Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:hmm (Score 4, Insightful) 894

In the US, which by virtue of the 1st Amendment has some of the strongest free speech protections in the world, those words would probably constitute "fighting words'.
Chaplinsky v. New Hampshire
"insulting or 'fighting words,' those that by their very utterance inflict injury or tend to incite an immediate breach of the peace" are among the "There are certain well-defined and narrowly limited classes of speech, the prevention and punishment of which have never been thought to raise any constitutional problem. These include the lewd and obscene, the profane, the libelous, and the insulting or "fighting words" those that by their very utterance inflict injury or tend to incite an immediate breach of the peace. It has been well observed that such utterances are no essential part of any exposition of ideas, and are of such slight social value as a step to truth that any benefit that may be derived from them is clearly outweighed by the social interest in order and morality."

Comment Re:If you have something that you don't want (Score 2) 186

I think it was stupid, but it doesn't look like it was a vast Google conspiracy to inhale as much data as possible for the takeover of the world. It looks like a stupid decision by an engineer and a layer of incompetent management.

I certainly don't condone anyone collecting WiFi data that most people expect to be private, but correct me if I'm wrong - they didn't crack WEP/WPA/hack their way into routers to obtain this data. That means it was floating free and unencrypted over the air for anyone to observe. It's shady and makes Google look bad, but technically it's not much different from receiving FM radio signals; perhaps short range walkie talkie conversations are a more apt comparison - still not illegal and not patently immoral.
Botnet

Apple Snubs Security Firm That Spotted Mac Botnet 409

Sparrowvsrevolution writes "Now that it's being increasingly targeted by botnet herders, Apple has a thing or two to learn about cooperating with friendly security researchers. Boris Sharov, the CEO of Dr. Web, the Russian security company that first reported more than half a million Macs were infected with Flashback malware last week, says when his company alerted Apple to the botnet, it never responded to him. Worse yet, on Monday Apple asked a Russian registrar to take down a domain it said was being used to host a command and control server for Flashback, but in fact was a 'sinkhole' that Dr. Web had set up to observe and analyze the botnet. Sharov describes the lack of communication and cooperation as a symptom of a company that has never before had to work closely with the security industry. 'For Microsoft, we have all the security response team's addresses,' he says. 'We don't know the antivirus group inside Apple.'"

Comment Re:Ease of access is not a problem in the US (Score 1) 218

Did you see this article today? Goes right along with what you're saying - getting people informed isn't even the root of the problem - it's that people are incapable of judging competency/quality because they always over-estimate their own abilities. http://news.yahoo.com/people-arent-smart-enough-democracy-flourish-scientists-185601411.html

Comment Re:What's The Point? (Score 1) 515

All older bills are valid until they wear out. In other words; this is a pointless exercise unless they set an expiry date for older bills.

No, it isn't pointless. By virtue of the fact that the average lifetime of a $100 bill in circulation is 5 years, seeing older $100s will be less common after 5-10 years. When older bills are used, they'll raise suspicion, thereby reducing a counterfeit note's utility.

Comment Re:"Official Response" (Score 2, Informative) 527

Comcast has been using twitter for a while now, under the @ComcastCares account. Multiple Comcast employees monitor twitter streams for complaints and are empowered to take action to resolve issues. ComcastBonnie (as well as a few others) are authorized (cs? pr?) representatives for Comcast. Given that her twitter page says the same thing as her post, you can probably take it at face value.

Comment Re:Those that haven't already changed... (Score 5, Insightful) 455

Yes, but it's often many days out of sync with the official releases. In more bureaucratic organizations you're not going to get some random 3rd party build of an application that handles as much sensitive data as a web browser approved. Mozilla needs to realize that wider corporate adoption requires easy manageability. MSI + Group Policy Template FROM MOZILLA would be huge.
Upgrades

Vista Security The 'Longest Suicide Note in History'? 467

rar42 writes "The Inquirer is reporting on an analysis of Vista by Peter Gutmann — a medical imaging specialist. This isn't the usual anti-Microsoft story — just a professional looking at what is going to happen to his computer if it is upgraded to Microsoft Vista. From the article: 'Windows Vista includes an extensive reworking of core OS elements in order to provide content protection for so-called "premium content", typically HD data from Blu-Ray and HD-DVD sources. Providing this protection incurs considerable costs in terms of system performance, system stability, technical support overhead, and hardware and software cost,' says Gutmann."

Bone Marrow Cells Repair Heart 116

Science Daily is reporting that Toronto researchers have discovered a method to utilize bone marrow cells in the repair of a damaged heart after a heart attack. From the article: "While it has long been known that bone marrow cells have the ability to clear the dead tissue after a heart attack, what has not been known until now is the critically important role of bone marrow adult stem cells in repairing a damaged heart, restoring its function and enhancing the growth of new blood vessels."

U.S. Service Personnel Data Stolen 343

BStrunk writes "I was reading the news this morning on Reuters, when I stumbled across this article: U.S. Service Personnel Personal Data Stolen In the article, an official violated policy by taking the detailed personal information of thousands of active and reserve troops to his personal home, storing it on a personal computer, that was later stolen. In an age where domestic phone calls are monitored, a government employee was allowed to walk out of a government installation with the data on thousands of American citizens to store on an insecure personal computer? Doesn't that seem strange to you? This is a real failure, in my opinion, in government protection of its citizens. Layers of encryption and protected access was successfully bypassed to make the theft of this information as simple as stealing a home pc. Now, not only do service personnel currently serving have to worry about IEDs and being fired upon, but they are now subject to possible identity theft. A real failure. After this, how could one have faith enough to serve an inept institution?"

D-Link Firmware Abuses Open NTP Servers 567

DES writes "FreeBSD developer and NTP buff Poul-Henning Kamp runs a stratum-1 NTP server specifically for the benefit of networks directly connected to the Danish Internet Exchange (DIX). Some time last fall, however, D-Link started including his server in a hardcoded list in their router firmware. Poul-Henning now estimates that between 75% and 90% of NTP traffic at his server originates from D-Link gear. After five months of fruitless negotiation with a D-Link lawyer (who alternately tried to threaten and bribe him), he has written an open letter to D-Link, hoping the resulting publicity will force D-Link to acknowledge the issue. There are obvious parallels to a previous story, though Netgear behaved far more responsibly at the time than D-Link seem to be."

Oracle Boss Says OSS Needs Big Business 157

Rob writes "Oracle Corp's CEO, Larry Ellison, has maintained that open source projects are only successful when major technology corporations get involved and doubted that open source will have a major impact on the software areas in which the company operates. Speaking at Oracle OpenWorld Tokyo Ellison also confirmed that the company had inquired about acquiring open source database vendor MySQL AB and denied that Oracle's recent open source acquisitions were designed to harm its rival."

Sony Already Lost Media War to Apple? 325

Declan McCullagh writes "Sony's Walkman was the king of media players. Now Apple's iPod is, and Sony Connect was a flop. But Sony's problems may soon be even bigger: the company is having a remarkably difficult time coordinating software development across different divisions and continents, and some managers are worried that things may be getting worse. Will Apple's recent forays into the living room create even more of a problem for Sony?"

Slashdot Top Deals

Promising costs nothing, it's the delivering that kills you.

Working...