Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Stress? (Score 1) 470

If I could mod you up, I would. Being drunk is not an excuse for *anything*, except maybe a hangover. All your faculties are still present until right about the point you pass out, and you shouldn't be getting there anyway, as you said.
Privacy

Submission + - Ubuntu's new Firefox is watching you (launchpad.net) 3

sukotto writes: Ubuntu recently released an unannounced and experimental "multisearch" extension to Firefox alpha3... apparently to improve the default behavior of new tabs and of search. In a response to one of the initial bug reports the maintainers mentioned that the extension's other purpose was for "collecting the usage data" and "Generating revenue" [citation] . Since this extension installs by itself and offers no warning about potential privacy violations, quite a few people (myself included) feel pretty unhappy.

There is no way to opt-out other than manually disabling the extension via Tools >> Add-ons.

Security

Submission + - UK national ID card cloned in 12 minutes (computerweekly.com) 1

Death Metal writes: "The prospective national ID card was broken and cloned in 12 minutes, the Daily Mail revealed this morning.

The newspaper hired computer expert Adam Laurie to test the security that protects the information embedded in the chip on the card.

Using a Nokia mobile phone and a laptop computer, Laurie was able to copy the data on a card that is being issued to foreign nationals in minutes."

Medicine

Submission + - SPAM: Is Genius I.Q. Linked to Psychosis? 2

destinyland writes: "New research suggests a genetic mutation linked to psychosis (and schizophrenia) could also be related to genius IQs. This supports the pscyhological theory that genius "blends intelligence with just the right amount of psychoticism" (which creates unconventional thinking). Evolution may even have favored schizophrenia and bipolar syndrome because the same gene also boosts creativity. But one geneticist still believes exactly the opposite. "Madness is often madness — and doesn't have as much genetic association with intelligence.""
Link to Original Source
Privacy

Submission + - Can we abandon Confidentiality for Google Apps? 1

An anonymous reader writes: I provide IT services for medium sized medical and law practices and have been getting a lot of feedback from doctors and lawyers who use gmail at home and believe that they can run a significant portion of their practice IT on Google Apps. From a support standpoint, I'd be happy to chuck mail/calendar service management into the bin and let them run with gmail, but for these businesses, there is significant legal liability associated with the confidentiality of their communications and records (eg HIPPA).

For those with high profile celebrity clients, stating that "Google employees can read your stuff" will usually end the conversation right there, but for smaller practices I often get a lot of pushback in the form of "What's wrong with trusting Google?" and "Google's not interested in our email/calendar". Weighing what they see as a tiny legal risk against the promise of Free IT Stuff(TM) becomes increasingly difficult in the face of the clear functionality/usability/ubiquity that they experience when using Google at home. So my question to the Slashdot community is this:

Are they right? Is it time for me to remove the Tin Foil Hat from their confidentiality obligations and stop resisting the juggernaut that is Google?
If not, what's the best way to clarify the confidentiality issues?
United States

Journal SPAM: McCain Ineligible for Presidency? 7

7 FAM 1116.1-4 Not Included in the Meaning of "In the United States"

([spam URL stripped]; 11-30-95)

a. A U.S.-registered or documented ship on the high seas or in the exclusive economic zone is not considered to be part of the United States. A child born on such a vessel does not acquire U.S. citizenship by reason of the place of birth (Lam Mow v. Nagle, 24 F.2d 316 (9th Cir., 1928)).

United States

Journal SPAM: InfraGuard Prepped for Martial Law: "When" not "If" 2

Today, more than 23,000 representatives of private industry are working quietly with the FBI and the Department of Homeland Security. The members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public does--and, at least on one occasion, before elected officials. In return, they provide information to the government, which alarms the ACLU. But there may be more to it than that. One business executive, who showed me his InfraGard card, t

Security

Submission + - Government-sponsored cyberattacks on the rise (networkworld.com) 1

jbrodkin writes: "A new McAfee report finds that 120 countries, notably the United States and China, are launching Web espionage operations. Government-sponsored cyber attacks against enemy countries are becoming more common, targeting critical systems including electricity, air traffic control, financial markets and government computer networks. This year, Russia allegedly attacked Estonian government news and bank servers, while China was accused of hacking into the Pentagon. A McAfee researcher says this trend will accelerate, noting "it's easier to attack government X's database than it is to nuke their troops.""
Software

