Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:nice fine ! (Score 1) 415

I'm really surprised this wasn't in the summary as I found this as the most interesting part of the story. It wasn't actually that they were made to give her the list, but they were punished as well. It's also reading briefs such as these that gives me hope in our judicial system. This seemed extremely fair. They said it was up to $1000 per violation. He felt that it would fair to drop it to $250 per month of refusal which is where he came up with $1000 to deter future disobedience of the law of which this was a first known offense.. Now my only question. Where are the fair judgements when it's the corporations suing the people.

Comment Re:Passwords not compromised (Score 1) 78

I'm not sure how you got that from my post. I'm saying that most of the users of the internet would not know a phishing message if one came. With these email databases being compromised people trying to phish can now target the specific users of the bank with a relevant message to them that they might normally be used to be seeing and not think twice about following links within.

Comment Re:Passwords not compromised (Score 2) 78

This is exactly where the risk comes from. I've now been receiving faked emails from a stock company of mine which was compromised. On my phone the email looks entirely credible and I'm not able to check where the link in the email is actually taking me. Once I checked it out on a computer I noticed the link was going to a fake domain rather than to the institution. I'm a web developer and consider myself pretty computer savvy. I also knew about the information being taken and am extremely wary of following an emails. When I think of my dad getting the email from his banking institution which appears completely legit; it scares me.

Comment Re:Wait A Second (Score 1) 178

I was reading through the comments getting extremely aggravated waiting to see how long it would take someone to point out he's naming types of crackers, not hackers. Stop allowing people to use the word hacker as a negative word without making them informed.

Facebook Suspends Personal Data-Sharing Feature 140

Suki I writes "Facebook has 'temporarily disabled' a controversial feature that allowed developers to access the home address and mobile numbers of users. The social network suspended the feature, introduced on Friday, after only three days. The decision follows feedback from users that the sharing-of-data process wasn't clearly explained and criticism from security firms that the feature was ripe for abuse."

Comment Re:Ok (Score 5, Informative) 480

Just happened to be reading the FAQ's.

5. Do I need to sign up for a 2 year agreement? When purchasing iPhone at the 2 year promotional price a new agreement is required. However, you will also have the option to purchase iPhone at full retail price, which will not require you to sign a long-term agreement.

Comment Re:ConnectBot on android (Score 1) 359

I've been using connectBot with my DROID almost since it came out. And quite frequently as well. Has all the functionality I need including autocomplete, ctrl keys, tabs, etc.

Slide it closed and you still get an on-screen keyboard for quickies.

Did you have to do anything special to get the on-screen keyboard for the droid 2; I've never been able to use the on-screen keyboard on my droid 1.


Smartphones For Text SSH Use Re-Revisited 359

Kainaw writes "This was asked in 2005 and 2008. I think it should be revisited yet again... With iPhone, Android, and Windows smartphones running around, which (if any) of them are well-suited to Unix/Linux server administration on the run? SSH is a must. A good screen resolution. A physical keyboard won't block the screen with a virtual keyboard. Many physical keyboards omit the numeric keys now, making the typing of numbers rather difficult. Nearly every smartphone has WiFi capability now. Some will do an X display through SSH tunnelling. So, pushing through all the bells and whistles that have nothing to do with effective server administration, what is left?"

Spamhaus Under DDoS Over 295

achowe writes "Steve Linford of Spamhaus sent this to a private anti-spam list and asked that the message get out far and wide: 'For speaking out about the crime gangs located at the mirror IP, Spamhaus is now under ddos by AnonOps. As our site cannot be reached now [actually sporadic], we can not continue to warn Wikileaks users not to load things from the Heihachi IP. ... AnonOps did not like our article update, here is what we said and what brought the ddos on us.'" At the conclusion of this message: "Spamhaus continues to warn Wikileaks readers to make sure they are viewing and downloading documents only from an official Wikileaks mirror site. We’re not saying 'don’t go to Wikileaks' we’re saying 'Use the server instead.'" Here is Spamhaus's full warning.

Why You See 'Free Public WiFi' In So Many Places 260

An anonymous reader writes "Almost anywhere you go these days (particularly at airports), if you check for available WiFi settings, you have a pretty good chance of seeing an ad hoc network for 'Free Public WiFi.' Of course, since it's ad hoc (computer to computer) it's not actually access to the internet. So why is this in so many places? Turns out it's due to a bug in Windows XP. Apparently, the way XP works is that if it can't find a 'favorite' WiFi hotspot, it automatically sets up the computer to broadcast itself as an ad hoc network point, using the name of the last connection the computer attempted. So... people see 'Free Public WiFi' and they try to log on. Then their own computer starts broadcasting the same thing, because it can't find a network it knows. And, like a virus, the 'Free Public WiFi' that doesn't work lives on and on and on."

T-Mobile Facing Lawsuit Over Text Message Censorship 181

Tootech writes with this quote from Wired: "A mobile-marketing company claimed Friday it would go out of business unless a federal judge orders T-Mobile to stop blocking its text-messaging service, the first case testing whether wireless providers can block text messages they don't like. EZ Texting claims T-Mobile blocked the company from sending text messages for all of its clients after learning that, an EZ Texting client, was using its service to send texts about legal medical marijuana dispensaries in California. 'T-Mobile subjectively did not approve of one of the thousands of lawful businesses and non-profits served by EZ Texting,' according to New York federal lawsuit."

How 6 Memorable Tech Companies Got Their Names 94

itwbennett writes "If Larry Page and Sergey Brin had stuck with the first name for their search engine, we'd be 'BackRubbing' instead of Googling. But the fun doesn't stop there. The unforgettable Go Daddy was first saddled with the eminently Seussian moniker 'Jomax Technologies.' And as for Yahoo!... its original name just rolled off the tongue: 'Jerry and David's Guide to the World Wide Web.'"

Slashdot Top Deals

The opposite of a correct statement is a false statement. But the opposite of a profound truth may well be another profound truth. -- Niels Bohr