Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:just because (Score 1) 143

If you commercially distribute binaries not accompanied with source code, the GPL says you must provide a written offer to distribute the source code later. When users non-commercially redistribute the binaries they received from you, they must pass along a copy of this written offer. This means that people who did not get the binaries directly from you can still receive copies of the source code, along with the written offer.

You sort of proved the GP's point. Only if you choose to use written offer must the offer be good for any third party. If, instead, one distributes binaries with source, there is no obligation to third parties as they should have received source from their distributor.

Comment Re:Typing "google" into search not a bad idea ... (Score 2) 522

It does lead to hilarious results sometimes. I recall a ReadWriteWeb article that BREIFLY became the top search result for "facebook login" on google. The chaos was amazing.

http://readwrite.com/2010/02/10/facebook_wants_to_be_your_one_true_login

The comment section is riddled with people asking how to get to facebook, or why did facebook change their login, asking help with logging in on this "new" login page. It was epic. The comments are still up if you want to read them

They had to put a notice near the top of the article explaining that it was not a facebook page. Eventually google fixed it. I guess the point is, that yes these people need to be considered when designing UIs.

Comment Re:Weasel words ... (Score 1) 182

Just because it has always been done that way, doesn't mean it still works in the current industry environment. Netflix only sends data to a host that requests it. if netflix is sending your network data it is because someone paying to use your network has asked them to that bandwidth is paid for already. I guess netflix could code the client to send back equal amounts of data as a workaround, then it would be even.

Comment Re:It could use up all your activations (Score 1) 221

I can't comment on the reactivate every boot, OEM's do strange things with preinstall images so I guess it is possible. Personally, I'd just reinstall Windows in a VM, it be easier than trying to put an existing install in a VM. Install .iso's are not difficult to come by and MD5/SHA1 can be verified against TechNet's published values.

Comment Re:No screenshots (Score 1) 77

Agree with everything you said. My first encounter with screen I first installed Linux to run a headless Counter-Strike server. It is a great solution to being able to ssh in to a box, start the server and log off. It also allowed other admins to log in and assume the screen if they needed to.

Comment Re:No jurisdiction (Score 4, Informative) 226

Microsoft, however, is subject to the jurisdiction of the U.S. Federal Court system, and when a Magistrate Judge orders them to produce something, they are compelled to produce it. It doesn't really matter where the something is. Basically the court is saying the search warrant can be executed like a subpoena.

From the linked article:
A search warrant for email information, he said, is a "hybrid" order: obtained like a search warrant but executed like a subpoena for documents. Longstanding U.S. law holds that the recipient of a subpoena must provide the information sought, no matter where it is held, he said.

Comment Re:Not malicious but not honest? (Score 1) 447

This all depends on how much society wants to pay for software, and whether or not you think a programmers guild is a good thing advancement of the profession (ala AMA or Bar association) as that would soon follow. Also not all mistakes are created equal, mistakes result in everything from "Oops!" to criminal proceedings, I believe is what you meant to say. Unless you were trying to imply that all mistakes result in a minimum of someone losing their job.

Comment Re:So... (Score 1) 127

List of NIST time servers here: http://tf.nist.gov/tf-cgi/serv... If you want to be a good NTP citizen you probably shouldn't use these servers directly though, unless your running a very large network and syncing your own ntp servers. Some ISPs run time servers on their gateways or DNS servers, it is a decent way to get an NTP sync that is "network close" to you.

Comment Re: From the Article (Score 1) 220

You also have to have possession of the wrapped key to unwrap it as well. Having the passphrase without the key does not do you any good. Furthermore, if one stores the private key on a smart-card means that the key is now effectively a physical thing that must be stolen. So it really isn't "just another password".

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...