Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Cloud

Adopt the Cloud, Kill Your IT Career 241

snydeq writes "IT professionals jumping into the cloud with both feet beware: It's irresponsible to think that just because you push a problem outside your office, it ceases to be your problem. It's not just the possibility of empty promises and integration issues that dog the cloud decision; it's also the upgrade to the new devil, the one you don't know. You might be eager to relinquish responsibility of a cranky infrastructure component and push the headaches to a cloud vendor, but in reality you aren't doing that at all. Instead, you're adding another avenue for the blame to follow. The end result of a catastrophic failure or data loss event is exactly the same whether you own the service or contract it out.'"
Music

Selling Used MP3s Found Legal In America 281

bs0d3 writes "After some litigation; ReDigi, a site where people can sell used MP3s has been found legal in America. One of the key decisions the judge had to make was whether MP3's were material objects or not. 'Material objects' are not subject to the distribution right stipulated in "17 USC 106(3)" which protects the sale of intellectual property copies. If MP3's are material objects than the resale of them is guaranteed legal under the first sale' exception in 17 USC 109. Capitol Records tried to argue that they were material objects under one law and not under the other. Today the judge has sided with the first-sale doctrine, which means he is seeing these as material objects."
Cellphones

Making Sensitive Data Location Aware 69

An anonymous reader writes "In a breakthrough that could aid spies, keepers of medical records, and parents who want to prevent their kids from 'sexting,' a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown. The phones are given permission to access sensitive data while in a particular room, but when the devices leave the room, the data is completely wiped. A general, for example, could access secret intelligence while visiting a secure government facility without fear that his or her smart phone or tablet computer might later be lost or stolen, the team's lead researcher said. 'This system provides something that has never been available before. It puts physical boundaries around information in cyberspace.'" Unless the phone or other device can also take screenshots, or doesn't have that software installed.
Crime

8GB of Data Stolen From Italian Cybercrime Unit 123

Orome1 writes "Evidence servers of the Italian National Anti-Cybercrime Center for the Protection of Critical Infrastructure (CNAIPIC) have been breached and some of their contents published by a group of hackers calling themselves 'Legion of Anonymous Doom,' who apparently got on board the AntiSec campaign. The group has made clear that its sitting on around eight GB of stolen data and that it plans to release it all."
Privacy

Researchers Debut Proxy-Less Anonymity Service 116

Trailrunner7 writes "As state-level censorship continues to grow in various countries around the globe in response to political dissent and social change, researchers have begun looking for news ways to help Web users get around these restrictions. Now, a group of university researchers has developed an experimental system called Telex that replaces the typical proxy architecture with a scheme that hides the fact that the users are even trying to communicate at all."
News

Submission + - The Queen sets a code-breaking challenge (i-programmer.info)

mikejuk writes: Queen Elizabeth II has made her first ever visit to Bletchley Park, the home of the UK's World War II code-breaking efforts and now a museum. To mark the occasion The Queen has issued a code cracking challenge of her own "The Agent X Code Book Challenge" aimed at getting children interested in cryptography. Perhaps a royal programming or general technology challenge is next....
Microsoft

Submission + - Microsoft Developer Is Top Linux Contributor (muktware.com)

sfcrazy writes: The 343 changes made by Microsoft developer K. Y. Srinivasan put him at the top of a list, created by LWN.net, of developers who made the most changes in the current development cycle for Linux 3.0.

Submission + - EU Considers Strict Data Breach Notification Rules (computerworld.com)

JohnBert writes: The European Commission is examining whether additional rules are needed on personal data breach notification in the European Union.

Telecoms operators and Internet service providers hold a huge amount of data about their customers, including names, addresses and bank account details. The current ePrivacy Directive requires them to keep this data secure and notify individuals if such sensitive information is lost or stolen. Data breaches must also be reported to the relevant national authority.

"The duty to notify data breaches is an important part of the new E.U. telecoms rules," she said. "But we need consistency across the E.U. so businesses don't have to deal with a complicated range of different national schemes. I want to provide a level playing field, with certainty for consumers and practical solutions for businesses."

Image

Book Review: Scribus Beginners Guide 34

JR0cket writes "Scribus is an open source desktop publishing tool that helps you create professionally laid out documents, from simple documents to full blown magazines, corporate brochures or even books. Desktop publishing tools are not a replacement for word processors, instead they give you the freedom to create uniquely designed documents and help you manage large sets of text and graphic content. Scribus is similar to Adobe InDesign or Quark Xpress and gives you a wide range of tools to layout content in either print or digital media form. Scribus is pretty easy to get to grips with and has good documentation on the project website. The Scribus 1.3.5 beginners guide is a really handy guide through the workflow of desktop publishing and helps you clearly understand how to create professional looking results." Read below for the rest of JR0ket's review.
Crime

Cisco Accused of Orchestrating Engineer's Arrest 160

alphadogg writes "Cisco Systems orchestrated the arrest of Multiven founder Peter Alfred-Adekeye last year in order to force a settlement of Multiven's antitrust lawsuit against Cisco, a Multiven executive said on Wednesday. Multiven, an independent provider of service and support for networking gear, sued Cisco in 2008, alleging that the company monopolized the market for its software. Cisco countersued, charging that Alfred-Adekeye hacked into Cisco's computers and stole copyrighted software. In May 2010, Alfred-Adekeye was arrested in Vancouver, Canada, on 97 counts of intentionally accessing a protected computer system without authorization for the purposes of commercial advantage, according to his arrest warrant. He could be sentenced to 10 years in prison and a $250,000 fine if convicted. The arrest came to light only this week after local Vancouver press reported it."
Idle

A Game Played In the URL Bar 156

Kilrah_il writes "Whether you think it is useful or useless, you can't ignored the sheer cool geekiness of a game played entirely in the URL bar. From the article: '... While getting lost in a three dimensional virtual world amongst increasingly thoughtful plot and character development may be an adequate pastime for some, the only new title the gaming world should be talking about is URL Hunter, an experimental keyboard-character based game played entirely in your browser's URL bar.'"
The Media

Wikileaks Founder Arrested In London 1060

CuteSteveJobs writes "The founder of WikiLeaks, Julian Assange, has been arrested by London police on behalf of Swedish authorities on allegation of rape. Assange has admitted that he is exhausted by the ongoing battle against authorities. The Swiss Government has confiscated $37K in his Swiss Bank account. PayPal and Mastercard have frozen Wikileak's accounts, hampering Wikileaks from raising any more funds."

Comment Re:CHANGE!! (Score 5, Insightful) 646

According to everything I've read, this is *not* an attempt to achieve "broader Internet wiretap authority" but rather to force providers to put systems in place so that they can easily and quickly comply with *existing* authority. You can argue that the existing authority is overreaching, but that's a separate matter.
Privacy

Facebook Adds Delete Account Option 249

roseability writes "Facebook have quietly added the ability to delete you account. 'Deactivate Account', under Account Setting, has become 'Deactivate or Delete Account', and when checked it purports to permanently delete your account and all information you have shared. Facebook is actually willing to erase your data permanently? They must be counting on very few people doing so." Mixed reports on this: perhaps this is a limited test?

Slashdot Top Deals

The more they over-think the plumbing the easier it is to stop up the drain.

Working...