Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Courts

Submission + - U.of Oregon Says No to RIAA; ID no good

NewYorkCountryLawyer writes: "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities, in what is believed to be the first such motion made by the university itself, rather than by the students, and the first instance of a State Attorney General bringing a motion to quash an RIAA subpoena. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: "Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC.... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor. Two of the seventeen John Does accessed the content in question from single occupancy dorm rooms....No login or personally identifiable information, i.e. authentication, was used by the Does to access the university's network because none is required. The University cannot determine whether the content was accessed by the room occupant or visitor. Nine of the seventeen John Does accessed the content in question from the University's wireless network or a similar system called the "HDSL Circuit." These systems do record a user name associated with the access. For these John Does, the University can determine the identity of the individual who bas been assigned the user name, however, it is unable to determine whether the content was accessed by the individual assigned that user name or by someone else using the computer associated with the user name. In the case of sixteen of the seventeen John Does, .... it is not possible for the University to identify the alleged infringers without conducting interviews and a forensic investigation of the computers likely involved." The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena." One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is "rubbish"."
Space

Submission + - Pluto Probe Makes Discoveries at Jupiter (jhuapl.edu)

Riding with Robots writes: No, it's not an accident due to a metric-to-English-units error. In February, the New Horizons probe passed through the Jupiter system on its way to Pluto, and we saw some spectacular pictures. Now, the science teams have published detailed scientific results, along with new images and movies. an overview is now online. The probe's instruments saw clouds form from ammonia welling up from Jupiter's lower atmosphere, and heat-induced lighting strikes in the polar regions, and fresh eruptions on the volcanic moon Io. New Horizons also captured the clearest images ever of the tenuous Jovian ring system, where scientists spotted clumps of debris that may indicate a recent impact inside the rings, or some more exotic phenomenon.
The Courts

Submission + - Judge bars RIAA prez from testifying in P2P case (arstechnica.com) 3

Eskimo Joe writes: A federal judge surprised observers in the Captiol v Thomas file-sharing trial today by barring RIAA president Cary Sherman from testifying. 'After a brief recess this afternoon, plaintiffs' counsel Richard Gabriel and defendant's counsel David Toder made their cases before the judge as to the relevance of Sherman's testimony. Toder argued that Sherman's testimony was not relevant to the question at hand, the fact of whether Thomas was liable for copyright infringement. Gabriel said that Sherman would be able to tell the jury why this case was significant, and more importantly, describe the harm the RIAA believes piracy has caused to the music industry. "I don't want to turn this case into a soap box for the recording industry," Toder argued in response.' Testimony wrapped up today with closing arguments expected Thursday morning.
Security

Submission + - Hackers Cause Generator to Self-Destruct

An anonymous reader writes: It has been revealed that in a U.S. Department of Homeland Security exercise codenamed "Aurora" conducted in March of this year, researchers were able to cause a power generator to self destruct remotely via a "cyber attack" which changed the operating cycle of the generator. "Government sources said changes are being made to both computer software and physical hardware to protect power generating equipment."

Full Story

Linux Business

Submission + - Novell Linux business spikes since Microsoft deal (idg.com.au)

StonyandCher writes: "Novell's Linux business has soared 243 percent since last November when the company signed its controversial deal with Microsoft. "The affect on sales year over year, for Novell's first three quarters of our fiscal year, which ends Oct. 31 — our Linux business was up 243 percent year over year," said Justin Steinman, director of marketing at Novell, who, along with executives from both companies, spoke at a program hosted by the Massachusetts Technology Leadership Council."
Announcements

Submission + - New Zealand Police Act wiki lets you write the law 1

PhoenixOr writes: New Zealand is now on the top of my list for cool governments. They've opened a wiki allowing the populous to craft a new version of their Police Act, the legislative basis for policing in New Zealand. Stuff.co.nz has an article about it here.
Security

Submission + - Cyber Crime A Distant #3 Priority for FBI

An anonymous reader writes: A reading of the Justice Department's 2008 budget justification to Congress for the FBI indicates the agency is dedicating about 5.5 percent of its field agents to combating cyber crime, the FBI's stated Number Three priority, The Washington Post reports. Take away the agents dedicated to catching child predators online — a program that accounts for the vast majority of the department's prosecutorial victories — and about 3.6 percent of the FBI's agents are dedicated to cyber crime, the report notes. From the story: "If the FBI's third most-important priority claims just over 3.5 percent of its active agents, how many agents and FBI resources are dedicated to the remaining Top Ten priorities?
Encryption

