By EditorDavid from Slashdot's angry-in-India department
"It is official now. The punishment for rape is actually less..." writes an anonymous Slashdot reader, who adds that "Some users think that this is all the fault of Bollywood/Hollywood movie studios. They are abusing power, court and money..." India Today reports:
The Indian government, with the help of internet service providers, and presumably under directives of court, has banned thousands of websites and URLs in the last five odd years. But until now if you somehow visited these "blocked URLs" all was fine. However, now if you try to visit such URLs and view the information, you may get a three-year jail sentence as well as invite a fine...
This is just for viewing a torrent file, or downloading a file from a host that may have been banned in India, or even for viewing an image on a file host like Imagebam. You don't have to download a torrent file, and then the actual videos or other files, which might have copyright. Just accessing information under a blocked URL will land you in jail and leave your bank account poorer.
While it's not clear how this will be enforced, visiting a blocked URL in India now leads to a warning that "Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of up to Rs. 3,00,000..."Read Replies (0)
By EditorDavid from Slashdot's plug-and-play-robot-brains department
Intel demoed their new robotics compute module this week. Scheduled for release in 2017, it's equipped with various sensors, including a depth-sensing camera, and it runs Ubuntu on a quad-core Atom. Slashdot reader DeviceGuru writes:
Designed for researchers, makers, and robotics developers, the device is a self contained, candy-bar sized compute module ready to pop into a robot. It's augmented with a WiFi hotspot, Bluetooth, GPS, and IR, as well as proximity, motion, barometric pressure sensors. There's also a snap-on battery. The device is preinstalled with Ubuntu 14.04 with Robot Operating System (ROS) Indigo, and can act as a supervisory processor to, say, an Arduino subsystem that controls a robot's low-level functions. Intel demoed a Euclid driven robot running an obstacle avoidance and follow-me tasks, including during CEO Brian Krzanich's keynote (YouTube video). Intel says they'll also release instructions on how to create an accompanying robot with a 3D printer. This plug-and-play robotics module is a proof-of-concept device -- the article includes some nice pictures -- but it already supports programming in Node.js (and other high-level languages), and has a web UI that lets you monitor performance in real-time and watch the raw camera feeds.Read Replies (0)
By EditorDavid from Slashdot's crimes-from-the-future department
The U.S. will phase out private prisons, a move made possible by fewer and shorter sentences for drug offenses, reports the BBC. But when it comes to reducing arrests for violent crimes, police officers in Chicago found themselves resorting ineffectively to a $2 million algorithm which ultimately had them visiting people before any crime had been committed. schwit1 quotes Ars Technica: Struggling to reduce its high murder rate, the city of Chicago has become an
incubator for experimental policing techniques. Community policing, stop and frisk, "interruption" tactics --- the city has tried many strategies. Perhaps most controversial and promising has been the city's futuristic "heat list" -- an algorithm-generated list identifying people most likely to be involved in a shooting.
The hope was that the list would allow police to provide social services to people in danger, while also preventing likely shooters from picking up a gun. But a new report from the RAND Corporation shows nothing of the sort has happened. Instead, it indicates that the list is, at best, not even as effective as a most wanted list. At worst, it unnecessarily targets people for police attention, creating a new form of profiling.
The police argue they've updated the algorithm and improved their techniques for using it. But the article notes that the researchers began following the "heat list" when it launched in 2013, and "found that the program has saved no lives at all."Read Replies (0)
By EditorDavid from Slashdot's talking-Turkey department
Slashdot reader mirandakatz writes:
In releasing an unredacted database of emails from the Turkish party AKP, WikiLeaks exposed the public to a collection of malware -- and even after a Bulgarian security expert pointed this out publicly, the organization only removed the select pieces of malware that he identified, leaving well over a thousand malicious files on the site.
That AKP leak also included the addresses and other personal details of millions of Turkish women, not unlike the recent DNC leak, which included the personal data of many private individuals. WikiLeaks says this is all in the name of its "accuracy policy," but the organization seems to be increasingly putting the public at risk.
