Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
The Internet

Submission + - ICANN Wants To Change Rules For gTLDs (thedomains.com)

An anonymous reader writes: The May 10th deadline for comments on the .net registry agreement renewal has arrived with new domain name dispute changes that aid corporations. Instead of UDRP, the new agreement proposes adding the Uniform Rapid Suspension (URS) process to the .net TLD. The URS is a quick $200 process for a trademark holder to disable and take ownership of a domain. URS also reduces the panel size from 1-3 people to a single person. You can still comment on the proposal by sending an email to ICANN (net-agreement-renewal@).
Government

Submission + - FTC Introduces New Orders for Intel; No bundling (bloomberg.com)

eldavojohn writes: Today a decision was handed down (PDF) from the FTC that underlined new guidelines for Intel in the highly anticipated investigation. Biggest result: the practices Intel employed like bundling prices to get manufacturers like Dell to block sales of competitors' chips like AMD must stop. No word yet on whether or not Intel will face monetary fines from the FTC like they did in Europe over the same monopolistic practices.

Submission + - Entire .SE TLD Drops off the Internet (pingdom.com)

Icemaann writes: Pingdom and Network World are reporting that the .SE tld dropped off the internet yesterday due to a bug in the script that generates the .SE zone file. The .SE tld has close to one million domains that all went down due to missing the trailing dot in the SE zone file. Some caching nameservers may still be returning invalid DNS responses for 24 hours.
Security

Submission + - New DoS Vulnerability in All Versions of BIND 9 (isc.org)

Icemaann writes: ISC is reporting that a new, remotely exploitable, vulnerability has been found in all version of BIND 9. A specially crafted dynamic update packet will make BIND die with an assertion error. There is an exploit in the wild and there are no access control workarounds. RedHat claims that the exploit does not affect BIND servers that do not allow dynamic updates. This is a high priority vulnerability and DNS operators will want to upgrade BIND to the latest patch level.

Comment Re:The Poor Man's RAID Array (Score 1) 649

Well, I'm similarly poor, so went with a el cheapo "RAID1" controller. Thats what it said on the packet, but, FreeBSD see's it as a plain old IDE controller. Not to worry, 4 x 120Gb drives, and then use gmirror to create a coupla metadrives with mirroring. Cheap? Yes. But, it works.

-L
--
My Mrs looks over my shoulder to read my email, but ignores /. Go figure.

Slashdot Top Deals

One can't proceed from the informal to the formal by formal means.

Working...