Forgot your password?
typodupeerror
Google

Oracle Claims Google 'Directly Copied' Our Java Code 675

itwbennett writes "On Wednesday, Oracle amended the lawsuit it filed against Google in August, saying that 'approximately one third of Android's Application Programmer Interface (API) packages' are 'derivative of Oracle's copyrighted Java API packages' and related documents. In particular, 'the infringed elements of Oracle America's copyrighted work include Java method and class names, definitions, organization, and parameters; the structure, organization and content of Java class libraries; and the content and organization of Java's documentation,' Oracle says. 'In at least several instances, Android computer program code also was directly copied from copyrighted Oracle America code,' Oracle alleges."
KDE

KDE 4.5 Released 302

An anonymous reader writes "KDE 4.5.0 has been released to the world. See the release announcement for details. Highlights include a Webkit browser rendering option for Konqueror, a new caching mechanism for a faster experience and a re-worked notification system. Another new feature is Perl bindings, in addition to Python, Ruby and JavaScript support. The Phonon multimedia library now integrates with PulseAudio. See this interview with KDE developer and spokesperson Sebastian Kugler on how KDE can continue to be innovative in the KDE4 age. Packages should be available for most Linux distributions in the coming days. More than 16000 bug fixes were committed since 4.4."
Security

ReCAPTCHA.net Now Vulnerable to Algorithmic Attack 251

n3ond4x writes "reCAPTCHA.net algorithms have been developed to solve the current CAPTCHA at an efficacy of 30%. The algorithms were disclosed at DEFCON 18 over the weekend and have since been made available online. Also available is a video demonstration of random reCAPTCHA.net CAPTCHAs being subjected to the algorithms." There's probably an excellent Firefox plugin to render this page's color scheme more bearable. Note: the PowerPoint presentation linked opens fine in OpenOffice, and the video speaks for itself.
Open Source

Illumos Sporks OpenSolaris 161

suraj.sun sends in this news from The Register. "If you were hoping that someone would fork the OpenSolaris operating system, you are going to have to settle for a spork. You know, half spoon and half fork. That, in essence, is what the Illumos, an alternative open source project to continue development on the core bits of OpenSolaris, is all about. ... Development on OpenSolaris has all but stopped, so Garrett D'Amore, a former Sun and Oracle software engineer who worked on Solaris for many years, decided to do something about it. ... What Illumos is doing is taking the core OpenSolaris kernel and foundation, which is called OS/Net or ON inside of the former Sun, and creating a repository and development community around that. ON includes the kernel, C libraries, shell and shell utilities, file systems, and networking functions of OpenSolaris. 'We are not a distribution in a normal sense,' says D'Amore. 'It is more of a code base.' And one that Nexenta, Belenix, and SchilliX, who do create alternative distros for OpenSolaris, can in theory base their future releases upon if they don't like what is — or isn't — coming out of OpenSolaris."
Security

Wi-Fi WPA2 Vulnerability Found 213

BobB-nw sends along news based on yet another press release in advance of the Black Hat conference: a claimed vulnerability in WPA2 Enterprise that leaves traffic open to a malicious insider. "...wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available. Malicious insiders can exploit the vulnerability, named 'Hole 196' by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network, and compromise other authorized devices using open source software, according to AirTight. 'There's nothing in the standard to upgrade to in order to patch or fix the hole,' says Kaustubh Phanse, AirTight's wireless architect who describes Hole 196 as a 'zero-day vulnerability that creates a window of opportunity' for exploitation." Wi-Fi Net News has some more detail and speculation.
Canada

Rogers Shrinks Download Limits As Netflix Arrives 281

Meshach writes "Hot on the heels of Netflix coming to Canada, Rogers (one of the biggest ISPs in Canada) has shrunk download limits. 'As of Wednesday, new customers who sign up for the Lite service will be allowed 15 gigabytes, a drop from the 25 GB limit offered to those who signed up before July 21. Meanwhile, any new Lite user who goes over the monthly limit will have to pay $4 per GB up to a maximum of $50 — a spike from the previous $2.5 per GB surcharge.' Officially, there is no connection between the two events, but it seems an odd coincidence, especially when Rogers charges customers who exceed their bandwidth allowance."
Bug

BSOD Issues On Deepwater Horizon 383

ctdownunder passes along this excerpt from a NY Times article about a rig worker's testimony concerning the April 20 accident at the Deepwater Horizon well: "The emergency alarm on the Deepwater Horizon was not fully activated on the day the oil rig caught fire and exploded, triggering the massive spill in the Gulf of Mexico, a rig worker on Friday told a government panel investigating the accident. ... On Friday, Mr. Williams added several new details about the equipment on the vessel, testifying that another Transocean official turned a critical system for removing dangerous gas from the drilling shack to 'bypass mode.' When he questioned that decision, Mr. Williams said, he was reprimanded. ... Problems existed from the beginning of drilling the well, Mr. Williams said. For months, the computer system had been locking up, producing what the crew deemed the 'blue screen of death.' 'It would just turn blue,' he said. 'You’d have no data coming through.' Replacement hardware had been ordered but not yet installed by the time of the disaster, he said." The article doesn't mention whether it was specifically a Windows BSOD, or just an error screen that happened to be blue.
Linux

