Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Comcast Pays Overdue Fees, Offers Freebies For TWC Merger Approval

JourneymanMereel Re:In other words. (77 comments)

Couple that with this statement:

After the deal, Comcast's franchises in those areas would be transferred to GreatLand.

And it looks like Comcast is writing checks they don't even have to cash. They'll provide the "free" cable until the merger goes through, then it becomes the burdon of GreatLand Connections.

4 days ago

Microsoft Ends Mainstream Support For Windows 7

JourneymanMereel Nostalgic for Windows 7? (640 comments)

I'm not nostalgic for Windows 7.... I still run it! On all of our networked computers.

about three weeks ago

ISPs Removing Their Customers' Email Encryption

JourneymanMereel Re:Meh (245 comments)

Wrong. Most MTAs (for a long time now) will attempt TLS if available.

Not really wrong... more like right. Heck, you even validated what he said when you qualified your statement with if available... if it's not available, it will simply send it in plain text. It won't notify you. It won't notify the next person down the line, etc. Neither you nor your recipient will have any way to know if the message was transmitted at some point in plain text. And it's a guarantee that it sat on every mail server it touched unencrypted.

Therefore, the safe option is to assume it will not be encrypted at any point unless you use some kind of end-to-end encryption (X509, PGP, etc).

about 3 months ago

ISPs Removing Their Customers' Email Encryption

JourneymanMereel Re: DMCA (Defamation) (245 comments)

No, what it is doing (to borrow the analogy from an eralier posting) is opening every letter in an evelope, putting the contents in a see-through bag and adding a new addres label.

Except that's not what it's doing. You're handing the letter to them and asking them to put it in an envelope, preferably one of those fancy ones that make it harder to see the contents, and send it. They're pretending like they don't have any of those fancy envelopes and instead putting it in a clear plastic bag. If you want it in a fancy envelope, make sure you specify that it has to be rather than that's what you'd like it to be.

Or, better yet, mask the contents yourself at the application layer rather than relying on the transport layer. X.509 and PGP are both pains, but they do work and would make this a total non-issue.

about 3 months ago

Netflix CEO On Net Neutrality: Large ISPs Are the Problem

JourneymanMereel Re:Big Data (181 comments)

In fairness, I was able to watch Amazon instant video just fine last night but Netflix wasn't working at all.

about 5 months ago

Comcast Converting 50,000 Houston Home Routers Into Public WiFi Hotspots

JourneymanMereel Re: Liability (474 comments)

Until someone starts broadcasting that standard SSID with a fake login page.

And if you're stupid enough to log in without being on an SSL, you deserve whatever happens.

about 8 months ago

Google To Spend $1 Billion On Fleet of Satellites

JourneymanMereel Re:Doesn't seem like a wise investment.. (170 comments)

It seems that such areas are underserrved because they can't afford it.

Define can't afford it. Let me give you a couple of examples here in the US.

The company where I work has a horribly incompetent local telco. When they first bought their wires from Verizon, they came out and talked to me about high speed internet. Five years later, they can still only figure out T1 lines. There is no cable available the industrial park where we're at. I once looked into it and Charter and Comcast couldn't figure out who would actually service my area (each saying it would be the other). I think they finally settled on Charter, but with a huge build-out cost (somewhere around 30k if I remember right). A few years later, a Charter sales guy popped in to find out if we were interested in buying their service. I told him I absolutely was, but there's no way I could afford their build out cost. Supposedly they're trying to find enough potential customers to justify their build out cost, but here we are almost two years later and no service. We can easily afford the service. Even at $1,000/mo I can probably get it approved. But we can't (won't) pay that build out cost.

I also like to go camping in a semi-remote area. It's not real camping. We do it with a travel trailer on a seasonal site. Full plumbing, full electric, etc. But it's still enjoyable. They've talked about putting in Wifi, but there's no broadband of any kind available. Again, build out costs are going to be the issue. I doubt they'd pay $1,000/mo for service, but I'm sure they can afford something like 100/mo.

about 8 months ago

XP Systems Getting Emergency IE Zero Day Patch

JourneymanMereel Re:There should be only two options (179 comments)

Yes... and if Disney refuses to sell a copy of a movie, I should be allowed to obtain it from other sources.

about 8 months ago

Whatever Happened To the IPv4 Address Crisis?

JourneymanMereel Re:Chicken little (574 comments)

News to me... our division in China just got a /28 allocation of IPv4 address last month.

about a year ago

Cisco Exits the Consumer Market, Sells Linksys To Belkin

JourneymanMereel Re:Cisco "small business" products also aren't gre (284 comments)

It's funny.... I was sitting here thinking about the Cisco Small Business switches (SG-300 series) I have running flawlessly in my slightly bigger than small business (~300 ports). I was even able to get them to VLAN and Port Channel with a Nexus switch.

