Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Bah (Score 1) 280

Yes people will go back and fourth on password managers. They are not idiot proof, and take skill to use, but for those of us who use them properly they are very convenient. No security system is going to be perfect so one just has to do a risk management analysis for themselves.

Personally, if I was forced to use an unsecured computer (a public terminal) to log in to a website I would look up the password on my cellphone and physically type it in. I would not log in to my password service on an unsecured computer, ever.

Comment Re: 50MB = 750$ (Score 1) 321

People need to realize that post-paid contract cell phone accounts are *unlimited liability* credit accounts and that you have agreed to pay whatever roaming charges are forwarded to ATT from other carriers that ATT agreed to. There is no incentive to change this practice absent regulation. This kind of stuff on post-paid is why I'm switching to prepaid when my contract is up, as I can control what I spend and what features I want to pay for. I will not be back on post-paid until they allow setting a spending limit like most other forms of credit accounts.

Comment Re:Irresponsible (Score 1) 354

I have serious doubts as to whether a source file for printing a 3D weapon can be regulated. Forgetting the 2nd amendment issues I doubt it would stand up to 1st amendment scrutiny (source files are speech). Possession of the output (the gun) is already regulated under existing laws anyway, I'm not sure what the big deal is.

Comment Re:just because (Score 1) 143

If you commercially distribute binaries not accompanied with source code, the GPL says you must provide a written offer to distribute the source code later. When users non-commercially redistribute the binaries they received from you, they must pass along a copy of this written offer. This means that people who did not get the binaries directly from you can still receive copies of the source code, along with the written offer.

You sort of proved the GP's point. Only if you choose to use written offer must the offer be good for any third party. If, instead, one distributes binaries with source, there is no obligation to third parties as they should have received source from their distributor.

Comment Re:Typing "google" into search not a bad idea ... (Score 2) 522

It does lead to hilarious results sometimes. I recall a ReadWriteWeb article that BREIFLY became the top search result for "facebook login" on google. The chaos was amazing.

http://readwrite.com/2010/02/10/facebook_wants_to_be_your_one_true_login

The comment section is riddled with people asking how to get to facebook, or why did facebook change their login, asking help with logging in on this "new" login page. It was epic. The comments are still up if you want to read them

They had to put a notice near the top of the article explaining that it was not a facebook page. Eventually google fixed it. I guess the point is, that yes these people need to be considered when designing UIs.

Comment Re:Weasel words ... (Score 1) 182

Just because it has always been done that way, doesn't mean it still works in the current industry environment. Netflix only sends data to a host that requests it. if netflix is sending your network data it is because someone paying to use your network has asked them to that bandwidth is paid for already. I guess netflix could code the client to send back equal amounts of data as a workaround, then it would be even.

Comment Re:It could use up all your activations (Score 1) 221

I can't comment on the reactivate every boot, OEM's do strange things with preinstall images so I guess it is possible. Personally, I'd just reinstall Windows in a VM, it be easier than trying to put an existing install in a VM. Install .iso's are not difficult to come by and MD5/SHA1 can be verified against TechNet's published values.

Comment Re:No screenshots (Score 1) 77

Agree with everything you said. My first encounter with screen I first installed Linux to run a headless Counter-Strike server. It is a great solution to being able to ssh in to a box, start the server and log off. It also allowed other admins to log in and assume the screen if they needed to.

Comment Re:No jurisdiction (Score 4, Informative) 226

Microsoft, however, is subject to the jurisdiction of the U.S. Federal Court system, and when a Magistrate Judge orders them to produce something, they are compelled to produce it. It doesn't really matter where the something is. Basically the court is saying the search warrant can be executed like a subpoena.

From the linked article:
A search warrant for email information, he said, is a "hybrid" order: obtained like a search warrant but executed like a subpoena for documents. Longstanding U.S. law holds that the recipient of a subpoena must provide the information sought, no matter where it is held, he said.

Slashdot Top Deals

On the eighth day, God created FORTRAN.

Working...