Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Backwards? (Score 1) 507

Seems to me, those that are _not_ predisposed to violence have a better chance of rehabilitating than those that aren't. Shouldn't they need less time in the slammer to rehabilitate?

Assuming that time in jail does rehabilitate, someone who is not predisposed to violence and has in spite of that committed a violent act is probably in need of more rehabilitation than someone who let slip their violent nature. Nevertheless, I believe all sentences should be equal, and exceptions like these allow for a corrupt system.

Comment Re:Idiocracy (Score 1) 494

Obviously Texas lawmakers are unfamiliar with the legal principle "Sticks and stones make break my bones, but words will never hurt me!" If I post online that Cmdr Taco is a goat fucker, have I really "harmed" him or his reputation in any way? It's not slander unless a reasonable person would believe it to be true, and no rational person believes Taco actually dates outside his own species (unlike Captain Kirk).

We all saw it, time to put out an affidavit for the arrest of Coward, first name Anonymous.

Comment Wireless devices with Master Mode Support (Score 1) 152

Correct me if I'm wrong but the technological "leap" here seems to be that any node can be the server of a wireless communication.

Wi-Fi Direct devices can connect in pairs or in groups. With Wi-Fi Direct only one of the devices needs to be compliant with Wi-Fi Direct to establish the peer-to-peer connection. So, for example, a Wi-Fi Direct-enabled mobile phone could establish a connection with a non-Wi-Fi Direct notebook computer to transfer files between the two.

Seems to be suggesting that a Wi-Fi Direct device will host an access point for the notebook computer to connect to. Otherwise how could such communication with a non Wi-Fi Direct node be possible? There are already certain wireless cards that allow running your device in master mode (appearing as an access point) so that others can connect to you. Combined with a repeater configuration and wireless N speeds and you have the equivalent connectivity of Wi-Fi Direct. So is the leap here that it will be made easy and standard?

Comment Re:Somehow I see a danger in this . . . (Score 4, Interesting) 229

That said, it has always been the case with computers (and robots are just computers with moving appendages) that if a hacker has physical access to the device, you're basically screwed anyways.

Yes but the vulnerabilities they studied were all over the network vulnerabilities which could be exploited without physical access.

They speak of "compromising" these robots as if user programmable devices are inherently bad. I don't want to see devices locked down into black box "no touch" state because of some fear mongering.

All these robots need is a lightweight linux installation running an ssh daemon to communicate through. Then nobody has anything to worry about.

Comment Re:Obnoxious intersitial ad? (Score 3, Insightful) 172

That may be so, but do you really think the value of that extra click is worth anything from a /. reader with this mindset. Next thing you know you'll be suggesting they should follow some of the ad links on the site, or buy some of the site's affiliate's products. This may even be enforced by having your affiliates track when each user visits their site or fills out some survey. Nevertheless, no matter what you do, people who believe that the web should be free will continue to believe so.

There's also a greater cause being supported. Paywalls are not conducive to an enjoyable internet. It's similar to the radio where I used to be able to enjoy music throughout the day. Over time radio air-time has been increasingly filled with ads to the point that it's no longer enjoyable to listen to. If websites require more forced advertising it will get to the point that you are forced to see more advertisement content than what you actually wanted to read in a day.

Censorship

Woman With Police-Monitoring Blog Arrested 847

Kris Thalamus writes "The Washington Post reports that a Virginia woman is being held in custody by police who allege that information she posted on her blog puts members of the Jefferson area drug enforcement task force at risk. 'In a nearly year-long barrage of blog posts, she published snapshots she took in public of many or most of the task force's officers; detailed their comings and goings by following them in her car; mused about their habits and looks; hinted that she may have had a personal relationship with one of them; and, in one instance, reported that she had tipped off a local newspaper about their movements. Predictably, this annoyed law enforcement officials, who, it's fair to guess, comprised much of her readership before her arrest. But what seems to have sent them over the edge — and skewed their judgment — is Ms. Strom's decision to post the name and address of one of the officers with a street-view photo of his house. All this information was publicly available, including the photograph, which Ms. Strom gleaned from municipal records.'"

Comment Re:It isn't just a hobby (Score 1) 343

Yea, so tell me, Mr. anonymous dumbass, what're you going to do when EMPs wipe out all 'digital' capability, hmmm?

You're a fucking moron.

Correct me if I'm wrong, but EMP does not just wipe out 'digital' circuits. I believe it will just as effectively destroy any circuitry, including the kind in ham radios. From what I have read, power cables (which act as giant antennas) and directly attached antennas make devices particularly more prone to electro-magnetic pulses, which will surge through the attached circuitry destroying weak components. I think people should take more care in not stating something as fact if they do not know for sure, especially if you're going to insult someone else's intelligence.

Comment Re:Whole Disk Encryption (Score 1) 459

Or better yet, you can just leave the netbook at home and use your flash drive on a PC at your destination.

It's not a good idea to trust a host PC. It could easily copy the data off of your flash drive at the point when it's plugged in, not to mention the potential for keyloggers logging your online passwords. One solution to using an unfamiliar host PC is to carry with you a linux live CD such as Knoppix. Running this live CD and using your USB key will keep your data safe. Your passwords will also be safe from software keyloggers, but hardware keyloggers exist (although these could be visually checked for).

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...