The article opens with the question, "What the hell happened to WikiLeaks?" then argues that "Once an inspiring effort at transparency, WikiLeaks now seems more driven by personal grudges and reckless releases of information..."Read Replies (0)
By EditorDavid from Slashdot's revenge-of-the-fake-ransomware department
An anonymous reader writes: A trojan that targeted Drupal sites on Linux servers last May that was incredibly simplistic and laughable in its attempt to install (and fail) web ransomware on compromised websites, has now received a major update and has become a top threat on the malware scene. That trojan, named Rex, has evolved in only three months into an all-around threat that can: (1) compromise servers and devices running platforms like Drupal, WordPress, Magento, Jetspeed, Exarid, AirOS; (2) install cryptocurrency mining in the background; (3) send spam; (4) use a complex P2P structure to manage its botnet; and (5) install a DDoS agent which crooks use to launch DDoS attacks. Worse is that they use their DDoS capabilities to extort companies. The crooks send emails to server owners announcing them of 15-minute DDoS tests, as a forewarning of future attacks unless they pay a ransom. To scare victims, they pose as a known hacking group named Armada Collective. Other groups have used the same tactic, posing as Armada Collective, and extorting companies, according to CloudFlare.Read Replies (0)
Ask Slashdot: Is KDE Dying?
Posted by News Fetcher on August 20 '16 at 08:07 PM
By EditorDavid from Slashdot's demise-of-desktop-development? department
A long-time loyal KDE user "always felt that it was the more complete and integrated of the many Linux desktop environments...thus having the most potential to win over new Linux converts." And while still using KDE exclusively without any major functional issues, now Slashdot reader fwells shares concerns about the future of desktop development, along with a personal opinion -- that KDE is becoming stale and stagnant:
KDE-Look.org, once a fairly vibrant and active contributory site, has become a virtual ghost town... Various core KDE components and features are quite broken and have been so for some time... KDEPIM/KMail frankly seems targeted specifically at the poweruser, maintaining over many years its rather plain and arguably retro interface. The Konqueror web browser has been a virtual carcass for several years, yet it mysteriously remains an integral component...
So, back to my opening question... Is KDE Dying? Has innovation and development evaporated in a development world dominated by the mobile device? And, if so, can it be reinvigorated? Will the pendulum ever swing back? Can it? Should it?
The original submission has some additional thoughts on Windows 10 and desktop development -- but also specific complaints about KDE's Recent Items/Application Launcher History and the KDE theming engine (which "seems disjointed and rather non-intuitive".) The argument seems to be that KDE lacks curb appeal to fulfill that form-over-function preference of the larger community of users, so instead it's really retaining the practical appeal of "my 12 year old Chevy truck, feature rich for its time... Solid and reliable, but definitely starting to fade and certainly lacking some modern creature comforts."
So leave your own thoughts in the comments. Does desktop development need to be reinvigorated in a world focused on mobile devices -- and if so, what is its future? And is KDE slowly dying?Read Replies (0)
By EditorDavid from Slashdot's bandits-vs-bandwidth department
Long-time Slashdot reader coondoggie quotes an article from Network World: The FBI today said it released a new application making it easier for the public -- as well as financial institutions, law enforcement agencies, and others -- to view photos and information about bank robberies in different geographic areas of the country.
The FBI's new "Bank Robbers" application runs on both Android and iOS, according to the article, "and lets users sort bank robberies by the date they occurred, the category they fall under (i.e., armed serial bank robber), the FBI field office working the case, or the state where the robbery occurred." The app ties into BankRobbers.fbi.gov, which overlays FBI information about bank robberies onto Google Maps.
The app's users "can also select push notifications to be informed when a bank robbery has taken place near their location," according to the FBI's site, which adds innocently that
"If the location services on your device are enabled, you can view a map that shows the relevant bank robberies that took place in your geographic area..."Read Replies (0)
By EditorDavid from Slashdot's having-a-heat-wave department
Slashdot reader iONiUM quotes an article from Vice that calls attention to the fact that
record-setting temperatures in July are just part of the story: On Wednesday, the US National Oceanic and Atmospheric Administration announced that July was the hottest month ever recorded on our planet, since modern record-keeping began in 1880. NASA has reached the same conclusion. July smashed all previous records... "We should be absolutely concerned," [NOAA climatologist] Sanchez-Lugo said. "We need to look at ways to adapt and mitigate. If we don't, temperatures will continue to increase"...
But the truth is that record-breaking temperatures, month after month, year after year, are starting to look less like an exception, more like the norm.
In fact, CityLab reports that the earth has now experienced 14 consecutive months of unprecedented hotness. Although July stands out, Vice notes that "each consecutive month in 2016 has broken its own previous record (May was the hottest May, April the hottest April, etc.)..."Read Replies (0)
By EditorDavid from Slashdot's greenhouse-gas department
Slashdot reader schwit1 shares an article from Bloomberg which argues "It's time to have a conversation about flatulent cows."
"Enteric fermentation," or livestock's digestive process, accounts for 22 percent of all U.S. methane emissions, and the manure they produce makes up eight percent more, according to the U.S. Environmental Protection Agency... Methane, like carbon, is a greenhouse gas, but methane's global warming impact per molecule is 25 times greater than carbon's, according to the EPA.
