Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Pirate Party of Canada Membership Drive (pirateparty.ca)

An anonymous reader writes: Three years ago I found the Pirate Party of Canada through the power of Slashdot. Now three years later we need the help of Canadian members of slashdot. We need to collect 500+ signatures to remain a registered federal party. As a result anyone who completes the form from Elections Canada and mails it in will be granted free membership in the party. You can find out more at the Pirate Party of Canada website: https://www.pirateparty.ca/helpus/

Submission + - Homemade VoIP Network Over WiFi Routers (techreport.com)

AnInkle writes: A blogger on The Tech Report details his research and testing of wireless voice communication options for remote mountainous villages in rural undeveloped areas. The home-built project involves open-source software, low-cost wireless routers, solar power, mesh networking, unlicensed radio frequencies and VoIP technology. Although his research began several months ago, he has concluded the first stage of testing and is preparing to move near one of the sites where he hopes to eventually install the final functional network. Anyone with experience or ideas on the subject is invited to offer input and advice.

Submission + - Researchers 'poison' Storm botnet (networkworld.com)

corerunner writes: Finally, a war that's both useful AND entertaining...

"A group of German researchers has unveiled the first publicly released research attempting to actively disrupt a peer-to-peer botnet — using as their case study the notorious Storm worm.

The researchers were able not only to infiltrate Storm, gaining in the process the most precise estimates of its size to date, but also had success in disrupting its communications through a "poisoning" technique, according to the study."

United States

Submission + - Washington Grounds All F-15 Jet Interceptors (washingtonpost.com)

reporter writes: "According to a report just published by "The Washington Post", the United-States Air Force has grounded its entire fleet of F-15 jet fighters, which serve as the front-line interceptors against enemy aircraft. This startling development resulted from the equally startling midair disintegration of an F-15C during a training mission: the aircraft broke apart just behind the cockpit. Following suit, Tokyo has also grounded its entire fleet of F-15 interceptors, according to a report by Bloomberg.

The F-15s will remain grounded until American engineers determine how to ensure the safety of the F-15. During this time, the air space of the Western world is vulnerable to penetration by hostile aircraft. Will the Kremlin attempt to test the level of vulnerability?"


Submission + - University of Arkansas buys Second Life "Islan (uark.edu)

adavidw writes: "University of Arkansas bought an "island" in the virtual world game Second Life to use for "research and educational purposes". An Second Life "island" is a very large plot of in-game land dedicated for the exclusive use of it's owner, and hosted on a dedicated server at the game's creator, Linden Labs. U of A will be using their island as a combined effort of their Computer Science, Computer Engineering, and Art departments to research various projects. Some projects proposed for the island include "using SL to recreate Ostia Antica, the ancient port city of Rome and mirroring a real healthcare facility in SL and instrumenting it with RFID and smart devices that communicate with each other"."

Submission + - Ron Paul recieves a record $4.2 million in 24 hrs

An anonymous reader writes: From FOXNews.com:

Ron Paul, the Texas congressman with a libertarian tilt and an out-of-Iraq pitch, entered heady fundraising territory with a surge of Web-based giving tied to the commemoration of Guy Fawkes Day. The $4.2 million represented online contributions from more than 37,000 donors.

Paul advocates limited government and low taxes like other Republicans, but he stands alone as the only GOP presidential candidate opposed to the Iraq war. He also has opposed Bush administration security measures that he says encroach on civil liberties.

Submission + - The Pirate Bay sails to trial in january (www.sr.se) 3

An anonymous reader writes: After a year and a half after the raid on The Pirate Bay, an action that doubled the number of visitiors, the preliminary work is done and come january the five men behind the site will go to trial for "aiding copyright infringement".
According to the anti-piracy agency it is a relief for everyone involved, them and TPB, to finaly be able to have the case tried in court.
One of the guys behind TBP says that he think the charge is strange considering that they never had any illigeal copies on the site, only links to other peoples machines.

Story in swedish only this far.

Portables (Games)

Submission + - Universal PSP Unbricker Released

wamerocity writes: "One of the biggest if not THE BIGGEST development in the PSP hacking scene has just unfolded."

A new homebrew app, lovingly referred to as "Pandora's Battery" has surfaced as a joint effort between the most noted PSP Homebrew devs, team Noobz, C + D, and homebrew god Dark_Alex. This app, allows ANY homebrew enabled PSP to turn any regular PSP battery into the famed "jigkick" battery, (the method Sony uses to unbrick warrantied PSP) and in conjunction with a small program on the memory stick, it can restore it to the celestial homebrew-friendly 1.5 firmware.

As a sidenote, the newly-created jigkick battery can no longer be used as a normal battery, so a new one should be purchased first.

