Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
PC Games (Games)

EA Hit By Class-Action Suit Over Spore DRM 538

The ever-growing unrest caused by the DRM involved with EA's launch of Spore came to a head on Monday. A woman named Melissa Thomas filed a class-action lawsuit against EA for their inclusion of the SecuROM copy-protection software with Spore. This comes after protests of the game's DRM ranged from a bombardment of poor Amazon reviews to in-game designs decrying EA and its policies. Some of those policies were eased, but EA has also threatened to ban players for even discussing SecuROM on their forums. The court documents (PDF) allege: "What purchasers are not told is that, included in the purchase, installation, and operation of Spore is a second, undisclosed program. The name of the second program is SecuROM ... Consumers are given no control, rights, or options over SecuROM. ... Electronic Arts intentionally did not disclose to any such purchasers that the Spore game disk also possessed a second, hidden program which secretly installed to the command and control center of the computer."
Privacy

Homeland Security Department Testing "Pre-Crime" Detector 580

holy_calamity writes "New Scientist reports that the Department of Homeland Security recently tested something called Future Attribute Screening Technologies (FAST) — a battery of sensors that determine whether someone is a security threat from a distance. Sensors look at facial expressions, body heat and can measure pulse and breathing rate from a distance. In trials using 140 volunteers those told to act suspicious were detected with 'about 78% accuracy on mal-intent detection, and 80% on deception,' says a DHS spokesman."
The Internet

P2P Networks Supplement Botnets 74

stuckinarut writes "Peer to peer file sharing network popularity is at an all time high, with hundreds of thousands of computers connected to a single P2P network at a given time. These networks are increasingly being used to trick PCs into attacking other machines, experts say. In fact, some reports indicate that peer-to-peer may actually exceed web traffic. Computer scientists have previously shown how P2P networks can be subverted so that several connected PCs gang up to attack a single machine, flooding it with enough traffic to make it crash. This can work even if the target is not part of the P2P network itself. Now, security experts are warning that P2P networks are increasingly being used to do just this. "Until January of this year we had never seen a peer-to-peer network subverted and used for an attack," says Darren Rennick of internet security company Prolexic in an advisory released recently. "We now see them constantly being subverted.""

Slashdot Top Deals

It appears that PL/I (and its dialects) is, or will be, the most widely used higher level language for systems programming. -- J. Sammet

Working...