Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Federal Prosecutors actually prosecuting H1-B Fraud (ap.org)

McGruber writes: The Associated Press is reporting (http://bigstory.ap.org/article/8fb0819e3b6543788237f32070f73974/business-owner-2-firms-face-visa-fraud-charges) that Federal Prosecutors have filed conspiracy charges against a part-owner of two information technology firms and an employee for fraudulently using the H-1B program.

Prosecutors said the conspirators falsely represented that the foreign workers had full-time positions and were paid an annual salary. They said the workers were only paid when placed at a third-party client and the defendants sometimes generated false payroll records. The defendants are charged with conspiracy to commit visa fraud and obstruct justice and conspiracy to harbor aliens. They face up to 15 years in prison if convicted on all counts.

Submission + - Commodore C64 Survives Over 25 Years Balancing Drive Shafts In Auto Repair Shop (hothardware.com)

MojoKid writes: One common gripe in the twenty-first century is that nothing is built to last anymore. Even complex, expensive computers seem to have a relatively short shelf-life nowadays. However, one computer in a small auto repair shop in Gdansk, Poland has survived for the last twenty-five years against all odds. The computer in question here is a Commodore C64 that has been balancing driveshafts non-stop for a quarter of a century. The C64C looks like it would fit right in with a scene from Fallout 4 and has even survived a nasty flood. This Commodore 64 contains a few homemade aspects, however. The old computer uses a sinusoidal waveform generator and piezo vibration sensor in order to measure changes in pressure, acceleration, temperature, strain or force by converting them to an electrical charge. The C64C interprets these signals to help balance the driveshafts in vehicles.

Submission + - Why Governments Lie About Encryption Backdoors (vortex.com)

Lauren Weinstein writes: But there are smart people in government too, who fully understand the technical realities of modern strong encryption systems and how backdoors would catastrophically weaken them.

So why do they continue to argue for these backdoor mechanisms, now more loudly than ever?

The answer appears to be that they're lying to us.

Or if lying seems like too strong a word, we could alternatively say they're being "incredibly disingenuous" in their arguments.

You don't need to be a computer scientist to follow the logic of how we reach this unfortunate and frankly disheartening determination regarding governments' invocation of terrorism as an excuse for demanding crypto backdoors for authorities' use.

Submission + - Federal Judge Calls BS on Homeland Security's 2008 STEM 'Emergency'

theodp writes: In 2008, the U.S. Dept. of Homeland Security enacted 'emergency' changes to Optional Practical Training (OPT) to extend the amount of time foreign STEM graduates of US colleges could stay in the country and work ("to alleviate the crisis employers are facing due to the current H-1B visa shortage", as Bill Gates explained it in 2007). More than seven years later, U.S. District Court Judge Ellen Huvelle has found that the government erred by not seeking public comment when it extended the program, and issued a ruling that could force tens of thousands of foreign workers on OPT STEM extensions to return to their home countries early next year. Huvelle has given the government six months to submit the OPT extension rule for proper notice and comment lest it be revoked. From the ruling (pdf): "By failing to engage in notice-and-comment rulemaking, the record is largely one-sided, with input only from technology companies that stand to benefit from additional F-1 student employees, who are exempted from various wage taxes. Indeed, the 17-month duration of the STEM extension appears to have been adopted directly from the unanimous suggestions by Microsoft and similar industry groups." Microsoft declared a new crisis in 2012, this time designed to link tech's need for H-1B visas to U.S. children's lack of CS savvy.

Submission + - Does Windows slow down Windows?

blackest_k writes: I recently reinstalled windows7 home on a laptop a factory restore minus the shovel ware did all the windows updates and it was reasonably snappy. 4 weeks later its running like a slug and now 34 more updates to install. The system is clear of malware there are very few additional programs other than chrome browser.

It appears that windows slows down windows! Has anyone benchmarked windows7 as installed and then again as updated? Even better has anybody identified any windows update that put the slug into sluggish?

