Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Privacy

GnuPG Short ID Collision Has Occurred. 110

kfogel writes "Asheesh Laroia now has two GPG different keys with the same short ID (70096AD1) circulating on keyservers. One of them is an older 1024-bit DSA key, the other is a newer 4096-bit RSA key. Oops. Asheesh argues that GPG's short IDs are too short to be the default anymore — collisions are too easy to create: he did it on purpose and openly, but others could do it on purpose and secretly. More discussion (and a patch by dkg) are in this bug report."
Cellphones

Tetris Clones Pulled From Android Market 396

sbrubblesman writes "The Tetris Company, LLC has notified Google to remove all Tetris clones from Android Market. I am one of the developers of FallingBlocks, a game with the same gameplay concepts as Tetris. I have received an email warning that my game was suspended from Android Market due to a violation of the Developer Content Policy. When I received the email, I already imagined that it had something to do with it being a Tetris clone, but besides having the same gameplay as Tetris, which I believe cannot be copyrighted, the game uses its own name, graphics and sounds. There's no reference to 'Tetris' in our game. I have emailed Google asking what is the reason for the application removal. Google promptly answered that The Tetris Company, LLC notified them under the DMCA (PDF) to remove various Tetris clones from Android Market. My app was removed together with 35 other Tetris clones. I checked online at various sources, and all of them say that there's no copyright on gameplay. There could be some sort of patent. But even if they had one, it would last 20 years, so it would have been over in 2005. It's a shame that The Tetris Company, LLC uses its power to stop developers from creating good and free games for Android users. Without resources for a legal fight, our application and many others will cease to exist, even knowing that they are legit. Users will be forced to buy the paid, official version, which is worse than many of the ones available for free on the market. Users from other countries, such as Brazil in my case, won't even be able to play the official Tetris, since Google Checkout doesn't exist in Brazil; you can't buy paid applications from Android Market in these countries."
Internet Explorer

IE8 Update Forces IE As Default Browser 311

We discussed Microsoft making IE8 a critical update a while back; but then the indication was that the update gave users a chance to choose whether or not to install it. Now I Don't Believe in Imaginary Property writes in with word that the update not only does not ask, but it makes IE the default browser. "Microsoft has a new tactic in the browser wars. They're having the 'critical' IE8 update make IE the default browser without asking. Yes, you can change it back, but it doesn't ask you if you want IE8 or if you want it as the default browser, it makes the decisions for you. Opera might have a few more complaints to make to the EU antitrust board after this, but Microsoft will probably be able to drag out the proceedings for years, only to end up paying a small fine. If you have anyone you've set up with a more secure alternative browser, you might want to help check their settings after this."
Data Storage

Encrypted But Searchable Online Storage? 266

An anonymous reader asks "Is there a solution for online storage of encrypted data providing encrypted search and similar functions over the encrypted data? Is there an API/software/solution or even some online storage company providing this? I don't like Google understanding all my unencrypted data, but I like that Google can search them when they are unencrypted. So I would like to have both: the online storage provider does not understand my data, but he can still help me with searching in them, and doing other useful stuff. I mean: I send to the remote server encrypted data and later an encrypted query (the server cannot decipher them), and the server sends me back a chunk of my encrypted data stored there — the result of my encrypted query. Or I ask for the directory structure of my encrypted data (somehow stored in my data too — like in a tar archive), and the server sends it back, without knowing that this encrypted chunk is the directory structure. I googled for this and found some papers, however no software and no online service providing this yet." Can anyone point to an available implementation?
Mozilla

EU Could Force Bundling Firefox With Windows 650

Barence writes "The European Commission could force Microsoft to bundle Firefox with future versions of Windows. The revelation came as part of Microsoft's quarterly filing with the Security and Exchange Commission. Among the statements is a clause outlining the penalties being considered by the European watchdog, which recently ruled that Microsoft is harming competition by bundling Internet Explorer with Windows. The most interesting situation outlined in the filing would see either Microsoft or computer manufacturers forced to install Firefox, Chrome, Opera and Safari by default alongside Internet Explorer on new Windows-based PCs."
Communications

Adobe To Open Real-Time Messaging Protocol 108

synodinos writes "Adobe has announced plans to publish the Real-Time Messaging Protocol specification, which is designed for high-performance transmission of audio, video, and data between Adobe Flash Platform technologies. This move that has followed the opening of the AMF spec has been received with varying degrees of enthusiasm from the RIA community."
Image

