Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Apple says booting OS X makes an unauthorized copy 9

recoiledsnake writes: Groklaw has an extensive look at the latest developments in the Psystar vs. Apple story. There's a nice picture illustrating the accusation by Apple that Psystar makes three unauthorized copies of OS X. The most interesting however, is the last copy. From Apple's brief: "Finally, every time Psystar turns on any of the Psystar computers running Mac OS X, which it does before shipping each computer, Psystar necessarily makes a separate modified copy of Mac OS X in Random Access Memory, or RAM. This is the third unlawful copy." Psystar's response: "Copying a computer program into RAM as a result of installing and running that program is precisely the copying that Section 117 provides does not constitute copyright infringement for an owner of a computer program. As the Ninth Circuit explained, permitting copies like this was Section 117’s purpose." Is Apple seriously arguing that installing a third party program and booting OS X results in copyright infringement due to making a derivative work and an unauthorized copy?
Security

Fixes Released (and More Promised) For "Clickjacking" Exploits 70

An anonymous reader writes "As discussed previously on Slashdot, concern has been raised over a class of 'clickjacking' vulnerabilities which affect all major Web browsers. These exploits allow an attacker to place invisible or seemingly legit objects on a Web page that perform undesired actions when a user clicks on them. In recent developments, 'Guya' posted a scary proof-of-concept that hijacks Adobe Flash Player to spy on users with a webcam and/or microphone. In response, Adobe released an advisory with a temporary workaround, and stated that a future Player update will address the exploit. This prompted the original disclosers of the vulnerabilities to post a summary of the exploits. Additionally, Giorgio Maone, creator of the popular NoScript extension for Firefox and other Gecko-based browsers, released version 1.8.2.1 of NoScript, which adds 'ClearClick,' a feature that intercepts clicks made on invisible or otherwise obscured elements on a page. Although issues remain, there seems to be progress in addressing these security problems."
Data Storage

Tips For Taking Your Laptop Into and Out of the US? 940

casualsax3 writes "I'm going to be taking a week long round trip from NYC to Puerto Vallarta Mexico sometime next month, and I was planning on taking my laptop with me. I'll probably want to rip a few movies and albums to the drive in order to keep busy on the flight. More important though, is that I'm also going to be taking pictures while I'm there, and storing them on the laptop. With everything in the news, I'm concerned that I'll have to show someone around the internals of my laptop coming back into the US. The pictures are potentially what upsets me the most, as I feel it's an incredible violation of my privacy. Do I actually need to worry about this? If so, should I go about hiding everything? I've heard good things about Truecrypt. Is it worth looking into or am I being overly paranoid?"
It's funny.  Laugh.

Student Given Detention For Using Firefox [UPDATED] 818

An anonymous reader writes "Several sites are reporting that a student has been given detention for using Firefox to do his classwork. No, really. The student was in class, working on an assignment that necessitated using a browser. The teacher instructed him to stop using Firefox and to do his classwork, to which the student responded that he was doing his classwork using a 'better' browser (it is unclear whether the computer was the student's own computer or not). The clueless teacher (who called the rogue program 'Firefox.exe') ordered him to detention." Update: 12/17 20:09 by SM One of the school officials was nice enough to contact us and let us know this is a hoax. If you are planning on calling the school please refrain from doing so, I'm sure they have had enough excitement for one day.
Security

Multiple FLAC Vulnerabilities Affect Every OS 360

Enon writes "eEye Digital Security has discovered 14 vulnerabilities in the FLAC file format that affect a huge range of media players on every supported operating system (Windows, Mac OS, Linux, Unix, BSD, Solaris, and even some hardware players are vulnerable). Heise points out a number of vulnerable apps that use the open source libavcodec audio codec library, which in turn relies on the flawed libFLAC library. These vulnerabilities could allow a person of ill will to trojanize FLAC files that could compromise your computer if they are played on a vulnerable media player. eEye worked with US-CERT to notify vulnerable vendors."
Music

