Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
User Journal

Journal Journal: Introducing the Censorship Research Center

The Censorship Research Center (CRC), a San Francisco-based 501(c)(3) non-profit organization, was founded by Austin Heap and Daniel Colascione in 2009 to serve as the legal entity which will provide anti-censorship education, outreach, and technologies for free to those who need it most. The CRC’s first major project is Haystack (official project site), which seeks to provide access to information and communications to the Iranian people

Privacy

Latest Revelations on the FBI's Data Mining of America 446

An anonymous reader writes "You probably already knew that the FBI was data mining Americans in the "search" for potential terrorists, but did you know that they're also supposed to be looking for people in the U.S. engaged in criminal activity that is not really supposed to be the province of the federal government? Now the feds are alleged to be data mining for insurance fraudsters, identity thieves, and questionable online pharmacists. That's what they're telling us now. What else could they be looking for that they are not telling us about?"

Less Than a Minute to Hijack a MacBook's Wireless 390

Kadin2048 writes "As reported by Ars Technica and the Washington Post, two hackers have found an exploitable vulnerability in the wireless drivers used by Apple's MacBook. Machines are vulnerable if they have wireless enabled and are set to connect to any available wireless network, fairly close to their default state, and the exploit allows an attacker to gain "total access" -— apparently a remote root. Although the demo, performed via video at the BlackHat conference, takes aim at what one of the hackers calls the "Mac userbase aura of smugness on security," Windows users shouldn't get too smug themselves: according to the Post article, "the two have found at least two similar flaws in device drivers for wireless cards either designed for or embedded in machines running the Windows OS." Ultimately, it may be the attacks against embedded devices which are the most threatening, since those devices are the hardest to upgrade. Currently there have not been any reports of this vulnerability 'in the wild.'" According to this story at ITwire.com, they were able to exploit Linux and Windows machines, too. (Thanks to Josh Fink.)

Vermont Launches 'Cow Power' System 400

odyaws writes "Central Vermont Public Service has launched Cow Power, a system by which power users can opt to buy 25, 50, or 100% of their electricity from dairy farms that run generators on methane obtained from cow manure. Cow Power costs only 4 cents/kWh more than market price, so a household like mine would only pay $5-6/month more at 100% usage. The big question now is whether Vermont-based Ben & Jerry's Ice Cream will use power generated from the manure of cows treated with Recombinant Bovine Growth Hormone."

Microsoft Workers Prefer Google 378

dhollist writes "A story just released by the Inquirer shows that 80% of incoming search requests from Microsoft's domain arrived via Google's search engine. In contrast, 64% of Yahoo! staff and 100% of Google staff use their own company's search engine. How's that for a product endorsement? I'd guess that Microsoft may soon add google.com to the list of blocked URL's on their intranet."
User Journal

Journal Journal: So What Is Dance Music?

Dance music is a lot of things. There's the bad house music, the shitty trance music...but Relentless is really a combo of soo many (non-shitty) things that it's not even fair to compare. You remember when Gabriel & Dresden first came out? How about Sander Kleinenberg's first Global Underground album? They both sucked. This...is much better.

More Headaches from Vista Security 240

Michael Cooney writes to tell us Windows Vista may have some serious headaches in store for corporate users with third-party authentication systems like VPNs. From the article: "ISVs say rewriting their code for the new architecture will produce headaches that will extend to their customers that have deployed strong authentication such as biometrics or tokens, enterprise single sign-on and a number of other systems integrated with the Windows authentication architecture."

Sun's Global Desktop Released 96

aphaenogaster writes "Suns Global Desktop version 4.2 has been released and appears to be quite effective. Applications load very quickly, and is not limited to Sparc or Solaris. Applications piped to a desktop across a slow DSL line appear to work very well. Sun has also set up a test server for users to play with."
User Journal

Journal Journal: Clint Curtis

I totally forgot that I wrote about his whole ordeal. So, here's what some other voices on the Internet are expressing about Mr. Curtis...

"The BRAD BLOG has just received an exclusive first-hand account of Clint Curtis' sworn testimony (as reported earlier) to the Judiciary Committee Democrats holding hearings this morning in Columbus, Ohio on Election 2004 Voting Irregularities.

Comment Re:Of course (Score 1) 1096

Granted the situation with windows does not line up exactly with your analogy. Microsoft does not have the responsibility to supply the pirates with newer service packs (add more features etc.) but only with security updates. It is dangerous to the stability of the internet to have a large number of unpactched vulnerable windows machines. Because a large portion of internet users use windows Microsoft must take an active role in maintaing the stability of the internet. This is not about giving the pirates a free ride but safeguarding other users.
User Journal

Journal Journal: Seven new sample libraries from VSL

The new Horizon Series from the Vienna Symphonic Library consists of seven instrumental sample libraries in Gigastudio and EXS24 formats. The diverse collection of instruments sampled were all recorded at VSL's purpose-built Silent Stage facility and all of the libraries include VSL's ingenious Performance Tool, which allows the user to incorporate convincing performance effects such as slides, bends, legato passages and repeated notes.

Slashdot Top Deals

All constants are variables.

Working...