Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Communications

Cell Phone Jamming on the Rise 942

netbuzz writes "It shouldn't come as a surprise to anyone either, as the number of inconsiderate dolts who yammer away oblivious to the disruptions their yapping is causing those around them continues to rise. Pocket-sized cell jammers are becoming a hot item, while proprietors of restaurants and the like look to defend themselves as well. Yes it's illegal, but given that the rudeness is pretty close to criminal as well, it's unlikely to stop any time soon."
Mandriva

Microsoft Denies Sabotaging Mandriva Linux PC Deal 161

An anonymous reader writes "Microsoft has denied sabotaging Mandriva's deal with the Nigerian government to supply Classmate PCs from Intel along with a customized Mandriva Linux operating system. 'From Microsoft's perspective it's a matter of choice. In the statement sent to InternetNews.com, Microsoft said it believes individuals, governments and other organizations should be free to choose the software and other technologies that best meet their needs. "We are seeing strong market demand for Windows on low-cost devices to help governments in the areas of education, local innovation, and jobs and opportunity," the Microsoft spokesperson said in the statement.' The company's denial is in response to Mandriva's CEO Francois Bancilhon expression of disappointment with Microsoft."
Security

Submission + - Datacenter robbed for the 4th time in 2 years (theregister.co.uk) 1

mariushm writes: "The CIHost datacenter was attacked by armed intruders for the fourth times in two years.

According to a letter C I Host officials sent customers, "at least two masked intruders entered the suite after cutting into the reinforced walls with a power saw, [...]

During the robbery, C I Host's night manager was repeatedly tazered and struck with a blunt instrument. After violently attacking the manager, the intruders stole equipment belonging to C I Host and its customers."

To aggravate the situation, C I Host representatives needed several days to admit the most recent breach, according to several customers who said they lost equipment, all the while reporting the problems as "router failures"."

The Courts

Submission + - U.of Oregon Says No to RIAA; ID no good

NewYorkCountryLawyer writes: "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities, in what is believed to be the first such motion made by the university itself, rather than by the students, and the first instance of a State Attorney General bringing a motion to quash an RIAA subpoena. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: "Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC.... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor. Two of the seventeen John Does accessed the content in question from single occupancy dorm rooms....No login or personally identifiable information, i.e. authentication, was used by the Does to access the university's network because none is required. The University cannot determine whether the content was accessed by the room occupant or visitor. Nine of the seventeen John Does accessed the content in question from the University's wireless network or a similar system called the "HDSL Circuit." These systems do record a user name associated with the access. For these John Does, the University can determine the identity of the individual who bas been assigned the user name, however, it is unable to determine whether the content was accessed by the individual assigned that user name or by someone else using the computer associated with the user name. In the case of sixteen of the seventeen John Does, .... it is not possible for the University to identify the alleged infringers without conducting interviews and a forensic investigation of the computers likely involved." The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena." One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is "rubbish"."
United States

C.I.A. to Let "Skeletons" Out of its Closet 235

sgt_doom writes "The C.I.A. announced it was going to reveal "skeletons" by declassifying hundreds of pages of documents detailing illegal abuses over the years. As a preamble, the National Security Archive at George Washington University released a separate set of documents covering internal government deliberations of the abuses from January 1975. Mandatory reading for all those history-challenged individuals who believe government knows best!"
Your Rights Online

ISPs Inserting Ads Into Your Pages 434

TheWoozle writes "Some ISPs are resorting to a new tactic to increase revenue: inserting advertisements into web pages requested by their end users. They use a transparent web proxy (such as this one) to insert javascript and/or HTML with the ads into pages returned to users. Neither the content providers nor the end-users have been notified that this is taking place, and I'm sure that they weren't asked for permission either."
Windows

Pimp Your XP 272

An anonymous reader writes "Ezinearticles.com has up an interesting article on how you can improve Windows XP to mimic and even surpass Vista — at least some of its new features. Several of the suggestions cost money and others are free. From improving the user interface with Stardock to mimicking new security features with open source software such as Sudown, the article discusses many ways that die-hard XP users can enhance their environment without moving to Vista."
Spam

Submission + - Does SPF really work?

Intelopment writes: "My Domain name has recently been used a lot as the REPLY field by some inconsiderate spammer and my ISP has suggested that I consider using the Open SPF service (http://openspf.org/) as a way to stop spammers from using my domain name for their REPLY field. From what I can tell it requires the receiving mail server to actually participate in the SPF service, which is where I get my doubts. Does anyone have any experience with this service? Does it work? Are many ISPs using openSFP?"
Censorship

Spy Chief Hints At Limits On Satellite Photos 309

An anonymous reader writes "Vice Adm. Robert Murrett, director of the National Geospatial-Intelligence Agency, says that the increasing availability of commercial satellite photos may require the government to restrict distribution. 'I could certainly foresee circumstances in which we would not want imagery to be openly disseminated of a sensitive site of any type, whether it is here or overseas,' he said. This would include imagery on Web sites such as Google Earth, because the companies that supply the photos get help from the NGIA with launches." I had never heard of this particular intelligence agency. During the early months of the invasion of Afghanistan they bought up all satellite imagery over that country, worldwide, in a tactic later dubbed "checkbook shutter control."
Censorship

Own Your Own 128-Bit Integer 477

Byte Swapper writes "After all the fuss over the AACS trying to censor a certain 128-bit number that now has something over two million hits on Google, the folks at Freedom to Tinker would like to point out that you too can own your own integer. They've set up a script that will generate a random number, encrypt a copyrighted haiku with it, and then deed the number back to you. You won't get a copyright on the number or the haiku, but your number has become an illegal circumvention device under the DMCA, such that anyone subject to US law caught distributing it can be punished under the DMCA's anti-trafficking section, for which the DMCA's Safe Harbor provisions do not apply. So F9090211749D5BE341D8C5565663C088 is truly mine now, and you can pry it out of my cold, dead fingers!"
Censorship

DMCA Takedown Notice For a Fake ID 563

TrippTDF writes "Rachel Hyman, an artist and bartender in New York City, maintains a blog where she regularly posts images of fake IDs she confiscates from would-be underage drinkers, along with a description of the confiscation. Recently, one of her posts (Google cache) was taken down when the owner of the fake ID invoked the DMCA against Blogspot. Can one claim a forged document as a copyrighted work of art?"

Soldiers Bond With Bots, Take Them Fishing 462

HarryCaul writes "Soldiers are finding themselves becoming more and more attached to their robotic helpers. During one test of a mine clearing robot, 'every time it found a mine, blew it up and lost a limb, it picked itself up and readjusted to move forward on its remaining legs, continuing to clear a path through the minefield.' The man in charge halted the test, though - 'He just could not stand the pathos of watching the burned, scarred and crippled machine drag itself forward on its last leg. This test, he charged, was inhumane.' Sometimes the soldiers even take their metallic companions fishing. Is there more sympathy for Robot Rights than previously suspected?"

Slashdot Top Deals

Advertising is a valuable economic factor because it is the cheapest way of selling goods, particularly if the goods are worthless. -- Sinclair Lewis

Working...