in a recent BBC article "The growing problem of accessing old digital file formats is a 'ticking time bomb'" — I personally found mention of the 580 Terabytes of data at the UK National Archives holding 900 years of written information "in older file formats that are no longer commercially available" to be particularly disturbing, in spite of this being expected."

Slashdot Top Deals

I find you lack of faith in the forth dithturbing. - Darse ("Darth") Vader