Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Google ordered to remove links to stories about Google removing links to stories (

vivaoporto writes: Ars Technica UK reports that the UK's Information Commissioner's Office (ICO) has ordered Google to remove links from its search results that point to news stories reporting on earlier removals of links from its search results. The nine further results that must be removed point to Web pages with details about the links relating to a criminal offence that were removed by Google following a request from the individual concerned.

The Web pages involved in the latest ICO order repeated details of the original criminal offence, which were then included in the results displayed when searching for the complainant’s name on Google. Toe company has 35 days to comply with the enforcement notice. If it does not, it faces financial sanctions, which can be significant.

Submission + - Jeb Bush Comes Out Against Encryption (

An anonymous reader writes: Presidential candidate Jeb Bush has called on tech companies to form a more "cooperative" arrangement with intelligence agencies. During a speech in South Carolina, Bush made clear his opinion on encryption: "If you create encryption, it makes it harder for the American government to do its job — while protecting civil liberties — to make sure that evildoers aren’t in our midst." He also indicated he felt the recent scaling back of the Patriot Act went too far. Bush says he hasn't seen any indication the bulk collection of phone metadata violated anyone's civil liberties.

Submission + - Linus Torvalds: Security Will Never Be Perfect (

jfruh writes: Linus Torvalds was a surprise speaker at this year's LinuxCon, and in a typically provocative speech, he declared that chasing after perfect security will always fail. Instead, he touted the open source model, which he said led to bugs and security holes in production environments being fixed as quickly as possible.

Submission + - Taking a foodporn picture is now a copyright violation in Germany

xPertCodert writes: According this article in Der Welt (Google translate from German), in Germany if you take a picture of a dish in a restaurant without prior permission, you are violating chef's copyright for his creation and can be liable to pay a hefty fine. If this approach to foodporn will become universal, what will we put in our Instagrams?

Google Releases Street View Images From Fukushima Ghost Town 63

mdsolar writes in with news that Goolge has released Street View pictures from inside the zone that was evacuated after the Fukushima disaster. "Google Inc. (GOOG) today released images taken by its Street View service from the town of Namie, Japan, inside the zone that was evacuated after the Fukushima nuclear disaster in March 2011. Google, operator of the world's biggest Web search engine, entered Namie this month at the invitation of the town's mayor, Tamotsu Baba, and produced the 360-degree imagery for the Google Maps and Google Earth services, it said in an e-mailed statement. All of Namie's 21,000 residents were forced to flee after the March 2011 earthquake and tsunami crippled the Fukushima Dai-Ichi nuclear plant, about 8 kilometers (5 miles) from the town, causing the world's worst nuclear accident after Chernobyl. Baba asked Mountain View, California-based Google to map the town to create a permanent record of its state two years after the evacuation, he said in a Google blog post."

Submission + - SCADA: 10 Years Behind Enterprise IT Security (

wiredmikey writes: A recent burned out water pump at a public utility has once again put SCADA and Industrial Control Systems security in the spotlight.

Several experts have chimed in on the matter, with some saying that SCADA Security is typically a decade behind other large enterprise security systems.

Why? These Industrial Control Systems were never intended to be connected to the Internet, and lack many of the security controls and features that most modern IT systems have in place. Additionally, many critical infrastructure systems are running older operating systems such as Windows 95 – something that brings its own set of security issues.

Another expert said the security problems with SCADA software are twofold: One is the prospect of security vulnerabilities in the software itself; the other is improper configurations and bad security around the software.

The challenges are exacerbated by such systems being connected to the Internet, which can be discovered and potentially breached....


RIP, SunSolve 100

Kymermosst writes "Today marks the last day that SunSolve will be available. Oracle sent the final pre-deployment details today for the retirement of SunSolve and the transition to its replacement, My Oracle Support Release 5.2, which begins tomorrow. People who work with Sun's hardware and software have long used SunSolve as a central location for specifications, patches, and documentation."
United States

Submission + - Web 2.0 & Honesty in Sex, Politics and Religio

jg21 writes: Till now the best known example of what is technically known as 'the online disinhibition effect' is probably what's more colloquially called "web rage" – brutal rudeness, racism, flamings and the like. But this article suggests another, sex-related example: the new world of Web 2.0 is fast altering the human psyche, with social network users often, in a safe fantasy setting, "transgresssing" into a new sexual identity that has no necessary day-to-day link to their personas in 'real life.'

[From the article: 'Web 2.0 permits the construction of personal identity at different levels of 'personal privacy'...Internet culture now allows someone to express an 'abnormal' part of themselves (often a very minor part) without being obliged to include it in the self-identity that is designed to accomodate social or community expectations.']

Submission + - Getting involved with writing open source licenses

bulio writes: I'm planning on studying civil law, and would like to gain some experience in the field by helping to write and revise licenses such as the GNU Free Documentation License, and licenses such as Creative Commons (and its derivatives). My question is, how does one help to revise and improve licenses like these? Is there a mailing list or IRC channel that I could visit? On another note, how would one go about writing his own documentation license?

Submission + - Flash based PC for ssh-based router?

iansmith writes: "I have an internal network I reach through a Linux box by using ssh to tunnel in via the internet.

The problem is I want to be able to reach this network even if the linux box(es) crash or get powered down.

Are there any flash based linux boxes (like the linksys wireless router) that have at least two ethernet ports to allow me to connect two networks together? It does not need to be fast or full featured, I just want a single service (ssh) running without needing to worry about an entire computer.

I'd use an old Cisco router (don't we all have a box of those in a closet?) but without firmware updates, no way will I put one on my network."

Submission + - Malware Self-Defense Technologies Evolution (

An anonymous reader writes: This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also provides an overview of the current situation. In order to avoid confusion about what is considered a self-defense technology and what is not, it examines only the most popular and obvious means of malware self-defense. First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions.

Slashdot Top Deals

Another megabytes the dust.