Ubuntu Kung Fu 253

Lorin Ricker writes "Back in the dark ages of windows-based GUIs, corresponding to my own wandering VMS evangelical days, I became enamored of a series of books jauntily entitled Xxx Annoyances (from O'Reilly & Assocs.), where "Xxx" could be anything from "Windows 95", "Word", "Excel" or nearly piece of software which Microsoft produced. These were, if not the first, certainly among the most successful of the "tips & tricks" books that have become popular and useful to scads of hobbyists, ordinary users, hackers and, yes, even professionals in various IT pursuits. I was attracted, even a bit addicted, to these if only because they offered to try to make some useful sense out of the bewildering design choices, deficiencies and bugs that I'd find rampant in Windows and its application repertory. Then I found Keir Thomas, who has been writing about Linux for more than a decade. His new "tips" book entitled, Ubuntu Kung Fu — Tips & Tools for Exploring Using, and Tuning Linux, and published by Pragmatic Bookshelf, is wonderful. Having only recently wandered into the light of Linux, open source software, and Ubuntu in particular, this book comes as a welcome infusion to my addiction." Read below for the rest of Lorin's review.
Communications

IPv4 Address Use In 2008 258

An anonymous reader writes "The world used 197 million new IPv4 addresses in 2008, leaving 926 million addresses still available. The US remains the biggest user of new addresses, but China is catching up quickly. Quoting Ars Technica: 'A possible explanation could be that the big player(s) in some countries are executing a "run on the bank" and trying to get IPv4 addresses while the getting is good, while those in other countries are working on more NAT (Network Address Translation) and other address conservation techniques in anticipation of the depletion of the IPv4 address reserves a few years from now. In both cases, adding some IPv6 to the mix would be helpful. Even though last year the number of IPv6 addresses given out increased by almost a factor eight over 2007, the total amount of IPv6 address space in use is just 0.027 percent.'"
Medicine

Blood From Mosquito Traps Car Thief 198

Frosty Piss writes "Police in Finland have made an arrest for car theft based on a DNA sample taken from the blood found inside a mosquito. 'A police patrol carried out an inspection of the car and they noticed a mosquito that had sucked blood. It was sent to the laboratory for testing, which showed the blood belonged to a man who was in the police registers,' a police officer told reporters. The suspect, who has been interrogated, has insisted he did not steal the car, saying he had hitchhiked and was given a lift by a man driving the car. I'm wondering if the suspect should have denied any association with the car at all. After all, who knows where that mosquito had been?"
Businesses

Abit To Close Its Doors Forever On Dec. 31, 2008 195

ki1obyte writes "Earlier this year the Taiwanese firm Abit, once a leading-edge maker of computer mainboards and other components, was slated to shut down motherboard production by the end of 2008 and focus on consumer electronics devices. Now X-bit labs reports that Abit will cease to exist entirely after midnight on the last day of 2008 because the owner of the brand, Universal Scientific Industrial, is in the process of restructuring and cutting their costs."
Wine

Wine Goes 64-Bit With Wine64 385

G3ckoG33k writes "Wine (Wine Is Not an Emulator) is a popular way to run Windows programs on Linux, and it has an impressive compatibility list. After 15 years of development it reached version 1.0 a few months ago. Now, Wine developer Maarten Lankhorst has succeeded in running 'Hello World' in 64-bit, natively! The 64-bit variety is unexpectedly named Wine64."
Encryption

BD+ Successfully Resealed 443

IamTheRealMike writes "A month on from the story that BD+ had been completely broken, it appears a new generation of BD+ programs has re-secured the system. A SlySoft developer now estimates February 2009 until support is available. There's a list of unrippable movies on the SlySoft forums; currently there are 16. Meanwhile, one of the open source VM developers seems to have given up on direct emulation attacks, and is now attempting to break the RSA algorithm itself. Back in March SlySoft confidently proclaimed BD+ was finished and said the worst case scenario was 3 months' work: apparently they underestimated the BD+ developers."
Businesses

After Domain Squatting, Twitter Squatting 201

carusoj writes "Squatting on domain names is nothing new, but Twitter has created a new opportunity for squatters, in the form of Twitter IDs. Writes Richard Stiennon: 'Is there evidence of Twitter squatting (squitting?) Let's check. Yup, every single-letter TwitID is taken ... How about common words? Garage, wow, war, warcraft, Crisco, Coke, Pepsi, Nike, and Chevrolet are all taken. My guess is that Twitter squatters have grabbed all of these in the hopes that they will be worth selling in the not too distant future. Of course the legitimate holders of brands can sue for them and Twitter can just turn them over if asked. But, because the investment and risk for the squatter is zero, you are going to see the rapid evaporation of available Twitter IDs.'"
Programming

Best Cross-Platform, GUI Editor/IDE For Python? 144

What do you find is the best text editor for Python software development? I've tried several, and I'm always frustrated by the limitations of each. Eclipse is cool, but it's huge, and I've had multiple problems with corruption of the workspace. It got so bad at one point that every week or so I was tearing it down and recreating it. I spent so much time re-creating Eclipse's workspace that I found any productivity gains were lost due to Eclipse's brokenness. (Read more below.)

Slashdot Top Deals

The cost of living hasn't affected its popularity.

Working...