alphadogg writes "Oracle is continuing to crack down on companies it claims are providing support services for its products in an illegal fashion. Last week, Oracle sued IT services providers Terix and Maintech, alleging they have 'engaged in a deliberate scheme to misappropriate and distribute copyrighted, proprietary Oracle software code' in the course of providing support for customers using Oracle's Solaris OS. Oracle's allegations are similar to ones it has made in lawsuits against other Solaris service providers, such as ServiceKey, as well as Rimini Street, which provides third-party support for Oracle and SAP applications."
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
First time accepted submitter MrClappy writes "I manage the network for a defense contractor that needs a cloud-based storage service and am having a lot of trouble finding an appropriate solution that meets our requirements. We are currently using DropBox and I am terrified of seeing another data leak like last year. Some of our data is classified under International Traffic in Arms Regulations (ITAR) which requires that all data to remain inside the US, including any cloud storage or redundant backups. We tried using Box as a more secure replacement but ended up canceling the service due to lack of functionality; 40,000 file sync limit, Linux-based domain controller compatibility issues and the fact that the sync application does not work while our computers are locked (which is an explicit policy for my users). I've been calling different companies and just can't seem to find a decent solution. Unless I'm severely missing something, I'm just blown away that no one offers this functionality with today's tech capabilities. Am I wrong?"
sl4shd0rk writes "Federal Judge William Pauley has dismissed an Obama Administration request to delay a hearing on Verizon/NSA data sifting. The ACLU has argued that the sifting is not authorized by statute and even if it were it would still be unconstitutional. The Obama Administration requested the delay on the grounds it needed more time to search through its classified material to determine what was suitable for disclosure." See also the case docket. Motions must be filed by August 26th, and oral arguments begin on November 1st.
sciencehabit writes "For Ved Chirayath, a graduate student and amateur fashion photographer, a photo project that involved NASA researchers dressed as Vikings was just a creative way to promote space science. 'I started this project hoping maybe one day some kid will look at it and say, 'I want to work for NASA,' ' says Chirayath, a student at Stanford University in Palo Alto, California, who also works nearby at NASA's Ames Research Center. He never suspected that his fanciful image would put him in the crosshairs of a government waste investigation triggered by a senior U.S. senator." The project was funded by an outside art grant. The best part: the investigation into the non-existent waste probably cost more than the "waste" would have were it funded by NASA in the first place.
An anonymous reader writes "Following the /. story on the Feds demanding SSL keys, now comes news that the feds are demanding user passwords, and in some cases, the encryption algorithm and salt used. From the article: 'A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'" ... Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. ... Other orders demand the secret question codes often associated with user accounts.' I'm next expecting to see the regulation or law demanding that all users use plain text for all web transactions, to catch terrorists and for the children."
Barence writes "Mozilla is proposing that the Firefox browser collects data on users' interests to pass on to websites. The proposal is designed to allow websites to personalize content to visitors' tastes, without sites having to suck up a user's browsing history, as they do currently. 'Let's say Firefox recognizes within the browser client, without any browsing history leaving my computer, that I'm interested in gadgets, comedy films, hockey and cooking,' says Justin Scott, a product manager from Mozilla Labs. 'Those websites could then prioritize articles on the latest gadgets and make hockey scores more visible. And, as a user, I would have complete control over which of my interests are shared, and with which websites.'" This is the result of an extended experiment. The idea is that your history is used to generate a set of interests which you can then share voluntarily with websites, hopefully discouraging the blanket tracking advertising systems love to do now.
AmiMoJo writes "The BBC reports that Huawei, one of the world's largest manufacturers of telecoms equipment, is controlling popular ISP TalkTalk's web censorship system. The system, known as Homesafe, was praised by Prime Minister David Cameron. Customers who do not want filtering still have their traffic routed through the system, but matches to Huawei's database are dismissed rather than acted upon. In other words there is no opt-out. Mr Cameron has demanded similar measures be adopted by all internet service providers (ISPs) in the UK, to 'protect our children and their innocence.'"
