Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Who needs an iOS GMail app? (Score 1) 90

I love how Android allows me to keep my personal GMail and my work Exchange account in different apps, I assume that this is meant to do the same thing on iOS. That way by just looking at the little "unread" number hovering over the app I can tell whether those unread emails are personal or professional: right now I have no way of making this differentiation.

Comment Re:Yup (Score 1) 257

While I'm glad they are expanding the Canadian library, I think back to when Netflix first launched in Canada, and the line they gave to the news outlets was "We know the library isn't as big as in the states, but it's a licensing issue. As we get more customers, we'll add more content. So pay us now, even if our service isn't great, and we'll improve it!".

Now I'm not as big on the free market as a lot of people, but telling people to pay for a sub-par service so you can afford to improve it is a laughable argument to me. If you want to support their business model, go ahead, but I need more content before I'll pay for it.

Comment Re:SuperGenPass (Score 1) 278

I just looked into SuperGenPass, and there are two things that scare me:
1) If any site that you use SGP on is compromised with an XSS attack and you're using the bookmarklet, they can harvest your _master_ password.
2) This post, from a seemingly intelligent cryptographic researcher stating that the basis of the math behind SGP isn't sound: http://stackoverflow.com/questions/554224/is-the-bookmarklet-password-generator-from-supergenpass-com-safe-to-use.

Comment Just make sure the carrier supports the phone (Score 2, Informative) 445

I just hope the people buying these phones do the research. In Canada, Rogers (one of the big three cell providers here) has said that they're not going to provide an upgrade for the HTC Magic (literally the same phone as the myTouch3G) to Android 1.6 - they think 1.5 provides a "good user experience" and so they're not going to bother. Just how do you think all these people buying new phones are going to feel when they get it home and discover a bunch of the bells and whistles they've been promised don't work? And there are already apps out there that require 1.6. That's one big difference between Android phones and the iPhone - Rogers is supporting the iPhone.

Source: http://www.boygeniusreport.com/2009/12/19/rogers-htc-dream-and-magic-to-be-deprived-of-donut/ (as well as the HTC website)

Comment Re:Format shifting (Score 1) 346

It's the re-selling that's the problem, and the profit inherent in it. And again, I'm referring to moral problem, not legal problem. Legally I think each are illegal, which is another matter altogether. But morally, I think doing anything you want with a product after you buy it (without eating into a company's profits) is legit, but re-selling their product in a way they don't intend, and making a profit from it, that's much sketchier.

Comment Re:Format shifting (Score 1) 346

The core difference is between you buying a CD and putting it on your iPod when the record label says you can't, and someone else selling you an iPod with that CD on it, along with a copy of the CD. One is morally home and personal use, the other is business, and an attempt at a profit. To me, that's the big difference.

Submission + - Facebook to change privacy policy (www.cbc.ca)

Retardical_Sam writes: Facebook has agreed to make changes to protect users' personal information on the social networking site, including the way data is accessed by third-party developers, Canada's privacy commissioner said Thursday. Canadian officials have been negotiating with Facebook since the Office of the Privacy Commissioner released a report a month ago that argued the social network breaches Canadian privacy law. Facebook agreed to make changes dealing with third-party applications like quizzes and games, deactivation of accounts, the personal identification of non-users and accounts of users who die.

Submission + - New attack breaks WPA WiFi crypto in 1 minute (threatpost.com)

Trailrunner7 writes: "First it was WEP, then TKIP and now WPA. A pair of Japanese researchers have developed a new technique for decrypting wireless packets encrypted with WPA , the most common wireless encryption protocol, in about a minute. The attack is an improvement on an existing technique and makes it simple for attackers to sniff and then crack supposedly secure wireless traffic. Threatpost.com reports: "The attack builds on the work done earlier by another pair of researchers who found a way to break the WPA encryption protocol that is used on many WiFi routers. Known as the Beck-Tews attack, the method involved making minor changes to packets encrypted with TKIP, a predecessor to WPA, and then sending the packets back to the access point. The vulnerability was in the way that the checksum was used. However, the attack required a significant amount of time to execute, as much as 15 minutes, making it somewhat impractical to execute in the real world. The newer attack, developed by Toshihiro Ohigashi and Masakatu Morii, improves on the Beck-Tews attack and lowers the amount of time needed to execute it to about one minute.""

Submission + - Nmap 5.00 Released (nmap.org)

Irongeek_ADC writes: "Insecure.Org is pleased to announce the immediate, free availability of the Nmap Security Scanner version 5.00 from http://nmap.org/. This is the first stable release since 4.76 (last September), and the first major release since the 4.50 release in 2007. Dozens of development releases led up to this. Follow the link for more details. Here are the top 5 improvements in Nmap 5: 1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks it maked easy with Ncat. 2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer. 3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify. 4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition. 5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal."

Comment Re:Why wearable? (Score 1) 234

Ok, I see your point, but there still should be a distinction between wearing the control mechanism and wearing the actual transportation device. So while in this case, the control mechanism and the device are essentially one and the same, that's not true in all cases. I suppose your wording could still imply that, it just depends on how it's read.

Gaming's 10 Biggest Scandals 96

GamePolitics has a list of ten of the most well known gaming scandals to hit the games industry. Starting back in 1993 with the senate hearings on Night Trap (a game that arguably led to today's ESRB), the list catalogs some things that the companies responsible would probably just as soon forget. "Hot Coffee (2005) - needs no introduction. Cheeky Rockstar programmers left hidden sex animations (accidentally or otherwise) buried in the PS2 code of Grand Theft Auto: San Andreas. Modders made sure they didn't stay buried for long. Rockstar's denials only made things worse. And then Hillary got involved ..." At the post's close they call for additional nominations, as it's definitely not an exhaustive list. They left off the ESRB's decision to re-rate Oblivion , for example. What 'scandalous' gaming events can you see rating with this topics?

Slashdot Top Deals

He who steps on others to reach the top has good balance.