Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - SPAM: CrossOver Games vs Wine 0.9.58

twickline writes: "Here is the first of a two part post of benchmarks that compare the performance of CrossOver Games 7.0 against Wine 0.9.58, I ran four test this round and they are 3DMark 2000, 3DMark 2001, 3DMark 2003 and Aquamark 3. I plan to test 3DMark 05/06, GlExcess, Performance test and PCMark for the next post, I thought I would split the benchmarks up and run about half of them now and the latter half for the next post."
Link to Original Source

Submission + - Community Codesigning Certificate for J2ME (darkskiez.co.uk)

darkskiez writes: "Nokia have "fixed" a bug which allowed you to install your own root certificates on your own mobile phones, this is no longer possible on Series60 v3 phones. This means that as a hobby developer you cannot make a mobile java application that runs as trusted with full api permissions, without purchasing a $300 to $500 certificate per year. This looks like it is being relaxed a little in the upcoming 3rd generation Mobile Information Device Profile.

In an attempt to reclaim a little more access to their own hardware, there has been limited success at patching some phone firmwares, and I have started a project to facilitate the purchasing of a shared codesigning certificates for the community."


Submission + - When Open Source Hosts Go Bad

Rhett's Dad writes: Be careful who you host your open source project with... have a look at the soap opera going on with the embedded projects Opie, GPE, and IPKG and their host handhelds.org: http://fl0rian.wordpress.com/2007/05/22/threatened -how-do-we-protect-our-projects/

It is interesting to see that the "trademark" notice on the site was slipped in about a week ago, under the guise of a CVS log note "changed e-mail address from webmaster to admin".

If this one sticks, then it makes me wonder if this kind of trademark hijacking could be done at other, bigger, sites...
The Media

Submission + - "The Advocate" perscutes autistic hacker

Analog Anabel writes: "When university students receive bizarre letters referring to bisexuality, gay newsrag "The Advocate" reporter Sarah Aswell does some cyber-sleuthing and unearths a multi-level internet drama. But a check back through internet archives and abandoned guestbooks by a Slashdot blogger reveals a web of serious mistakes, misleading statements, and lies targeted at a abused, shy, but technically adept autistic man."

Submission + - What should I ask Slashdot?

TodMinuit writes: "Dearest Slashdot: Recently, I've wanted to ask Slashdot something. Unable to come up with a question myself, I thought who better to ask what I should ask Slashdot than Slashdot itself? Surely the very people answering the question are quite capable of coming up with one. So, Slashdot, what should I ask Slashdot?"

Submission + - Can a Rootkit Be Certified for Vista?

winetoo writes: "Forget what Microsoft says about Vista being the most secure version of Windows yet. More to the point, what do the hackers think of it? In a nutshell, they think it's an improvement, but at the end of the day, it's just like everything else they dissect — that is, breakable. "Not all bugs are being detected by Vista," pointed out famed hacker H.D. Moore. "Look at how a hacker gets access to the driver: Right now I'm working on Microsoft's automated process to get Metasploit-certified. It [only] costs $500." Moore is the founder of the Metasploit Project and a core developer of the Metasploit Framework — the leading open-source exploit development platform — and is also director of security research at BreakingPoint Systems. The irony of his statement lies in the idea that Vista trusts Microsoft-certified programs — programs that can include a hacker exploit platform that walks through the front door for a mere $500 and a conveyor-belt approval process.

Full details at source."

Submission + - Friends Swap Twitters, and Frustration

WSJdpatton writes: "The growth of services like Twitter and Dodgeball, which tie together instant messaging, social networking and wireless communication, elicits mixed feelings in the technology-savvy people who have been their early adopters. Fans say they are a good way to keep in touch with busy friends. But some users are starting to feel "too" connected, as they grapple with check-in messages at odd hours, higher cellphone bills and the need to tell acquaintances to stop announcing what they're having for dinner."

Submission + - LGPL Swfdec project now works with YouTube!

Ur@eus writes: "The swfdec library which is a LGPL licensed Flash library just announced that code making it work with YouTube has been checked into their Git repository. So you can now view your YouTube movies with an open source solution! This is the result of six months of intensive hacking by swfdec developer Benjamin Otte and a big step forward for opensource Flash support."

Submission + - Generating hifi graphics: which language/libs?

znerd writes: "For an internet site, I need to develop an off-line graphics generator. Since it's off-line, there is not much of a performance-challenge, but quality is; the generated graphics must look absolutely slick. Among my requirements are GIF/JPEG/PNG generation, alpha blending and soft shadows. Generation of animated GIFs is a nice-to-have, but not a requirement. I have started evaluating both Java2D and Cocoa (Mac OS X, Objective C), and both seem acceptable, although Cocoa will probably give nicer results, considering the reputation of Apple's graphical interface.
Do you have experience with (high-volume) off-line generation of graphics? What technologies did you use and which recommendations can you make?"

