Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
Electronic Frontier Foundation

Submission + - Judge orders man to apologize to wife on Facebook (

Marillion writes: "Photographer Mark Byron was so bothered by his pending divorce and child visitation issues that he blasted his soon-to-be ex-wife on his personal Facebook page. That touched off a battle that resulted in a Hamilton County judge ordering Byron jailed for his Facebook rant – and to post on his page an apology to his wife and all of his Facebook friends, something free speech experts found troubling."
The Courts

Submission + - RIAA's $222,000 verdict may be set aside (

NewYorkCountryLawyer writes: "In a shocking turn of events, the Judge who presided over the $222,000 verdict in favor of the RIAA, in the Duluth, Minnesota, case, Capitol v. Thomas, has issued an order stating that he may be vacating the verdict because he appears to have committed a "manifest error of law" when he instructed the jurors, as he had been requested by the RIAA to do, that Ms. Thomas could be liable for copyright infringement just by "making available" the files on her computer. In his 3-page Order (PDF) District Judge Michael J. Davis noted that he may have overlooked controlling Eighth Circuit authority, the case of National Car Rental v. Computer Associates, which held that you can't have a violation of the "distribution right" without an "actual dissemination of copies or phonorecords". According to the Judge, neither Ms. Thomas's lawyer, nor the RIAA lawyers, had cited the National Car Rental case (which would mean that the RIAA lawyers committed an ethical violation in failing to bring "contrary controlling authority" to the Court's attention). The Judge has asked for amicus curiae briefs, and has scheduled oral argument for July 1st, at 10 AM, in courtroom number 1, at the federal courthouse in Duluth, Minnesota. p2pnet says this is "likely to be the worst upset yet for Vivendi Universal, EMI, Warner Music and Sony BMG", and reminds us that the July 1st argument is "open to the public"."

Submission + - Strength of Encryption

HK writes: There has been a spate of data security leaks in Hong Kong. Hong Kong's largest hospital network (Hospital Authority) lost more than 16000 patient's data. This was soon followed by the global banking group HSBC's admission of the loss of a server containing just under 160,000 customer's data. HSBC claims "The server is protected by multiple layers of security. The risk of data leakage and fraudulent transactions resulting from the loss of the server is deemed to be low,".

Every organization has to improve their security measures in the light of these recent leaks. Suggestions of quick fixes by IT include encryption using Microsoft Office's password, WinZip/PKZip encryption, in-house encryption, multi-layered encryption or hardware encryption.

May I ask SlashDot what are better alternatives? How secure are the recommended measures?

Are there better open source alternatives? How do organizations deal with leaks if open source software are used for encryptions — who is to blame when there is no software company behind the software?

How does one go about protecting electronic data of patients and customers?

Submission + - Debian modifications to OpenSSL compromises keys (

jberryman writes: Debian-specific changes to the openssl packages cause the random number generation scheme to be predictable. The issue has been fixed, but debian suggests that all keys created with faulty versions of openssl be regenerated. From the announcement:

"It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation."

Slashdot Top Deals

Over the shoulder supervision is more a need of the manager than the programming task.