Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Transportation

Bruce Schneier On Airport Security 582

the4thdimension writes "Bruce Schneier has an opinion piece on CNN this morning that illustrates his view on airport security. Given that he has several books on security, his opinion carries some weight. In the article, Bruce discusses the rarity of terrorism, the pitfalls of security theater, and the actual difficulty surrounding improving security. What are your thoughts? Do you think that we can actually make air travel (and any other kind of travel, for that matter) truly secure?"
The Courts

FreeCreditReport.com Wins 1,017 Domains By UDRP 184

typosquatting writes to mention that the largest domain dispute case since the Uniform Domain-Name Dispute Resolution Policy (UDRP) was enacted ten years ago has been decided. The decision saw 1,017 cyber-squatting domains turned over to ConsumerInfo.com, owner of FreeCreditReport.com. The full decision can be read via the National Arbitration Forum website. "It would seem that this decision sets or reinforces a fairly strong precedent that trademark holders may be entitled to, not only to the domain name that exactly matches their trademark, but also to a wide swath of other domain names including nearly every possible misspelling or other variation of that trademark, potentially even if the trademark is comprised of generic words."
Censorship

Man Attacked In Ohio For Providing Iran Proxies 467

David Hume writes "electronicmaji is reporting on the Daily Kos that the individual known as ProtesterHelp (also to be found on twitter) was attacked in Ohio for providing network security for Twitterers in Iran, setting up private networks to provide secure proxies, calling for media networks to remove the Iranians Twitterers' information from their broadcast, and providing counter-intelligence services (including Basiji and Army Locations) within the Twitter community. ProtesterHelp was allegedly attacked by a group of men while walking to class in Ohio. The men, who appeared to ProtesterHelp to be either Iranian or Lebanese, drove up beside him and threw rocks at him while shouting, 'Mousavi Fraud.' ProtesterHelp further reported that his personal information has been leaked, and is currently being spread both online and inside of Iran amongst the government." Relatedly, Wired is also reporting that Google and Facebook have rushed out support for Persian. This move has allowed many pro-democracy groups to connect and translate their message to a broader audience.
Government

CIA Officers Are Warming To Intellipedia 102

Hugh Pickens writes "The CIA is adopting Web 2.0 tools like collaborative wikis but not without a struggle in an agency with an ingrained culture of secrecy. 'We're still kind of in this early adoptive stage,' says Sean Dennehy, a CIA analyst and self-described 'evangelist' for Intellipedia, the US intelligence community's version of the popular user-curated online encyclopedia Wikipedia adding that 'trying to implement these tools in the intelligence community is basically like telling people that their parents raised them wrong. It is a huge cultural change.' Dennehy says Intellipedia, which runs on secure government intranets and is used by 16 US intelligence agencies, was started as a pilot project in 2005 and now has approximately 100,000 user accounts and gets about 4,000 edits a day. 'Some people have (supported it) but there's still a lot of other folks kind of sitting on the fence.' Dennehy says wikis are 'a challenge to our culture because we grew up in this kind of "need to know" culture and now we need a balance between "need to know" and "need to share."' A desire to compartamentalize information is another problem. 'Inevitably, every person, the first question we were asked is "How do I lock down a page?" or "How do I lock down a page so that just my five colleagues can access that?"' The growth of Intellipedia has so far largely been fueled by early adopters and enthusiasts says Chris Rasmussen, a social-software knowledge manager and trainer at the National Geospatial Intelligence Agency. 'We are struggling to take it to the next level.'"
Earth

Frank Herbert's Moisture Traps May Be a Reality 226

Omomyid writes "In the seminal science fiction book 'Dune,' Frank Herbert envisioned the Fremen collecting water from the air via moisture traps and dew collectors. Science Daily reprints a press release from the Fraunhofer Institute in Stuttgart, where scientists working with colleagues from Logos Innovationen have developed a closed-loop and self-sustaining method, no external power required, for teasing the humidity out of desert air and into potable water."
Image

Swedish Anti-Piracy Lawyer Gets New Name 'Pirate' 178

An anonymous reader writes "Swedish newspaper Aftonbladet (in Swedish) reports that Henrik Pontén, a lawyer of Antipiratbyrån, a Swedish organization against file sharing, has received a notification from officials that an application for change of his name has been approved and a new first name 'Pirate' has been added to his name. Authorities do not check the identity of persons applying for name changes. Pirate Pontén now has to apply for another change in order to revert the change."
Businesses

Buying a Domain From a Cybersquatter 800

Nevo writes "A partner and I are in the planning stages of a business. We've decided on a name that we'd like to use but the domain name is already registered. The owner has a single 'search' page up (similar to the one at www.goggle.com)... clearly not a legitimate business interest, but since we don't own a trademark on this name it doesn't qualify as bad faith, I don't think. Does anyone have any experience buying domains from these operators? Do you have any advice on how to approach the owners of these domains to get them at a reasonable cost?"
The Internet

