Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Freedom of the press? (Score 1) 528

If indymedia did offer to co-operate with the police, or the police didn't seek thier co-operation first before getting a warrant then this was heavy handed and the police are in the wrong. If the reverse is the case and indymedia just refused to help the police then the police have done exactly what they are supposed to do. Get a warrant!

Indymedia couldn't cooperate with the police, as
1) They don't keep IP logs
2) this machine was a mirror
3) The police knew this.

Its not illegal to NOT keep IP logs ( yet ), but it does seem not doing so means your server can be pulled at anytime.

Comment Re:Freedom of the press? (Score 5, Informative) 528

If you read the article you'd have seen that the personal details were removed by an Indymedia moderator as soon as they were aware of them.

Indymedia UK privacy policy does not condone publishing personal details


Indymedias policy of not logging IP addresses is well known to the Police.

Its difficult to see what reason they could have for pulling this machine, other than low level harrasssment.


Submission + - UK Goverment to outsource data snooping (guardian.co.uk)

bone_idol writes: The Guardian is reporting that The private sector will be asked to manage and run a communications database that will keep track of everyone's calls, emails, texts and internet use under a key option contained in a consultation paper to be published next month by Jacqui Smith, the home secretary. Also covered on the BBC

Submission + - Google tells users to drop IE6 (tgdaily.com)

Kelly writes: "Google is now urging Gmail users to drop Internet Explorer 6 (IE6) in favor of Firefox or Chrome. Google recently removed Firefox from the Google Pack bundle, replaced it with Chrome, then added a direct download link for Chrome on Google and YouTube. Google's decision to list IE6 as an unsupported Gmail browser does not affect just consumers: Tens of thousands of small- and mid-sized businesses that run Google Apps hosted services may dump IE6 as well. What's especially interesting is the fact that Mozilla is picking up two out of three browser users that Microsoft surrenders."

Submission + - Future of Compiz Uncertain 1

dov_0 writes: "Kristian Lyngstol from the Compiz project has shared some pretty big worries about the health of the Compiz/compiz-fusion project. He cites a lack of direction, organisation and a dropping number of programmers as major areas of concern. Responses from the compiz community to his mailing list post have not been overwhelming, with only one person posting in his support so far.

If Compiz was gone, surely someone else would pick up the pieces? Distros like Ubuntu have made it a notable feature of their desktop setup. Haven't we all enjoyed the glazed over eyes and admiring stares of onlookers as we spin our desktop cubes and pull out bling that makes Vista desktop effects fade by comparison?

Is the compiz project already dead without knowing it and who will pick up pieces and keep our desktop cubes spinning?"

Comment Re:Obfuscation 101 (Score 5, Informative) 101

Best Use of Light and Spheres:

        Anders Gavare
        Gibraltargatan 82-156
        SE-412 79 Gothenburg


Judges' Comments:

        To build:

        make gavare

        To run: ./gavare > ioccc_ray.ppm

        For users of systems that distinguish between text and binary mode
        (you know who you are), add a library call that specifies binary mode
        for stdout as the first statement of main(),
        or use freopen("ioccc_ray.ppm", "wb", stdout) and do not use redirection.

        A freely distributable command-line version of Microsoft Visual C
        exhibits an optimizer bug when compiling this entry. Disable /Og for
        best results.

        The judges were able to figure out how to control position
        (in all 3 coordinates), size, and color (to some extent) of the balls.

Selected Author's Comments:

        It is possible to write some kinds of programs in C without using reserved
        words. For very short and trivial programs, it usually isn't very hard to
        write a variant using no reserved words, but with this program I want to
        show that also non-trivial programs can be written this way. This IOCCC
        entry contains no reserved words (I don't count 'main' as a reserved word,
        although the compiler gives it special meaning) and no preprocessor

        The program is a small ray-tracer. The first line of the source code may
        be modified if you want the resulting image to be of some other resolution
        than the predefined. The 'A' value is an anti-alias factor. Setting it to
        1 disables the anti-aliasing feature (this makes the output look bad), but
        setting it too high makes the trace take a lot more time to complete.

        The ppm image can then be viewed using an image viewer of your own choice.
        (Running the ray-tracer may take several minutes, even on fast machines,
        so be patient.)

        I am very much aware about the fact that I'm breaking the guidelines. For
        example, the word 'int' is a reserved word and therefore all variable
        declarations are implicit. There will no doubt be _lots_ of warnings,
        no matter which compiler is used. Still, the source code should be word-
        length-independent and endianess-independent.

        Another reason for writing code without using reserved words is that many
        text editors will make all reserved words turn BOLD when printed on
        paper. Since I care for the global environment, we shouldn't waste any
        more laser toner, or ink, than necessary. Everyone should write C code
        with no reserved words, and our world will be a better place.


Submission + - What to do about suspected network attack

An anonymous reader writes: I help volunteer manage a community open access wireless network covering an innercity area of the United Kingdom.

As well as providing open access internet access via wireless, the network is used to provide internet access to some residential and business properties, where computers connect more conventionally with cat 5 cable

We transparently proxy with squid outgoing http traffic, and recently noticed a number of 'hacking' tools being downloaded to an ip address at a local business / housing coop. Out of interest I ssh'd into the local router at that site, and ran tcpdump on that segment. The pc that had downloaded the tools was spoofing the arp replies of another PC on the local LAN. This looked to me like an attempt to capture data destined to another user there.

What should I do ? I don't manage or have any direct influence on IT at the business where this happened, but I could contact someone who lives there and pass the information on, or I could just ignore it, after all its not really my business, and the traffic does not impact on the wider wireless network.

Slashdot Top Deals

If you can't get your work done in the first 24 hours, work nights.