Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Man Fined $1.5 Million For Leaked Mario Game 287

An anonymous reader writes "A Queensland man will have to pay Nintendo $1.5 million in damages after illegally copying and uploading one of its recent games to the internet ahead of its release, the gaming giant says. Nintendo said the loss was caused when James Burt made New Super Mario Bros Wii available for illegal download a week ahead of its official Australian release in November of last year. Nintendo applied for and was granted a search order by the Federal Court, forcing Burt to disclose the whereabouts of all his computers, disks and electronic storage devices in November. He was also ordered to allow access, including passwords, to his social networking sites, email accounts and websites."

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Submission + - EFF Petition for real net neutrality (realnetneutrality.org)

jbezorg writes: Electronic Frontier Foundation is soliciting for signatures. Here's their pitch.

Buried in the FCCs rules is a deeply problematic loophole. Open Internet principles, the FCC writes, "do not...apply to activities such as the unlawful distribution of copyrighted works."

For years, the entertainment industry has used that innocent-sounding phrase "unlawful distribution of copyrighted works" to pressure Internet service providers around the world to act as copyright cops to surveil the Internet for supposed copyright violations, and then censor or punish the accused users.

From the beginning, a central goal of the Net Neutrality movement has been to prevent corporations from interfering with the Internet in this way so why does the FCCs version of Net Neutrality specifically allow them to do so?

Go to the Real Net Neutrality petition to tell the FCC that if it wants to police the Internet, it first needs to demonstrate that it can protect Internet users and innovators by standing up to powerful industry lobbyists. Sign your name to demand that the copyright enforcement loophole be removed.

Here's the EFF petition.

And here is the FCC documentation FCC 09-93: In the Matter of Preserving the Open Internet Broadband Industry Practices ( ref and footnotes excluded )

Page 51 ~ 139. Third, we propose that broadband Internet access service providers would not violate the principles in taking reasonable steps to address unlawful conduct on the Internet. Specifically, we propose that broadband Internet access service providers may reasonably prevent the transfer of content that is unlawful. For example, as the possession of child pornography is unlawful, consistent with applicable law, it appears reasonable for a broadband Internet access service provider to refuse to transmit child pornography. Moreover, it is important to emphasize that open Internet principles apply only to lawful transfers of content. They do not, for example, apply to activities such as the unlawful distribution of copyrighted works, which has adverse consequences on the economy and the overall broadband ecosystem. In order for network openness obligations and appropriate enforcement of copyright laws to co-exist, it appears reasonable for a broadband Internet access service provider to refuse to transmit copyrighted material if the transfer of that material would violate applicable laws. Such a rule would be consistent with the Comcast Network Management Practices Order, in which the Commission stated that providers, consistent with federal policy, may block . . . transmissions that violate copyright law.


New WoW Patch Brings Cross-Server Instances 342

ajs writes "World of Warcraft's Wrath of the Lich King expansion was staggered into 4 phases. The fourth and final phase, patch 3.3, was released on Tuesday. This patch is significant in that it will be the first introduction of one of the most anticipated new features in the game since PvP arenas: the cross-realm random dungeon, as well as the release of new end-game dungeons for 5, 10 and 25-player groups. The patch notes have been posted, and so has a trailer. The ultimate fight against the expansion's antagonist, the Lich King a.k.a. Arthas, will be gated as each of the four wings of the final dungeon are opened in turn — a process that may take several months. The next major patch after 3.3 (presumably 4.0) will be the release of Cataclysm, the next expansion."

Over 160 Tutorial Videos Created For Unreal Dev Kit 48

As a follow-up to Epic Games' release of a free version of the Unreal Engine last month, the company has now posted over 160 video tutorials which demonstrate the various uses of the Unreal Development Kit. Roughly 20 hours of footage were created by technical education company 3D Buzz, with topics ranging from user interface to game physics to cinematics.

Comment Re:To Everyone... (Score 1) 655

This is precisely why I stopped playing WOW. At the end of the day, all you've done is move some bits around on a server somewhere. If you're building a ship in a bottle, at least you have a ship in a bottle. I do miss the people I used to play with, (we had a lot of fun together) but you can never, "beat," or "win," WOW. WOW is like the proverbial carrot on a stick, you can get the best armor/weapons there are, but periodically Blizzard just moves the carrot a bit further away.

Comment Re:Whats the difference between this and (Score 1) 418

I think you're absolutely right. Cory Doctorow (of EFF fame) gave a great talk at microsoft about why this kind of hardware dongle CAN'T work. It's the best explanation I've heard yet. To paraphrase, (poorly) your client and your attacker are the same person. The client needs the key to view the information. Therefore, the client has the key (even if try to hide it in hardware) needed to break your encryption. CSS is a perfect example of this. Here's a link to Cory's talk. Excellent reading. http://www.craphound.com/msftdrm.txt

Slashdot Top Deals

Money cannot buy love, nor even friendship.