Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:It is all software, really (Score 2) 509

If it starts out not requiring any internet connection, and you never update it, it won't get any more restrictive.

If I recall, there have been PS3 games that required an update to function, and contained that update on disc. So you could reach a point where you can't play any new games without updating.

No one would force you to install those updates, so technically you're right. But I would consider it just as system killing as forcing an update over the Net.

Comment Re:Hmm... I have a question. (Score 1) 177

I think you missed a video.

There are two on the site and you seem to only be referring to the second one.


Last year Lockheed Martin carried out a similar test, but in that case the missile that got destroyed was tethered and moved along a predetermined path. Clearly progress has been made and ADAM can now track a freely moving target.

Check out the second video that appears to be shooting down an untethered missile and is implied to not be following a predetermined path:

Submission + - An open handheld terminal for retail stores?

Evil Al writes: From the ubiquitous Verifone card card terminals to the fancy Apple Store terminals, point-of-sale devices are everywhere. But does anyone know of an *open* terminal (with printer + Wi-Fi), preferably running Linux, that we can use to run a custom application for retail, made by a reputable manufacturer?

Submission + - Anonymous Releases 90,000 Military E-Mail Accounts (

jjp9999 writes: Anonymous Operations posted 90,000 military email addresses and passwords to Pirate Bay on July 11, in what they're calling "Military Meltdown Monday." They obtained the emails while hacking government contracting and consulting firm Booz Allen Hamilton. They hinted at other information obtained during the breach, which they describe as "maps and keys for various other treasure chests buried on the islands of government agencies, federal contractors and shady whitehat companies." The breach comes just days after Anonymous hacked government contractor IRC Federal. Both breaches are linked to the new AntiSec movement, which LulzSec joined forces with shortly before disbanding.

Submission + - Groupon Changes TOS, Now Wants Your Location Data (

jfruhlinger writes: "This past weekend (in the wee hours of Sunday morning, in my case) Groupon sent out an email to its subscribers announcing an update to its terms of service. Dan Tynan takes a look at the new terms, and, to nobody's surprise, finds that subscribers just lost some privacy. The company is rolling out new apps and location-based services — and users' location information is now going to be stored and sold."

Comment Re:There's no right to be anonymous. (Score 1) 172

Actually we do have a right to anonymity.

Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.

-McIntyre v. Ohio Elections Commission (1995)


Submission + - Graphing Internet Interaction to spot Spammers (

Gunkerty Jeb writes: Spammers, it turns out, aren't like everyone else: they have fewer friends. That, according to new research by Microsoft scientists who have developed a new method of distinguishing attacker-created spam email accounts from legitimate ones. The new finding, from researchers Yinglian Xie and Fang Yu of Microsoft is described as Social Graphs for Online Service Security. The two are using studies of legitimate and malicious social networks to spot bogus email accounts that are used to push spam, malware, and otherwise malicious links.

The researchers are analyzing natural social connections between users on the Web that are difficult for attackers or botnets to replicate. Spotting a spammer isn't hard, they say, when you look at his or her patterns of communication.


Submission + - The Dark Side of Google Chrome (

An anonymous reader writes: There is no browser war. It's a platform war that apparently has already been won as far as HTML5 browsers are concerned. There is an interesting analysis that highlights some of the downsides of Google Chrome surpassing Firefox and becoming the dominant HTML5 browser, including Google's main interest to use Chrome as a tool to lock-in Adsense viewers. The motivation could almost be considered to be sneaky and possibly evil, even if Chrome appears to be generally considered as the fastest progressing browser.

Slashdot Top Deals

But it does move! -- Galileo Galilei