Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:But (Score 2) 440

The London Underground has looked at enabling mobile phone access, but their tunnels aren't well suited to reception (they're deep, narrow and follow the roads). At the moment it appears that mobile phone access is going to be restricted to the above the surface lines and stations using regular ground based antennae.

The London Underground is often known as the tube.

Comment Three technically incompentent idiots. (Score 2) 403

RTFA and you'll see three names: David Cameron, Teresa May and Keith Vaz.

Between the three of them they don't have a brain cell to rub together about how the Internet works, how folks use the Internet or how services like Twitter, FaceBook, Linked-In, Google+, Flickr, Wordpress (or unpteen other publicly accessable websites) work. They weren't able to effectively block those sites in my son's secondary school (because the kids knew how to find and use an open unblocked proxy).

They are also clueless about how folks use those things from their mobile phones.

Quite simply this won't work unless they get a pair of bolt croppers and physically sever the cables across the Atlantic, English Channel and North Sea (which would take out the POTS with it). They'd also need to shoot down a few satellites while they're trying to disconnect things.

Comment An article written by a total bozo (Score 3, Informative) 284

6. Using Command Prompt Quick Explanation: In Windows at least, one can simply open up command prompt (explained in tutorial) and simply type in “ping [insert domain name here]” and obtain a server IP address for later use.

The guy is a fucking cretin.

How do he think PING finds the address? It looks it up using the default DNS.

Comment Re:Thanks! (Score 1) 184

The authors would be millionaires if they charged for this. I see this software used many many places, so thanks.

I use PuTTY every day. So thanks as well.

Comment Non-event. No crash here. (Score 1) 213

I ran this:
<php echo "start\n"; $a = (float) "2.2250738585072011e-308"; echo $a,"\n"; echo "end\n"; ?>

It got this:
[Thu Jan 06 23:30:49 2011] [error] [client 10.1.1.30] PHP Fatal error: Maximum execution time of 30 seconds exceeded in /home/dougie/public_html/test_crud/bug.php on line 3

Comment In other news ... (Score 1) 335

A British MP shows she is 100% clueless. A British MP shows in public that she doesn't have the first faintest idea how the Internet works.
The only way I can see this working would be with a Great British Firewall, something like the one China has and the one the Australians keep trying to inflict on their poor long suffering citizens.
I can see a rise in the use of firewall breaking proxyies if the UK Gov't are stupid enough to inflict this crap on us.

Comment Re:Twitter, instead of (Score 1) 141

By getting a tweet through he was assured that all of his followers would see it.

I'd say he may have found the one instance where tweeting is actually a really good idea.

There's an interesting use of the word "assured". It's a good job his followers weren't using Tweetdeck or he'd still be in jail. Tweetdeck has an amazing ability to hide tweets from the user there's no "assured" about Tweetdeck.

Comment Re:Supporting citizens vs supporting a platform (Score 1) 393

That is funded by the BBC Television License Fee, not by taxes.

And how does that differ to a simple property tax?

I don't want the BBC to waste my £142.50 on stuff for fancy technology that the majority of their user base doesn't have, doesn't want and can't afford.

I want my BBC to spend the money I pay them on producing decent television and radio programmes.

Comment Politics and high tech don't mix. (Score 1) 223

I'm always astounded by the complete ineptitude of politicians when it comes to anything with a remote whiff of high tech.

It's clear that they've been watching too many movies where the CIA/NSA/FBI/Mossad/MI5/MI6/[insert other security service here] have their massive database at their fingertips and can track everything that's happening on their network. They've seen too many movies where Kevin Costner/Mel Gibson/Tom Hanks/Meg Ryan/Matthew Broderick/[insert other actor here] hacks into the security service/military/[insert other target system here] and foils the plot to blow up the world/starts the end of the world/[insert other disaster here].

The Italians buy this stuff hook line and sinker, they force me (a non-Italian) to change my passwords every 90 days (because I work for a global computer company). They've demostrated with that that they don't understand the Internet and the global nature of the internet. They've failed to notice that the child pornography moves from one IP addr to the next every day (and when we switch to IPv6 the bad folks will switch IP addr every minute if they need to.

The world is full of paedophiles, the world is full of bad people and the internet means that everyone is a child pornographer. Except that's not true only a tiny number of folks subscribe to that stuff and sometimes the authorities get ahead of them, sometime they're ahead of the authorities (just like the spammers and phishermen). Chase the server not the client, when you find the server it's logs will have all the stuff (punter's credit card numbers, ip address, whatever) that you need to find the ponces who peddle and trade this stuff. It'll be located in China or Russia or other Eastern European countires (it always is), In the UK I would get years in prison and registered on the Sex Offenders Register for life just for accidentally finding a child porn image on Google Images and looking at it so it's unlikely to be here.

This is not the way to control the problem. The way to control the problem is not the folks looking at this stuff, it's the folks publishing it and when you catch them castrate them (that's probably too weak a punishment). Sniffing my exceedingly boring internet traffic doesn't work - because I know how to use SSL and I know how to use an internet proxy with a secure VPN and if I were inclined to want to use child pornography then those are the first two requirements.

Slashdot Top Deals

PURGE COMPLETE.

Working...