Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Tor (Score 4, Interesting) 248

The big problem with being an exit node is a legal one. Specifically the Cease and Desist notices from the RIAA/MPAA.

I had an exit node with 2mbps bandwidth DEDICATED to TOR. Not too long later, my service provider started getting the copyright infringement emails. Even though I handled them all myself, and sent replies, called people, showed my service provider the TOR page about legal threats, and even promised to cover any legal costs *IF* it did ever get that that, eventually my service provider just got sick of receiving and forwarding the emails.

Now I don't specifically blame my service provider for this - it IS a potential legal exposure/battle they just don't need. Now you could blame the people using TOR for P2P, but they're doing it for exactly the reason TOR was created - to avoid detection of who they really are. Now you can't tell people TOR cannot be used for illegal activity, because the very reason TOR was CREATED was to facilitate illegal activity (eg. dissident speech in China). So what is illegal or not is a judgement call.

Therefore the blame ends up being on the RIAA/MPAA - but even there, they are legitimately trying to protect their rights. As unpopular as it sounds, and annoying and ineffective as it may be, there IS a reason they are sending out emails of the like. It's cheap for them to do it, and the threat of legal action is usually enough for ISP's to yank someone's pipe.

So my TOR node was, in the end, turned into a non-exit node. Until this kind of problem is solved (for which I don't know what the solution would be), then exit nodes on TOR will be a rare commodity, and as such, bandwidth on the TOR network will be limited because it is being constrained to very few eligible pipes.

Books

What Can I Do About Book Pirates? 987

peterwayner writes "Six of the top ten links on a Google search for one of my books point to a pirate site when I type in 'wayner data compression textbook.' Others search strings actually locate pages that are selling legit copies including digital editions for the Kindle. I've started looking around for suggestions. Any thoughts from the Slashdot crowd? The free copies aren't boosting sales for my books. Do I (1) get another job, (2) sue people, or (3) invent some magic spell? Is society going to be able to support people who synthesize knowledge or will we need to rely on the Wikipedia for everything? I'm open to suggestions."
Input Devices

A No-Touching 3D Computer Interface 123

Justin Schunick points out a video demonstration of a 3D input system which senses the user's hand position, but without requiring the user to touch a controller or wear a trackable position indicator. From the provided description: "Utilizing the theory of electrostatics, we have designed a low-cost human-computer interface device that has the ability to track the position of a user's hand in three dimensions. Physical contact is not required and the user does not need to hold a controller or attach markers to their body. To control the device, the user simply waves their hand above it in the air."

Comment The point? (Score 4, Informative) 393

"On Linux, if you have root access, you can override the MTR buffers and install a root kit."

If you already have root access, WTF is the point, just install the root kit. The idea of exploits is to *GET* root access to be able to install these root kits.

Now while this might be moderately interesting if you can somehow manage to get a service running as root to run said code, but then, if you can get the service running as root to execute arbitrary code like this, then why not get it to install the root kit for you.

Stupidest exploit scare ever.

Transportation

Computer-Controlled Cargo Sailing Vessels Go Slow, Frugal 210

An anonymous reader writes "Big container ships are taking it very slow these days, cruising at 10 knots instead of their usual 26 knots, to save fuel. This is actually slower than sailing freighters traveled a hundred years ago. The 1902 German Preussen, the largest sailing ship ever built, traveled between Hamburg (Germany) and Iquique (Chile): the best average speed over a one way trip was 13.7 knots. Sailing boats need a large and costly crew, but they can also be controlled by computers. Automated sail handling was introduced already one century ago. In 2006 it was taken to the extreme by the Maltese Falcon, which can be operated by one man at the touch of a button. We have computer-controlled windmills, why not computer-controlled sailing cargo vessels?"

Comment Pilots? (Score 1, Redundant) 1077

This is similar to how all pilots who expect to fly internationally (and probably all commercial pilots regardless) are required to speak English. It is the standard language of air traffic control and such.

If you expect anyone else to work with or see your code, you should probably be writing it (and commenting it) in English. Not because it is a better language than your native language, but because it has basically become the modern Lingua Franca and tends to have the greatest chance of 'common ground' between nationalities.

Comment Been done, and better supported. (Score 0, Redundant) 325

How is this any different to P2P over TOR, except for the fact TOR exit nodes tend to block several 'standard' P2P ports (which is easily fixed by using a non-standard port for your P2P)?

TOR has the added avantage of nobody needing to use some new piece of specialized software to be able to get the benefits of anonymity - and it's not used for a single purpose - so people can't go 'Oh! he's using OneSwarm! He must be P2P sharing, and want to hide it!' ....

Privacy

Bill Would Require ISPs, Wi-Fi Users To Keep Logs 857

suraj.sun notes CNet reporting on bills filed in the US House and Senate that would require all ISPs and operators of Wi-Fi hotspots — including home users — to maintain access logs for 2 years to aid in law enforcement. The bills were filed by Republicans, but the article notes that the idea of forcing data retention has been popular on both sides of the aisle over the years. "Republican politicians on Thursday called for a sweeping new federal law that... would impose unprecedented data retention requirements on a broad swath of Internet access providers and is certain to draw fire from businesses and privacy advocates. ... Each [bill] contains the same language: 'A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user [i.e., DHCP].'"

Comment Re:Following Apple (Score 2, Insightful) 535

I'm betting their focus will more be their SURFACE platform - demoing things like transferring to/from media player to the surface PC by just putting the media device ON the surface and dragging stuff to/from it. That seems where their next generation of 'wow' factor is going.

Slashdot Top Deals

Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them?

Working...