Forgot your password?
typodupeerror
Communications

Mississippi Makes Caller ID Spoofing Illegal 258

marklyon writes "HB 872, recently signed into law by Mississippi Governor Haley Barbour, makes Caller ID spoofing illegal. The law covers alterations to the caller's name, telephone number, or name and telephone number that is shown to a recipient of a call or otherwise presented to the network. The law applies to PSTN, wireless and VoIP calls. Penalties for each violation can be up to $1,000 and one year in jail. Blocking of caller identification information is still permitted."
Medicine

CDC Adopts Near Real-Time Flu Tracking System 102

CWmike writes "The US Centers for Disease Control and Prevention launched an effort this week to better and more easily track for H1N1 and other seasonal influenza activity throughout the US. The CDC said it is now tracking data on 14 million patients from physician practices and hospitals stored on a database hosted by GE Healthcare. The data is submitted daily from physicians' offices and hospitals that use GE's electronic medical record system. The data is then uploaded to GE Healthcare's Medical Quality Improvement Consortium, a database repository designed with HIPAA-compliance parameters of patient anonymity and best practices, where it can be the subject of medical data queries. The CDC can perform queries to look for flu-like symptoms being reported by physicians, and then disseminate the data for health care providers and local government officials throughout the country, who can alert businesses and others about flu outbreak hot spots. The CDC also hopes its analysis of the data helps it better understand the characteristics of H1N1 outbreaks and to determine who is most at risk for developing complications from the virus. Prior to implementing the new system, the CDC relied heavily on tracking insurance claims data, which could take days or weeks to make its way to the agency's medical staff for analysis. The medical data is normalized so that, for example, reports of hypertension, HTN, and high blood pressure all mean the same thing when a researcher enters a query against the data."
Idle

Submission + - Indian military to use hot chili pepper grenades (ananova.com) 1

Dr_Ken writes: "According to this news story in Ananova The Indian Defence Ministry is looking into a cheaper and simpler form of tear gas agent for riot dispersal and crowd control.

Defence researchers say the idea is to replace explosives in small hand grenades with a certain variety of red chilli to immobilise people without killing them, reports the BBC.The chilli, known as Bhut Jolokia, is said to be 1,000 times hotter than commonly used kitchen chilli.

Probably much cheaper to fabricate than conventional CN or CS gases and way less toxic too."

Google

Submission + - Google Releases Chrome v2.0 (blogspot.com) 1

RadiusK writes: Google has released the second major version of the Chrome browser. This version features more speed improvements thanks to a newer version of V8 JavaScript engine and WebKit. JavaScript-heavy web pages will now run about 30% faster. Other new features include form autofill, fullscreen mode, and improved New Tab page. If you're already using Google Chrome, you'll be automatically updated with these new features soon. If you haven't downloaded Google Chrome, you can get the latest version at google.com/chrome.
Communications

Submission + - U.S Federal Government Launches Data.gov (elasticvapor.com)

Elastic Vapor writes: "I'm happy to announce that the U.S. Federal Government earlier today launched the new Data.Gov website. The primary goal of Data.Gov is to improve access to Federal data and expand creative use of those data beyond the walls of government by encouraging innovative ideas (e.g., web applications). Data.gov strives to make government more transparent and is committed to creating an unprecedented level of openness in Government. The openness derived from Data.gov will strengthen the Nation's democracy and promote efficiency and effectiveness in Government."
Linux Business

Submission + - The future might be BIOS and browsers

An anonymous reader writes: Few in the open source community have welcomed online applications like Google Docs with open arms, but Keir Thomas claims he's found a way forward — and it's one that involves exclusively open source. He reckons BIOS-based operating systems are the future, because they will alter the way users think about their computers. FTA: "The key breakthrough is ideological: BIOS-based operating systems demote the operating system to just another function of the hardware. It breaks the old mindset of the operating system being a distinct platform, or an end in itself. The operating system becomes part of the overall computing appliance. This allows the spotlight to focus on online applications. "
Mozilla

Submission + - Mozilla Jetpack: API for standards-based add-ons

revealingheart writes: Mozilla Labs have released a prototype extension called Jetpack: An API for allowing you to write Firefox add-ons using existing web technologies technologies to enhance the browser (e.g. HTML, CSS and Javascript), with the goal of allowing anyone who can build a Web site to participate in making the Web a better place to work, communicate and play. Example add-ons are included on the Jetpack website.

While currently only a prototype, this could lead to a simpler and easier to develop add-on system, which all browsers could potentially implement.
Security

Submission + - Flaw made public in OpenSSH encryption (zdnet.com) 1

alimo20 writes: "Researchers at the Royal Holloway, University of London have discovered a flaw in Version 4.7 of OpenSSH on Debian/GNU Linux. According to ISG lead professor Kenny Patterson, an attacker has a 2^{-18} (that is, one in 262,144) chance of success. Patterson tells that this is more significant than past discoveries because "This is a design flaw in OpenSSH. The other vulnerabilities have been more about coding errors"

The vulnerability is possible by a man-in-the-middle intercepting blocks of encrypted material as it passes. The attacker then re-transmits the data back to the server and counts the number of bytes before the server to throws error messages and disconnects the attacker. Using this information, the attacker can work backwards to figure out the first 4 bytes of data before encryption. "The attack relies on flaws in the RFC (Request for Comments) internet standards that define SSH, said Patterson"

"Patterson said that he did not believe this flaw had been exploited in the wild, and that to deduce a message of appreciable length could take days.""

