Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
China

China Using 'State Secrets' Label To Hide Pollution 149

eldavojohn writes "More problems have surfaced as people attempt to bring soil pollution problems to light in China. From the article: 'When Pan sued the Hebei Department of Environmental Protection in 2011, he was given access to the environmental impact assessment that the environment ministry claimed it had done in the village. Pan discovered that the assessment, carried out by the Chinese Academy of Meteorological Sciences, had names of people who had left the village two decades previously and even a person who had been dead for two years — all "expressing favor" for the project. Pan surveyed 100 people in his village, showing them the purported environmental impact study. The majority of them gave him written statements that declared: "I've never seen this form," according to documents seen by Reuters.' Reuters has also discovered that China uses 'state secrets' labels to hide environmental studies and pollution numbers as well as using strong arm tactics to silence residents attempting to do their own studies."
Education

Publisher of Free Textbooks Says It Will Now Charge For Them, Instead 156

An anonymous reader writes "In a surprising blow to the movement to create free textbooks online, an upstart company called Flat World Knowledge is dumping its freemium model. The upstart publisher had made its textbooks free online and charged for print versions or related study guides, but company officials now say that isn't bringing in enough money to work long-term."
Security

Real-Time Cyber-Attack Map 36

First time accepted submitter anavictoriasaavedra writes "In October, two German computer security researchers created a map that allows you to see a picture of online cyber-attacks as they happen. The map isn't out of a techno-thriller, tracking the location of some hacker in a basement trying to steal government secrets. Instead, it's built around a worldwide project designed to study online intruders. The data comes from honeypots. When the bots go after a honeypot, however, they're really hacking into a virtual machine inside a secure computer. The attack is broadcast on the map—and the researchers behind the project have a picture of how a virus works that they can use to prevent similar attacks or prepare new defenses."

Comment Re:P2P (Score 0) 317

Doesn't the current model work because what is actually happening is more along the lines of:

Client: I need this file ...
Server: Okay. Here is a copy of the first part...
Client: Okay. I am making a copy of your first part that will then disappear into cyber space.
Client: Ok. Copied it. I need the nth part.
Server: Ok. Here is a copy of the nth part.
etc, etc, etc...

So the actual copying is still being done by the client. Is this wrong?

Slashdot Top Deals

If you didn't have to work so hard, you'd have more time to be depressed.

Working...