Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Would redundancy and really long TTL have countered a lot of DDOS effects? ( 1

marmot7 writes: My primary takeaways from this article was that it's important to have redundancy (additional NS's) and that it's important to have a very long TTL when you're not actively updating something. Would the measures in this article have at least limited the damage of these attacks? The long TTL change alone would have made the cache likely covered the entire attack, right?

Submission + - Mozilla Firefox Patch Deals with Third Party Cookies, Smartly ( 1

hypnosec writes: Mozilla is testing a new patch for its Firefox browser that would provide more privacy to users and control over third party cookies by targeting the manner in which they are installed on users’ systems. Currently when users visit a website that site may be calling up a number of things from other websites – be it advertising, analytics, behavior tracking, etc. These third party elements drop cookies onto users’ machines, which may be accessed at a later date or time to gather data about users' usage habits. The new mechanism effectively prohibits websites from installing third party cookies onto users’ systems. Users who have the patch installed will have to directly interact with the website or the company "for a cookie to be installed on their machine." This means that up until a user actively interacts with the third party website directly, Firefox will not allow for those cookies to be installed on the user’s system.

Submission + - Istanbul face recog cameras scan 15000 faces/sec 2

An anonymous reader writes: Istanbul's popular (and crowded) Istiklal shopping, cafe and restaurant street is being outfitted with 64 wirelessly controlled, tamperproof face recognition cameras attached to a computer system capable of scanning 15000 faces in a moving crowd per second for a positive match. The Samanyolu article (badly translated by Google) states that 3 cameras are in place so far and that if trials are successful, this will mark the first time such a system, previously used by Scottland Yard and normally reserved for indoor security use, is put to use in a public outdoor setting. It also notes that each camera controlled by the system is capable of "locking onto" the faces of known criminals and pickpockets detected in the crowd and "tracking" their movements for up to 300 metres before the next, closer placed camera takes over.

While the article doesn't state it outright, it would appear likely that the outdoor face recognition system, if "successful", will be expanded to other crowded areas of Istanbul as well, which has already seen a dazzling increase in the number of installed plain-vanilla (non face-recognizing) CCTV cameras in recent years.

This comes after Istanbul's two signature Bosphorus bridges have become passable by vehicle with a mandatory vehicle windscreen mounted electronic pass only, subway and bus tickets in the city have gone electronic, vote tallying in municipal and national elections has become fully computerized and future plans for mandatory biometric ID cards for all Turkish citizens have been announced by the government.

The ruling "moderate Islamist" AKP party appears to frame these and other e-government initiatives as "keeping step with the times", "keeping step with other major world cities" and "making living safer, easier and more efficient through the targeted use of electronic technology".

Its secular critics on the other hand argue that everything and everyone under the sun is rapidly becoming "electronically trackable" thanks to the omnipresence of mobile phones and gratuitous overuse and overapplication of these installed electronic systems, and that these systems will, eventually, form a dense surveillance grid that could turn daily life for Turks (and secular Turks critical of the current government in particular) into living in a veritable Big Brother House.

Is the historic city of Istanbul, which will be the European Capital of Culture
in 2010, turning into the new London?

Submission + - Safari 4's Messy Trail (

Signum Ignitum writes: Safari 4 came with a slew of cool new features, but extensive data generation combined with poor cleanup make for a data trail that's a privacy nightmare. Hidden files with screenshots of your history, files that point back to webpages you've visited and cleared from your history, and thousands of XML files that track the changes in the pages in your Top Sites can add up to gigabytes of information you didn't know was kept about you.

Submission + - Best Laptop for Going Around-the-World? 2

mitbeaver writes: I'm planning a round-the-world trip. 6+ months in developing countries, including Everest base camps 1 & 2, the deserts of Namibia and lots of places in between. I want to bring something to write (blogs or the Great American Novel) and burn DVD photo backups to mail home. I don't really need much in the way of power. But I do need it to survive the altitude, dust, moisture of tropical locations, and being hauled around non-stop for the better part of a year.

I will be carrying my life in my backpack, so every pound counts. It looks like some "semi-rugged" ultraportables exist, but the truly "rugged" are all pretty heavy. These are pricey, and the risk of theft is non trivial. A smaller laptop is easier to keep on my person more often, which is safer (in most countries) than leaving it in the hostel/hotel. Still, the rugged guys are 2x the price — almost worth buying a cheap one and planning an on the road replacement purchase. Help!

Any Slashdotters out there have a favorite backpacker-laptop? Any other advice?

Submission + - AT&T Ping of Death 1

rhinokitty writes: No links, but here is a conversation with an AT&T Representative this evening:

Me: "Do you know anything about the ping of death?"

Customer service representative: "Basically they do it as a line test. They do it automatically to make sure you are getting the quality of service you deserve. Usually they do it in the middle of the night."