Submission + - Australia cracked US combat aircraft codes (news.com.au)

SpamSlapper writes: FORMER defence minister Kim Beazley has told how Australia cracked top-secret American combat aircraft codes to enable the shooting down of enemy aircraft in the 1980s. The radar on Australia's Hornets could not identify most potentially hostile aircraft in the region, but dispite many requests, the codes were not provided, so "In the end we spied on them and we extracted the codes ourselves". The Americans knew what the Australians were doing and were intrigued by the progress they made.
United States

Submission + - Habeas Corpus is GONE (senate.gov) 2

Khyber writes: "In a vote of 56 yeas to 43 nays, with one abstaining, the Cloture Motion to restore Habeas Corpus has been halted, with a 3/5 majority vote unable to be attained. Article 6 states their oath to uphold the constitution, Article 4 states that habeas corpus shall not be suspended unless in cases of rebellion and invasion when the public safety may require it. It's becoming a very dark age, indeed."
Censorship

Submission + - MediaDefender and the Streisand Effect (arstechnica.com)

Foldarn writes: It looks like MediaDefender, in an effort to quell the explosion of negative publicity, has instead done the opposite (also known as the Streisand Effect) and made it even more widespread. The folks over at Ars Technica have an article about a few popular BitTorrent sites MegaNova and IsoHunt that are being demanded to remove the ever incriminating emails. What's more, Ars is reporting that it appears that MediaDefender, in response to IsoHunt's decline to remove, may be behind a massive denial of service attack against IsoHunt.
Security

Submission + - Which Lost/Stolen Laptop Trackers Do You Like? 2

saudadelinux writes: "I got held up at gunpoint in July, and my laptop was stolen. Fortunately, I was able to get a new one, and I'm typing this post on it.
There companies out which for a fee, install tracker software on your laptop. If it's stolen or lost, they track its whereabouts whenever it gets on the 'Net and work with local law enforcement and ISPs to find the machine. I'm wondering: does anyone use one of those services? Does anyone have a recommendation for which company to go with? I'm using a dual-boot Ubuntu/XP machine, and the couple of companies I've looked at do Windows-only. Are there Linux options? TIA, saudadelinux"
Music

Submission + - Trent Reznor Says "Steal My Music" (youtube.com)

THX-1138 writes: A few months ago, Trent Reznor (frontman of the band Nine Inch Nails), was in Australia doing an interview when he commented on the outrageous prices of CDs there. Apparently now his label, Universal Media Group is angry at him for having said that. During a concert last night , he told this to fans, "...Has anyone seen the price come down? Okay, well, you know what that means — STEAL IT. Steal away. Steal and steal and steal some more and give it to all your friends and keep on stealin'. Because one way or another these mother**** will get it through their head that they're ripping people off and that that's not right."

The YouTube link contains a video recorded by a fan that shows his full speech during the concert.

Security

Submission + - Ophcrack, don't even think your password is secure (codinghorror.com)

javipas writes: "An insightful article at Jeff Atwood's Coding Horror reveals the power inside Ophcrack, an Open Source program that is capable of discover virtually any password in Windows operating systems. The article explains how passwords get stored on Windows using hash functions, and how Ophcrack is capable of generate inmense tables of words and letter combinations that are compared to the password we want to obtain. The program is available in Windows, Mac OS and Linux, but be careful: the generated tables that Ophcrack uses are really big, and you should need up to 15 Gbytes to store these tables."
Space

Submission + - The Next Fifty Years in Space (associatedcontent.com)

MarkWhittington writes: "2007 marks the fiftieth anniversary of the Space Age, agreed by most to have begun with the launch of the first artificial Earth satellite, Sputnik, on October 4th, 1957. While some are taking stock of the last fifty years of space exploration, noting what has been accomplished and, more importantly, what has not been accomplished, others are wondering what the next fifty years might bring. And therein lays the problem."
The Internet

Submission + - How much are ad servers slowing down the internet? 2

vipermac writes: Most the times I have a problem with a web page loading slow (or freezing temporarily), I look down at the status bar and see that it is waiting on an ad server, google analytics, or the like. It seems to me on popular web sites the bottle neck is overwhelmingly on the ad servers now and not on the servers of the main web site itself. In my opinion it seems we need a better model for serving ads or else these services need to add more servers/bandwidth. Are there any studies on the delay that 3rd party ad servers are creating, or any new models that are being introduced to serve ads?

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...