Forgot your password?
typodupeerror

Comment Re:Uh, no. (Score 1) 498

I'm not a system admin, but isn't it stupid to assume that it is possible to secure every device on the network? Wouldn't a more appropriate approach be to assume that every single device is vulnerable and design a system for that scenario?
Social Networks

Secret Mailing List Rocks Wikipedia 531

privatemusings writes "Wikipedians are up in arms at the revelations that respected administrators have been discussing blocking and banning editors on a secret mailing list. The tensions have spilled over throughout the 'encyclopedia anyone can edit' and news agencies are sniffing around. The Register has this fantastic writeup — read it here first." The article says that some Wikipedians believe Jimbo Wales has lost face by supporting the in-crowd of administrators and rebuking the whistle blower who leaked the existence of the secret mailing list.
Patents

House Passes Patent Overhaul Bill 150

narramissic writes "ITworld reports that the House of Representatives has passed a bill that promises to overhaul the US patent system. 'The Patent Reform Act, supported by several large tech vendors including Microsoft Corp. and IBM Corp., would allow courts to change they way they assess damages in patent infringement cases. Currently, courts generally consider the value of the entire product when a small piece of the product infringes a patent; the bill would allow, but not require, courts to base damages only on the value of the infringing piece."
Google

Outcry Over Google's Purchase of Doubleclick 242

TheCybernator writes to mention that several activist groups have cried out in protest of the Google buyout of Doubleclick reported in recent news. "'Google's proposed acquisition of DoubleClick will give one company access to more information about the Internet activities of consumers than any other company in the world,' said the complaint lodged with the Federal Trade Commission. 'Moreover, Google will operate with virtually no legal obligation to ensure the privacy, security, and accuracy of the personal data that it collects.' The complaint was filed by the Electronic Privacy Information Center along with the Center for Digital Democracy and the US Public Interest Research Group, all of which are involved in online privacy issues."
Music

Safeguards For RIAA Hard Drive Inspection 276

NewYorkCountryLawyer writes "In SONY v. Arellanes, an RIAA case in Sherman, Texas, the Court entered a protective order (PDF) that spells out the following procedure for the RIAA's examination of the defendant's hard drive: (1) RIAA imaging specialist makes mirror image of hard drive; (2) mutually acceptable computer forensics expert makes make two verified bit images, and creates an MD5 or equivalent hash code; (3) one mirror image is held in escrow by the expert, the other given to defendant's lawyer for a 'privilege review'; (4) defendant's lawyer provides plaintiffs' lawyer with a 'privilege log' (list of privileged files); (5) after privilege questions are resolved, the escrowed image — with privileged files deleted — will be turned over to RIAA lawyers, to be held for 'lawyers' eyes only.' The order differs from the earlier order (PDF) entered in the case, in that it (a) permits the RIAA's own imaging person to make the initial mirror image and (b) spells out the details of the method for safeguarding privilege and privacy."
Caldera

Submission + - Novell Bombards SCO with Summary Judgment Motions

rm69990 writes: Novell has filed 4 motions for Summary Judgment against SCO, which essentially ask the court to toss the remainder of SCO's case that isn't already being arbitrated between SUSE and SCO. One seeks a ruling from the court that Novell transfered none of the copyrights in Unix to SCO, which is backed up by many exhibits and declarations from people who negotiated the deal. Another, along the same lines, asks the court to toss the portions of SCO's Unfair Competition and Breach of Contract claims pertaining to the Unix copyrights. The third asks the court to rule that Novell did not violate the Technology License Agreement between SCO and Novell, and last and also least, the fourth seeks to toss the Slander of Title for the additional reason that SCO has failed to prove any special damages. These motions follow 2 motions for summary judgment filed by Novell late last year on 2 of their counterclaims.