An anonymous reader writes "Oilfield services giant Halliburton will plead guilty to destroying computer test results that had been sought as evidence in the Deepwater Horizon disaster, the Justice Department announced Thursday. Company officials threw out test results that showed 'little difference' between the number of devices Halliburton said was needed to center the cement casing in the well at the heart of the disaster and the number well owner BP installed, according to court papers. The issue has been key point of contention between the two companies in hearings and litigation ever since the April 2010 blowout. BP and Halliburton are still battling over responsibility for the disaster in a New Orleans federal courtroom. BP had no comment on the plea agreement Thursday evening."
wiredmikey writes "US authorities have charged four Russians and a Ukrainian five on charges of running a global hacking operation that targeted major payment processors, retailers and financial institutions. The charges stem from hacking attacks dating back to 2005 against several global brands, including the NASDAQ exchange, 7-Eleven, JC Penney, Hannaford, Heartland, JetBlue, Dow Jones, Euronet, Visa Jordan, Global Payment, Diners Singapore and Ingenicard. The men allegedly used SQL injection attacks as the initial entry point into the computer systems of global corporations. Once networks were breached, the defendants allegedly placed malware on the systems. According to the indictment (PDF), the malware used created a "back door," leaving the system vulnerable and helping the defendants maintain access to the network. The men face five years in prison for conspiracy to gain unauthorized access to computers; 30 years in prison for conspiracy to commit wire fraud; five years in prison for unauthorized access to computers; and 30 years in prison for wire fraud."
An anonymous reader points out this story about the latest effort by the U.S. to get Edward Snowden back in the country. "A U.S. Senate panel voted unanimously on Thursday to seek trade or other sanctions against Russia or any other country that offers asylum to former spy agency contractor Edward Snowden, who has been holed up for weeks at a Moscow airport. The 30-member Senate Appropriations Committee adopted by consensus an amendment to a spending bill that would direct Secretary of State John Kerry to meet with congressional committees to come up with sanctions against any country that takes Snowden in."
v3rgEz writes "After the ACLU's Christopher Soghoian highlighted NSA programs listed on LinkedIn, Jason Gulledge filed a request for details about the program — and turned up lucky. The NSA released 7 pages of database descriptions of its ANCHORY program, an open-source intelligence data gathering effort. The NSA's FOIA office said it would pony up more, but only if Gulledge could prove he was requesting the documents as part of a news gathering effort or if he would agree to pay associated fees."
steveb3210 writes "EQ2Wire.com is a fan site for the MMO Everquest 2. One feature of their site is a searchable portal for all game-related stats such as characters, equipment, items, and mobs which they generate from an XML feed provided by the game's publisher. Recently, the owner of a trademark has been threatening them over the name of a character and in the face of possible legal bills, they were forced to remove the character's profile from their site. Adding further insult to injury, the character seems to have been created prior to the trademark in question."
miller60 writes "The U.S. government keeps finding more data centers. Federal agencies have about 7,000 data centers, according to the latest stats from the ongoing IT consolidation process. The number started at 432 in 1999, but soon began to rise as agencies found more facilities, and exploded once the Obama administration decided to include server closets as well as dedicated data centers. The latest estimate is more than double the 3,300 facilities the government thought it had last year. The process has led to the closure of 484 data centers thus far, with another 855 planned over the next year. The GAO continues to call for the process to look beyond the number of facilities and focus on savings."
alphadogg writes "Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control servers, according to researchers from security firm ESET. The researchers recently came across two botnet-type malware programs that use C&C servers operating as Tor 'hidden services.' The Tor Hidden Service protocol allows users to set up services — usually Web servers — that can only be accessed from within the Tor network through a random-looking hostname that ends in the .onion pseudo domain extension. The traffic between a Tor client and a Tor hidden service is encrypted and is randomly routed through a series of computers participating in the network and acting as relays."