Microsoft's Plan to Be King of All Media 131

An anonymous reader writes "Saul Hansell from the New York Times spoke with Microsoft's J. Allard, formerly of the Xbox games division and now in charge of their push on Apple's captive audience with the Zune. Allard lays out Microsoft's media battle plan, highlighting their longterm goals for expanding beyond games and software. 'This service will at some point add more options for video and mobile phones, Mr. Allard said, without offering details. Actually, Microsoft has been quite successful selling video downloads and online movie rentals through the Xbox Live service already. This seems a bit too much like the initial plan for MSN. This new network would be the switchboard through which all entertainment content and communication flows. Pretty much everything else in the technology world now is revolving around open systems where the Internet, and some simple standards, are in the middle.'"
Biotech

Chefs As Chemists 266

circletimessquare writes "Using ingredients usually relegated to the lower half of the list of ingredients on a Twinkies wrapper, some professional chefs are turning themselves into magicians with food. Ferran Adrià in Spain and Heston Blumenthal in England have been doing this for years, but the New York Times updates us on the ongoing experiments at WD-50 in New York City. Xanthan Gum, agar-agar, and other hydrocolloids are being used to bring strange effects to your food. Think butter that doesn't melt in the oven, foie gras you can tie into knots, and fried mayonnaise."
Programming

Thinking about Rails? Think Again 482

wolfeon writes "In 2005, Derek Sivers of CD Baby wanted to scrap his site and perform a rewrite in Rails. He hired Jeremy Kemper, also known as bitsweat on Freenode, to help on the project. Two years later, through blood and sweat, the project was then canceled because of limitations of Rails. Rails just wasn't meant to do everything since it is very much "canned" project. Mr. Sivers has written an entry in the O'Reilly blog: 7 reasons I switched back to PHP."

Science vs. Homeopathy 686

Mr. E writes "Ars Technica has an interesting look at pseudoscience as it applies to homeopathy. While most discussions about what science is get derailed by the larger controversies surrounding them, Ars chose a relatively uncontroversial pseudo-science to examine so that they could examine the factors which make homeopathy a psuedo-science: ignoring settled issues in science, misapplication of real science, rejection of scientific standards, claims of suppression, large gaps between the conclusion and evidence, and a focus only on the fringes of what we currently understand."
Privacy

FBI's Unknown Eavesdropping Network 362

An anonymous reader writes "Building off the design mandates of CALEA, the FBI has constructed a 'point-and-click surveillance system' that creates instant wiretaps on almost any communications device. A thousand pages of restricted documents released under the Freedom of Information Act were required to determine the veracity of this clandestine project, Wired News reports. Called the Digital Collection System Network, it connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is intricately woven into the nation's telecom infrastructure. From the article: 'FBI wiretapping rooms in field offices and undercover locations around the country are connected through a private, encrypted backbone that is separated from the internet. Sprint runs it on the government's behalf. The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone's location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.'"

Looking Beyond Vista To Fiji and Vienna 600

Vinit wrote in with an article that describes Microsoft's strategy for future versions of Windows. It begins: "As we all know that Microsoft Vista was originally scheduled to be released in 2003, after two years of Windows XP, but it got delayed by over five years due to various reasons. Definitely, Vista is very very improved OS over the previous versions, but the delayed in the launch has cost Microsoft, billions of dollars. Now the question at the moment is, what exactly after Vista? Microsoft can't afford to wait another five years for an operating system. People are becoming more aware of the choices they have, and Linux is no longer a hobbyist OS, and that day isn't far away when it becomes simple enough to be a viable alternative to Windows. The competition is fierce. That is why, to stay at the top, Microsoft has planned a 'Vista R2', codenamed 'Fiji' which will be released some time in 2008. And after Fiji, there will be Windows 'Vienna'. Windows Fiji, will not be a totally different OS from Vista; but it will be an add-on. Whereas Vienna will be totally different from Vista."

Slashdot Top Deals

Long computations which yield zero are probably all for naught.

Working...