Cargill has tried capturing some of the methane released from cow manure by using domed lagoons, while researchers at Danone yogurt discovered they could reduce methane emissions up to 30% by feeding cows a diet rich in Omega-3 fatty acids (mostly from flax seed). But now Argentina researchers are testing plastic "methane backpacks" which they strap on to the back of cows, and according to the article "have been able to extract 300 liters of methane a day, enough to power a car or refrigerator."Read Replies (0)
By EditorDavid from Slashdot's virtually-augmented department
Calling it "A weekend that transforms the future of immersive technologies," MIT's Media Lab is hosting a big Augmented Reality/Virtual Reality hackathon. An anonymous Slashdot reader quotes this report from UploadVR:
Game jams, hackathons, and meetups are more popular than ever in the budding VR and AR communities...to focus on creativity and functionality, rather than getting bogged down by polishing and prepping something for launch.
The MIT Media Lab is officially announcing its backing of the appropriately titled Reality, Virtually Hackathon. The hackathon is organized by a multitude of VR/AR experts, developers, industry executives, and MIT students, alumni, and Ph.D. candidates and will take place at the MIT campus.
Sponsors include Microsoft and the AT&T Developer Program, and applications for the hackathon are due by Wednesday, September 7, 2016. I'm wondering if any Slashdot readers have tried writing (or using) VR apps.Read Replies (0)
By EditorDavid from Slashdot's now-with-video department
Computerworld is running an emotional report by their national correspondent Patrick Thibodeau -- complete with a dramatic video -- arguing that America's H-1B Visa program "has also become a way for companies to outsource jobs." An anonymous Slashdot reader quotes the article accompanying the video:
The vast majority of people who work in IT did everything right: They invested in their education, studied difficult subjects, kept their skills updated... But no job is safe, no future entirely secure -- something IT workers know more than most. Given their role, they are most often the change agents, the people who deploy technologies and bring in automation that can turn workplaces upside down. To survive, they count on being smart, self-reliant and one step ahead...
Over the years, Computerworld reporter Patrick Thibodeau has interviewed scores of IT workers who trained their visa-holding replacements. Though details each time may differ, they all tell the same basic story. There are many issues around high-skilled immigration, but to grasp the issue fully you need to understand how the H-1B program can affect American workers.Read Replies (0)
By EditorDavid from Slashdot's hack-the-planets department
Eleven days after its release, No Man's Sky already has over 100 unofficial mods by fans intent on improving the game. "We don't have time to wait for official dev tools to fix what can be fixed by us," one modder told Motherboard. "We definitely want the official tools ASAP but honestly, the players need a game that actually launches and plays at decent FPS first." An anonymous Slashdot reader quotes the article:
In an email to one customer, Hello Games revealed that it will be releasing patches this week and next which will "help to improve the experience further for players" but it is unlikely that the promised official modding tools will be released in the near future...
Among the [unofficial] mods available for anyone to download are ones to...replace the system font with one from Star Trek, disable annoying audio warnings, and replace a "Units Received" alert with "the Rick 'Wubba Lubba Dub Dub' sound bite from Rick and Morty"... The Instagram Filter Remover mod is among the most popular on the No Man's Sky Mods website promising to remove "the stupid Instagram filter from the game"...making everything sharper and clearer.
That last mod has been downloaded 17,655 times so far, and by Friday the site had almost 800,000 views and 60,000 downloads. There's two other mods that add Dr. Who sound clips into the game, and the article notes fans are clamoring for more, "including one request to replace all the voice lines in the game with William Shatner quotes."Read Replies (0)
By EditorDavid from Slashdot's back-to-school department
After performing hours of analysis, a computer science professor says he's "not impressed" by the quality of the recently-leaked code that's supposedly from an NSA hacking tool. An anonymous Slashdot reader writes: The professor, who teaches Software Vulnerability Analysis and Advanced Computer Security at the University of Illinois, Chicago, gripes about the cryptography operations employed in the code of an exploit called BANANAGLEE, used against Fortinet firewalls. Some of his criticism include the words "ridiculous", "very bad", "crazy" and "boring memory leaks". "I would expect relatively bug-free code. And I would expect minimal cryptographic competence. None of those were true of the code I examined which was quite surprising," the professor told Softpedia in an email.
If these were cyberweapons, "I'm pretty underwhelmed by their quality," professor Checkoway writes on his blog, adding that he found "sloppy and buggy code," no authentication of the encrypted communication channel, 128-bit keys generated using 64 bits of entropy, and cypher initialization vectors that leaked bits of the hash of the plain text...Read Replies (0)