Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Launched to Offer Disposable Email Alias

An anonymous reader writes: Launch has been announced for, a free webmail service designed to provide smoother experience along with convenience of use. The new webmail allows creating email aliases under a single account with just one mouse click, and offers exceptionally strong antispam protection based on e-mail address whitelist. is specifically geared to those who need a dozen of email addresses without remembering a dozen of passwords. The service allows its users to create additional email addresses (aliases) that will forward messages to the main account. While email aliases are also available at some other webmail services, developers took care to make this feature particularly convenient by adding a special Aliases menu. From this menu a user can create new aliases (, where "alias" is any prefix) and delete them as they become redundant or compromised — all with one click of a mouse.

Being especially handy for registering with various websites, this one-click-alias feature can also be used to separate business contacts, friends and relatives. The smart service can automatically tag emails from different addresses and move them to specified folders to avoid mixing up business correspondence, personal life, and various notifications and newsletters. What's more, filtering rules can be customized independently for each alias.

For the main address Umail uses whitelist-based filtering, which means that only messages from those in the contact list will make it to the Inbox. All the other emails are stored in a separate Spam folder. If a contact is added to the whitelist the message is moved to Inbox, otherwise it is deleted after a certain deadline (3 days by default, but can be changed as required). However, a message from someone who is not on the whitelist has a chance of getting to the Inbox. The sender can pass antispam check to be added to the address book without waiting for confirmation from the account owner. This system renders antispam protection impenetrable for junk mail, yet ensures that messages from friends, colleagues and business partners easily get to the mailbox.

Most of Umail features described above are only one or two mouse clicks away, thanks to the intuitive interface being similar to that of popular email clients. A user can get familiar with Umail in no time and start efficiently managing correspondence.

Website address:

Comment Re:You don't understand the GPL (Score 1) 4

The point is not that the GPL should enable end users to make easy modifications to things like firmware - the GPL doesn't say so anywhere, and it may not even be possible.

The GPL, version 3, does require this. See section 6: "If you convey an object code work under this section in, or with, or specifically for use in, a User Product, [...] the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM)."

"Installation Information" is defined to include "any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source".

Comment Re:Correct User Access (Score 1) 932

But then you get a phone call every time they do want to install something. Better is to install sysresccd on a USB hard drive, configure the system just that once the way the users want it and use partimage to store an image of the computer's hard drive on the USB drive. When they get to trouble, restore the image and you've got a working system again - you could even set up a script to do this. In case of security updates, you of course need to restore the image, do the installation and create a new image, but this is much easier than hunting down all the spyware and whatever garbage the users have installed on the computer.


Submission + - Gmail users howl over Halloween outage ( 1

An anonymous reader writes: Gmail has been completely down for a large number of users (including me) for 36 hours straight, though Google refuses to acknowledge any problem. I linked to an early article in the Register about this, which reports that service is down even for many users who paid for the $50 Premier service, and that Google isn't answering its tech support line (which is advertised as being 24/7). Here's a support forum

where users from all over (incl. Denmark, Israel, South Africa) are reporting the problem and commiserating. No one from Google seems to be listening — indeed, Google's Apps Status Dashboard

still reports "No Issues" with Gmail.

Scott Aaronson, MIT CSAIL
(temporary email address I created:
my blog entry about this:


Harvard Faculty Adopts Open-Access Requirement 147

Vooch writes "Harvard University's Faculty of Arts and Sciences adopted a policy this evening that requires faculty members to allow the university to make their scholarly articles available free online." I may not be smart enough to go to college, but at least I can pretend to have a Harvard eduction. I don't think that will be enough to get a gig as a Simpsons writer.
United States

Submission + - GOP Preparing to Steal the 2008 Election (

An anonymous reader writes: Hendrik Hertzberg of The New Yorker reports that Californians vote next year on a radical change to the allotment of their state's electoral college votes. Republican sponsors call themselves Californians for Equal Representation, but if their measure passes, it's more likely than ever that a Republican will win the Presidency without winning the popular vote.

Submission + - Ruling by Secret US Court Allegedly Reduces Spying

conspirator57 writes: TFA na-spying2aug02,0,5813563.story?coll=la-home-cente r states that the US Foreign Intelligence Surveillance Court (a court that no citizen can establish standing to appear before) has ruled against Executive requests for so-called "basket warrants" as violating the 4th amendment to the Constitution, namely that such warrants do not meet the clearly expressed criteria in the second half of the amendment. To accomplish this they must have looked startlingly like British general warrants which were the original motivation for the 4th amendment. for more.

TFA is very sympathetic to the Executive branch, going on to depict ways in which we're all less safe because of this ruling. Personally, I feel safer with more rulings like this one. Just wish the process were a bit more transparent.

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

Submission + - Chernobyl Mushrooms Feeding on Radiation

cowtamer writes: According to a National Geographic Article certain fungi can use ionizing radiation to perform "radiosynthesis" using the pigment melanin (the same one in our skin that protects us from UV radiation). It is speculated that this might be useful on long space voyages where energy from the Sun is not readily available.
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Submission + - U.S. DOT ban on Vista

Fozzyuw writes: My company has just sent out a memo stating that no computers are allowed to be purchased or upgraded to Windows Vista, Office 2007, or Internet Explorer. While being my companies web developer, I've upgraded to IE7 some time ago, but only after Multiple IE allowed me to easily install IE6.

This policy memo was initialed due to the recent action by the U.S. Department of Transpertation placing a ban on these new Microsoft Products stating...

"there appears to be no compelling technical or business case for upgrading to these new Microsoft software products. Furthermore, there appears to be specific reasons not to upgrade."

I think it makes sense for my company to do this. As the old saying goes "If it's not broke, don't fix it". So, are there other companies out there that are enacting a similar kind of policy?

Slashdot Top Deals

Uncertain fortune is thoroughly mastered by the equity of the calculation. - Blaise Pascal