However, I've never tried to use any of their other equipment (My phone system is an actual phone system, my wifi is from Aruba and my NAS is from NetApp).

about 2 years ago

You're Driving All Wrong, Says NHTSA

JourneymanMereel Re:One hand, 12 o'clock ... (756 comments)

That's because people use it to signal irritation and then when it would actually be useful they forget about it. I was hit a couple years back as I was making a left turn. The roads were a little slick and the vehicle two behind me couldn't stop (the one directly behind me had no problem). The driver of this second vehicle swerved into the oncoming traffic lane just hoping that I wasn't turning left (despite the fact that I had my turn signal on). Had she used the horn in addition I would have known she was there soon enough to most likely prevent the accident. As it was, the first clue I had was when she slammed into my door.

more than 2 years ago

Security Tool HijackThis Goes Open Source

JourneymanMereel Re:Visual Fred (101 comments)

Yep... it was called Visual Basic.Net ... I haven't tried in the newer versions, but the first VB.Net (2005 was it?) did a pretty horrid job with my relatively small VB 6 apps. I actually ended up just re-writing them all.

more than 2 years ago

Job Seeking Hacker Gets 30 Months In Prison

JourneymanMereel Re:Good (271 comments)

Petty concerns? Wow, if you consider $400,000 - $1 million "petty", then could you please send me some petty amount of money?

Blocking .exe files sent by email is not unreasonable nor is it uncommon. You can complain to the CTO all you want, but if he's any good at his job he's been hearing ridiculous complaints like your so long that he has a "bitch-slap" email already composed and ready to go only needing to fill in a few blanks.

more than 2 years ago

Space Station To Be Deorbited After 2020

JourneymanMereel Re:"Russia and its partners"?! (572 comments)

Let me see if I have your argument right... sending people into space for long periods of time in order to study the effects of having people in space for even longer periods of time is not the best path to long term space exploration... instead, we should just sit on the ground and look at space while trying to imagine what it might be like up there.

more than 3 years ago

Why Netflix Had To Raise Its Prices

JourneymanMereel Re:The issue wasn't raising prices (574 comments)

And were subsequently purchased by Dish Networks.

I'm also considering a move the BlockBuster for the same reason... not only do they include games, but also BluRay. My biggest hang-up is, even though it's limited, I do like the Netflix streaming to the Wii... it has kept my daughter entertained when she wakes up in the morning quite well w/out needing cable.

more than 3 years ago

Fired IT Worker Replaces CEO's Presentation With Porn

JourneymanMereel Re:Awesome (316 comments)

Kind of rules out Firefox, Chrome, IE and Safari, doesn't it.

Kind of rules out Windows XP.... which comes with Remote Desktop Connection built right in. As does Vista and 7. Guess he can use an iPad as long as he doesn't buy one of those VNC or RDP apps....

more than 3 years ago

World IPv6 Day: Most-watched Tech Event Since Y2K

JourneymanMereel Re:And... (243 comments)

Y2K was definitely overblown by the mainstream media. I knew many people who were scared their car wouldn't start on Jan. 1, 2000.

more than 3 years ago

Sony Delays PlayStation Network Reactivation

JourneymanMereel Re:Who & Why (317 comments)

I just recently read that statute from a few posts higher, and nowhere in it does it say that it's illegal to leave your keys in your car. It only says that you must remove them from the ignition before leaving the car.

Makes me wonder, though, do cops needing the fill their ticket quota just hang out at the local tow shop waiting for a call to come in from somebody who locked their keys in their car?

more than 3 years ago

Sony Delays PlayStation Network Reactivation

JourneymanMereel Re:Who & Why (317 comments)

OK.... but it's not illegal to leave them on the dashboard. Yet, even if the keys are on the dashboard, the thief is still the criminal. Of course, the person who left the keys on the dashboard is an idiot, but not a criminal.

more than 3 years ago



Open Source IS Welcome At Palm App Catalog

JourneymanMereel JourneymanMereel writes  |  more than 5 years ago

Jacob Steenhagen writes "After two recent stories here on Slashdot slamming Palm as being unfriendly to Open Source on their new webOS app store I expected to log on this morning and see a story about Palm's recent development conference. Sadly, that was not the case. According to a story on Tech Crunch, Palm has come out in full support of Open Source apps. Not only did they say that they would be allowed, but they also will be waiving their $99/yr and $50/app fees for Open Source apps. All closed source apps, even if they're free, will be required to pay those fees."