Submission + - The Really Fair Scheduler (kerneltrap.org)

derrida writes: "During the many threads discussing Ingo Molnar's recently merged Completely Fair Scheduler, Roman Zippel has repeatedly questioned the complexity of the new process scheduler. In a recent posting to the Linux Kernel mailing list he offered a simpler scheduler named the 'Really Fair Scheduler' saying, "as I already tried to explain previously CFS has a considerable algorithmic and computational complexity. This patch should now make it clearer, why I could so easily skip over Ingo's long explanation of all the tricks CFS uses to keep the computational overhead low — I simply don't need them.""

iPhone Root Password Hacked in Three Days 311

unPlugged-2.0 writes "An Australian developer blog writes that the iPhone root password has already been cracked. The story outlines the procedure but doesn't give the actual password. According to the story: 'The information came from an an official Apple iPhone restore image. The archive contains two .dmg disk images: a password encrypted system image and an unencrypted user image. By delving into the unencrypted image inquisitive hackers were able to discover that all iPhones ship with predefined passwords to the accounts 'mobile' and 'root', the last of which being the name of the privileged administration account on UNIX based systems.' Though interesting, it doesn't seem as though the password is good for anything. The article theorizes it may be left over from development work, or could have been included to create a 'false trail' for hackers."
Biotech

Submission + - Open-Source Biology? (nybooks.com)

kripkenstein writes: In an interesting article by the physicist Freeman Dyson, he discusses the history and future of biology in terms that many Slashdotters would be familiar with,

[We can speculate about] a golden age [...] when horizontal gene transfer was universal and separate species did not yet exist. Life was then a community of cells of various kinds, sharing their genetic information [...] Evolution could be rapid, as new chemical devices could be evolved simultaneously by cells of different kinds working in parallel and then reassembled in a single cell by horizontal gene transfer.

But then, one evil day, a cell resembling a primitive bacterium happened to find itself one jump ahead of its neighbors in efficiency. That cell, anticipating Bill Gates by three billion years, separated itself from the community and refused to share. Its offspring became the first species [...] reserving their intellectual property for their own private use. With their superior efficiency, the bacteria continued to prosper and to evolve separately, while the rest of the community continued its communal life. [...] And so it went on, until nothing was left of the community and all life was divided into species.

[This period] has lasted for two or three billion years. It probably slowed down the pace of evolution considerably.

[But] now, as Homo sapiens domesticates the new biotechnology, we are reviving the ancient [...] practice of horizontal gene transfer, moving genes easily from microbes to plants and animals, blurring the boundaries between species. We are moving rapidly into the post-Darwinian era, when [...] the rules of Open Source sharing will be extended from the exchange of software to the exchange of genes. Then the evolution of life will once again be communal, as it was in the good old days before separate species and intellectual property were invented.
Certainly an unexpected context in which to see Open Source and Bill Gates mentioned in. Are biology and software more similar than we might think? And if so, what does the history of biology portend for the longevity of Microsoft's dominance?

Google Maps Now Does Interactive Re-Routing 188

An anonymous reader writes "Remember how cool it was the first time you used MapQuest or Google Maps or Google Earth? You'll feel like it's the first time again, when you use interactive dragging of routes on Google Maps. Some of the folks from the development team have even whipped up a handy video to explain the concept."
Hardware Hacking

Submission + - Can cryptography prevent printer-ink piracy? 1

Zack Melich writes: Cryptography Research Inc. (CRI), a San Francisco company, is developing chip technology aimed at helping printer manufacturers protect this primary source of profit. The company's chips use cryptography designed to make it harder for printers to use off-brand and counterfeit cartridges. CRI plans to create a secure chip that will allow only certain ink cartridges to communicate with certain printers. CRI also said that the chip will be designed that so large portions of it will have no decipherable structure, a feature that would thwart someone attempting to reverse-engineer the chip by examining it under a microscope to determine how it works. Its chip generates a separate, random code for each ink cartridge, thus requiring a would-be hacker to break every successive cartridge's code to make use of the cartridge. "You can see 95 percent of the [chip's] grid and you still don't know how it works," said Kit Rodgers, CRI's vice president of business development.
United States

Submission + - New York! My kinda' place... I got a permit! (nytimes.com)

G4Cube writes: From the NY Times, New York City May Seek Permit and Insurance for Many Kinds of Public Photography... "Some tourists, amateur photographers, even would-be filmmakers hoping to make it big on YouTube could soon be forced to obtain a city permit and $1 million in liability insurance before taking pictures or filming on city property, including sidewalks". If ever a law was made for cops to "thump and trump" anyone, this is one. "Hey buddy. "You got a permit? Yeah, I'm talkin' to you.

Slashdot Top Deals

APL is a write-only language. I can write programs in APL, but I can't read any of them. -- Roy Keir

Working...