Submission + - A Good Reference for Website Architecture?

sdr0303 writes: I've been working in IT for 17 years and have done a significant amount of development for various public and private companies. Every time I start a new web project I always know in the back of my head that someone, somewhere has already probably done this (possible better). I've always been fascinated with the architecture of some of the big name websites like Google, Facebook, MySpace, Yahoo, Slashdot, Digg, etc. and what their application architecture looks like. For example, are they LAMP/WAMP, J2EE, .Net, Perl/Python, etc.. I've seen tons of material written on Google and their architecture but is there a website that lists the application stack for these sites? Possibly other sites or is that information far to proprietary?

Submission + - Why Privacy & Security are Not Zero-Sum Games (

I Don't Believe in Imaginary Property writes: "Ars Technica has a nice article on why security consultant Ed Giorgio's statement that "privacy and security are a zero-sum game" is wrong. They reason that, due to Metcalfe's law, the more valuable a government network is to the good guys, the more valuable it is to the bad guys. Given the trend in government to gather all of its eggs into one database (to mix a metaphor), unless more attention is paid to privacy, we'll end up with neither security nor privacy. In other words, privacy and security are a positive sum game with precarious trade-offs — you can trade a lot of privacy away for absolutely no gain in security, but you don't have to."

Submission + - Collapsed UK bank attempts to censor Wikileaks (

James Hardine writes: Wikileaks has released a couple of hilarious legal demands over a confidential briefing memo entitled Project Wing — Northern Rock Executive Summary. Northern Rock Bank (UK) collapsed spectacularly late last year on the back of the sub-prime lending crisis and was re-floated by the Bank of England at a cost of over £24bn. The memo was used by the Financial Times, the Telegraph and others. It attracted a number of censorship injunctions, as reported by the Guardian, which only Wikileaks continues to withstand. In their legal demand to Wikileaks, Northern Rock's well-known media lawyers, Schillings, invoke the DMCA & WIPO, claim it'll be 10 years in prison for Wikileaks operators for not following the UK injunction, but then, incredibly, refuse to hand over a copy of the order unless Wikileaks' London lawyers promise not to give it to Wikileaks. Finally they claim copyright and more — on their demands! The letters raise a serious issue about the climate of censorship in the UK, where one can apparently easily obtain a censorship order — a judge made law — that everyone is meant to obey, but no one is meant to know.

Submission + - Open source DRM solutions? 2

Feint writes: I'm working on an business platform for inter-company collaboration based on an open source software stack. As part of that platform I would like to integrate some sort of digital rights management for the documents managed in the system. The vast majority of articles are focused how good or evil it is to apply DRM to digital music or video. I haven't seen many articles address the open source solutions around how to protect business data like CAD/MSOffice/PDF/etc documents, which is a real need in business today. Can the Slashdot readership suggest some open source DRM offerings other than the Sun DReaM initiative (which hasn't had a release since Jan 2007)?

Submission + - Has Apple crippled DTrace in OS X? 1

sastrugi writes: Andy Leventhal's blog has a detailed analysis of how Apple's implementation of DTrace in OS X has been changed so certain applications are not seen by DTrace probes. Is this a problem or a right by Apple to deploy a tool as they see fit?

Submission + - AOL adopting XMPP aka Jabber ( 5

sander writes: "Proprietary protocols are things from yesterday. Today, Opensource technologies are taking over the world! AOL / ICQ has just launched a test server using XMPP, an open technology. This means that you'll soon be able to talk to your ICQ / AIM contacts via Jabber. Google has already started using it. So who's next? MSN! More here:"

Submission + - Ford says they own the rights to pics of YOUR car

fist_187 writes: Ford Motor Company blocked the sale of a fan-made Ford Mustang calendar on cafepress, claiming copyright infringement. From the thread:

I got some more info from the folks at cafepress and according to them, a law firm representing Ford contacted them saying that our calendar pics (and our club's event logos — anything with one of our cars in it) infringes on Ford's trademarks which include the use of images of THEIR vehicles. Also, Ford claims that all the images, logos and designs OUR graphics team made for the BMC events using Danni are theirs as well. Funny, I thought Danni's title had my name on it ... and I thought you guys owned your cars ... and, well ... I'm not even going to get into how wrong and unfair I feel this whole thing is as I'd be typing for hours, but I wholeheartedly echo everything you guys have been saying all afternoon. I'm not letting this go un-addressed and I'll keep you guys posted as I get to work on this.

Submission + - Shutting off the problem of fraud

CaptainStumpy writes: "To serve and protect. That is all I ask of my police and government. But after getting 3 phone calls, exactly 1 hour apart, from an obvious text to speech program (which by the was not even close to correctly prounouncing my city of Leominster) telling me that my accound has been suspended and asking me to call and re-enable my bank account. After filing reports to my local PD and the Internet Crime Complaint Center, I ask slashdot why there can't be some monkey trained to simply shut off these fraudlent numbers, as soon as they are reported and verified fraudulent. The solution seems so simple, but nobody is doing it. I ask why.

Meanwhile, the scammer's line remains active and is phishing unknown number of people and getting just what it is asking. Have some fun and call 704-935-4534 and enter some random numbers. I was surprised it didn't even check for validity."

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy