Forgot your password?
typodupeerror
The Internet

One Broken Router Takes Out Half the Internet? 412

Silent Stephus writes "I work for a smallish hosting provider, and this morning we experienced a networking event with one of our upstreams. What is interesting about this, is it's being caused by a mis-configured router in Europe — and it appears to be affecting a significant portion of the transit providers across the Internet. In other words, a single mis-configured router is apparently able to cause a DOS for a huge chunk of the Net. And people don't believe me when I tell them all this new-fangled technology is held together by duct-tape and baling wire!"
Privacy

New Law Will Require Camera Phones To "Click" 1235

An anonymous reader writes "A new bill is being introduced called the Camera Phone Predator Alert Act, which would require any mobile phone containing a digital camera to sound a tone whenever a photograph is taken with the phone's camera. It would also prohibit such a phone from being equipped with a means of disabling or silencing the tone."
Intel

Intel Develops Micro-Refrigerator To Cool Chips 94

Spacedonkey writes "Researchers at Intel, RTI International of North Carolina, and Arizona State University have made ultra-thin 'micro-refrigerators' for computer chips. The device uses a thermoelectric cooler made from nanostructured thin-film superlattice that can reduce the temperature by 55C when a current passes through it. In testing, it reduced the temperature on part of a chip by 15C without impairing its performance. The researchers say the component could be particularly useful for cooling hot spots that frequently occur on multi-core chips."
Image

Schneier on Security 204

brothke writes "There is a perception in both the private and government sector, that security, both physical and digital, is something you can buy. Witness the mammoth growth of airport security products following 9/11, and the sheer number of vendors at security conferences. With that, government officials and corporate executives often think you can simply buy products and magically get instant security by flipping on the switch. The reality is that security is not something you can buy; it is something you must get." Keep reading for the rest of Ben's review.
Privacy

Tool To Allow ISPs To Scan Every File You Transmit 370

timdogg writes "Brilliant Digital Entertainment, an Australian software company, has grabbed the attention of the NY attorney general's office with a tool they have designed that can scan every file that passes between an ISP and its customers. The tool can 'check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images.' As with the removal of the alt.binary newgroups, this is being promoted under the guise of preventing child porn. The privacy implications of this tool are staggering."
Security

UK Court Rejects Encryption Key Disclosure Defense 708

truthsearch writes "Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that disclosure was incompatible with the privilege against self incrimination. In its ruling, the appeals court said an encryption key is no different than a physical key and exists separately from a person's will."
Image

Researchers Claim To Be Able To Determine Political Leaning By How Messy You Are 592

According to a study to be published in The Journal of Political Psychology, you can tell someone's political affiliation by looking at the condition of their offices and bedrooms. Conservatives tend to be neat and liberals love a mess. Researchers found that the bedrooms and offices of liberals tend to be colorful and full of books about travel, ethnicity, feminism and music, along with music CDs covering folk, classic and modern rock, as well as art supplies, movie tickets and travel memorabilia. Their conservative contemporaries, on the other hand, tend to surround themselves with calendars, postage stamps, laundry baskets, irons and sewing materials. Their bedrooms and offices are well lit and decorated with sports paraphernalia and flags — especially American ones. Sam Gosling, an associate professor of psychology at the University of Texas at Austin, says these room cues are "behavioral residue." The findings are just the latest in a series of recent attempts to unearth politics in personality, the brain and DNA. I, for one, support a woman's right to clean.
Privacy

Every Email In UK To Be Monitored 785

ericcantona writes "The Communications Data Bill (2008) will lead to the creation of a single, centralized database containing records of all e-mails sent, websites visited and mobile phones used by UK citizens. In a carnivore-on-steroids programme, as all vestiges of communication privacy are stripped away, The BBC reports that Home Secretary Jacqui Smith says this is a 'necessity.'"
Cellphones

How Mobile Phones Work Behind the Scenes 220

adamengst writes "We seldom think about how our mobile phones actually work, but in this TidBITS article, Rich Mogull pulls back the covers and peels away the jargon to explain why text messages work when voice calls are dropped, why your battery lasts longer in some places than in others, why you're not allowed to use phones on airplanes, why you can be notified of a voicemail message when your phone never rang, and more."

Linux Annoyances For Geeks 445

Taran Rampersad writes "Every now and then, someone comes up with a fun title. 'Linux Annoyances for Geeks' is a definitely fun - and accurate - title for this book. While some people have been fiddling with Linux since it first came out, the majority of Linux users haven't been. I started using Linux in the late 90s, and my work schedule didn't allow me to go to meetings, or track down people who knew things. And the first time you do an install on a machine, you may be disconnected from the very information that gets you connected. Been there, done that. So this book attracted me because despite being an advocate of Free Software and Open Source, there are times when I still type very naughty things on the command line. Read the rest of Taran's review.

Slashdot Top Deals

I have ways of making money that you know nothing of. -- John D. Rockefeller

Working...