Submission + - Score: IBM - 700,000 / SCO - 326

The Peanut Gallery writes: "After years of litigation to discover what, exactly, SCO was suing about, IBM has finally discovered that SCO's "mountain of code" is only 326 scattered lines. Worse, most of what is allegedly infringing are comments and simple header files, like errno.h, which probably aren't copyrightable for being unoriginal and dictated by externalities, aren't owned by SCO in any event, and which IBM has at least five separate licenses for, including the GPL, even if SCO actually owned those lines of code. In contrast, IBM is able to point out 700,000 lines of code, which they have properly registered copyrights for, which SCO is infringing upon if the Court rules that it has, in fact, repudiated the GPL. If this were a game show, I suspect SCO would be complaining that their buzzer wasn't working right about now."

Submission + - RIAA sues paralyzed stroke victim

Stangger writes: Just when you thought they couldn't do any worse, the RIAA is suing a paralyzed Stroke victim for alleged copyright infringment in Michigan. Of course, he lives in Florida, but that shouldn't be more than a minor glitch in the lawsuit. Article: http://gizmodo.com/gadgets/riaa-boycott/riaa-tires -of-suing-babies-and-elderly-moves-on-to-paralyzed -stroke-victims-244108.php

Submission + - "Spamtrap" - an electronic installation a

bshack writes: ""Spamtrap" is an interactive installation piece that helps me fine tune my spam email filter. (video) My Spamtrap monitors an email address I created specifically to lure in spam. I do not use this email address for any other communication. I post this email address on websites and online bulletin boards that cause it to be harvested by spambots and then to start receiving spam. Because I know that all email sent to this email address is spam, I can adjust my spam filter to look for characteristics found in those confirmed spam messages when filtering out spam for my personal email account. Click here for more information about Spamtraps. The installation uses a wirelessly network connected Pentium II computer, personal printer, personal shredder and a Spamtrap email address. When a new spam email is detected by my installation, it automatically prints it out. The printed email slides down a track into the shredder that analyzes it. After the spam email has been analyzed the paper is then recycled. Watch the Documentation Video"

Submission + - New Fair Use Bill introduced today to change DMCA

An anonymous reader writes: WashingtonPost.com notes that Reps Boucher(D-Va) and Dolittle(R-Calif) today introduced the FAIR USE Act that updates the DMCA to "make it easier for digital media consumers to use the content they buy." Boucher's statement on the bill says "The Digital Millennium Copyright Act dramatically tilted the copyright balance toward complete copyright protection at the expense of the public's right to fair use..." Backing the bill is the Consumer Electronics Association, the Home Recording Rights Coalition, the American Library Association and others.

Submission + - Heroic Slashdotter Mistakes Pron for Rape

ObiWanStevobi writes: Ok, since this is considered an invasion case, I picked YRO. I also figured a sword qualifies as a handheld device.

A man who lives in his mother's basement, and has a sword collection, is being charged after breaking into his neighbor's house. He broke in after hearing what sounded like a woman being raped. He burst through the door weilding his sword with a +3 Dexterity adrenaline rush. The frightened wanker then proceeded to show him(James Van Iveren AKA Krunk the Slashdotter) that he was alone and just watching a porno. Van Iveren is now being charged on several counts such as trespassing and damage to property for breaking the door. LINK

PS Notice the URL, porn.sword.ap
The Almighty Buck

Submission + - What is the cost of using hosted applications?

foniksonik writes: I work at a small company, less than 30 people, and yet the leadership refuses to consider using hosted applications for ANY purpose. They won't consider going to Gmail as a POP email provider, or using Basecamp for Project Management or Harvest for timesheets, Salesforce for CRM. etc. even though these hosted applications would save them a lot of effort/grief as well as time = money.

They claim that there is a huge downside to not 'owning' their own data in these areas and that it far outweighs the savings from not having to manage, maintain and support those tools internally. SO we have created a hodgepodge of opensource versions of the tools (dotProject, timesheet, Sugar) which don't interoperate well together either AND take a lot of time to set up, deploy, configure and customize for our needs. We have competent developers and a team in India we contract to for time intensive troubeshooting... but he time they spend on these apps takes away from time they could be devoting to PAID projects.

What do you think Slashdot? Are hosted apps a money loser, does not having ultimate control of your operational business data (as opposed to your code or other proprietary data) keep you from considering them as a time = money saver? If your company has already made the leap to hosted apps for business use, what are your experiences — good and bad?

Slashdot Top Deals

Consultants are mystical people who ask a company for a number and then give it back to them.