Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Gizmodo author faces huge criticism over article (gizmodo.com.au) 2

RichM writes: A Gizmodo post by Alyssa Bereznak humiliating a world champion "Magic: The Gathering" player, who has earned $300k from his hobby, has seen a large amount of criticism across the net; including on Twitter and even other Gawker sites.
The ethical concerns over this post are also quite clear.

The Streisand Effect demonstrated, yet again.

Comment Compression (Score 1) 294

This isn't really "loudness", it's "compression".
And it's been done for years on commercial radio and, more recently, on TV adverts.
Every album you listen to has been mastered or mixed with compression of some sort on the master tracks.

A good example of how things have changed: listen to Violently Happy by Bjork for an example of when Compression is done correctly (i.e. subtle), then listen to any autotuned crap made within the last 2 years (Ke$ha) for an example of when not to do it.

Comment Starcraft 2 (Score 1) 133

A bit off topic, but I was always amused by the fact that when you play versus the computer 1v1 in Starcraft 2, the computer says "gg" when it realises that they can't possibly win.
And then they surrender.

I'm just waiting for the days when they start swearing at you and you can't tell the difference between AI and a person.

Media

Submission + - UK paper closing admid 'phone hacking' allegations (bbc.co.uk)

Jozza The Wick writes: The BBC reports that the News of the World, a UK newspaper owned by News International, is to close after police report they have the names of over 4000 people who may have had their phone voicemails 'hacked'. The list includes families of victims of the 7/7 attacks, familes of bereaved service personnel , as well as the murdered schoolgirl Milly Dowler.

Comment Disclaimers at the bottom of emails (Score 1) 619

Another pet hate of mine is those stupid fucking disclaimers at the bottom of emails sent from companies.
They usually bang on about "if this email has been sent in error you agree to delete it and inform the sender and must not disclose the contents to a third party... " etc.
Yeah right...what a load of bollocks.

I'm not a lawyer but I'm betting that virtually all of this junk is legally unenforceable because to enter into any kind of agreement or legal contract you have to agree to it first - that's why it's called an agreement...
Email sent by mistake can be considered the same as spam - unsolicited email.

Comment I get this all the time (Score 1) 619

I've not got a massively popular surname, but thanks to having a FirstInitialSurname@gmail account, I get tons of the stuff.

I've had the following:

- Job offer for the Vice President of Communications (ha!) for the Carlyle Group
- Invoices from storage companies
- Bills from Qwest Communications which unbelievably include a temporary username/password to log into the customer's account, imagine the fun to be had here
- Party invitations
- Bank statements
- Random email conversations that I have been CC'd into
- Pictures sent from mobile phones (usually by the owner to what they think is their email address)

Occasionally I email back, but most of the time I don't bother - it's their own damn fault.

Linux

Submission + - Has Linux Missed Out on IPv6 Day? (internetnews.com)

darthcamaro writes: As users and providers around the world focus on IPv6 today, Linux is taking on a mixed role. While Linux as an operating system is ready for IPv6, major Linux websites, including Linux.com are not.

"Unfortunately, we won't be participating in IPv6 Day because our upstream provider does not route IPv6 yet," Amanda McPherson, vice president of marketing and developer programs told InternetNews.com.


Comment Re:So Mac Users should expect this? (Score 1) 277

Root does matter, but if I were writing Mac malware I would grab their Safari passwords then try a "sudo -i" with each one on the system.
You can bet most users will use the same password for websites as they do for their computer login.

Also, I'm not sure how feasible it would be - but it would be theoretically possible to flag a binary setuid by modifying the underlying filesystem or exploit another binary which is already set to +s.
And then, boom - root access.

Slashdot Top Deals

God help those who do not help themselves. -- Wilson Mizner

Working...