Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Dark side (Score 1) 65

I would note that much of the Federal government already contracts out routine and easy-to-define services

And to former federal employees in many more cases than it should be. You are kidding yourself if you think that is not a closed ecosystem. It is a monopoly, and one that is much harder to see through.

Submission + - Spy tools uncovered in harddrive firmware (reuters.com)

Cenan writes: (Reuters) — The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Comment Re:Other sources for music (Score 1) 196

Netflix lacks the appeal of similar services for music, since it lags severely behind other venues for movies. I'm not going to pay for Netflix when I have to torrent half the seasons of a series regardless. The Netflix vs torrent comparison will only be valid once the studio mafia yanks their collective heads out of each other's asses. I know many here in Europe feel the same way, Netflix is money out the window for no gain at all. Rectify that, and movie piracy could go the way of music piracy.

Comment Re:grandmother reference (Score 1) 468

Really? I can understand a piece of software both being one of a kind and severely overpriced, such as Windows, being pirated. In that case I think it's correct to almost equate piracy with a lost sale. Granted you would have to assume that people would have bought it without the cracks being available. More likely potential buyers remain on an older version, or in extreme cases find an alternative.

I've also worked at places where a piece of software was integral to running the business, but gouging via license fees forced them into creative setups to work around it.

I've not actually heard of a software company going out of business due to piracy. Mismanagement or other bone headed crap, sure. Piracy tends to follow popularity, and in my experience money follows that.

Comment Re:grandmother reference (Score 3, Interesting) 468

Except a pirated item does not equate to a lost sale. Further, those hypothetical people who would then download the pirated game have already paid, again not hurting sales. You'd be surprised how quickly people turn back to the monkey that kicked their teeth in for another treatment.

Event Y is going to hurt the profits of X - bullshit. Time and time again we're shown that prior reputation has absolutely nothing to do with future profits, contrary to common belief. My personal hypothesis is that marketing machines are just too good at hyping whatever game the company is putting out, making gamers want to fork over money to a disreputable company rather than wait for the pirated version to become available.

Comment Re:They don't act enough (Score 1) 329

They don't just wait. They let the actual plot play out. If there were no random acts of terrorism, how would they go about arguing for increased capabilities? The mass murderers in France were well known and were allegedly also being watched. They found an ID in the car? How convenient.

Submission + - Delivering Malicious Android Apps Hidden In Image Files

An anonymous reader writes: Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, seemingly innocuous wrapper app. Fortinet malware researcher Axelle Apvrille and reverse engineer Ange Albertini created a custom tool they dubbed AngeCryption, which allows them to encrypt the payload Android application package (APK) and make it look like an image (PNG, JPG) file . They also had to create another APK that carries the "booby-trapped" image file and which can decrypt it to unveil the malicious APK file and install it. A malicious app thusly encrypted is nearly invisible to reverse engineers, and possibly even to AV solutions and Google's Android Bouncer.

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...