Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:SCEA or SNEA (Score 1) 404

Given that Sony simply imported the data from one "child" company to another I don't expect that the owner of the company matters. It interests me that by closing the service on one company and opening it on another (along with a completely new TOS), would clauses regarding forcing a customer to use arbitration then be rendered void? The EULA is a legal document which supposedly forms a contract between one party and another; by failing to continue to provide service on the original company sony has breached that contract.

What of the millions (of 77+ I'm sure there's a few) who have yet to agree to the new EULA. Even in the case that one or both EULAs contain requirements that users handle disputes through arbitration I'd expect many individuals would not be held to these requirements at all.

Any lawyers care to correct me?

Comment Re:Them swedes. (Score 1, Flamebait) 420

If only there was some way we convince those third-world political forces to respect our "IP" authority. We face a greater ethical dilemma; is it right to enforce IP protection by military power? I think most americans would say no, but what alternative do we have? Once the cat is out of the box there's little that can be done to right it, and from what I understand the developing world (our manufacturing outsource channel of choice) continues to build 1960's car designs from both GM and VW. These designs don't sell in developed countries (likely only due to trade embargos), but with trade balance against us, that type of problem will be minimized for the "pirates" of these corporate machine countries. Is it time that our annual trillion+ dollar defense budget brought some sort of return on investment?

Comment Re:jobs and woz got their start doing blueboxes (Score 2) 134

I'd agree that blueboxes are a step above jailbreaking in that you are actually using infrastructure instead of just your own device; I wouldn't call it theft in the case of "Ma Bell" though. The infrastructure was paid for by the people, should they not be allowed to use it without paying a corporation with no investment again?

Comment Re:GOOGLE MAIL (Score 1) 467

Are you implying that there are more zip files floating around in workplace environments than there are rar files floating around bittorrent and other file sharing worlds? Honestly, considering the feature set I wouldn't even consider winzip to be a contiguous archive format. It was intended to compress small collections of files in the early days and true "archive" features like multi-part files or archives larger than 4GB have only been added to select programs outside of specifications.

I will concede that if you consider popularity strictly from the perspective of public knowledge zip (weather or not it's a true archive) would easily win. If we were to look at the number of files or size of files stored and transmitted nothing will come close to RAR.

Comment Re:GOOGLE MAIL (Score 1) 467

There's a reason why RAR is the most popular archive format, it provides small files and sound performance, especially on multi-core systems. As long as you're not doing anything illegal the severity of encryption isn't an issue, the DMCA makes snooping encrypted files or communications punishable with extreme repercussions.
Networking

VPN Flaw Shows Users' IP Addresses 124

AHuxley writes "A VPN flaw announced at the Telecomix Cyphernetics Assembly in Sweden allows individual users to be identified. 'The flaw is caused by a combination of IPv6, which is a new Internet protocol due to replace the current IPv4, and PPTP (point-to-point tunneling protocol)-based VPN services, which are the most widely used. ... The flaw means that the IP address of a user hiding behind a VPN can still be found, thanks to the connection broadcasting information that can be used to identify it. It's also relatively easy to find a MAC address (which identifies a particular device) and a computer's name on the network that it's on.' The Swedish anti-piracy bureau could already be gathering data using the exploit."

Comment Re:RTFA (Score 1) 214

Somebody posting at 2 points should know better than to make stupid incorrect analogies like that. Broadcasting unencrypted WiFi is more like leaving your furniture on the front lawn, or even on the curb with a "please take" sign. Even so, your communications aren't being stolen, they're simply being recorded. That's the real issue here, governments love recording citizens, but when someone else does it they feel jealous. That's why google is being ordered to hand over the data instead of being fined.
Handhelds

Asus Joins Tablet PC Race 235

WrongSizeGlass writes "Reuters is reporting that netbook pioneer Asustek Computer Inc. has become the latest technology company to jump on the tablet PC bandwagon. The device will be called the Eee Pad, will run on Intel or ARM chips, and use Microsoft's Windows operating system. 'The Eee Pad can display Adobe Flash for the full web experience, has a USB port and a camera,' Asus Chairman Jonney Shih said. Asus did not release pricing details or a potential release date, and did not provide further details on the format or a launch date for the new app store."

Slashdot Top Deals

egrep -n '^[a-z].*\(' $ | sort -t':' +2.0

Working...