Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Respect (Score 1) 923

So it's as easy as asking god if he promised the guy the apartment or not? Then if god goes "no fucking way, he's a total liar man" you'll know he was being deceitful. That's ingenious, I tell you! This'll revolutionize the whole legal system: we can just ask god if the accused party is guilty or not.

Comment Re:A Solution in Search of a Problem (Score 1) 149

Proof that you can completely fail to understand the subject, (for some reason) post about it anyway, refer to something completely unrelated, and still get a +5 Insightful.

Could you (or anyone else, for that matter) elaborate on what's wrong with the GP's claim? I don't know much about cryptography and even less computational physics, so I have no idea what's wrong with this guy's statement.

OS X

Submission + - Some command line tools unique to OS X (googlepages.com)

ORBAT writes: "OS X (Darwin) contains several tools that aren't included in any other UN*X operating system, and some of them are actually a lot more useful than their GUI counterparts. This list is not intended to be a complete list of unique command line tools, but just a collection I've found useful or interesting."
Media (Apple)

Submission + - CNN Slams Apple For Trialware

gbulmash writes: "When you think of computers that have been overloaded with unwanted trialware and demo programs to try to improve the manufacturer's margins, who do you think of? CNN apparently thinks of Apple. In a video story on how to avoid excessive amounts of trialware on your new PC, they displayed 25 seconds (from 2:07 to 2:32) of footage of an Apple store while their expert described how stores will charge you up to $130 to remove trialware and optimize the machine you just bought. Is this fair, or does CNN owe Apple an apology?"
Security

Evidence of Steganography in Real Criminal Cases 231

ancientribe writes "Researchers at Purdue University have found proof that criminals are making use of steganography in the field. Steganography is the stealth technique of hiding text or images within image files. Experts say that the wide availability of free point-and-click steganography tools is making the method of hiding illicit images and text easier to use. Not everyone is convinced; some security experts such as Bruce Schneier have dismissed steganography as too complex and conspicuous for the bad guys to bother using, especially for inside corporate espionage: 'It doesn't make sense that someone selling out the company can't just leave with a USB.'"
Censorship

Submission + - truthout blocked by AOL/Hotmail (truthout.org) 1

dolo724 writes: Subscribers to Truthout.org are finding their newsletters sent to the trash by some pretty popular ISPs. Who's in charge now? From the article: "Currently, AOL- and Microsoft-related email providers, including Hotmail, are preventing delivery of a range of Truthout communications to thousands of our subscribers. Such communications include Truthout's regular newsletters and notifications to our subscribers from individual workstations of Truthout administrators informing those subscribers that they are affected."
Sci-Fi

Submission + - Bottle makes dirty water drinkable in seconds

Gary writes: "After seeing the pathetic conditions of the Tsunami 2004 refugees and the Hurricane Katrina victims crave for fresh water, Michael Pritchard, an Ipswich-based businessman has invented a £190 ($ 385) bottle that makes 'foul-smelling water drinkable in seconds.' The bottle dubbed Life Saver was shown at the DESI defense show in London and the military has already shown their interest in it. The bottles can distill either 4000 liters or 6000 liters of water without changing the filter. The bottle has also been voted "Best Technological Development" at the Soldier Technology conference."
Microsoft

Submission + - Windows Updates without users' permission/knowledg (microsoft-watch.com) 1

javipas writes: "A recent discovery on Windows Secrets and Microsoft Watch has revealed a new tactic used by Microsoft. The Windows Update component acts even when automatic updates are turned off, and without users' knowledge or permission. The study's conclusion: though the programs updated do not pose a risk for users, Microsoft behaviour shows a potential danger for IT professionals. But this is not the important fact. What about users rights? Windows' EULA doesn't reflect this, but Windows Update Privacy Statement gives explicit permission to such tasks."
The Media

Submission + - Science vs. Homeopathy (arstechnica.com)

Mr. E writes: "Ars Technica has an interesting look at pseudoscience as it applies to homeopathy. While most discussions about what science is get derailed by the larger controversies surrounding them, Ars chose a relatively uncontroversial pseudo-science to examine so that they could examine the factors which make homeopathy a psuedo-science: ignoring settled issues in science, misapplication of real science, rejection of scientific standards, claims of suppression, large gaps between the conclusion and evidence, and focusing only on the fringes of what we currently understand."
Announcements

Submission + - QNX Publishes Neutrino Source Code

entrigant writes: QNX has announced that they are opening the code and development process for Neutrino. From the press release:

"In a move that revolutionizes software development practices by combining the best of the open source and commercial software domains, QNX Software Systems today announced that it is opening access to the source code of its QNX® Neutrino® realtime operating system (RTOS) under a new hybrid software licensing arrangement."

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...