Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
PlayStation (Games)

PlayStation Network Expanding To Involve Other Devices 63

At CES, Sony's Kaz Hirai confirmed that the company will build out its PlayStation Network for use with other devices, such as televisions, Blu-ray players, and PCs. Quoting: "... the expansion starts next month with the availability of the PSN video store on these other devices, and Hirai explained they are constructing a mechanism to create a single user ID across the entire network (if you have a PSN account, it's good to go on any other applicable Sony device, and if you create one on another device, it'll work on PSN). And finally, Hirai also announced the formation of a new Sony division — called Sony Network Entertainment, Inc. — to drive this expansion of the PSN service into a Sony-wide network."

Comment Re:Old (Score 1) 342

That's fine by me. Tried it, didn't like it after a while, quit. I don't want to change them, I'll just find a new game to play. I love the concept of EVE but in practice it's easy to be overwhelmed by the shear size and depth of the sandbox and the seemingly titanic time investment required for any kind of fulfilling game play. I don't want to change myself to play the game and I wouldn't change the game to suit my needs.
Security

Schneier On Un-Authentication 336

Trailrunner7 writes "Bruce Schenier writes on Threatpost.com: 'In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you un-authenticate yourself? My home computer requires me to log out or turn my computer off when I want to un-authenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability.'"

Comment Re:Pedantic Note: Troll Vs Trawl (Score 1) 82

While we are quoting Wikipedia:

The contemporary use of the term is alleged to have first appeared on the internet in the late 1980s,[3] but the earliest known example is from 1991.[4] It is thought to be a truncation of the phrase trolling for suckers, itself derived from the fishing technique of slowly dragging a bait through water, known as trolling. The word also evokes the trolls portrayed in Scandinavian folklore and children's tales as they are often creatures bent on mischief and wickedness. The verb "troll" originates from Old French "troller", a hunting term. The noun "troll", however, is an unrelated Old Norse word for a giant.

Comment Re:About time (Score 1) 261

The really smart part is that using the PLEX system they can edge out the ISK sellers making it less financially viable for them to restart there activites. I don't believe in buying game money or items from RMTs but I have no problem putting money into the developers pockets for ISK especially since it provides value to other players as well.

Slashdot Top Deals

What good is a ticket to the good life, if you can't find the entrance?

Working...