Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission Summary: 0 pending, 3 declined, 0 accepted (3 total, 0.00% accepted)

DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Comcast and Time Warner - Match Made in Heaven

whitesea writes: I must admit that I protested the merger and even submitted a comment to FCC that they needed to protect Time Warner customers from Comcast. I have now discovered that I was wrong, and this is indeed a perfect match. Remember all these articles that told us about Comcast employees changing names of complaining customers to something obscene? Here is a proof that Time Warner employees have already been trained in such customer service niceties.

Submission + - Real and fictional MITM attacks

whitesea writes: I recently read "The Loves Of Alonzo Fitz Clarence And Rosannah Ethelton", because a Slashdot reader claimed it described a Man-In-The-Middle (MITM) attack. I discovered that the commenter made a common mistake: mixed up an impersonation and a MITM attack.
I started thinking, "What MITM attacks do I know in fiction or in history?" It turns out that most attacks I could think of were actually impersonation attacks, when Alice thought she was talking to Bob, but in reality, she was talking to Ike. In history, probably the Mary Queen of Scots is the best example, where Elisabeth I was not only reading letters going in both directions, but also made at least one alteration. In literature, I can only think of "The Tale of Tsar Saltan", by the famous Russian poet Pushkin.
There, when the queen sent good news to the king about the birth of a wonderful heir, her envious sisters kidnapped the original messenger and replaced him with another one, who brought the king fake, very upsetting, news. When the king decided to postpone his decision until coming back home, the evil women got the messenger drunk and replaced a reasonable message from the king by one that required execution of his wife and a child. (See details here:

Do you know any other cases of full-fledged MITM attacks, either in fiction or history?

If your examples are not in English, please try to find and post a translation.

I wonder if we can get even 10 examples, that are not just simple impersonation?

Submission + - Fair use wins this round (

whitesea writes: Finally! A judge who actually understands where the copyright comes from. This judge in the Nevada federal district court based his decision on whether use of the copyright by a notorious copyright Righthaven follows the intention of Constitution Article 8. Article 8 lists the powers of Congress and, in particular, states"The Congress shall have Power ...
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries."
The judge concluded that the Righthaven's use of copyright does nothing to encourage and protect creativity and, actually, has a chilling effect. Then, taking into account the way the non-profit used the article and other circumstances, the judge concluded that in this case the fair use exception did apply and found for the non-profit. We need more such judges, with a brain and capable of reading and understanding classical texts. Go read the detals at and enjoy your day.

Slashdot Top Deals

UNIX enhancements aren't.