Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Best Phone For a Wi-Fi-Only Location? 289

bendodge writes "I am planning on heading to a university in a remote area with very poor cellular service (the only signal is spotty Verizon voice, no data). However, the entire campus is thoroughly blanketed in Wi-Fi. I am trying to find the best and most economical 'Wi-Fi phone' or else hack one together. Belkin/Netgear sell what is essentially a portable Skype device for $180. These folks recommend outfitting an iPod Touch with a mic and VoIP apps. I am looking for something that can make and receive calls to and from landlines with incoming call notification. What experiences have Slashdot readers had and what would you recommend?"

Submission + - CARS.gov EULA Allows the Government to Own Your PC 1

54mc writes: "Glen Beck today revealed what a close inspection of the End User License Agreement for the CARS system contains. From the EULA, "This application provides access to the DoT CARS system. When logged on to the CARS system, your computer is considered a Federal computer system and is the property of the U.S. Government." The EULA goes on to include other specific aspects of what exactly belongs to the computer.Will this be yet another issue for the already troubled system?

This is of course, yet another example of EULAs that no one reads going way too far."

Submission + - Police Ask Hackers to Help Track Jakarta Bombers

Hugh Pickens writes: "Australian newspaper "The Age" reports that police in Indonesia are calling on computer hackers to track who is behind a website claiming responsibility for the Jakarta hotel bombings that left nine people dead in attacks on the JW Marriott and Ritz-Carlton hotels in downtown Jakarta on July 17. "The cyber crime team is chasing (who is behind this) ... hopefully, we can track them," says national police spokesman Nanan Soekarna. "There are a lot of smart hackers in Indonesia. Come on, try to prove that you can defend your people and country and provide information so we can catch them." A statement discovered earlier this week on blogging service Blogspot.com claimed responsibility for the hotel attacks under the name of Malaysian-born extremist Noordin Mohammed Top. Police are investigating the authenticity of the blog which carries two messages from a group called Tanzim Al Qoidah Indonesia saying the bombings aimed to destroy all parties related to the West and Christianity and offers solace to Muslims suffering from their oppression. Real or not, the statement has attracted tens of thousands of visitors to the blog, more than 2,000 of whom have posted messages in response, the vast majority condemning the attacks. "These comments represent the mood of the larger Internet users in Indonesia," writes Riyadi Suparno in the Jakarta Post. "Their mood, their anger and their frustration with terrorism represent the mood, anger and frustration of many of us nationwide.""
The Internet

Submission + - SPAM: FTC delays identity theft rules for third time

coondoggie writes: "Well this is getting kind of predictable. The Federal Trade Commission this week has delayed for the third time in less than a year the deadline for companies to enact its identity theft rules known as Red Flags, which were set to become practice Aug. 1. Originally set to become required practice Nov. 1, 2008, the Red Flags program is touted as being one of the major ways the government plans to fight the growing identity theft blight. Under the Red Flags rules, all entities that regularly permit deferred payments for goods or services, including entities such as health care providers, attorneys, and other professionals, as well as retailers and a wide range of businesses that invoice their customers must develop a written program that identifies and detects the relevant warning signs — or "red flags" — of identity theft. These may include, for example, unusual account activity, fraud alerts on a consumer report, or attempted use of suspicious account application documents. The program must also describe appropriate responses that would prevent and mitigate the crime and detail a plan to update the program. Lawyers are perhaps predictably protesting the loudest about implementing such rules. [spam URL stripped]"
Link to Original Source

Japanese ESRB Bans Rape Depiction In Games 662

eldavojohn writes "The Ethics Organization of Computer Software (EOCS), now 233 companies strong, and met in Tokyo yesterday to ban a controversial title from Japan known as RapeLay, an eroge game (something much more adult than the more popular dating simulators). It's gotten a lot of press as reviewers have noted at one point the player must force sex on a 12-year-old. More importantly, the large ($353 million annually) adult game industry in Japan will now need to stay away from rape in their games if they wish to remain a member of EOCS. RapeLay seems to be available on Amazon's UK and JP sites, sparking outrage and causing a former US Ambassador to Japan to write an editorial criticizing Japan, saying, 'Only Japan allows people to possess these hideous images without penalty. Six of the G-7 countries have found ways to protect the innocent from being prosecuted for possession of child pornography. Is it not time for Japan to find a way to punish the guilty?' Singapore's Straits Times has more details, pointing out that it's still not illegal to possess these materials in Japan. We discussed this and other games last month in an editorial."

Radiation-Resistant Plants Could Be Used In Space 132

Hugh Pickens writes "New Scientist reports that two decades after the world's largest nuclear disaster, life around Chernobyl continues to adapt, with Chernobyl soya containing significantly different amounts of several dozen proteins, including one protein involved in defending cells from heavy metal and radiation damage. 'One protein is known to actually protect human blood from radiation,' says Martin Hajduch of the Slovak Academy of Sciences. In a study to determine how plants might have adapted to the meltdown, Hajduch's team compared soya grown in radioactive plots near Chernobyl with plants grown about 100 km away in uncontaminated soil. Results from the study suggest that adaptation toward heavy metal stress, protection against radiation damage, and mobilization of seed storage proteins are involved in the plant adaptation mechanism to radioactivity in the Chernobyl region (abstract). Determining how plants coped with life after Chernobyl could help scientists engineer radiation-resistant plants. While few farmers are eager to cultivate radioactive plots on Earth, future interplanetary travelers may one day need to grow crops to withstand space radiation."

Slashdot Top Deals

The absence of labels [in ECL] is probably a good thing. -- T. Cheatham