Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:UDP ... (Score 2) 151

At that point you don't need the reliabilitiy and retransmission features of TCP. Once you stack the layers up, TCP will take care of that anyway, without running it over TCP again. Think IP: unreliable datagrams; you put TCP on it and presto: reliable, ordered, everything. Run a VPN, and you do it over UDP, and end up with something like IP -> UDP -> TCP, and then TCP again does its thing, without a care in the world about the layers below. Same principles apply with this new things too. If your underlying layers are flaky, you can't make them less flaky by adding more TCP to your cake. In effect, you make them even more flaky as each TCP layer tries to do its own retransmission and floods your line.

Comment Re:Same IP (Score 5, Informative) 132

Replying to myself because I just got the brilliant idea to see if BT aren't actually hijacking DNS itself, making me look like an idiot. Well... they succeeded:

$ dig +trace thepiratebay.org
#snip#
thepiratebay.org. 3600 IN A 194.71.107.50

$ dig +trace promobay.org
#snip#
promobay.org. 3600 IN A 108.59.2.74

Promobay.org works once I add its IP to /etc/hosts.

Why are BT hijacking the DNS for promobay.org? I have no idea, but a judge might be interested.

Comment Same IP (Score 2) 132

I can't believe I haven't read this one yet:

$ host promobay.org
promobay.org has address 62.239.4.146
$ host thepiratebay.org
thepiratebay.org has address 62.239.4.146

BT gives me "Error - site blocked" for both TPB and PromoBay.org which means they've hijacked the IP address itself. What I will have to see next is if anyone goes and tell the court that BT is doing more blocking than they've been ordered. They've been ordered to block TBP, but not anything else that may be hosted at the same IP address.

My conclusion: TPB is playing one of their games. Popcorn may be recommended for this one if the ball gets rolling.

Comment Workaround (Score 1) 186

I created a new profile in the profile manager of Firefox and wrote a tiny script that I called '~/bin/privatefox' with this command in it:

#!/bin/bash
exec /usr/bin/firefox -P new -no-remote -private

Bug fixed :)

I've switched away from Chrome since Chrome started adding my incognito cookie and javascript exceptions to the persistent list. Everything else Chrome did to tick me off was tolerable, but the leaking of incognito exceptions... GTFO

Comment Printed braille (Score 1) 75

I imagine the OCR is overkill, but this invention could really make printed braille useful, and turn the fail I just linked to into a win (if you ignore the braille typo). I imagine the recognition would be a lot easier to do (to the likes of QR codes), and it would be really easy to retrofit to existing signs.

Comment Re:Meanwhile at Canonical (Score 2) 255

I was about to uphold my point by pasting this from the GPL:

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

emphasys mine,

but then I scrolled down:

9. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

emphasis mine here as well.

So I guess you're right. Thanks for making me look it up and update my knowledge.

Comment Plausable explanation (Score 1) 215

My guess is that she picked up an iPad, she liked it, but thought it was a Surface (a staffer is laughing on the floor in a closet right now), and tweeted that crap (directly, or via intern/secretary), and she'll go like "WTF is this shit?" when she receives her real Surface order later on. Don't attribute to malice (or shilling) what can be explained by stupidity or somesuch, right? It could have been more than speculation if she specified that she tweeted from her Surface, so I wouldn't have to write this at all.

Comment Re:This. I teach cybersecurity for DHS (Score 1) 104

So wait... let me get this straight... broken MD5 is not acceptable because it's... well... broken, but clear text is OK? I guess no one cracked clear text yet...

And lest I say something stupid, I went to Wikipedia to figure out who uses MD5 as a block cipher and came up empty. MD5 doesn't appear to be a block cipher in any usage, but something that you attach to data (either plain or encrypted) to verify integrity/identity. NIST seems to still like 3DES for block encryption just fine. NIST also like SHA and things. If DHS says NIST is pants, well... Are you sure those limitations aren't just for the purposes of your teaching, lest students leave with state secrets on their mobile phones?