Submission + - Twitter moves non-US accounts to Ireland away from the NSA (betanews.com) 1

Mark Wilson writes: Twitter has updated its privacy policy, creating a two-lane service that treats US and non-US users differently. If you live in the US, your account is controlled by San Francisco-based Twitter Inc, but if you're elsewhere in the world (anywhere else) it's handled by Twitter International Company in Dublin, Ireland. The changes also affect Periscope.

What's the significance of this? Twitter Inc is governed by US law, it is obliged to comply with NSA-driven court requests for data. Data stored in Ireland is not subject to the same obligation. Twitter is not alone in using Dublin as a base for non-US operations; Facebook is another company that has adopted the same tactic. The move could also have implications for how advertising is handled in the future.

Submission + - LightEater malware attack places millions of unpatched BIOSes at risk (betanews.com)

Mark Wilson writes: Two minutes is all it takes to completely destroy a computer. In a presentation entitled "How many million BIOSes would you like to infect?" at security conference CanSecWest, security researchers Corey Kallenberg and Xeno Kovah revealed that even an unskilled person could use an implant called LightEater to infect a vulnerable system in mere moments.

The attack could be used to render a computer unusable, but it could also be used to steal passwords and intercept encrypted data. The problem affects motherboards from companies including Gigabyte, Acer, MSI, HP and Asus. It is exacerbated by manufactures reusing code across multiple UEFI BIOSes and places home users, businesses and governments at risk.

Submission + - UNDER U.S. PRESSURE, PAYPAL NUKES MEGA FOR ENCRYPTING FILES (torrentfreak.com)

seoras writes: After coming under intense pressure PayPal has closed the account of cloud-storage service Mega. According to the company, SOPA proponent Senator Patrick Leahy personally pressured Visa and Mastercard who in turn called on PayPal to terminate the account. Bizarrely, Mega's encryption is being cited as a key problem.... ... What makes the situation more unusual is that PayPal reportedly apologized to Mega for its withdrawal while acknowledging that company’s business is indeed legitimate.
However, PayPal also advised that Mega’s unique selling point – it’s end-to-end-encryption – was a key concern for the processor."

Submission + - NSA Spying Wins Another Rubber Stamp (nationaljournal.com)

schwit1 writes: The FISA court has again renewed an order allowing the NSA to continue its illegal bulk collection of Americans' phone records, at least until June 1 when it is set to expire in Congress. President Obama pledged to end the controversial program more than a year ago.

The extension is the fifth of its kind since Obama said he would effectively end the Snowden-exposed program as it currently exists during a major policy speech in January 2014. Obama and senior administration officials have repeatedly insisted that they will not act alone to end the program without Congress.

After all the other things he's done against or without congressional approval and he balks at this one?

Submission + - How Silk Road Bounced Back from Its Multimillion-Dollar Hack (vice.com)

Daniel_Stuckey writes: “I am sweating as I write this I must utter words all too familiar to this scarred community: We have been hacked.” That is what Defcon, the current administrator of the infamous black market site Silk Road (the 2.0 version), wrote back in February on the site’s forums. In total, an estimated $2.7 million worth of bitcoin belonging to users and staff of the site was stolen. Some in the Silk Road community suspected that the hack might have involved staff members of the site itself, echoing scams on other sites. Project Black Flag closed down after its owner scampered with all of their customers' bitcoin, and after that users of Sheep Marketplace had their funds stolen, in an incident that has never been conclusively proven as an inside job or otherwise. Many site owners would probably have given up at this point, and perhaps attempted to join another site, or start up a new one under a different alias. Why would you bother to pay back millions of dollars when you could just disappear into the digital ether? But Silk Road appears to be trying to rebuild, and to repay users' lost bitcoins.

