Forgot your password?
typodupeerror
Windows

Windows 7 Clean Install Only In Europe 803

jbeale53 writes "It seems that to install Windows 7 in Europe, you'll have to wipe the system and start over. There will be no ability to upgrade. From the article, 'The unfortunate side effect has been caused by Microsoft's decision to avoid any further EU censure on Windows 7 by removing Internet Explorer 8 from the OS. Because Internet Explorer is so deeply integrated within Vista, it's not currently possible to perform an upgrade that removes IE.' Why would Microsoft cripple it this way? Just to try and point fingers at the European Union? Because the EU didn't tell them to remove IE, they only told them to offer other browsers to be installed during setup."

Firefox Beta Touts Advanced Engine, Solves 8 Flaws 493

nandemoari writes "Mozilla may be this year's winner in the 'browser battles' as they ready the next beta version of their tour-de-force, Firefox 3.1. Mozilla is resolving eight critical vulnerabilities found in the current version of Firefox — a move sure to garner applause from devoted Firefox users. As this year's crop of new browsers emerges, enhanced features are becoming secondary to one thing: speed. Mozilla is nearly ready to release the next beta version of Firefox 3.1 to the public for testing, and insiders predict that it will outpace even Safari 4, which has been the fastest browser in wide release since its beta began last week." It looks like they also will be upping the next major release to v3.5 to better show the significance of the release.
Privacy

Should Job Seekers Tell Employers To Quit Snooping? 681

onehitwonder writes in with a CIO opinion piece arguing that potential employees need to stand up to employers who snoop the Web for insights into their after-work activities, often disqualifying them as a result. "Employers are increasingly trolling the web for information about prospective employees that they can use in their hiring decisions. Consequently, career experts advise job seekers to not post any photos, opinions or information on blogs and social networking websites (like Slashdot) that a potential employer might find remotely off-putting. Instead of cautioning job seekers to censor their activity online, we job seekers and defenders of our civil liberties should tell employers to stop snooping and to stop judging our behavior outside of work, writes CIO.com Senior Online Editor Meridith Levinson. By basing professional hiring decisions on candidates' personal lives and beliefs, employers are effectively legislating people's behavior, and they're creating an online environment where people can't express their true beliefs, state their unvarnished opinions, be themselves, and that runs contrary to the free, communal ethos of the Web. Employers that exploit the Web to snoop into and judge people's personal lives infringe on everyone's privacy, and their actions verge on discrimination."
Security

Website Security Without Breaking the Bank? 195

An anonymous reader writes "I do my own Web design and have a few websites — MySQL, PHP, CSS, HTML, that kind of thing. It's simple, amateur stuff, but I would love to have some reasonable ways to assess their security myself and patch the big holes, or possibly enlist someone to do 'white hat' work to assist me. I have absolutely no idea how to proceed. I don't want to get mired in a never-ending paranoia-fueled race to patch holes before the hackers find them, but on the other hand, I don't want my websites to look like Swiss cheese. Right now, I wouldn't know what kind of cheese they look like: Swiss, Havarti, or hard as Parmesan. How can I take reasonable steps to protect these websites myself? What books has the community found useful? What groups (if any) can offer me inexpensive white-hat hacking that won't end up costing me a first-born child? Or am I better off just waiting until a problem arises and then fixing it?"
GNOME

Building Linux Applications With JavaScript 288

crankymonkey writes "The GNOME desktop environment could soon gain support for building and extending applications with JavaScript thanks to an experimental new project called Seed. Ars Technica has written a detailed tutorial about Seed with several code examples. The article demonstrates how to make a GTK+ application for Linux with JavaScript and explains how Seed could influence the future of GNOME development. In some ways, it's an evolution of the strategy that was pioneered long ago by GNU with embedded Scheme. Ars Technica concludes: 'The availability of a desktop-wide embeddable scripting language for application extension and plugin writing will enable users to add lots of rich new functionality to the environment. As this technology matures and it becomes more tightly integrated with other language frameworks such as Vala, it could change the way that GNOME programmers approach application development. JavaScript could be used as high-level glue for user interface manipulation and rapid prototyping while Vala or C are used for performance-sensitive tasks.'"
It's funny.  Laugh.

