Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Good (Score 2, Informative) 395

Actually, it was the roommate of the iPhone finder who tipped off the police.

From the article:

Martinson turned Hogan in, because Hogan had plugged the phone into her laptop in an attempt to get it working again after Apple remotely disabled it. She was convinced that Apple would be able to trace her Internet IP address as a result. "Therefore she contacted Apple in order to absolve herself of criminal responsibility," according to the detective who wrote the affidavit.

Censorship

Politician Forces German Wikipedia Off the Net 569

Stephan Schulz writes "A German Member of parliament for a left-wing party, Lutz Heilmann, has obtained a preliminary injunction against the local chapter of the Wikimedia foundation, Wikimedia Deutschland e.V., forbidding the forwarding of the popular http://wikipedia.de to the proper http://de.wikipedia.org. Apparently Heilmann is not happy with the fact that his Wikipedia article (English version) contains information on his work for the former GDR Stasi, the much-hated internal secret service. Wikimedia Germany displays a page explaining the situation, and has announced that it will file an objection to get the injunction lifted. The German Wikipedia has more than 800,000 pages, and is hosted, like all Wikimedia projects, by the Florida-based Wikimedia Foundation, and hence beyond the effective reach of at least German politicians and judges."
The Internet

Comcast Says FCC Powerless to Stop P2P Blocking 377

Nanoboy writes "Even if the FCC finds that Comcast has violated its Internet Policy Statement, it's utterly powerless to do anything about it, according to a recent filing by the cable giant. Comcast argues that Congress has not given the FCC the authority to act, that the Internet Policy Statement doesn't give it the right to deal with the issue, and that any FCC action would violate the Administrative Procedures Act of 1946. '"The congressional policy and agency practice of relying on the marketplace instead of regulation to maximize consumer welfare has been proven by experience (including the Comcast customer experience) to be enormously successful," concludes Comcast VP David L. Cohen's thinly-veiled warning to the FCC, filed on March 11. "Bearing these facts in mind should obviate the need for the Commission to test its legal authority."'"
The Internet

Canadian MP Calls For ISP Licenses, Content Blocks 273

An anonymous reader writes "A member of Canada's ruling Conservative party has pledged to "clean up" the Internet with new bill that would mandate ISP licensing, know-your-subscriber rules, and allow the government to order ISPs to block content. ISPs that fail to block would faces possible jail time for the company's directors and officers."
The Courts

Submission + - Daylight Savings Time Puts Kid in Jail for 12 Days

Jherek Carnelian writes: Cody Webb was jailed for calling in a bomb threat to his Hempstead Area high school (near Pittsburgh). He spent 12 days in lockup until the authorities realized that their caller-id log was off an hour because of the new Daylight Savings Time rules and that Cody had only called one hour prior to the actual bomb threat. Perhaps it took so long because of the principal's Catch-22 attitude about Cody's guilt — she said, 'Well, why should we believe you? You're a criminal. Criminals lie all the time.'
Music

EFF Jumps in Against RIAA for Copyright Misuse 147

NewYorkCountryLawyer writes "Arguing that the RIAA and big record labels may be misusing their copyrights, the Electronic Frontier Foundation has jumped in on the defendant's side in a White Plains, New York, court conflict. The case is Lava v. Amurao, and the EFF will be defending Mr. Amurao's right to counterclaim for copyright misuse. EFF argued that the RIAA, by deliberately bringing meritless cases against innocent people based on theories of 'secondary liability', are abusing their copyrights. In its amicus brief, EFF also decried (just as when it joined the ACLU, Public Citizen, and others on the side of Debbie Foster in Capitol v. Foster) the RIAA's 'driftnet' litigation strategy. They argue that the declaratory judgment remedy must also be made available to defendants, in view of the RIAA's habit of dropping the meritless cases it started but can't finish."
Privacy

Submission + - Beware how much your WiFi is sharing about you!

