Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Linode hacked, CCs and passwords leaked 6

An anonymous reader writes: On Friday Linode announced a precautionary password reset due to an attack despite claiming that they were not compromised. The attacker has claimed otherwise, claiming to have obtained card numbers and password hashes. Password hashes, source code fragments and directory listings have been released as proof. Linode has yet to comment on or deny these claims.

Comment Re:Sweet! (Score 1) 177

Ooh, I don't think so.

The "general terms of business" are defined in law as a statutory contract. Ergo, even underage individuals can enter into a contract of simple trade.

If such terms were to be imposed as "general terms of business", some sort of contract would be signed at the time of purchase. Yet purchasing software involves nothing more than the default statutory contract of trade.

The nonsense found in EULAs has no such government endorsement. What's more, entering into a contract requires some sort of knowledge of the contract. You can't tell me that downloading something from a website has made me a party to a contract, because having no idea of this, it's impossible for me to be a party to it.

Comment Re:Sweet! (Score 1) 177

After all: without altering the program (which is not allowed without a license)

Says who? If I own a copyrighted work, I'm entitled to do what I like with it, save for copying it. That includes modifying it. There is no difference here from me buying a book and scribbling all over it.

Depending on the software, you can also just extract the files without running the installer. Additionally, proving that you "agreed" to the licence needn't be nearly as simple; the user that uses the software isn't necessarily the person that installed it. I also have difficulty believing that EULAs are valid instruments; in disproving the false statements that only the EULA grants you permission to use the software, the EULA becomes extremely one-sided. EULAs that attempt to redefine the nature of a transaction that has already occured, from a sale to a grant of a licence, are particularly entertaining.

Simply put, a license is an agreement giving you the right to use the software.

This is simply false. If I make a piece of software, and distribute it for free online, I don't have to grant the users permission for their use of the software to be lawful. Copyright grants monopoly rights solely over the creation of copies; however, copies of computer programmes created that are technically necessary to the use of software in conjunction with a machine are permitted by law under USC 17-117.

A successful demonstration of this is the GPL:

You are not required to accept this License in order to receive or run a copy of the Program.

Comment Re:Sweet! (Score 1) 177

Of course, the software is still covered by copyright and it's license, so you're really selling the license.

False. A second hand sale involves the sale of physical property. There is no exception for software. A "license" can refer to many things; in the context of software it tends to refer to a fictional concept created by the software industry, the implication being that one is required, typically per user, or even per feature. However, a second-hand copy of a piece of software is a lawfully produced copy of a copyrighted work, and so no license is required merely to transfer ownership, nor is a "license" legally required to use a piece of software.

USC 17-117 creates an exemption for copyright with regards to copies of computer programmes technically necessary to their use in conjunction with a machine. Thus, copies of a computer programme made on a hard drive or in RAM are not infringing.

The lack of necessity of a "license" is demonstrated in the GPL. The GPL explicitly states "You are not required to accept this License in order to receive or run a copy of the Program.".


Submission + - Stereo mix can crack any type of DRM

Quickfingers writes: "All of the companies out there working so hard to create their own unbreakable DRM will never succeed. You see, any DRM can be cracked just by using Audacity and a sound card. By setting the input on Audacity to stereo mix, one can easily record any song from any source as long as it is playing through the sound card. Then using the LAME dll, the audio can be output to mp3 in a matter of seconds. So why are all of these companies trying to come up with new and improved DRM? It will never work as long as there are sound cards installed in computers."
The Internet

Submission + - Five things that are wrong with the BBC iPlayer

RoyalPotato writes: The BBC recently launched a public beta of its IPTV app, iPlayer. Cnet.co.uk has a list of five things it thinks are wrong with it, and while some are pretty obvious, like the undesirable presence of DRM, there are some interesting points about the P2P app, Kontiki, constantly 'seeding' with no user override and the lack of support for Linux and MacOS X.

Submission + - UK Government Rejects Anti-DRM e-Petition

Anonymous Coward writes: "The UK government has rejected an e-Petition calling for a ban on DRM. In a response posted to the e-Petitions site, they claim that DRM gives users "unprecedented choice". BBC News reports on the response: "It said DRM acted as a policeman in that it protected digital content, but, it added, the technology also improved choice and the price consumers wished to pay." The response did, however, recognise that "the needs and rights of consumers must also be carefully safeguarded.""

Submission + - Engineering Student Killed by Canned Air

Kevin writes: "According to The Home News Tribune, "a judge has ruled that a Rutgers student who was found dead in January died from accidentally inhaling a spray used to clean computer keyboards." Ryan Niedzwiadek, a 22-year-old future electrical and computer engineer, died "due to the toxic effects of difluoroethane, an ingredient in a refrigerant-based propellant cleaner". Canned air is very common in most computing environments, yet few realize the danger of using it without proper ventilation. My condolences to Ryan's family for this tragic loss."

Submission + - A free mobile operator in UK starts next year

Juha writes: The main newspaper in Finland, Helsingin Sanomat reports (sorry, in finnish only) that previous Nokia's President, Pekka Ala-Pietilä and Antti Öhrling, owner of a finnish ad agency, have established a free mobile phone operator in UK, which is due to start next year. Users only need to give permission to receive advertisements to their phones and give information of themselves. This kind of operator business model seems to be the first in the world.

Submission + - EFF sues DMCA abuser

destinyland writes: "The EFF moved today against a serial abuser of the DMCA who squelched an unflattering news photo by contacting ISPs claiming his DMCA rights "are being violated by the continued presence of this photograph" and even mimicking the official wording of a DMCA complaint. ("I swear, under penalty of perjury...that I am the copyright owner...") The EFF's suit says he knowingly mis-represented himself, intentionally misusing copyright law to try to shut down legitimate debate, and they're seeking damages and legal fees."

Submission + - A concise indepth look at Drupal 5.0 beta

An anonymous reader writes: This article explores the new features found in Drupal 5.0 beta, some of them very useful such as a color dialog and a rework of the administration section; and concludes ....
All in all version 5.0 beta is a big step in the right direction for this very popular content management system. And not withstanding the beta tag, I found Drupal ver 5.0 to be remarkably stable and to provide a lot of improvements over the earlier versions.
Operating Systems

Submission + - The Internet browser is the new OS

TheShadowzero writes: "CNN predicts that soon applications loaded from the internet through a web browser (as opposed to one saved on your hard drive) will render operating systems obsolete. Allegedly, the trend of using PDA phones to access email and the internet has shown that the access of portable office apps is what we want. Also stated is that PDA phones will soon replace laptops. From the article: "What this means is that you'll be able to write your documents in Writely (who needs Word?), e-mail them via Gmail (who needs Outlook?), and arrange appointments to jointly edit those documents via Google Calendar (again, who needs Outlook?). And while you're at it, a Google Talk chat window running inside these applications could let you collaborate (who needs AIM?).""
Internet Explorer

Submission + - IE7 anti phishing tool can spike CPU

An anonymous reader writes: From a Microsoft .Net developer blog: When visiting AJAX extensive web sites (for example, Windows Live Mail Beta, Yahoo Mail Beta, Microsoft Outlook Web Access, Google Reader), IE7 may cause CPU spike. This could be caused by Anti-Phishing. To workaround the issue, you can disable Anti-Phishing by going to Tools->Internet Options->Advanced, scroll to Phishing Filter, check "Disable Phishing Filter", and restart the browser.

Slashdot Top Deals

"Trust me. I know what I'm doing." -- Sledge Hammer