Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Constitution (Score 1) 568

Wrong. Your "papers" are personal writings (e.g. journals, diaries, etc.) or correspondence of which there are no other copies. Your bank records, heating bills, and "phone call metadata" are copies of data that third parties (Citibank, Duke Energy, AT&T) own. Obtaining said data does not involve a search of your home or your person.

Comment Re:Any chance this will cause real outrage? (Score 1) 404

If you remember aaaalll the way back to 2005, a whistleblower at AT&T in San Francisco made public the NSA's secret wiretapping program. Despite ongoing lawsuits brought on by the EFF, it doesn't seem like the majority of the public really cared at all.

Seems like most people simply don't give a shit about their rights.

One could also say that the slippery slope didn't obtain. Disclaimer: I was outraged at the time, but have yet to see the men-with-guns at my door.

The Military

Submission + - Pirated Software Could Bring Down Predator Drones

Pickens writes: "Fast Company reports that Massachusetts Superior Court Judge Margaret Hinkle will soon issue a decision on an intellectual property-related lawsuit that could ground the CIA's Predator drones as Intelligent Integration Systems (IISi) alleges that their Geospatial Toolkit and Extended SQL Toolkit were pirated by Massachusetts-based Netezza for use by a government client and is seeking an injunction that would halt the use of their two toolkits by Netezza for three years. The dispute goes back to when Netezza and IISi were former partners in a contract to develop software that would be used, among other purposes, for unmanned drones. IISi's suit claims that both the software package used by the CIA and the Netezza Spatial product were built using their intellectual property and according to statements made by IISi CEO Paul Davis, a favorable ruling in the injunction would revoke the CIA's license to use Geospatial. If IISi prevails in court this would either force the CIA to ground Predator drones or to break the law in their use of the pirated software. But there's more. Testimony given by an IISi executive to the court indicates that Netezza illegally and hastily reverse-engineered IISi's code to deliver a faulty version that could cause predator drones to miss their targets by as much as 40 feet. According to a deposition by IISi Chief Technical Officer Rich Zimmerman "my reaction was one of stunned amazement that (the CIA) want to kill people with my software that doesn't work." Zimmerman was also nervous about any possible legal liability for IISi in case Predator missiles miss their target; in his words they would not continue participating "without some sort of terms around that indemnifies us in case that code kills people.""

Submission + - Google's Slideshow Of Interesting Things (blogspot.com)

Kilrah_il writes: Google's Creative Labs came out with a slideshow of interesting things on the web. In the slideshow you will find "lot of interesting HTML5 apps, iPhone apps, visualization tools, 3D projections, art projects, creative YouTube videos, crowdsourcing services and many other interesting things." It ranges from cool YouTube videos to really amazing data collection projects and much more. Guaranteed to ruin your productivity for today. Watch it here.

Pluto — a Complex and Changing World 191

astroengine writes "After 4 years of processing the highest resolution photographs the Hubble Space Telescope could muster, we now have the highest resolution view of Pluto's surface ever produced. Most excitingly, these new observations show an active world with seasonal changes altering the dwarf planet's surface. It turns out that this far-flung world has more in common with Earth than we would have ever imagined."

Apple Orders 10 Million Tablets? 221

Arvisp writes "According to a blog post by former Google China president Kai-Fu Lee, Apple plans to produce nearly 10 million tablets in the still-unannounced product's first year. If Lee's blog post is to be believed, Apple plans to sell nearly twice as many tablets as it did iPhones in the product's first year."

Comment Re:We don't need more privacy laws (Score 4, Insightful) 166

The only people who *need* privacy are those who are a) doing something illegal or unethical and want to keep others from finding out or b) doing something competitive and want to keep their progress from their competition.

People in category (a) deserve no legal cover for their actions.

In other words, "People who are doing something unethical deserve no legal cover for their actions." 'Unethical' may be defined as "belonging to a class of activities that my peers and I disagree with or find distasteful." Your argument, and the fact that many others have similar positions, actually makes an excellent case for privacy.


The Ultimate "Doll House" For WoW Players 44

BoyIHateMicrosoft! writes "A friend of mine sent me this link today about a group of MIT students who have created something called a WoWPod. It's like a playhouse for WoW players. It has everything from Refreshing Spring Water, to food (Like Crunchy Spider Surprise of course!) to a toilet and of course the appropriate gaming gear."

Windows 7 Users Warned Over Filename Security Risk 613

nandemoari writes "Would-be Windows 7 users have been warned to change a default setting which could leave them vulnerable to attack via bogus files. As a result, Microsoft is taking flak for failing to correct a problem found in previous editions of Windows. The issue involves the way Windows Explorer displays filenames. In all editions of Windows after Windows 98, the default setting hides the filename extension (which identifies what type of file it is). This means that a Word file titled 'partyinvite.doc' will show up in Windows Explorer as simply 'partyinvite'. The only exception to this rule is if Windows does not recognize the file type. The reason for this setting is that it makes for a less cluttered look and avoids filling the screen with redundant detail. However, a flaw in the way it works leaves it liable to exploitation by hackers. They can take an executable file (which can do much more damage to a computer when opened) and disguise it by calling it 'partyinvite.doc.exe.'"

The Rootkit Arsenal 79

Nicola Hahn writes "One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie "at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers." Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that's both articulate and well organized. This accounts for the book's girth; it weighs in at roughly 900 pages." Keep reading for the rest of Nicola's review.

Submission + - Ask Slashdot: Lenovo Customer Service Tragedy (ripoffreport.com)

L Collins writes: "I have been through the most nerve wracking and hellish experience with Lenovo over the purchase of a shiny new T60 Thinkpad Laptop. My initial experience was that Lenovo sent me out a laptop sans battery and power cord, and when I tried to return said laptop to them in favor of purchasing one locally at a retail store, I was given incorrect information as to how to go about returning said laptop. This ended up leaving me without a tracking number and lo & behold, Lenovo claims they never received the laptop back. Lenovo blames UPS, UPS blames the UPS store that it was dropped off at and the UPS store it was dropped off blames Lenovo. (Further details can be had at: http://www.ripoffreport.com/reports/0/269/RipOff02 69581.htm)

At this point, Lenovo has told me that I'm simply out my laptop AND the money used to purchase said laptop, leaving me with a $1600 credit card bill with nothing to show for it.

I guess my question to Slashdot, is: Has anyone else out there had any similar experiences with the customer service, and how have they been able to get them resolved? I've already tried the BBB, filing a dispute with my credit card company, Executive Customer Relations @ Lenovo and contacting the VP of Sales & Marketing @ Lenovo, all with no success. Does anyone have any insight as to what can be done past this point to recoup my money or my laptop?"

Slashdot Top Deals

Prototype designs always work. -- Don Vonada