Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Idle

Your Cat Wants Armor 3

What would you get if you crossed The Society for Creative Anachronism with an old cat lady? Cat armor of course. Now the age old question of whether or not a cat thrown into battle lands on its feet can be answered. To keep the playing field level, they've also made mouse armor.
The Courts

Submission + - Oregon AG Seeks to investigate RIAA tactics

NewYorkCountryLawyer writes: "Turning the tables on the RIAA's attempt to subpoena information from the University of Oregon about the identities of the university students, the Attorney General has now filed additional papers requesting permission from the Court to conduct immediate discovery into the RIAA's 'data mining' techniques, such as the use of unlicensed investigators, the turning over of subpoenaed information to collection agencies, the obtaining of personal information from computers. The AG pointed out (pdf) that "Because Plaintiffs routinely obtain ex parte discovery in their John Doe infringement suits.....their factual assertions supporting their good cause argument are never challenged by an adverse party and their investigative methods remain free of scrutiny. They often settle their cases quickly before defendants obtain legal representation and begin to conduct discovery...... and have dropped cases, such as their case against Tanya Andersen, in which their methods and practices have been challenged through counterclaims...... While the University is not a party to the case, Plaintiffs' subpoena affects the university's rights and obligations. Plaintiffs may be spying on students who use the University's computer system and may be accessing much more than IP addresses." As one commentator succinctly put it, "They'll be going bananas in RIAA land" after reading this filing."
Government

Canada's New DMCA Considered Worst Copyright Law 234

loconet writes "The government of Canada is preparing to attempt to bring a new DMCA-modeled copyright law in Canada in order to comply with the WIPO treaties the country signed in 1997. (These treaties were also the base of the American DMCA.) The new Canadian law will be even more restrictive in nature than the American version and worse than the last Canadian copyright proposal, the defeated Bill C-60. Among the many restrictive clauses in this new law, as Michael Geist explains, is the total abolishment of the concept of fair use: 'No parody exception. No time shifting exception. No device shifting exception. No expanded backup provision. Nothing.' Geist provides a list of 30 things that can be done to address the issues."
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.
Slashdot.org

Introducing the Slashdot Firehose 320

Logged in users have noticed for some time the request to drink from the Slashdot Firehose. Well now we're ready to start having everybody test it out. It's partially a collaborative news system, partially a redesigned & dynamic next-generation Slashdot index. It's got a lot of really cool features, and a lot of equally annoying new problems for us to find and fix for the next few weeks. I've attached a rough draft of the FAQ to the end of this article. A quick read of it will probably answer most questions from how it works, what all the color codes mean, to what we intend to do with it.
Security

What We Know About the FBI's CIPAV Spyware 207

StonyandCher writes "What is CIPAV? CIPAV stands for 'Computer and Internet Protocol Address Verifier'; a lengthy term for powerful spyware the Federal Bureau of Investigation can bring to bear on web-based crime. It was used last month in a case where someone was emailing bomb threats regularly to a Washington high school. An affidavit by an FBI agent revealed some of the workings of CIPAV. 'According to the court filing, this is [some of] what the CIPAV collects from the infected computer: IP address, Media Access Control address for the network card, List of open TCP and UDP ports, List of running programs ... Last visited URL. Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.' In a Computerworld article, the author attempts to dissect CIPAV's purpose and raises a number of questions such as: What happens to the data the CIPAV collects? Does the CIPAV capture keystrokes? Can the CIPAV spread on its own to other computers, either purposefully or by accident? Does it erase itself after its job is done?"
Announcements

Submission + - Plants 'recognize' their siblings (pressesc.com)

An anonymous reader writes: Biologists have discovered that just like humans, plants can also recognize their relatives. Researchers at McMaster University have found that plants get fiercely competitive when forced to share their pot with strangers of the same species, but they're accommodating when potted with their siblings.
Google

Google Wins Nude Thumbnail Legal Battle 204

eldavojohn writes "Google is currently fighting many fronts in its ability to show small images returned in a search from websites. Most recently, Google won the case against them in which they were displaying nude thumbnails of a photographer's work from his site. Prior to this, Google was barred from displaying copyrighted content, even when linking it to the site (owner) from its search results. The verdict: "Saying the District Court erred, the San Francisco-based appeals court ruled that Google could legally display those images under the fair use doctrine of copyright law." This sets a rather hefty precedence in a search engine's ability to blindly serve content safely under fair use."
Robotics

A Robotic Cable Inspection System 65

Roland Piquepaille writes "In a short article, Popular Science reports that researchers at the University of Washington have built a robotic cable inspection system. This system should help utility companies to maintain their networks of subterranean cables. The robot, dubbed Cruiser, is about 4-feet-long and is designed like a snake. When it detects an anomaly on an underground cable, it sends a message to a human operator via Wi-Fi. The first field tests took place in New Orleans in December 2006. But a commercial version should not be available before 2012."
Data Storage

The First Terabyte Hard Drive Reviewed 495

mikemuch writes "ExtremeTech has a review and benchmarks of the Hitachi Deskstar 7K1000 1TB Hard Drive, which ushers in the terabyte age. It performs well on HDTach and PCMark benchmarks, though not as speedily as professional-grade drives. It could be just the ticket for digital media junkies. 'One of the first issues to note is that you may not see an actual one terabyte capacity on your system. First, the formatted capacity is always less than the raw space available on the drive. Directory information and formatting data always take up some space. Second, the hard drive industry's definition of a megabyte differs from the rest of the PC business. One megabyte of hard drive space is 1,000,000 bytes: 10^6 bytes. Operating systems calculate one megabyte as 2^20 bytes, or 1,048,576 bytes. Once installed and set up, Hitachi's 1TB hard drive offers up an actual formatted capacity of about 935GB, as measured by the OS. That's still a lot of space, by anyone's definition.'" Update: 05/17 21:52 GMT by Z : Adding '^s' missing from article.
Security

AACS Revision Cracked A Week Before Release 346

stevedcc writes "Ars Technica is running a story about next week's release of AACS, which is intended to fix the currently compromised version. The only problem is, the patched version has already been cracked. From the article: 'AACS LA's attempts to stifle dissemination of AACS keys and prevent hackers from compromising new keys are obviously meeting with extremely limited success. The hacker collective continues to adapt to AACS revisions and is demonstrating a capacity to assimilate new volume keys at a rate which truly reveals the futility of resistance. If keys can be compromised before HD DVDs bearing those keys are even released into the wild, one has to question the viability of the entire key revocation model.'"

Slashdot Top Deals

"Bond reflected that good Americans were fine people and that most of them seemed to come from Texas." - Ian Fleming, "Casino Royale"

Working...