What Do You Do With a Personal Domain? 286

bmerr71 writes "I bought my own domain name to use as a self-promotion tool. I use a subdomain, 'profile.mydomain.com', which I selectively put on my email signatures to link to my linkedin profile. I also loaded up Google Apps to use for email. But when you go directly to my domain name, there is nothing there. I didn't want GoDaddy getting ad revenue off my name (and it doesn't look very professional), so I killed the ad page, but it seems like I should be able to put something up on my main page. But, I am not interesting in blogging, I do not want too much personal information up there, and I do not want to spend a lot of money (none, if possible). Are there any free apps that I can load up on my domain to fill the blank space? What do non-bloggers do with their personal domains?"
Education

Keeping a PC Personal At School? 695

Berto Kraus writes "As one of the most tech-oriented students in my art-oriented institution, I'm usually the one with the laptop. This causes frequent requests from other students to read mail, check some site, or connect it to the projector to display a file from their Flash drive. For the sake of my privacy, the health of my laptop, and my own peace of mind, I'm reluctant. But telling my compatriots to go to our building supervisor and ask him for a desktop-on-a-cart, as they should do, is considered rude and unfriendly. Now, I could dual-boot Ubuntu, or carry around a Linux-on-a-stick. Or I could embed the computer in my skull. For many reasons, none of these solutions is ideal. So I'm asking you, insightful and funny Slashdotters, what would you do to keep your PC personal at school?"
Communications

Phony TCP Retransmissions Can Hide Secret Messages 188

Hugh Pickens writes "New Scientist reports that a team of steganographers at the Institute of Telecommunications in Warsaw, Poland have figured out how to send hidden messages using the internet's transmission control protocol (TCP) using a method that might help people in totalitarian regimes avoid censorship. Web, file transfer, email and peer-to-peer networks all use TCP, which ensures that data packets are received securely by making the sender wait until the receiver returns a 'got it' message. If no such acknowledgment arrives (on average 1 in 1000 packets gets lost or corrupted), the sender's computer sends the packet again in a system known as TCP's retransmission mechanism. The new steganographic system, dubbed retransmission steganography (RSTEG), relies on the sender and receiver using software that deliberately asks for retransmission even when email data packets are received successfully (PDF). 'The receiver intentionally signals that a loss has occurred,' says Wojciech Mazurczyk. 'The sender then retransmits the packet but with some secret data inserted in it.' Could a careful eavesdropper spot that RSTEG is being used because the first sent packet is different from the one containing the secret message? As long as the system is not over-used, apparently not, because if a packet is corrupted, the original packet and the retransmitted one will differ from each other anyway, masking the use of RSTEG."
Security

Investigators Replicate Nokia 1100 Banking Hack 181

Ian Lamont writes "Investigators have duplicated an online banking hack using a 2003-era Nokia mobile phone. Authorities had been aware for some time that European gangs were interested in buying the phone, and were finally able to confirm why: It can be used to access victims' bank accounts using "special software written by hackers." The hack apparently works by letting criminals reprogram the phones to use someone else's phone number and receive their SMS messages, including mTANs (mobile transaction authentication numbers) from European banks. However, the only phones that work are 1100 handsets (pictures) made in a certain factory. Nokia had claimed last month it had no idea why criminals were paying thousands of euros to buy the old handsets."
Mozilla

Mozilla Jetpack, an API For Standards-Based Add-Ons 42

revealingheart writes "Mozilla Labs have released a prototype extension called Jetpack: An API for allowing you to write Firefox add-ons using existing web technologies to enhance the browser (e.g. HTML, CSS and Javascript), with the goal of allowing anyone who can build a Web site to participate in making the Web a better place to work, communicate and play. Example add-ons are included on the Jetpack website. While currently only a prototype, this could lead to a simpler and easier to develop add-on system, which all browsers could potentially implement."
Transportation

Australia, UK To Test Vehicle Speed-Limiting Devices 859

nemesisrocks writes "The New South Wales government is set to begin testing a device that will limit the speed of drivers because 'excessive speed is one of the primary ways that people are killed while driving.' Located on the dashboard, it senses a driver's speed with the use of GPS. If the speed of a car goes over the posted legal limit, a warning sounds. If the driver ignores the warning, the device eventually cuts all power to the car because a cut-off switch has been installed between the accelerator and the engine." The Times Online reports that the same system will be tested in the UK this summer for use in taxis and buses.
Government

Database of All UK Children Launched 296

An anonymous reader writes "'A controversial database which holds the details of every child in England has now become available for childcare professionals to access. The government says it will enable more co-ordinated services for children and ensure none slips through the net. 390,000 people will have access to the database, but will have gone through stringent security training.'"

Slashdot Top Deals

A businessman is a hybrid of a dancer and a calculator. -- Paul Valery

Working...