Reader turp182 notes that the Amash Amendment (#100) to HR 2397 (DOD appropriations bill) failed to pass the House of Representatives, meaning it will not be added to the appropriations bill. turp182 writes "The amendment would have specifically defunded the bulk collection of American phone records." Americans can see how their representatives voted here.
First time accepted submitter fsagx writes "The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users' private Web communications from eavesdropping. These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users."
An anonymous reader writes "One of the arguments for continuing and even expanding the H1-B visa program (pdf) is that it enables highly-skilled immigrants to work in the U.S. and grow the U.S. economy. Counterarguments state that the H1-B visa program does not bring in the 'best and brightest' and is used to drive down wages, particularly in the STEM fields. This Bloomberg article, discussing pending H1-B legislation, quotes some of the salaries of current workers in the U.S. on H1-B visas: $4,800/month and $5,500/month which work out to $57,600/year and $66,000/year; only slightly higher than the average entry-level salaries of newly-graduated engineering or computer science majors."
cold fjord writes "Break out the tin foil hats, and make them double thick. Forbes reports, 'The NSA will soon cut the ribbon on a facility in Utah ... the center will be up and running by the "end of the fiscal year," ....Brewster Kahle is the engineering genius behind the Internet Archive,... Kahle estimates that a space of that size could hold 10,000 racks of servers .... "So we are talking $1 billion in machines." Kahle estimates each rack would be capable of storing 1.2 petabytes of data. ... all the phone calls made in the U.S. in a year would take up about 272 petabytes, ... If Kahle's estimations and assumptions are correct, the facility could hold up to 12,000 petabytes, or 12 exabytes – ... but is not of the scale previously reported. Previous estimates would allow the data center to easily hold hypothetical 24-hour video and audio recordings of every person in the United States for a full year. The data center's capacity as calculated by Kahle would only allow the NSA to create archives for the 13 million people living in the Los Angeles metro area. Even that reduced number struck Internet infrastructure expert Paul Vixie as high given the space allocated for data in the facility. ... he came up with an estimate of less than 3 exabytes of data capacity for the facility. That would only allow for 24-hour recordings of what every one of Philadelphia's 1.5 million residents was up to for a year. Still, he says that's a lot of data pointing to a 2009 article about Google planning multiple data centers for a single exabyte of info. '" Update: 07/25 16:33 GMT by T : For even more, see this story.
An anonymous reader writes "The Ninth U.S. Circuit Court of Appeals affirmed a lower court's ruling in favor of Dish Network, allowing the company to continue forward with it ad-skipping "Hopper" technology. From the article: 'Last year, Fox Broadcasting Company, with the support of other broadcast networks, sued Dish for its "Hopper" DVR and its "Auto Hop" feature, which automatically skips over commercials. According to the Fox, the Hopper automatically records eight days' worth of prime time programming on the four major networks that subscribers can play back on request. Beginning a few hours after the broadcast, viewers can choose to watch a program without ads. As we observed when the it started, this litigation was yet another in a long and ignominious series of efforts by content owners to use copyright law to control the features of personal electronic devices, and to capture for themselves the value of new technologies no matter who invents them.'"
twoheadedboy writes "Claire Perry MP, who has been the main driver of the UK government's plans for default blocking of pornography, has had her website plastered in porn by hackers. But the story only just begins there. Notable blogger Guido Fawkes, otherwise known as Paul Staines, posted on the matter, only to later be accused of sponsoring the hacking himself. During some back and forth over Twitter, it appeared Perry was 'confused,' as she said Fawkes had posted a link to the defaced page, when he had only shown a screenshot of the site. Given the backlash against the government's plans to censor porn and its technical fallacies, the event could be particularly embarrassing for Perry. She is not commenting on the matter, whilst Staines has threatened to sue unless Perry offers a retraction of her claim he had anything to do with the hack." The tweet: 'Apologies to anyone affected by the hacking of my website sponsored by @GuidoFawkes – proves so clearly what we are dealing with.' Someone needs a lesson about hypertext.