The Scalability of Linus 239

Hugh Pickens writes "Katherine Noyes writes at LinuxInsider that it may be time for Linus Torvalds to share more of the responsibility for Linux that he's been shouldering. 'If Linux wants to keep up with the competition there is much work to do, more than even a man of Linus's skill [can] accomplish,' argues one user. The 'scalability of Linus' is the subject of a post by Jonathan Corbet wondering if there might there be a Linus scalability crunch point coming. 'The Linux kernel development process stands out in a number of ways; one of those is the fact that there is exactly one person who can commit code to the "official" repository,' Corbet writes. A problem with that scenario is the potential for repeats of what Corbet calls 'the famous "Linus burnout" episode of 1998' when everything stopped for a while until Linus rested a bit, came back, and started merging patches again. 'If Linus is to retain his central position in Linux kernel development, the community as a whole needs to ensure that the process scales and does not overwhelm him,' Corbet adds. But many don't agree. 'Don't be fooled that Linus has to scale — he has to work hard, but he is the team captain and doorman. He has thousands doing most of the work for him. He just has to open the door at the appropriate moment,' writes Robert Pogson, adding that Linus 'has had lots of practice and still has fire in his belly.'"
Piracy

Latest Version of ACTA Leaks 87

An anonymous reader writes "Drew Wilson of ZeroPaid points to a freshly leaked version of ACTA available on La Quadrature Du Net. While the text will need further analysis, the most recent look at the text suggests that there is no Three Strikes law, but anti-circumvention laws have a new twist to them with regard to exceptions in that 'they do not significantly impair the adequacy of legal protection [...] or the effectiveness of legal remedies for violations of those measures.' Overall, the text still hints at a global DMCA with notice-and-takedown."
Patents

Software Now Un-Patentable In New Zealand 221

A few weeks ago New Zealand Software decided to grant software patents. But now "Despite what appears to be a big-budget lobbying effort by the pro-patent fraternity, Hon Simon Power announced today that he wouldn't be modifying the proposed Patents Bill hence software will be un-patentable once the Bill passes into law. This is significant. As we've previously pointed out software patents aren't black and white, and there are certainly pros and cons. However on balance, we believe they represent a far greater risk to smaller NZ-based software providers than opportunity, and there are many cases where they have significantly stifled innovation. We believe it's near impossible for software to be developed without breaching some of the hundreds of thousands of software patents awarded around the world, hence many software companies in New Zealand, creating outstanding and innovative software, live a constant risk that their entire business will be wound up overnight due to litigious action by a patent holder. This has led to many a 'patent troll' company, primarily in the US. These are non-software companies who exist only to buy up old patents with the sole intention of suing innovative software companies for apparent breach of these patents. The effects of this have been chilling."
Caldera

Claimed Proof That UNIX Code Was Copied Into Linux 578

walterbyrd writes "SCO's ex-CEO's brother, a lawyer named Kevin McBride, has finally revealed some of the UNIX code that SCO claimed was copied into Linux. Scroll down to the comments where it reads: 'SCO submitted a very material amount of literal copying from UNIX to Linux in the SCO v. IBM case. For example, see the following excerpts from SCO's evidence submission in Dec. 2005 in the SCO v. IBM case:' There are a number of links to PDF files containing UNIX code that SCO claimed was copied into Linux (until they lost the battle by losing ownership of UNIX)." Many of the snippets I looked at are pretty generic. Others, like this one (PDF), would require an extremely liberal view of the term "copy and paste."
Firefox

Firefox 4 Beta 1 Shines On HTML5 256

snydeq writes "InfoWorld's Peter Wayner takes a first look at Firefox 4 Beta 1 and sees several noteworthy HTML5 integrations that bring Firefox 4 'that much closer to taking over everything on the desktop.' Beyond the Chrome-like UI, Firefox 4 adds several new features that 'open up new opportunities for AJAX and JavaScript programmers to add more razzle-dazzle and catch up with Adobe Flash, Adobe AIR, Microsoft Silverlight, and other plug-ins,' Wayner writes. 'Firefox 4 also adds an implementation of the Websockets API, a tool for enabling the browser and the server to pass data back and forth as needed, making it unnecessary for the browser to keep asking the server if there's anything new to report.'"
Role Playing (Games)

Dragon Age 2 Announced 183

Today BioWare announced a sequel to Dragon Age: Origins, titled Dragon Age 2. They've opened an official site for the game, which shares some vague details and concept art, and promises a trailer in mid-August. The story will apparently span an entire decade and involve a new hero, but it will be located in the same world as the original game. The site says there will be "dynamic new combat mechanics," though the same three basic classes will be available. More information should be forthcoming in this month's issue of Game Informer.
Wireless Networking

Finland To Legalize Use of Unsecured Wi-Fi 151

Apotekaren writes "The Finnish Ministry of Justice has started preparing changes to a current law that criminalizes using unsecured wireless hot spots (Google translation; Finnish original). The reasoning includes the impossibility of tracking unlawful use, the ease of securing networks, and the lack of real damage done by this activity. It is also hard for a user to know if an unsecured network is intended for public use or not. The increased ubiquity of legal, open networks in parks, airports, and other public places has also influenced this move by the Ministry of Justice."

Slashdot Top Deals

"An open mind has but one disadvantage: it collects dirt." -- a saying at RPI

Working...