Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Because death threats are illegal and a felony (Score 1) 806

Saying trespass is ok in certain situations is similar to saying stealing is ok in certain situations.

He wasn't trespassing! He walked up the driveway and knocked on the front door! You don't seriously think shooting him for that was acceptable do you?

As I said, there were NO THREATS MADE.

RTFA. Yes there were. Three separate people felt it was serious enough to suspend her temporarily and investigate. This was not an overreaction.

Comment Re:Tbh, these definitions need to be dropped. (Score 1) 362

To be fair, the "key-mashing no-thinking tank" wouldn't exist in any world... Even if you try to roleplay Obelix, you have this whole personality with dreams to act out besides wanting to bash everyone. Honestly this is why I looked at MUDs in the past year and why I am starting to really enjoy them compared to modern mainstream games. You always are a nobody and you still get amazing stories. The story might be about how you and your friend hunted a bear instead of how both heroes killed a dragon... Less heroic, but it forces you to keep your ego down.

Comment Re:Tbh, these definitions need to be dropped. (Score 1) 362

you still dont get it.

you are setting up a situation in which the machine gun is going to be much more superior. there are hundreds of yards in between the machinegun and its enemies, the enemies dont have weapons to hit him from that range, and they cant naturally close in.

it is little different from placing a rogue with no evasion ability 100 yards from an archer that has rapid shot. if you set it up that way, anything becomes a 'crowd control'. situation is not equal.

in a real life situation the infantry would have bazookas or grenade launchers to use against emplacements.

in ANY case, evne if they didnt, they would STILL be able to at least retreat and try to go around the emplacement, which was the method usually attempted in ww1, in the period where machinegun was dominant.

with crowd control concept in rpgs you cant do anything.

Comment .net is great for programmers but... (Score 1) 558

Me: "Hey programmer guy, we need a small program that does XYZ." .NET guy: "It's going to take 6 months and we'll need to buy a license for these modules."

PHP guy: "Sure, I can square that away in one caffein-fueled night."

I'm not saying PHP is pretty or that it's better, but this sort of thing is a regular occurrence.

Comment Re:Ideas (Score 1) 533

alright, i tried installing CustomizeGoogle from Mozilla's addon page (https://addons.mozilla.org/en-US/firefox/addon/743), and then, under noscript i allowed google.com (can't forbid google's js with noscript or customize google won't work).

the results: on web searching, now i DO get the ability to try my search on other search engines (that's my favorite thing, just one middle click on each search engine!). But when using image searching, it DOES NOT add links to other image search sites. Nor does it give convenient links to other news search sites.

And other things like being able to make image links point directly to the image aren't working....

Mozilla

Submission + - French Military Donated Code to Thunderbird (pcmag.com) 1

An anonymous reader writes: A new email client unveiled by Mozilla last week contains code from an unusual source, the French military, which decided the open source product was more secure than Microsoft's rival Outlook. The French government is beginning to move to other open source software, including Linux instead of Windows and OpenOffice instead of Microsoft Office. Thunderbird 3 used some of the code from TrustedBird, generalized version of Thunderbird with security extensions built by the french military.

Comment Re:I'll never use Facebook (Score 5, Informative) 219

I am really worried about the fact that Facebook has access to data such as people's real name (that's the point of it, right?)

Um, no it doesn't. It has no real name verification mechanism, so if you are like me and you go by a nickname among your friends, you can register using a nickname. I think at some point they changed it so that you couldn't change the name easily once you register ('didn't used to be that way in its first year), but if you start out with a pseudonym, they don't stop you.

As for other infos, well, use TOR and litter your profile (and friend list) with a lot of false information so that they cannot separate the truth from lie.

Or, as you said, don't use Facebook.

Microsoft

Submission + - Office 2003 Bug Locks Owners Out (techflash.com)

I Don't Believe in Imaginary Property writes: "A Microsoft Office 2003 bug is locking people out of their own files, specifically those protected with Microsoft's Rights Management Service. Microsoft has a TechNet bulletin on the issue with a fix. It looks like they screwed up and let a certificate expire. There's no information on when the replacement certificate will expire, though, or what will happen then."
Encryption

Submission + - How to encrypt all internet traffic?

bondiblueos9 writes: Is there a way to anonymize and/or encrypt all of my internet traffic? I am really only concerned about it being so out to at least my cable modem, preferably through it.

I live in an apartment with several people and we all use one cable internet connection through one wireless router (using WPA2) to access the internet. They all depend on me to keep it running. We were having some connectivity/bandwidth issues, and in the process of tracking down the problem I realized that I could use available tools to capture all of their wireless traffic, and in the worst case, I could tap the line from the router to the cable modem to capture all traffic. If I can do it, then that means someone else could, and with the right equipment someone could even tap the cable box outside and grab all my traffic.

I don't mean to be paranoid, but how can I avoid this? I know Tor does this for some applications, but only ones that can be set up to use a proxy, not for all traffic. I had the idea to set up a box between all of my computers and our router, and somehow configure it to redirect all of my traffic through tor, but I do know if this is possible or what tools I need to set up the forwarding. How can I set this up, or what other suggestions/solutions does anyone have?

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...