Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:More Please.... (Score 1) 140

Not that I'm even slightly a fan of 88 page long TOS "by clicking here I agree I've read and accept all of the above" agreements, they are often enforceable.

I have to wonder how much their lawyers get paid to take apart an 88 page book and find loopholes/defenses in it to use against the other party.

Facebook

Submission + - Dating site inports 250k facebook profiles (wired.com)

mark72005 writes: How does a unknown dating site, with the absurd intention of destroying Facebook, launch with 250,000 member profiles on the first day?

Simple.

You scrape data from Facebook.

At least, that’s the approach taken by two provocateurs who launched Lovely-Faces.com this week, with profiles — names, locations and photos — scraped from publicly accessible Facebook pages. The site categorizes these unwitting volunteers into personality types, using a facial recognition algorithm, so you can search for someone in your general area who is “easy going,” “smug” or “sly.”

Networking

Submission + - If you think you can ignore IPv6, think again. (securityweek.com)

wiredmikey writes: It’s official. The IANA(Internet Assigned Numbers Authority) this week allocated the last IP address blocks from the global IPv4 central address pool.

While the last IPv4 addresses have been allocated, it’s expected to take several months for regional registries to consume all their remaining regional IPv4 address pool.

The IPv6 Forum, a group with the mission to educate and promote the new protocol, says that enabling IPv6 in all ICT environment is not the end game, but is now a critical requirement for continuity in all Internet business and services going forward.

Experts believe that the move to IPv6 should be a board-level risk management concern, equivalent to the Y2K problem or Sarbanes-Oxley compliance. During the late 1990s, technology companies worldwide scoured their source code for places where critical algorithms assumed a two-digit date. This seemingly trivial software development issue was of global concern, so many companies made Y2K compliance a strategic initiative. The transition to IPv6 is of similar importance.

If you think you can ignore IPv6, think again.

Android

Submission + - Security warning over web-based Android market (sophos.com)

An anonymous reader writes: Security researcher Vanja Svajcer is warning that cybercriminals may be particularly interested in stealing your Google credentials, after discovering a way of installing applications onto Android smartphones with no interaction required by the phone's owner.

The new web-based Android Market retrieves the details of Android devices registered to the Google address, and automatically installs software onto the associated smartphones with no user interaction required on the phone itself.

Svajcer summarises: "Google should make changes to the remote installation mechanism as soon as possible. As a minimum, a dialog should be displayed on the receiving device so that the user must personally accept the application that is being installed."

"Let us hope that the update will come in time to prevent cybercriminals abusing the Android Market for the automatic installation of malicious software. "

Science

Submission + - "Invisibility Cloak" Created Using Crystals (gizmag.com) 1

Zothecula writes: The quest to build a working “invisibility cloak” generally focuses on the use of metamaterials – artificially engineered materials with a negative refractive index that have already been used to render microscopic objects invisible in specific wavelengths of light. Now, using naturally occurring crystals rather than metamaterials, two research teams working independently have demonstrated technology that can cloak larger objects in the broad range of wavelengths visible to the human eye.

Slashdot Top Deals

There's no such thing as a free lunch. -- Milton Friendman

Working...