Submission + - Parents' Privacy Concerns Kill Bill Gates' $100M inBloom Initiative

theodp writes: As things turn out, All Your Child's Data Are Not Belong To inBloom, the Bill Gates-bankrolled and News Corp. subsidiary-implemented data initiative that sought to personalize learning. GeekWire's Tricia Duryee reports that inBloom, which was backed by $100 million from The Bill and Melinda Gates Foundation and others, is closing up shop after parents worried that its database technology was violating their children's privacy. According to NY Times coverage (reg.), the inBloom database tracked 400 different data fields about students — including family relationships ("foster parent" or "father's significant other”") and reasons for enrollment changes ("withdrawn due to illness" or "leaving school as a victim of a serious violent incident") — that parents objected to, prompting some schools to recoil from the venture. In a statement, inBloom CEO Iwan Streichenberger said that personalized learning was still an emerging concept, and complained that the venture had been "the subject of mischaracterizations and a lightning rod for misdirected criticism." He added, "It is a shame that the progress of this important innovation has been stalled because of generalized public concerns about data misuse, even though inBloom has world-class security and privacy protections that have raised the bar for school districts and the industry as a whole [although it was still apparently vulnerable to Heartbleed]." As far as Gates goes, the world's richest man has a couple of irons left in the data-driven personalized learning fire via his ties to Code.org, which seeks 7 years of participating K-12 students' data, and Khan Academy, which recently attracted scrutiny over its data-privacy policies. Khan Academy — which counted the managing partner of Gates' bgC3 think-tank and Google CEO Eric Schmidt as Board members in a recent tax filing — just struck an exclusive partnership with CollegeBoard to prepare students for the redesigned SAT.

Submission + - The Ethical Dilemmas Today's Programmers Face

snydeq writes: As software takes over more of our lives, the ethical ramifications of decisions made by programmers only become greater. Unfortunately, the tech world has always been long on power and short on thinking about the long-reaching effects of this power. More troubling: While ethics courses have become a staple of physical-world engineering degrees, they remain a begrudging anomaly in computer science pedagogy. Now that our code is in refrigerators, thermostats, smoke alarms, and more, the wrong moves, a lack of foresight, or downright dubious decision-making can haunt humanity everywhere it goes. Peter Wayner offers a look at just a few of the ethical quandaries confronting developers every day. 'Consider this less of a guidebook for making your decisions and more of a starting point for the kind of ethical contemplation we should be doing as a daily part of our jobs.'

Submission + - Adam Carolla Joins Fight Against Patent Troll 1

tor528 writes: Patent troll Personal Audio has sued top podcasters including Adam Carolla and HowStuffWorks, claiming that they own the patent for delivery of episodic content over the Internet. Adam Carolla is fighting back and has started a Fund Anything campaign to cover legal fees. From the Fund Anything campaign page: "If Adam Carolla loses this battle, then every other Podcast will be quickly shut down. Why? Because Patent Trolls like Personal Audio would use a victory over Carolla as leverage to extort money from every other Podcast.. As you probably know, Podcasts are inherently small, owner-operated businesses that do not have the financial resources to fight off this type of an assault. Therefore, Podcasts as we know them today would cease to exist."

James Logan of Personal Audio answered Slashdotters' questions in June 2013.
Links to the patent in question can be found on Personal Audio's website.
The EFF filed a challenge against Personal Audio's podcasting patent in October 2013.

Submission + - Why Firefox -- yes, Firefox -- will become the mobile OS to beat (citeworld.com)

mattydread23 writes: It's geared toward low-powered hardware in a way that Google doesn't care as much about with Android, it's cheap enough for the pre-paid phones that are much more common than post-paid in developing countries, and most important, there are still 3.5 billion people in the world who have feature phones and for whom this will be an amazing upgrade.

Submission + - One of the Most Alarming Internet Proposals I've Ever Seen (vortex.com)

Lauren Weinstein writes: You'd think that with so many concerns these days about whether the likes of AT&T, Verizon, and other telecom companies can be trusted not to turn our data over to third parties whom we haven't authorized, that a plan to formalize a mechanism for ISP and other "man-in-the-middle" snooping would be laughed off the Net.

But apparently the authors of IETF (Internet Engineering Task Force) Internet-Draft "Explicit Trusted Proxy in HTTP/2.0" (14 Feb 2014) haven't gotten the message.

What they propose for the new HTTP/2.0 protocol is nothing short of officially sanctioned snooping.

Slashdot Top Deals

Marriage is the triumph of imagination over intelligence. Second marriage is the triumph of hope over experience.

Working...