Research Paper on DMCA

JourneymanMereel JourneymanMereel writes  |  more than 11 years ago

I tried to submit this as a slashdot story for the main page, but it got rejected... anyway, for my English 101 class we had to do a research paper and I chose the topic of he DMCA (a favorite around here :). What follows is that paper:

Digital Millennium Copyright Act vs Fair Use

There is an old cliché that there is only one constant in life: everything changes. That has certainly been the case with copyright law in America. The first statute, passed in 1790, required so much red tape that few things were copyrighted. Authors had to register for a copyright, renew it, and supply a copyright notice with their material. Those requirements no longer apply under current copyright law. Copyright now happens automatically whenever a new work is created. In fact, this paper is copyrighted, even though it doesn't bear the traditional copyright symbol. It is true that not everything in this paper is original material. The words of other authors can be included without their explicate permission because of the fair use clause of the copyright law. Unfortunately, this clause, which applies to far more than simply research papers, is being indirectly threatened by the Digital Millennium Copyright Act.

But what exactly is fair use? The answer to that question is often debated. The concept of fair use has been around for more than a hundred years. Ironically, one of the first fair use cases posthumously involved George Washington, signer of the first copyright law. The court ruled in 1841 that the author of Life of Washington in the Form of an Autobiography had exceeded what it termed "justifiable use" of previously copyrighted material (Johnson 131). However, it wasn't until 1976 that fair use actually became a part of US copyright law as section 107. The intent at the time was not to provide new rights to the public nor to remove any existing rights, but instead to codify the status quo. The basic concept of fair use is to ensure that the author of a work does not have total control of the use of that work. This ensures that knowledge contained in one work can be built upon in another. This concept also applies to areas outside the academic world. The Supreme Court ruled in 1984 in a case between Sony and Universal Studios that the ability to record a television show for later viewing was protected under the fair use section of copyright law (Garfinkel 26). There are also rights that are almost taken for granted. For example, is there anything wrong with lending a book purchased from a local book store to a friend? Of course not; while that book does contain copyrighted material, the ability to loan it out or even sell it to a used book store is fair use. Where fair use gets sketchy is when it concerns making copies. Interestingly enough, every time a CD is played on a computer, a document is displayed, or magazine article is downloaded it involves storing a copy of this copyrighted material in the computers random access memory (RAM). This action is not covered under the fair use section of the 1976 copyright law.

Enter the Digital Millennium Copyright Act (DMCA) passed on October 28, 1998. This 70 page document not only updates the copyright law to account for the way computers function, it also adds new provisions for this digital information. Up until this time, copyright law focused on the relationship between authors and distributors virtually ignoring end users (Litman 111). As the Internet increased in size and popularity, it became easier for end users to exchange copyrighted material with each other. Distributors started looking for ways to control this activity and discovered encryption. However, anything that can be encrypted can be decrypted so the industries lobbied for Congress to include provisions making it illegal to break this encryption. This resulted in section 1201 which, according to the summary published by the U.S. Copyright Office, prohibits the "making or selling of devices or services that are used to circumvent [...] technological measure[s]" intended to prevent unauthorized access or copying of copyrighted material (3-4). Surprisingly enough, this provision only prohibits the act of circumvention on methods designed to prohibit unauthorized access. This section goes on to say "this distinction [between unauthorized access and copying] was employed to assure that the public will have the continued ability to make fair use of copyrighted works" (4). Unfortunately, these provisions intended to maintain fair use seem to be largely ignored.

Since the passing of the DMCA, there have been many cases where fair use is taking a back seat to the will of authors and distributors. When the DMCA was passed, many people felt it was giving too much control of copyrighted material to the authors at the expense of the consumer (Gillmor). While this doesn't seem to be that case in theory, in practice it appears to be true. Pamela Samuelson wrote an article originally appearing in Science magazine describing the plight of Edward Felton of Princeton Universitie's computer science department and a group of his collaborators. An organization calling themselves the Secure Digital Music Initiative had been working on a method to secure digital music using a form of watermarks. In September 2000, they issued a challenge offering a $10,000 reward for every broken watermark on the condition that information about how to break the watermarks would become the sole property of SDMI. Mr. Felton accepted the challenge, but decided not to accept the prize money and instead publish a paper describing their findings. Because they made no efforts to conceal their plans, SDMI contacted Mr. Felton with the support of the Recording Industry Association of America to persuade Mr. Felton to omit the details of the watermark's weakness. Because Mr. Felton and his group felt the details were an important part of their paper, they decided not to be persuaded. After many conversations on the subject and Mr. Felton's refusal to cooperate, SDMA and RIAA "made clear their intent to take action against the researchers [using the DMCA] unless they withdrew the paper" from the April 2001 conference where they intended to release their findings. Even though the group felt they were in the right, the threat of a law suit was enough to convince them to withdraw their paper (2028). This is extremely unfortunate as one of the main purposes of the original copyright law was to promote the expansion of knowledge. But, "when it comes to the business plans of those who publish books and music, academic freedom and free speech are apparently expendable" (Levy 54).

