By EditorDavid from Slashdot's six-strikes-and-you-get-a-lecture department
"Major internet providers are ending a four-year-old system in which consumers received 'copyright alerts' when they viewed peer-to-peer pirated content," reports Variety.
An anonymous reader quotes Engadget's update on the Copyright Alert System.
It was supposed to spook pirates by having their internet providers send violation notices, with the threat of penalties like throttling. However, it hasn't exactly panned out. ISPs and media groups have dropped the alert system with an admission that it isn't up to the job. While the program was supposedly successful in "educating" the public on legal music and video options, the MPAA states that it just couldn't handle the "hard-core repeat infringer problem" -- there wasn't much to deter bootleggers. The organizations, which include the RIAA, haven't devised an alternative.
"Surprise: it's hard to stop copyright violators just by asking them," reads their article's tagline, which attributes the failure of the system to naive optimism. "It assumed that most pirates didn't even realize they were violating copyright, and just needed to be shown the error of their ways."Read Replies (0)
By EditorDavid from Slashdot's please-do-not-turn-off-your-computer department
schwit1 shares this angry commentary from a CNET senior editor:
Maybe you're delivering a presentation to a huge audience. Maybe you're taking an online test. Maybe you just need to get some work done on a tight deadline.
Windows doesn't care.
Windows will take control of your computer, force-feed it updates, and flip the reset switch automatically — and there's not a damn thing you can do about it, once it gets started. If you haven't saved your work, it's gone. Your browser tabs are toast. And don't expect to use your computer again soon; depending on the speed of your drive and the size of the update, it could be anywhere from 10 minutes to well over an hour before your PC is ready for work. As far as I'm concerned, it's the single worst thing about Windows. It's only gotten worse in Windows 10. And when I poked around Microsoft, the overarching message I received was that Microsoft has no interest in fixing it.
The editor recalls rebooting his Windows laptop while listening to a speech by Steve Jobs in 2010. (The reboot locked his computer for 20 minutes while updates were installed, "the first of three occasions that a forced Windows update would totally destroy my workflow at a critical moment.") He shares stories from other frustrated Windows users, urges readers to send him more anecdotes, and argues that Microsoft has even begun "actively getting rid of ways to keep users from disabling automatic updates."Read Replies (0)
By EditorDavid from Slashdot's zero-downtime department
In 1993 a Stratus server was booted up by an IT application architect -- and it's still running.
An anonymous reader writes:
"It never shut down on its own because of a fault it couldn't handle," says Phil Hogan, who's maintained the server for 24 years. That's what happens when you include redundant components. "Over the years, disk drives, power supplies and some other components have been replaced but Hogan estimates that close to 80% of the system is original," according to Computerworld.
There's no service contract -- he maintains the server with third-party vendors rather than going back to the manufacturer, who says they "probably" still have the parts in stock. And while he believes the server's proprietary operating system hasn't been updated in 15 years, Hogan says "It's been extremely stable."
The server will finally be retired in April, and while the manufacturer says there's some more Stratus servers that have been running for at least 20 years -- this one seems to be the oldest.Read Replies (0)
By EditorDavid from Slashdot's who-do-you-sue department
Here's the problem. "You could download Comma.ai's new open-source Python code from Github, grab the necessary hardware, and follow the company's instructions to add semi-autonomous capabilities to specific Acura and Honda model cars (with more vehicles to follow)," writes IEEE Spectrum. But then who's legally responsible if there's an accident?
Long-time Slashdot reader Registered Coward v2 writes:
While many legal experts agree OSS is "buyer beware" and that Comma.ai and its CEO Georg Hotz would not be liable, it's a gray area in the law. The software is release under the MIT OSS license and the Read Me contains the disclaimer "This is alpha-quality software for research purposes only... You are responsible for complying with local laws and regulatons." The U.S. Supreme Court, in a series of court cases in the 1990s, ruled open source code as free speech protected under the First Amendment of the U.S. Constitution.
The question is does that release the author(s) from liability. The EU has no EU wide rules on liability in such cases. One open question is even if the person who used the software could not sue, a third party injured by it might be able to since they are not a party to the license agreement.
