Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Internet

Submission + - The Pirate Bay About To Relaunch Suprnova.org 3

kungfujesus writes: The Pirate Bay crew has been working on this secret project for quite some time now. Back in April they wrote a cryptic post on their blog announcing that something was coming. In a response to this announcement TPB admin Brokep told TorrentFreak: "The past, the present and the future. It's all the same, but one thing's for sure, we will radiate for weeks", today it became clear that he was referring to the resurrection of Suprnova. Article Here
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.
It's funny.  Laugh.

OS X Vs. Vista — In Spandex 302

An anonymous reader writes "CNET UK compares Vista Vs. Apple OS X in a Romeo and Juliet, spandex-wearing, Shakespearean English style. Two guys dress up as their favorite operating system and fight with swords, guns, and fists, while a third guy, dressed as a woman, awaits the winner. 'Usability - Act 3, Scene 2: Swords clash, sparks fly and men grunt, but the showdown ends in stalemate ... [Vista] has a far better user interface than XP -- the file and application search facility is vastly improved and the cascading Start menu has been banished, but it only takes a few moments of use to discover pointless idiosyncrasies. Microsoft constantly reminds us of how great Flip 3D is, but this feature doesn't help us find the right application window much faster than Alt-Tab did. It's very time consuming when you have many application windows to flip through, and it's in no way as efficient as OS X's Exposé feature ... We're calling this one a draw. They're just as good as each other, and in some cases just as bad -- a pox upon both your houses! Score: Mac OS X - 2, Windows Vista - 2'"
Caldera

Novell Bombards SCO with Summary Judgment Motions 98

rm69990 writes "Novell has filed 4 motions for Summary Judgment against SCO, which essentially ask the court to toss the remainder of SCO's case that isn't already being arbitrated between SUSE and SCO. One seeks a ruling from the court that Novell transfered none of the copyrights in Unix to SCO, which is backed up by many exhibits and declarations from people who negotiated the deal. Another, along the same lines, asks the court to toss the portions of SCO's Unfair Competition and Breach of Contract claims pertaining to the Unix copyrights. The third asks the court to rule that Novell did not violate the Technology License Agreement between SCO and Novell, and last and also least, the fourth seeks to toss the Slander of Title for the additional reason that SCO has failed to prove any special damages. These motions follow 2 motions for summary judgment filed by Novell late last year on 2 of their counterclaims."
Hardware Hacking

Submission + - Your GPS may be too trusting

mi writes: "Many GPS devices today will try to scan the FM bands for traffic advisories in the area to display on their screens. The signals, however, are neither authenticated nor encrypted, and one can — with commonly available electronics — construct a device to broadcast bogus advisories. Possible codes range from "bullfight ahead" to "terrorist attack"..."

Security Software Conflicts with AJAX? 84

ithyus needs help with the following: "My employer is running an e-commerce site that, until recently, our customers were quite happy to use. With increased traffic to the site we decided to implement AJAX to try to reduce the load on our database servers. In doing so, our customers have experienced all kinds of problems with security/privacy software such as Norton and McAfee. It seems that no matter what we do we can't make these programs happy. Bigger companies such as Google have documented work arounds for some of them, but we wouldn't be able to keep our docs current with all the software that's presently out there. I'd really like to know how Slashdot's readers have handled these issues. Since security programs don't appear to be compatible with the emerging features of the Internet, do you simply suggest that the customer disable the offending software or do you opt to offer some support for the more popular ones? Are those really the only two options? How do you justify your method?"

Slashdot Top Deals

"Call immediately. Time is running out. We both need to do something monstrous before we die." -- Message from Ralph Steadman to Hunter Thompson

Working...