Because of these new anti-circumvention policies, some things were were perfectly legal before are now crimes. With traditional media, such as a book, it is perfectly legal to loan a legally obtained copy to a friend or sell it to a bookstore. In order to read it, you merely have to pick it up and open the cover. The DMCA, however, "for the first time purports to make it illegal for individual consumers to gain unauthorized access to copies of technologically protected works, even copies they own" (Litman 31). What does this mean? Let's say a person buys an electronic version of a book. Because this book is encrypted, it actually comes in three pieces. One is the file containing the actual book. Another is an application allowing the book to be viewed. The third is a digital key that tells the reader application that it is acceptable to open the book and display it's contents. If the owner of the book were to loose the digital key, the reader software will no longer open the book. Because the book is digitally encrypted, it is illegal under the DMCA to attempt to decrypt the book, even though it was legally obtained. But how is that possible? Certainly if the book were legally obtained it would be OK to open it using some software other than what it came with? Unfortunately, this is not the case.

In fact, a 26 year old Russian programmer named Dmitry Sklyarov wrote a program that bypassed the electronic provisions included in one popular format: Adobe's eBook. Mr. Sklyarov wrote this software while employed by ElcomSoft, a Russian company which sold the software to, among others, people in America. Because the DMCA is not a Russian law, his "research and software writing were perfectly legal in Russia" (Wallich 17). However, when Mr. Sklyarov came to America in July 2001 to present a paper at a conference, the FBI was waiting for him. He was arrested and jailed for almost two weeks before finally being given the opportunity to post $50,000 bail in San Jose, California. After more than a year of waiting, the case finally went to trial in December 2002. Mr. Sklyarov and ElcomSoft were acquitted on December 17, 2002 because the jury felt that while ElcomSoft's actions were illegal, they did not intend to break the law. This verdict despite the fact that "the software does have a legitimate use: restoring [...] 'fair uses'" (Levy 54).

Another high profile case involving apparent abuse of the DMCA involves DVD encryption. The vast majority of movies on DVD are stored in an encrypted format called Content Scrambling System (CSS). The routines needed to decrypt the information on these discs is embedded in commercial DVD players. DVD drives are also available for computers allowing movies to be viewed on the computer. However, the software containing the decryption routines are only available for Microsoft Windows or Apple's Macintosh. This makes it impossible for people running other operating systems, such as the freely available Linux to watch DVD on their computers. In 1999 a then anonymous programmer in Europe cracked the code used to encrypt DVDs. To the movie industries disappointment, he distributed this software, 215 lines of code he called DeCSS, across the Internet. It has since been discovered that the person who broke this code was a 15 year old Norwegian boy. This code was posted on the website for 2600 Magazine, prompting a lawsuit by Universal Studios. Despite the fact "Universal did not produce any evidence that DeCSS had every actually been used to make an infringing copy of the plantiffs' movies," in January 2000 the magazine was ordered by a trial judge to remove the code from their site (Samuelson 2028). It appears that the fact that it could be used for that purpose was enough. In an act resulting in making it even more difficult to block the distribution of the code, "two programmers at MIT reduced the [...] algorithm to just six lines" (Garfinkel 26). The six lines of code are extremely difficult to understand and don't contain any comments to help in understanding the it, but being only six lines makes it small enough that it has been published many times and even printed on a T-shirt.

When the Digital Millennium Copyright Act was passed in 1998 it may have had good intentions, but it was driven by an industry that has sought to have more control over its content for years. Universal tried to block the sale of VCRs in 1984, but failed. In 2000, they succeeded in court on the topic of DVDs because of additional regulations added by the DMCA. The same basic issue of when and where a person should be able to view copyrighted material was at stake both times. The entertainment industry is always on the lookout for ways to increase profit margins, even if it means lobbying Congress to create new laws. In the words of Dmitry Sklyarov, "'It's money. In the U.S. everything is related to money.'" (Levy 54).

Works Cited

Garfinkel, Simson. "The DVD Rebellion." Technology Review Jul/Aug 2001: 25-27.

Gillmor, Dan. "Digital Copyright Act comes back to haunt us." Knight Ridder/Tribune News Service. 23 Aug 2000. Gale Group Databases. Muskegon Community College Lib., Muskegon, MI. 18 Feb 2003. <http://www.infotrac.galegroup.com>.

Johnson, Donald. Coypright Handbook. 2nd ed. New York: R. R. Bowker, 1982.

Levy, Steven. "Busted by the Copyright Cops." Newsweek 20 Aug 2001: 54.

Litman, Jessica. Digital Coypright. New York: Prometheus, 2001.

Samuelson, Pamela. "Anticircumvention Rules: Threat to Science." Science 14 Sep 2001: 2028-2031.

U.S. Copyright Office. "The Digital Millennium Copyright Act of 1998." 18 Feb 2003 <http://www.loc.gov/copyright/legislation/dmca.pdf>.

Slashdot Login

Need an Account?

Forgot your password?