Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Patent Application Filings (Score 0, Redundant) 191

I believe Microsoft's going to win this one. From the article:

However, a trademark application for the name was not filed until May - when rumours about Microsoft's new product had already spread widely across the internet.

Microsoft, meanwhile, filed its own trademark applications for the name in March - for a variety of uses, including search engine software, interface software, advertising, telecoms and for "providing a website and website links to geographic information, map images and trip routing".

Comment Re:What happens to Hulu? (Score 1) 258

There's a New York Times article that discusses the conflict of interest. Of particular interest is this quote:

“Hollywood needs a toll collector,” said Todd Dagres of the venture capital firm Spark Capital, and “Comcast can play the part because online video will erode traditional cable.”

Hulu's not going anywhere. Instead, it will probably be relegated to second-tier content. The content providers will charge for the new stuff and continue to file DMCA notices if content ends up elsewhere. They'll throw the people a bone, charge for the meat, and sue the pants off the vegetarians. Sounds like a Murdochian utopia.

Comment Re:Tour a sub. (Score 3, Informative) 239

The USS Cod is docked next to the Rock and Roll Hall of Fame in Cleveland. I went there this summer and was amazed by how small the living quarters were. Apparently the best bunks were above the torpedo tubes in the bow of the submarine because they're furthest away from the diesel engine. Bunks elsewhere were stacked three high about a foot apart and only wide enough for your shoulders. Cramped!

Comment Re:a 4G+ file? (Score 1) 412

The file on the device is probably compressed in a way that makes a diff impractical.

Plus they can charge for their proprietary format! From their store:

Annual Update Subscription $29 for two updates per year

Receive content updates for your WikiReader delivered to your door.

Comment Re:They're copying Braid (Score 1) 275

Not to go off on too far a tangent, but Braid's rewind was not just an "oops, let me retry" button like Sands of Time's was. In the GP's example, some monsters and platforms were immune to rewinding. This led to interesting puzzles where you would rewind to get a platform in place for a rewind-immune monster to walk on.

Don't get me wrong. Sands of Time is a good game. It's just that Braid was one of the best games I've played in a long time. Please give it a try, you might like it.

Comment Re:Is TOR really make web surfing anonymous? (Score 2, Insightful) 122

Yes, this is a weakness. Hopefully multiple alphabet soup agencies from different countries will get this idea and end up competing with each other. An arms race of diminishing returns to get a bigger chunk of the Tor network just means we'll have plenty of free Tor bandwidth on the gov't dime.

Protip: You can edit the Tor config or source code to pick geographically diverse nodes yourself.

Comment Re:Linux version? (Score 1) 133

Apologies about the "hacker" faux pas.

Anyway, you might be right about the cracker coming back with a honeypot. I wish I was a fly on the cracker's wall so I could see how this played out.

As far as gov't grey-hats go, there is definitely a turf war between agencies. Hell, even the Air Force wants a piece of the pie. God help us all!

Comment Re:Linux version? (Score 4, Insightful) 133

This paragraph from TFA is telling:

In a separate February 2007 Cincinnati -based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."

Seems like the FBI exploits browser vulnerabilities a la the Pwn2Own contest in order to deliver CIPAV, but CIPAV itself might not run in linux. I suspect that the FBI will have written a linux-compatible CIPAV after the quoted incident. Probably a bash or perl script so they don't have to worry about different architectures.

On a side note, there was probably some good porn on that page for the hacker to load it 30 times.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...