Submission + - GNOME Beats KDE in Annual Desktop Linux Poll 1

An anonymous reader writes: GNOME has taken over the leadership position from KDE, in the battle for Linux desktop mindshare, according a just completed annual survey of desktop Linux users. This year marks the first time that GNOME has beaten out KDE in desktop Linux user popularity (with 45 percent vs. 35 percent usage), a result attributed by the survey's analysis to the enormous popularity of GNOME-based Ubuntu (30 percent usage). I'm curious how slashdotters feel about the advantages/disadvantages of GNOME vs. KDE? Which is better, and why?

Submission + - Forgent Patent Troll Loses Again

anagama writes: "Forgent Networks, a patent troll, got the slap down by a TX jury in May when it invalidated a patent Forgent held regarding video teleconferencing over telephone lines, and today, its motion for a new trial against EchoStar was denied. In fact, the court awarded EchoStar $90k in costs. Forgent probably isn't crying that much though, it already extorted $28m from other defendants. Some of you may recall that Forgent made a business out of cheating companies for jpeg use — till their patent was largely invalidated on that front as well."

Submission + - Eavesdropping Laws Would Create Security Risk. (wired.com)

Sniper223 writes: "Susan Landau, a cryptographer for Sun Microsystems and the co-author of Privacy on the Line: The Politics of Wiretapping and Encryption, argues in the Washington Post today that the spying outposts made possible by the so-called Protect America Act actually create holes that can be used by hackers to attack critical infrastructure.

        To avoid wiretapping every communication, NSA will need to build massive automatic surveillance capabilities into telephone switches. Here things get tricky: Once such infrastructure is in place, others could use it to intercept communications.

        Grant the NSA what it wants, and within 10 years the United States will be vulnerable to attacks from hackers across the globe, as well as the militaries of China, Russia and other nations.

        Such threats are not theoretical. For almost a year beginning in April 2004, more than 100 phones belonging to members of the Greek government, including the prime minister and ministers of defense, foreign affairs, justice and public order, were spied on with wiretapping software that was misused. Exactly who placed the software and who did the listening remain unknown. But they were able to use software that was supposed to be used only with legal permission."


Submission + - DoJ Hides National Security Records. (cryptome.org)

Sniper223 writes: "On May 8, 2007, at 72 FR 26037, the Department of Justice
issued a proposed rule to amend Title 28 of the Code of Federal
Regulations, Part 16, to exempt the following new system of records
from certain provisions of the Privacy Act: The National Security
Division (NSD), ``Foreign Intelligence and Counterintelligence Records
System (JUSTICE/NSD-001),'' which incorporated three previous systems
of records of the Office of Intelligence Policy and Review (OIPR). This
records system must be exempted from sections of the Privacy Act since,
in most cases, disclosure of the existence of records pertaining to an
individual would hinder authorized United States intelligence
activities by informing that individual of the existence, nature, or
scope of information that is properly classified pursuant to Executive
Order 12958, as amended, and thereby cause damage to the national
security. Further it is necessary to exempt this system to ensure
unhampered and effective collection and analysis of foreign
intelligence and counterintelligence information and to protect the
identities of confidential sources.

EFFECTIVE DATE: This final rule is effective August 8, 2007.

FOR FURTHER INFORMATION CONTACT: GayLa Sessoms, (202) 616-5460 or Mary
Cahill (202) 307-1823.

SUPPLEMENTARY INFORMATION: The notice of the proposed rule with
invitation to comment was published in the Federal Register on May 8,
2007, at 72 FR 26073. No comments were received. The Department of
Justice is exempting JUSTICE/NSD-001 from 5 U.S.C. 552a(c)(3) and (4);
(d); (e)(1), (2), (3), (4)(G), (H), and (I), (5) and (8); (f); (g); and
        This order relates to individuals rather than small business
entities. Nevertheless, pursuant to the requirements of the Regulatory
Flexibility Act, 5 U.S.C. 601-612, this order will not have a
significant impact on a substantial number of small business entities.

List of Subjects in 28 CFR Part 16

        Administrative Practices and Procedures, Courts, Freedom of
Information, and Privacy.

Pursuant to the authority vested in the Attorney General by 5 U.S.C.
552a and delegated to me by Attorney General Order No. 793-78, amend 28
CFR part 16 as follows:


1. The authority for part 16 continues to read as follows:

        Authority: 5 U.S.C. 301, 551, 552a, 552b(g), and 553; 18 U.S.C.
4203(a)(1); 28 U.S.C. 509, 510, 534; 31 U.S.C. 3717, and 9701.

