Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:I just don't even open the door (Score 1) 307

Given that it doesn't appear you've actually read my replies, I think we'll leave your foolishness to the judgment of others.

All I was debating was the issue of physical raids, which you brought up. Nothing else. I was not in any way defending overall BSA tactics.

You argued the raid point and whiffed mightily, so changing the debate to a topic about which I made no reference to in my prior comments is a waste of time.

Comment Re:I just don't even open the door (Score 1) 307

Right, but the difference between you and me is apparently that I actually read the articles.

The fox news story you cite is about a guy who received a *letter* from the BSA informing him that he was not properly licensing his software. He later admits he had shoddy book and record keeping.

No one showed up at his door, no one demanded to be let inside, and no one got anywhere near his property or computers.

I'm not saying the BSA's tactics with respect to settlement payments are to be applauded, but sending a legal notice to a company that has not licensed software correctly (or properly accounted for it), is far, far outside the definition of a "raid."

Comment Re:I just don't even open the door (Score 0) 307

So I stopped after the first page, but none of those had anything to do with the OP or the subject at hand. The BSA "raids" were for counterfeiting operations, not companies that were under-licensed or inappropriately licensed.

Raiding a seedy shop in Thailand that's pressing tens of thousands of bootlegged install discs for Windows and Office 2007 is not the same as sending a letter to a business asking that they account for their 20-seat installation license.

I work for a mid-size business and we were audited by Adobe last year. We basically had to send them a list of all the apps we had installed, reconciled as best we could with license keys. That was it.

Now, if someone's dumbass IT department is using the same single-license retail key to install hundreds of copies of Office on the company's computers, then yeah, you're going to get some serious legal action. But nobody kicks down doors.

Comment Re:I just don't even open the door (Score 1) 307

Eh? How do things work there down under?

Software audits don't entail some government henchman knocking on your door at random and demanding to see what's inside. Audits in the U.S. are usually for companies licensing large volumes of software for multiple users. The agreements they enter into allow the software maker (Micosoft, Adobe, etc.) to ask for and recieve an accounting of installed copies of software to make sure you're paying for what you are using or are otherwise properly licensed.

They don't just show up and kick down your door.

Kudos to you for going the free software route, but most software audits are not the jackbooted RIAA/MPAA criminal issues of pirating -- the companies licensing legit software know what they're getting into when they sign the deals, and some can expect to at some point to have the auditing clause invoked.

Submission + - Texas Instruments Signing Keys Broken (

emcron writes: "Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short: 512-bits. Earlier this month, a collaborative effort factored the moduli and published the private keys. Texas Instruments responded by threatening websites that published the keys with the DMCA, but it's too late. (via Schneier)."
The Internet

Submission + - Comcast Starts Typosquatting Domain Names

emcron writes: Calling it a service to "help high-speed Internet customers get where they want to go," Comcast has announced that it will be redirecting mistyped domain names to its own sites. Comcast says its redirected landing pages for non-existent domains will have search services provided by Yahoo. Hoping to avoid lawsuits similar to those filed against other ISPs who've implemented DNS typo redirecting, Comcast says it will provide users a way to opt-out of the service on the new landing pages.

Submission + - Comcast DNS redirection launched in trial markets (

Anonymous Coward writes: "Comcast has finally launched its DNS Redirector service in trial markets (Arizona, Colorado, New Mexico, Oregon, Texas, Utah, and Washington state), and has submit a working draft of the technology to the IETF for review.

Comcast customers can opt-out from the service by providing their account username and cable modem MAC address. Customers in trial areas using "old" Comcast DNS servers, or non-Comcast DNS servers, should not be affected by this.

This deployment comes after many previous ISPs, like DSLExtreme, were forced to pull the plug on such efforts as a result of customer disapproval/retaliation. Some may remember when VeriSign tried this back in 2003, where it also failed."


Submission + - Report slams FCC for leaks to companies (

An anonymous reader writes: The Federal Communications Commission leaks confidential information to some companies and trade groups with business before the agency while leaving consumer advocates and the public in the dark, congressional investigators have found. The Government Accountability Office said the agency tips off some people about what items are about to be voted on, which gives them an unfair lobbying advantage. "This imbalance of information is not the intended result of the Communications Act and it runs contrary to the principles of transparency and equal opportunity for participation established by law and to FCC's own rules that govern rulemaking," the report said.

Submission + - CastleCops DDoS Attacker Indicted (

An anonymous reader writes: became the target of a DDoS last February, which peaked at 969 Mbps. US Attorney Office allege Greg King, 21, of Fairfield California is responsible for the attack on CastleCops in the 12 page indictment. King is facing 4 counts of "Transmission of code to cause damage to a protected computer" he faces a maximum sentence of ten years imprisonment and a $250,000 fine.

Submission + - VBootkit Bypasses Vista's Code Signing Mechanisms

An anonymous reader writes: At the Black Hat Conference in Amsterdam, security experts from India demonstrated a special boot loader that gets around Vista's code signing mechanisms. Indian security experts Nitin and Vipin Kumar of NV labs have developed a program called the VBootkit that launches from a CD and boots Vista, making "on the fly" changes in memory and in files being read. In a demonstration, the "boot kit" managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista, even without a Microsoft signature. Bruce Schneier reminds us that this is not theoretical; VBootkit is actual code that demonstrates the exploit.

Comment Re:Shh! Don't spoil the secret! (Score 5, Insightful) 372

Um, no. If you're on a public street, it's fair game. What you're thinking of only applies to using someone's likeness or celebrity without consent to imply that a specific person is endorsing a product. You don't think that every local news station in the US has to compensate people milling about in the background of their news video, do you? If you're on public property you can take whatever pictures you want and commercialize them in nearly any fashion.

Slashdot Top Deals

"Our vision is to speed up time, eventually eliminating it." -- Alex Schure