Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Secret trade agreement covering 68% of world services published by WikiLeaks (

schwit1 writes: The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks on Thursday as the transparency group’s editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London.

Fifty countries around the globe have already signed on to the Trade in Service Agreement, or TISA, including the United States, Australia and the European Union. Despite vast international ties, however, details about the deal have been negotiated behind closed-doors and largely ignored by the press.

In a statement published by the group alongside the leaked draft this week, WikiLeaks said “proponents of TISA aim to further deregulate global financial services markets,” and have participated in “a significant anti-transparency manoeuvre” by working secretly on a deal that covers more than 68 percent of world trade in services, according to the Swiss National Center for Competence in Research.

Submission + - Developer Loses $50,00 Twitter Name Through Extortion

Hugh Pickens DOT Com writes: Naoki Hiroshima, creator of Cocoyon and a developer for Echofon, writes at TNW that he had a rare one-letter Twitter username, @N and had been offered as much as $50,000 for its purchase. "People have tried to steal it. Password reset instructions are a regular sight in my email inbox," writes Hiroshima. "As of today, I no longer control @N. I was extorted into giving it up." Hiroshima writes that a hacker used social engineering with paypal to get the last four digits of his credit card number over the phone then used that information to gain control of his GoDaddy account. "Most websites use email as a method of verification. If your email account is compromised, an attacker can easily reset your password on many other websites. By taking control of my domain name at GoDaddy, my attacker was able to control my email." Hiroshima received a message from his extortionist. "Your GoDaddy domains are in my possession, one fake purchase and they can be repossessed by godaddy and never seen again. I see you run quite a few nice websites so I have left those alone for now, all data on the sites has remained intact. Would you be willing to compromise? access to @N for about 5 minutes while I swap the handle in exchange for your godaddy, and help securing your data?" Hiroshima writes that it'’s hard to decide what’s more shocking, the fact that PayPal gave the attacker the last four digits of his credit card number over the phone, or that GoDaddy accepted it as verification. Hiroshima has two takeaways from his experience: Avoid custom domains for your login email address and don’t let companies such as PayPal and GoDaddy store your credit card information.

Submission + - Edward Snowden Nominated for Nobel Peace Prize

SmartAboutThings writes: Edward Snowden has a chance of getting the 2014 Nobel Peace Price, as two Norwegian members of the Parliament have nominated him – Baard Vegard Solhjell, a former environment minister and Snorre Valen. For those who don't know, the Nobel prize has been running since 1901 and is awarded annually in Oslo, Norway. So, the fact that members of the Norwegian Parliament have proposed him for the Nobel Peace Prize could improve his chance of winning. After all, if Obama got this prize, why wouldn't Snowden get it?

Submission + - Apple Could Be Building An iPad Running OS X (

redletterdave writes: Three Apple executives—marketing VP Phil Schiller, software engineering VP Craig Federighi, and software technology VP Bud Tribble—recently insisted that OS X and iOS will always be separate entities. But Apple’s executives unanimously rejected the notion of putting iOS in a Mac; nobody downplayed or even mentioned the idea of porting a full version OS X to a mobile device—such as, for instance, the company's rumored large-screened, “professional-leaning” tablet with a detachable keyboard.

Submission + - SPAM: hip hop instrumentals

lupitamendosa writes: We have a collection of hip hop instrumentals and rap beats for free downloads. Some producers or beat-maker upload their works free for all.
Link to Original Source

Submission + - LogMeIn Users flee after changes (

An anonymous reader writes: 24 hours ago LogMeIn on Jan 21st announced all free accounts would close on the 21st. On their forums [] User distaste of the the way the situation has been handled run rampant. On the official blog [] they state financial reasons for forcing every free user to move to a minimum of $49.99 a year pro account for 2 machines to continue service. They state a 7 day grace period to choose but many feel like it's holding a gun to their head. Many of their paid users are fleeing to alternate applications as well, stating a distrust of the company.

Submission + - Apple vs Xiaomi: Let the Battle for China's Smartphone Market Begin (

DavidGilbert99 writes: Apple is making a lot of headlines this week for its iPhones launching on the mega-network China Mobile which boast a subscriber base of 760 million. However while the deal will certainly give Apple's bottom line an initial boost, it is a three-year-old Chinese smartphone company called Xiaomi which could be set to become the next big player in the smartphone market. It surpassed Samsung as the country's biggest smartphone manufacturer in December, has nabbed Hugo Barra from Google and even managed to get Apple co-founder Steve Wozniak to endorse their latest smartphone for free.

Submission + - Patent troll sues US gov't for interfering with its business ( 1

inode_buddha writes: According to El Reg — MPHJ Technology, one of the most notorious patent trolls in America, has filed a lawsuit against the US Federal Trade Commission, claiming that the agency's attempts to interfere with its business are in violation of its constitutional rights.
The obscurely named MPHJ is a patent-assertion entity that demands royalties of about $1,000 per employee from companies that own networked scanners with a "scan to email" function.
By its own admission, MPHJ has so far sent letters to about 16,000 businesses, warning them that their use of such scanners is in violation of its patents.
Links to the case are in the article, for the armchair lawyers and ex-groklawers...

Submission + - It's icebreakers . . . all the way down . . . ( 2

PolygamousRanchKid writes: A U.S. Coast Guard heavy icebreaker left Australia for Antarctica on Sunday to rescue more than 120 crew members aboard two icebreakers trapped in pack ice near the frozen continent's eastern edge, officials said. The 399-foot cutter, the Polar Star, is responding to a Jan. 3 request from Australia, Russia and China to assist the Russian and Chinese ships because "there is sufficient concern that the vessels may not be able to free themselves from the ice," the Coast Guard said in a statement.

The Australian Maritime Safety Authority's Rescue Coordination Centre, which oversaw the rescue, said the Polar Star, the Coast Guard's only active heavy polar icebreaker, would take about seven days to reach Commonwealth Bay, depending on weather. Under international conventions observed by most countries, ships' crews are obliged to take part in such rescues and the owners carry the costs.

Submission + - FlowingMail: P2P email system loosely based on Bittorrent (

Paolo Brandoli writes: FlowingMail is a P2P email system loosely based on Bittorrent.
The DHT (distributed hash table) is used to store the public keys or the clients in the network (separate keys for signature/encryption) and the actual mails travel from client to client in a Bittorrent fashion (encrypted & signed by the sender).
The addresses of the clients are derived from the signature public key, so they cannot be faked, and all the messages between the clients are signed and encrypted

Comment Re:Oh really? (Score 4, Informative) 389

I'm so tired of hearing this 'no professional level music tools on linux' rubbish. Try Ardour. You can even use VST plugins if you really want to (though I wouldn't, too many are rubbish). I've been a recording engineer for close to twenty years and I find the only barrier I have to using it professionally is uninformed bigotry from ProTools users who regard themselves as the centre of the universe. Also, if it taking you DAYS to get jack working, you are definitely doing it wrong or your computer is from Mars.

Slashdot Top Deals

You can write a small letter to Grandma in the filename. -- Forbes Burkowski, CS, University of Washington