An EFF attorney told HotHardware "Prosecutors and plaintiffs often urge courts to disregard traditional First Amendment protections in the case of software." But not everyone agrees. "Most legal experts that spoke with IEEE Spectrum -- and Hotz himself -- believe that if you use the company's code and something goes wrong, then it isn't liable for damages. You are."Read Replies (0)
By EditorDavid from Slashdot's crimes-against-crimefighters department
"Police in Cockrell Hill, Texas admitted Wednesday in a press release that they lost years worth of evidence after the department's server was infected with ransomware," reports BleepingComputer. "Lost evidence includes all body camera video, some in-car video, some in-house surveillance video, some photographs, and all Microsoft Office documents." An anonymous reader writes:
Most of the data was from solved cases, but some of the evidence was from active investigations. The infection appears to be from the Locky ransomware family, one of the most active today, and took root last December, after an employee opened a document he received via via a spam email. The police department backup system apparently kicked in right after the infection took root, and created copies of the already encrypted data. The department did not pay the $4,000 ransom demand and decided to wipe all its systems.Read Replies (0)
By EditorDavid from Slashdot's energy-employment department
Solar energy now accounts for 43% of the workers in the U.S. power-generating industry, surpassing the 22% from all workers in the coal, oil, and gas industries combined, according to new figures from the Department of Energy. Slashdot reader Lucas123 writes:
In 2016, the solar workforce in the U.S. increased by 25% to 374,000 employees, compared to 187,117 electrical generation jobs in the coal, gas and oil industries... [N]et power generation from coal sources declined by 53% between 2006 and September 2016; electricity generation from natural gas increased by 33%; and solar grew by over 5,000% -- from 508,000 megawatt hours (MWh) to just over 28 million MWh.
Solar industry created jobs at a rate 20 times faster than the national average, according to the Energy Department, while 102,000 more workers also joined the wind turbine industry last year, a 32% increase. In fact, 93% of the new power in America is now coming from solar, natural gas, and wind -- but it's building out new solar-generating capacity that's causing much of the workforce increases, according to the Energy Department. "The majority of U.S. electrical generation continues to come from fossil fuels," their report points out, adding that the latest projections show that will still be true in the year 2040.Read Replies (0)
By EditorDavid from Slashdot's choosing-chapter-11 department
Friday Avaya's Corporate Treasurer explained why they're filing for a chapter 11 "restructuring." After examining their debt, "we decided it was a critical next step in our transformation from a hardware company to a software and services company and the best path forward for our customers, partners and employees."
ZDNet breaks down the deal... "Avaya noted that its foreign affiliates aren't included in the filing and will operate as normal. Avaya said the $725 million in debtor-in-possession financing, via Citibank, is enough to minimize disruption and continue business operations." Not surprising, Avaya has canceled the planned IPO.
PC World reports that Avaya "emerged from Lucent Technologies in 2000 with a focus on phone switches, enterprise networking gear, and call-center systems. But with the shift toward mobile phones and cloud-based tools for communication, and a tight market for enterprise network equipment, the company has been changing its focus... Like much of the networking and collaboration industry, Avaya is looking toward software-defined networking, IoT, and cloud-based platforms that work on many different devices and the web."Read Replies (0)
By EditorDavid from Slashdot's found-you-on-Facebook department
An anonymous reader writes:
Last week a security consultant remotely logged into his stolen laptop, and gathered clues from a Facebook profile. Though it didn't provide the suspect's real name, the consultant shared the profile online, and says he's now receiving tips from other crime victims who are scouring through the profile's friends list. And according to a local newspaper, the Canadian police say they've now identified a suspect, although "there is a lot of work that needs to be done before we can lay charges." But despite this apparent victory, one officer is also warning the public against sharing a suspect's identity on social media, according to the paper, "after the social media post may have wrongly identified a suspect."
"When you get to public shaming, I urge caution..." the police officer tells the newspaper. "As a person that gets stuff stolen, I understand the want to publicly shame someone... Give us all the info, and we will follow up once we have the evidence."Read Replies (0)
By BeauHD from Slashdot's held-for-ransom department
Orome1 quotes a report from Help Net Security: A single SMS can force Samsung Galaxy devices into a crash and reboot loop, and leave the owner with no other option than to reset it to factory settings and lose all data stored on it. This is because there are certain bugs in older Samsung Galaxy phones and tablets that can be triggered via SMS, and used by attackers to force maliciously crafted configuration messages onto the users' device. The bugs allow these types of messages to be executed without user interaction. As the ContextIS researchers who discovered the vulnerabilities explained, this avenue of attack can be abused by crooks to hold users' devices for ransom. "First a ransom note is sent, if ignored then the malicious configuration message can be sent," they noted. If the victim pays up, a configuration message can later be sent to stop the rebooting. The vulnerabilities in question, CVE-2016-7988 and CVE-2016-7989, can be triggered through SMS on the S4, S4 Mini, S5 and Note 4, but not on newer Samsung devices. "It's worth noting that although newer phones such as the S6 and S7 aren't affected over the air, [a similar result] could be accomplished by a malicious app abusing CVE-2016-7988," they added. These specific issues are related to modifications Samsung made to to the Android telephony framework and are found in a Samsung-specific application for handling carrier messages. They've since been patched (November 2016).Read Replies (0)