2. Section 16. 74 is revised to read as follows:

Sec. 16.74 Exemption of National Security Division Systems — limited

        (a) The following system of records is exempted from subsections
(c)(3) and (4); (d); (e)(1), (2), (3), (4)(G),(H) and (I), (5) and (8);
(f); (g); and (h) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2),
(k)(1), (2) and (5): Foreign Intelligence and Counterintelligence
Records System (JUSTICE/NSD-001). These exemptions apply only to the
extent that information in the system is subject to exemption pursuant
to 5 U.S.C. 552a(j)(2), (k)(1), (2), and (5).
        (b) Exemptions from the particular subsections are justified for
the following reasons:
        (1) Subsection (c)(3). To provide the target of a surveillance or
collection activity with the disclosure accounting records concerning
him or her would hinder authorized United States intelligence
activities by informing that individual of the existence, nature, or
scope of information that is properly classified pursuant to Executive
Order 12958, as amended, and thereby cause damage to the national
        (2) Subsection (c)(4). This subsection is inapplicable to the
extent that an

[[Page 44383]]

exemption is being claimed for subsection (d).
        (3) Subsection (d)(1). Disclosure of foreign intelligence and
counterintelligence information would interfere with collection
activities, reveal the identity of confidential sources, and cause
damage to the national security of the United States. To ensure
unhampered and effective collection and analysis of foreign
intelligence and counterintelligence information, disclosure must be
        (4) Subsection (d)(2). Amendment of the records would interfere
with ongoing intelligence activities thereby causing damage to the
national security.
        (5) Subsections (d)(3) and (4). These subsections are inapplicable
to the extent exemption is claimed from (d)(1) and (2).
        (6) Subsection (e)(1). It is often impossible to determine in
advance if intelligence records contained in this system are relevant
and necessary, but, in the interests of national security, it is
necessary to retain this information to aid in establishing patterns of
activity and provide intelligence leads.
        (7) Subsection (e)(2). Although this office does not conduct
investigations, the collection efforts of agencies that supply
information to this office would be thwarted if the agencies were
required to collect information with the subject's knowledge.
        (8) Subsection (e)(3). To inform individuals as required by this
subsection could reveal the existence of collection activity and
compromise national security. For example, a target could, once made
aware that collection activity exists, alter his or her manner of
engaging in intelligence or terrorist activities in order to avoid
        (9) Subsections (e)(4)(G), (H) and (I), and (f). These subsections
are inapplicable to the extent that this system is exempt from the
access provisions of subsection (d).
        (10) Subsection (e)(5). It is often impossible to determine in
advance if intelligence records contained in this system are accurate,
relevant, timely and complete, but, in the interests of national
security, it is necessary to retain this information to aid in
establishing patterns of activity and providing intelligence leads.
        (11) Subsection (e)(8). Serving notice could give persons
sufficient warning to evade intelligence collection and anti-terrorism
        (12) Subsections (g) and (h). These subsections are inapplicable to
the extent that this system is exempt from other specific subsections
of the Privacy Act.

        Dated: July 27, 2007.
Lee J. Lofthus,
Assistant Attorney General for Administration.
  [FR Doc. E7-15455 Filed 8-7-07; 8:45 am]



Submission + - LG Phillips patents oil and water based display

jordanhh writes: Tech.co.uk reports that LG Phillips has filed a patent for a new type of thin, flexible display."The pixels are made from tiny plastic cells filled with minute amounts of oil and water. The oil floats on the surface of the water and shrouds the coloured surface underneath it. When electricity is applied across the cell, the oil moves aside, changing the colour of the pixel."

Submission + - Converting from XP to Ubuntu (ittoolbox.com) 1

madgreek writes: "Here is a short story about my switch to Ubuntu from XP at work. I have been Microsoft free for 3 months now at a Microsoft heavy shop. Few people know I am using Open Office and Linux. I create countless documents that people open using Word, Excel, PPT and nobody can tell that they were created using Open Office. http://blogs.ittoolbox.com/eai/madgreek/archives/o pen-source-and-microsoft-free-17339"

Submission + - U Delaware breaks solar power efficiency record (renewableenergyaccess.com) 1

mdsolar writes: "Renewable Energy Access is reporting that a consortium led by researchers at the University of Delaware has achieved 42.8% efficiency with a silicon solar cell. The method uses lower concentration (factor of 20 magnification) than the previous record holder Boeing-Spectrolab made cell (40.7% efficiency) so that it may have a broader range of applications since tolerances for pointing the device will be larger. They are now partnering with DuPont to build engineering and manufacturing prototypes under DARPA's Very High Efficiency Solar Cell program which supports work towards achieving 50% efficiency. It is expected that these cells can help improve the military battery logistics pipeline, providing "soldiers with more power at reduced weight." They expect to be in production in 2010. On a roof, such cells would require less than half the surface area to produce the same amount of power as today's standard solar panels. This might leave room for panels to power plugin hybrids for cases where roof area is too limited to do this with standard panels."

Slashdot Top Deals

Too much of everything is just enough. -- Bob Wier