Feed Lenovo laying off 1,400 employees, looking overseas (engadget.com)

Filed under: Desktops, Laptops

Tough news on the Lenovo front, as the "world's third ranking PC manufacturer" is looking to axe 1,400 of its US-based employees -- and fast. Reportedly, the firm has decided to lay off a good chunk of its American-based work force "within the next 30 to 60 days" as it turns around and creates around 750 new positions in Brazil, China, India and Slovakia. The company stressed that its return to profitability last year was greatly assisted by the laying off of upwards of 1,000 employees, and insinuates that the latest cost-cutting measures are just attempts to "make the organization more efficient by reducing expenses." The cuts also include a whopping 20-percent of the work force at Lenovo's Research Triangle Park (RTP) location and around five-percent overall, but should net some $100 million in savings for the new fiscal year. Sadly, it just seems to get more cutthroat every year in the corporate arena, regardless of accomplishments.

[Via TWW]

Read | Permalink | Email this | Comments

BOLD MOVES: THE FUTURE OF FORD A new documentary series. Be part of the transformation as it happens in real-time

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


How Encrypted Binaries Work In Mac OS X 365

An anonymous reader writes "By now we know that OS X uses encrypted binaries for some critical apps like Dock, Finder and LoginWindow. Amit Singh explains the implementation of this protection scheme which makes use of the AES crypto algorithm and a special memory pager in Mach. The so called Do Not Steal Mac OS X (DSMOS) kernel extension helps along the way by decrypting things for the special pager when apps get executed. A funny thing is that if you print the pointer at address 0xFFFF1600 in your own app you get as output Apple's karma poem for crackers! According to the article there are 8 protected binaries in OSX including Rosetta and Spotlight meta data demon. Interestingly Apple's window server is NOT one of those."

If Not America, Then Where? 2349

Wellington Grey asks: "Often during our heated political discussions on slashdot, several people will mention their desire to leave the country. As an American living in England, which sees much the same problems as the US, I often wonder where these Americans would go. So, I pose two questions for the restless: 1) Where would you live, if not in America and 2) What's stopping you from going?"

Diebold Disks May Have Been For Testers 182

opencity writes "The Washington Post reports on the two Diebold source disks that were anonymously sent to a Maryland election official this past week. Further investigation has lead individuals involved to believe the disks came from a security check demanded by the Maryland legislature sometime in 2003." From the article: "Critics of electronic voting said the most recent incident in Maryland casts doubt on Lamone's claim that Maryland has the nation's most secure voting system. "There now may be numerous copies of the Diebold software floating around in unauthorized hands," said Linda Schade, co-founder of TrueVoteMD, which has pressed for a system that provides a verifiable paper record of each vote."

Pirate Party Launches Commercial Darknet 661

CrystalFalcon writes "The Swedish Pirate Party has launched a commercial, high-capacity darknet, on an unprecedented scale and bandwidth. This service lets anybody send and receive files anonymously without being tracked or traced. 'There are many legitimate reasons to want to be completely anonymous on the Internet,' says Rickard Falkvinge, chairman of the Pirate Party. 'If the government can check everything each citizen does, nobody can keep the government in check.'"

Pact Not to Use Image Constraint Token Until 2010? 285

Devlin C. writes "Ars Technica reports that many major movie studios and several consumer electronics companies have an unofficial pact not to use the controversial Image Constraint Token in movies until at least 2010, presumably in an effort to spur early adoption. As the article at Ars notes, this would explain why both the low-end PS3 and the Xbox360 lack HDMI. The companies think it's not necessary to have right now, and they would rather shave costs than sell future-proof hardware."

MacSaber Turns Your Macbook into a Lightsaber 223

Petey_Alchemist writes "SomethingAwful.com forum goon isnoop has developed a useless but fun app that takes advantage of the new sudden motion sensor available in Macbooks. The MacSaber 1.0 causes your Macbook or Macbook Pro to whoosh and crash like a lightsaber depending on how you swing it around. The reviews from those who have installed it say it is quite fun--although there is some concern about whether or not 'lightsaber battles' fall under warranty."

Slashdot Top Deals

You don't have to know how the computer works, just how to work the computer.

Working...