There are so many ways I can't wrap my head around your post, it makes my head spin, so I'll stop. All I can safely do is ask: did I pass your class? :)

Comment Re:Only credential holders? (Score 1) 196

Not if you're a journalist you're not. Parent has a point: if the journalists exceed the limit, have their credentials revoked and start attending as private citizens instead, what's the UW to do about it? Ban communication devices and have them "detained" at a TSA-like security checkpoint at the entrance? Install a Faraday cage around the avenue and hinder the radio and TV stations too? Jam GSM/UMTS/CDMA specifically and hope they don't leak any jamming signal outside and get in trouble with the FCC?

Comment Patent idiot here (Score 1) 347

Sorry if this is totally off, but aren't patents supposed to prevent the manufacturing and distribution and/or selling of the patented items, and have nothing to do with the usage? That means this statement is at least misleading, if not down right lying: “When the government grants you the right to a patent, they grant you the right to exclude others from using it.”

To clarify: If I use SSL on my website, I don't think this patent applies to me. I didn't make SSL, and I'm not providing SSL for download. Go sue the OpenSSL guys, or sue Debian, Red Hat and Canonical for distributing your patented thingy, and hope the EFF doesn't chime in.

The big guys who settled are making and selling products that ship SSL within. Except Exxon Mobil - I have no idea what they could sell me with SSL in it, and appear to have settled just because the inconvenience of a lawsuit wasn't worth it. If he isn't asking for crazy amounts, the big guys may not even twitch and just pay up. As in "hey, I see your patent, it doesn't look like it could hold in court, but... you're asking for peanuts, so here you go, please go away". Because in that case the lawyers would cost a lot more just to throw the case out of court, and this guy's company doesn't have any assets that can be reposessed to cover the costs.

Conclusion: he's not going to sue anyone small, and he'll stop when all the big cows have been milked - unless he meets the wrong kind of cow before then.
Your Rights Online

Submission + - Australia abandons plans for a mandatory internet filter (itnews.com.au)

littlekorea writes: The Australian Government has officially abandoned plans to legislate a mandatory internet filter. The news ends a four-year campaign by the ruling party to implement legislation that would have compelled ISPs to block a list of URLs dictated by Australia's telecommunications regulator, the ACMA. ISPs have instead been told to block a list of known child pornography sites maintained by INTERPOL.

Comment Re:Keeps programmers busy (Score 1) 475

On one specific day, we have to pay a worker for 13 hours while hes on a 12 hour shift and not count the extra hour as overtime and on another specific day, we need to pay for 11 hours and still count the 12 hour shift fully filled.

That's a very interesting point there about overtime. Why would the 13th hour not be classed as overtime? The person is working one hour longer than they would otherwise. Cost of doing business during the night that falls between a Saturday and a Sunday when the clocks go back. And when the clocks go forward, the shift is 11 hours, and that's it. You don't pay the worker for 12 hours. Don't like it this way? Set schedules based on Standard Time, so workers have to come in an hour "earlier" or "later", depending one which way the clocks go.

I wonder what the regulators would have to say about this.

Security

Submission + - The Web Won't Be Safe or Secure until We Break It

CowboyRobot writes: "Jeremiah Grossman of Whitehat Security has an article at the ACM in which he outlines the current state of browser security, specifically drive-by downloads.

"These attacks are primarily written with HTML, CSS, and JavaScript, so they are not identifiable as malware by antivirus software in the classic sense. They take advantage of the flawed way in which the Internet was designed to work."

Grossman's proposed solution is to make the desktop browser more like its mobile cousins.

"By adopting a similar application model on the desktop using custom-configured Web browsers (let's call them DesktopApps), we could address the Internet's inherent security flaws. These DesktopApps could be branded appropriately and designed to launch automatically to Bank of America's or Facebook's Web site, for example, and go no further. Like their mobile application cousins, these DesktopApps would not present an URL bar or anything else making them look like the Web browsers they are on the surface, and of course they would be isolated from one another.""

Slashdot Top Deals

I program, therefore I am.

Working...