Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Yahoo May Re-Consider Google Alliance, Rebuff Microsoft 273

anastasd writes "Reuters is reporting that Yahoo might consider a business alliance with Google as a way to top a $44.6 billion takeover proposal by Microsoft. 'Yahoo management is considering revisiting talks it held with Google several months ago on an alliance as an alternative to Microsoft's bid, that source said. At $31 a share, Yahoo believes the bid undervalues the company, two sources said. A second source close to Yahoo said it had received a procession of preliminary contacts by media, technology, telephone and financial companies. But the source said they were unaware whether any alternative bid was in the offing.'"

Submission + - Network defense against malicious nodes

An anonymous reader writes: New Scientist article on a new strategy for network self-defense, conceptually related to a bee sting:

The approach works by giving all the devices on a network — or "nodes" — the ability to destroy themselves, taking any nearby malevolent device with them. "Bee stingers are a relatively strong defence mechanism for protecting a hive, but whenever the bee stings, it dies," says Tyler Moore, a security engineer at the University of Cambridge in the UK.

Self-sacrifice provides a check against malicious nodes attacking legitimate ones. "Our suicide mechanism is similar in that it enables simple devices to protect a network by removing malicious devices — but at the cost of its own participation," Moore adds.

The technique they have developed, called "suicide revocation," lets a single node decide quickly whether another node's behaviour is malevolent and shut it down. But there's a drastic cost: the single node must deactivate itself too. It simply broadcasts an encrypted message declaring itself and the malevolent node dead.

... "Nodes must remove themselves in addition to cheating ones to make punishment expensive," says Moore. "Otherwise, bad nodes could remove many good nodes by falsely accusing them of misbehaviour."

One-Third of Employees Violate Company IT Policies 320

BaCa writes with a link indicating that a survey of white collar US workers shows that something like a third of all employees break IT policies. Of those, almost a sixth actually used P2P technologies from their work PCs. Overall, the survey indicates workers aren't overly concerned about any kind of security: "The telephone survey found that 65% of white-collar professionals are either not very concerned or not concerned at all about their privacy when using a workplace computer. A surprising 63% are not very concerned or are not concerned at all about the security of their information while at work. Additionally, most employees have the misconception that these behaviors pose little to no risk to their companies."
PC Games (Games)

Submission + - Atari Posts 70M$ Loss... De-listing possible (

Khalbrae writes: "Atari Inc. on Tuesday filed its delayed annual report for the fiscal year ending March 31, reporting a net loss of $69.7 million on net revenue of $122.3 million, compared to a net loss of $69 million on revenue of $206.8 million a year earlier. In a news release, Atari described its latest 10-K filing as a move that will bring the company "one step closer" to resolving its looming Nasdaq delisting. In July, Atari said it did not file its FY07 10-K report on time and received a notice from the stock exchange warning that the company was not in compliance with exchange rules and that its stock was subject to removal."

GCC Compiler Finally Supplanted by PCC? 546

Sunnz writes "The leaner, lighter, faster, and most importantly, BSD Licensed, Compiler PCC has been imported into OpenBSD's CVS and NetBSD's pkgsrc. The compiler is based on the original Portable C Compiler by S. C. Johnson, written in the late 70's. Even though much of the compiler has been rewritten, some of the basics still remain. It is currently not bug-free, but it compiles on x86 platform, and work is being done on it to take on GCC's job."

Submission + - Storm Worm htis the NFL over the weekend (

Negsss writes: "Are you ready for some malware? The ubiquitous Storm Worm hit the US gridiron over the weekend when attackers, through mass emails, attempted to dupe NFL fans into visiting a malicious website promising information about the season's opening weekend."
It's funny.  Laugh.

Submission + - Jobs Offers Apple Lisa Early Adopters Store Credit (

Brian writes: From the most trusted source for tech news, BBspot. "After giving early iPhone adopters a $100 refund, Steve Jobs finally decided it was time to make good with all those Apple Lisa buyers. If you remember, the Apple Lisa came out at $9995 and not long after the similar Mac came out at $2495. Store credit of $7k for every one who has a receipt and proof of purchase. Is this too little, too late for all those burned by the Lisa?" Can you believe it?

Submission + - NASA monitors lightning inside hurricanes

Roland Piquepaille writes: "According to a new study from NASA, it is possible to forecast a storm's intensity by monitoring the lightning strikes near a hurricane's eye. And it can be done weeks before the storm arrives with the help of 'highly-sensitive sensors located thousands of miles from the storm.' Today, the Pacific Lightning Detection Network (PacNet) is based on a network of four lightning location sensors in the central north Pacific. The detectors have been installed in Dutch Harbor (Alaska), Kwajalein Atoll (Marshall Islands), Lihue and Kona (both in Hawaii). More sensors should be installed in Kiritimati (Christmas Island, Kiribati)and in Japan, Korea, and Australia. Read more for additional details and to see how NASA is using these lightning sensors."
The Courts

Submission + - Darl McBride: SCO isn't dead yet (

Ian Lamont writes: "Computerworld has an interview with Darl McBride, the SCO CEO who launched a series of lawsuits against IBM, Novell, and several large Linux users, relating to SCO's claim that its IP rights were violated. Despite last week's court ruling that found Novell to be the owner of the Unix and UnixWare copyrights, McBride says in the interview that "some very encouraging things" came out of the ruling, and "it's one of the more exciting times for this company." He compares SCO with Apple in the mid-1990s and Apple's subsequent comeback, and describes SCO's current plans for developing Unix for mobile devices. Of his many critics in the media, McBride says "I think this thing has been overplayed just a tad." Meanwhile, Frank Hayes says one of the critics — Groklawdeserves credit for making available documents and analysis that has kept this story in the spotlight for the past five years, and filtering out the PR noise from the various players in the case:

Once documents in the lawsuits started to pile up, it was possible to draw hard conclusions based on the evidence presented to the court, rather than public-relations bluster. Which explains why so many analysts were able to tell their clients there wasn't much legal risk to worry about with Linux — and tell them that literally years before the hammer finally fell on the litigation. All thanks to the Groklaw crowd's desire to pile up every suit-related document they could find. Did Groklaw really have an impact on those court cases? Naaah. The impact was on the rest of us. That collection of documents gave SCO's suits a transparency that's impossible to come by with most IT industry litigation.

McBride says SCO is looking at filing an interlocutory appeal, which would deliver an immediate ruling even as the trial proceeds.

Wireless Networking

Submission + - Is "borrowing" Wi-Fi ethical? (

Z80xxc! writes: BBC has written an article about "stealing" Wi-Fi, and whether or not it is ethical. After all of the recent attention given to arrests due to wireless borrowing, it makes me wonder what will happen in the future. Do you steal wireless? Do you think it's ethical? I do.
Emulation (Games)

Submission + - Tux Racer Arcade Game?!?!

Hawkeye05 writes: "I was at a local Casino and I went to the Arcade because i couldn't find any $3 Blackjack tables and guess what I found, A TUX RACER ARCADE GAME! Now I haven't checked into it that deeply but I would assume that this is some violation of the GPL. But I do find it rather sad how nowhere on it did it mention even who Tux is or what he stands for. Sorry for the poor image quality.

Crappy Cell Phone Photos hoto-0034.jpg hoto-0035.jpg"

Slashdot Top Deals

"If it's not loud, it doesn't work!" -- Blank Reg, from "Max Headroom"