Unix Dict/grep Solves Left-Side-of-Keyboard Puzzle 423

destinyland writes "For decades, people have been asking this brain teaser: 'What's the longest word you can type with only the left-hand letters on a keyboard?' The answer is supposed to be 'stewardesses,' but grepping the standard dictionary that ships with Unix reveals a much better answer. There's nearly 2,000 shorter words that can typed with only the left hand — including one word that's even longer. (The article also quotes a failed novel attempt using nothing but words typed on the keyboard's left side.)"
Cellphones

How Mobile Phones Work Behind the Scenes 220

adamengst writes "We seldom think about how our mobile phones actually work, but in this TidBITS article, Rich Mogull pulls back the covers and peels away the jargon to explain why text messages work when voice calls are dropped, why your battery lasts longer in some places than in others, why you're not allowed to use phones on airplanes, why you can be notified of a voicemail message when your phone never rang, and more."
United States

Report is Critical of US For Dumping E-Waste Overseas 152

coondoggie writes "In what may be the least astonishing news of the day, some major US companies who say they are environmentally recycling electronic waste — aren't. Rather more startling — they are dumping everything from cell phones and old computers to televisions in countries such as China and India where disposal practices are unsafe to people and dangerous to the environment. Controlling the exportation of all of the e-waste plops on the doorstep of the US Environmental Protection Agency which is doing a woeful job, according to a scathing 67-page report issued by the Government Accountability Office today."
The Internet

Berners-Lee Launches New W3 Foundation 111

robertsonadams tips us to the initiation of the World Wide Web Foundation with $5M of seed funding from the Knight Foundation. From the announcement: "Sir Tim Berners-Lee, inventor of the World Wide Web, unveils the World Wide Web Foundation. It aims to advance One Web that is free and open, to expand its capability and robustness, and to extend its benefits to all people on the planet." The new foundation's site should have video up soon of Berners-Lee's speech at the kickoff event. The foundation hopes to raise $50M–$100M and will issue grants in Web science, technology and practice, and Web for society. Initial plans will be disclosed early next year.
Security

Most Companies Admit Their Data Is At Risk 60

Weblver1 writes "A recent survey of IT professionals published by web security firm Finjan shows that data-theft should be a good reason for concern. Based on answers from 1,387 professionals, 25% acknowledged that their organization has been breached. What's worse, 42% did not know and could not exclude a breach, reflecting on the number of organizations that could potentially be breached without anyone knowing after the fact. Other findings we should be concerned about include 82% of Healthcare IT respondents admitting that medical records are at risk of data-theft, and 68% of all sectors admitting sensitive corporate information can be compromised by cyber-criminals. Finjan's report is available here (PDF, registration required). This survey comes a week after Forrester Research found in their survey that IT security spending is expected to rise (or at least remain the same) — with the current level of data breaches and sensitive data that is not protected well enough, there is a good reason for it.
Image

Slashdot's Disagree Mail 264

In this week's Disagree Mail, I try to show the range of messages I get. It's not all angry or insane, sometimes it's sent to us for no apparent reason. We start off a little mad, slip into a whole bunch of crazy and finish with someone who has a complaint about racism at his favorite restaurant. Read below to get started.
Books

Ivy League Computer Science Curricula Exposed 312

Doug Treadwell writes "Many people have wondered what the difference is between the Computer Science education given in the average public university versus one given in an Ivy League university (or a top level public university). There have also been discussions here on Slashdot about whether any Computer Science curriculum gives students the knowledge they need for the working world. As a computer science student both questions are very important to me, so I decided to answer them for myself and build a website to share what I found. I was able to find the required reading for hundreds of courses at Stanford, Princeton, Carnegie Mellon, and Berkeley; along with some other institutions. This should also help answer some of those 'What should I read?' questions."
Linux

Nokia Urges Linux Developers To Be Cool With DRM 536

superglaze writes in to note that according to Nokia's software chief, its plans for open source include getting developers to accept things like DRM, commercial IP rights, and SIM locks. "Jaaksi admitted that concepts like these 'go against the open-source philosophy,' but said they were necessary components of the current mobile industry. 'Why do we need closed vehicles? We do,' he said. 'Some of these things harm the industry but they're here [as things stand]. These are touchy, emotional issues, but this dialogue is very much needed. As an industry, we plan to use open-source technologies, but we are not yet ready to play by the rules; but this needs to work the other way round too.'"

Slashdot Top Deals

IBM Advanced Systems Group -- a bunch of mindless jerks, who'll be first against the wall when the revolution comes... -- with regrets to D. Adams

Working...