Data Storage

Flash Drive Roundup 311

Braedley writes "When [Ars] last took an in-depth look at USB flash drives in 2005, the landscape was a bit different. A 2GB drive ran nearly $200, and speeds were quite a bit slower then. At the time, we noted that while the then-current crop of drives was pretty fast, they still were not close to saturating the bandwidth of USB2. To top it off, a good drive was still going to set you back $50 or $70--not exactly a cheap proposition. Since our first roundup, this picture has changed considerably, and it leads to a question: has the flash drive become an undifferentiated commodity, just like any other cheap plastic tsotschke that you might find at an office supply store checkout counter?"
The Internet

Cory Doctorow Says DIY Licensing Will Solve Piracy 189

An anonymous reader writes "The founding editor of Boing Boing, Cory Doctorow, has written a report about 'do-it-yourself' digital licensing, which he's touting as the panacea for piracy. Doctorow's solution for content creators is two-fold: get a Creative Commons license and append some basic text requiring those who re-use your work to pay you a percentage of their gross income. Doctorow refers to this as the middle ground between simply acquiring a Creative Commons license and hiring expensive lawyers for negotiations. He calls do-it-yourself licensing 'cheap and easy licensing that would turn yesterday's pirates into tomorrow's partners.'"
Space

An Australian Space Agency At Last? 189

Dante_J writes "In the Australian Federal budget presented last night, as well as big national infrastructure spending, an amount of $48.6 million over four years was allocated for an 'Australian Space Science Program.' Normally a space program is managed by a space agency. Does this now mean that Australia will follow the recommendations of the Senate Space Science report and give up its rather inadequate title of the only top-20 GDP nation not to have one? With nations like Vietnam, Bangladesh and Bulgaria forming or maintaining space agencies, this government infrastructure is obviously not limited to G-20 nations. Discussions to combine Australian and New Zealand airspace have been undertaken; should that translate to aerospace too, and both nations form an ANZAC space agency together?"
Security

Apple and Microsoft Release Critical Patches 194

SkiifGeek writes "Both Microsoft and Apple have released major security updates in the last 24 hours. Microsoft's single update (MS09-017) addresses fourteen distinct vulnerabilities across all supported versions of PowerPoint, but it isn't the number of patched vulnerabilities that is causing trouble. Instead, the decision to release the patch for Windows versions while OS X and Works versions remain vulnerable to the same remote code execution risks (including one that is currently being exploited) hasn't gone down well with some people. Microsoft have given various reasons why this is the case, but this mega-update-in-a-patch is still interesting for other reasons. Meanwhile, Apple has updated OS X 10.5 to 10.5.7 as part of the 2009-002 Security Update, as well as a cumulative update for Safari 3 and the Public Beta for 4. As well as addressing numerous significant security risks, the 10.5.7 update provides a number of stability and capability enhancements and incorporates the Safari 3 update patch. Probably the most surprising element of the Apple update is the overall size of it; 442MB for the point update, and 729MB for the ComboUpdate."
Privacy

Greece Halts Google's Street View 192

Hugh Pickens writes "Greece's Data Protection Authority, which has broad powers of enforcement for Greece's strict privacy laws, has banned Google from gathering detailed, street-level images in Greece for a planned expansion of its Street View mapping service, until the company provides clarification on how it will store and process the original images and safeguard them from privacy abuses. The decision comes despite Google's assurances that it would blur faces and vehicle license plates when displaying the images online and that it would promptly respond to removal requests. In most cases, particularly in the US, Google has been able to proceed on grounds that the images it takes are no different from what someone walking down a public street can see and snap. And last month, Britain's privacy watchdog dismissed concerns that Street View was too invasive, saying it was satisfied with such safeguards as obscuring individuals' faces and car license plates. The World Privacy Forum, a US-based nonprofit research and advisory group, said the Greek decision could raise the standard for other countries and help challenge that argument. 'It only takes one country to express a dissenting opinion,' says Pam Dixon, the group's executive director. 'If Greece gets better privacy than the rest of the world then we can demand it for ourselves. That's why it's very important.'"
Music

Submission + - Lala Invents Network DRM to ensnare your music (cnet.com)

An anonymous reader writes: You got your DRM in my patent so says Lala who claims to have invented "Network DRM". According to a Cnet story record label backed online music purveyor Lala has filed for a patent which moves DRM from a file wrapper like Windows Media and Fairplay to the server. Digital music veteran Michael Robertson has quotes from the patent application on his blog about how Lala monitors every access, allows only authorized devices (so far there are none), blocks downloads and can revoke content at the labels request.

Slashdot Top Deals

There are no data that cannot be plotted on a straight line if the axis are chosen correctly.

Working...