QuantumCrypto writes: "Errata has developed a new network sniffer that looks for traffic using 25 protocols, including those for the popular instant message clients as well as DHCP, SNMP, DNS and HTTP. This means the sniffer will capture requests for network addresses, network management tools, Web sites queries, Web traffic and more. "You don't realize how much you're making public, so I wrote a tool that tells you," said Robert Graham, Errata's chief executive. The tool will soon be released publicly on the Black Hat Web site. Anyone with a wireless card will be able to run it, Graham said. Errata also plans to release the source code on its Web site."
Desktops (Apple)

Submission + - when Macs break

cyber-dragon.net writes: "I have long been a staunch supporter of Apple and Macs, bordering on but not quite a fan boy. My recent experience with trying to bring them into my department at work has been dissapointing. We had a Mac Pro (the big quad processor monster) die after four days. Ok, it happens, everything else has worked flawlessly. I even delt with the inevitable teasing about the siny new Mac being a lemon.
Well after almost four hours dealing with Apple Care, three hours dropping off and picking up my computer at different stores as per thier instructions trying to get this done quickly... I am beginning to wonder if Apple really wants business customers to rely on these machines. Much as I may dislike Dell like the rest of you... when my Linux box died it was fixed in four hours and I spent maybe 20 mintes of my time setting up the repair. I have spent seven hours of my time so far on this Mac and it still will not power up. Is this just me or have other people lost critical business machines to the depths of Apple Care inefficiency and lack of business level support?"
Biotech

Suppressed Report Shows Cancer Link to GM Potatoes 325

Doc Ruby writes "After an 8-year-long court battle, Welsh activists have finally been allowed to released a Russian study showing an increased cancer risk linked to eating genetically modified potatoes. While the victory of the Welsh Greenpeace members in the courtroom would seem to vindicate the work of the Russian scientists that did the original research, there are still serious questions to be answered. The trials involved rats being fed several types of potatoes as feed. The rats who were fed GM potatoes suffered much more extensive damage to their organs than with any other type; just the same, serious questions remain about the validity of the findings. The Welsh group wants to use this information to stop the testing of GM crops in the UK, tests currently slated for the spring of this year."
Networking

5 Things the Boss Should Know About Spam Fighting 168

Esther Schindler writes "Sysadmins and email administrators were asked to identify the one thing they wish the CIO understood about their efforts to fight spam. The CIO website is now running their five most important tips, in an effort to educate the corporate brass. Recommendations are mostly along the lines of informing corporate management; letting bosses know that there is no 'silver bullet', and that the battle will never really end. There's also a suggestion to educate on technical matters, bringing executives into the loop on terms like SMTP and POP. Their first recommendation, though, is to make sure no mail is lost. 'This is a risk management practice, and you need to decide where you want to put your risk. Would you rather risk getting spam with lower risk of losing/delaying messages you actually wanted to get, or would you rather risk losing/delaying legitimate messages with lower risk of spam? You can't have both, no matter how loudly you scream.'"

Comment Re:How long before the first class action suit in (Score 1) 267

Actually IBM/Lenovo have really improved their update rollout methods.

To find support documentation and downloads, you can go to Lenovo Support & downloads and enter in the model number of the computer in question. Or you may find drivers from the Driver Matrices page. Better yet, you can download the ThinkVantage System Update program which will scan your computer, check for available updates from the Lenovo servers, download, and install them for you.

The links provided are not secrets. They're all available from the "SUPPORT & DOWNLOADS" link off of Lenovo's homepage.

Vista Upgrade Matrix 94

Tyler Too writes "With six different versions of Vista due once it ships, figuring out an upgrade path can be confusing. Microsoft has tried to clear things up with a 4x6 matrix laying out your options. 'In short, users of XP Home can do an upgrade install to any of the four Vista versions. However, XP Pro users can only perform upgrade installs to Business or Ultimate.' And if you're not running a 32-bit version Windows XP, there's no upgrade path for you at all."

Microsoft Adds Risky System-Wide Undelete to Vista 365

douder writes "Windows Vista will have a new 'previous versions' feature when it ships next year. According to Ars Technica, the feature is built off of the volume shadow copy technology from Windows XP and Windows Server 2003. Now turned on by default, the service stores the modified versions of a user's documents, even after they are deleted. They also report that you can browse folders from within Explorer to see snapshots of what they contained over time. It can be disabled, but this seems like a privacy concern." From the article: "Some users will find the feature objectionable because it could give the bossman a new way to check up on employees, or perhaps it could be exploited in some nefarious way by some nefarious person. Previous versions of Windows were still susceptible to undelete utilities, of course, but this new functionality makes browsing quite, quite simple. On the other hand, it should be noted that 'Previous Versions' does not store its data in the files themselves. That is, unlike Microsoft Office's 'track changes,' files protected with 'Previous Versions' will not carry their documentary history with them."

Slashdot Top Deals

The degree of technical confidence is inversely proportional to the level of management.

Working...