Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:How about... (Score 3, Insightful) 267

Why would they go through the trouble of reverse enigneering your password system when there's thousands of other people who just use the same exact password everywhere? Unless someone is trying to specifically target you, it's usually sufficient to simply not be the low-hanging fruit. In case of these large password leaks, what they're probably doing is something like this:
1. Take every username (or email) and password combination
2. Through automated means, check if they are valid on other websites
3. Record the ones that worked and abuse/sell those as well.

Comment Re:I can't find the commercial speech section (Score 1) 239

The whole "no commercial use" thing is beyond silly. What if I took some pictures with my drone, not intending to do anything commercial with them, and then later someone wanted to buy the rights to those photos? Am I retroactively breaking an FAA rule? There's far too much gray area, but that's beside the point entirely. The FAA should be regulating what can fly, where it can fly, and how it gets flown, not the reason for flying it.

Comment Re:VM (Score 2) 73

Looking at the Bromium report, it appears that it's checking for various drivers that Vm programs would typically install as part of their guest tools. It looks like if you were to install something as simple as the VMware mouse driver it would think you're in VMware. It also checks for Fiddler so you could simply install that.

Comment Re:Reality of YikYak (Score 1) 367

From what I understand (and I have only sketchy information on this), the police were contacted, and YikYak was asked for an IP address.

However, either they refused to give one, or it ended up being some public computer (this is, after all, a university; there are hundreds of public computers on campus). Nothing the police can do about that. Even CSI's reality-bending tricks would have trouble figuring out which of dozens of people who sat at that computer might have sent the message.

Dan Aris

How is that different from any internet communications platform? If someone hops on a random public computer, they could easily anonymously send those death threats or other nasty messages via an email, some other anonymous website/service, or even through a payphone of all things. The only thing that YikYak provides is convenience. I don't think that if there were no death threats before YikYak, that any of the death threats sent through YikYak would have any shred of credibility. Someone isn't going to say "wow look at this app that I can send death threats through, I think I'll go murder someone that I wasn't going to murder before".

Comment Re:Lift the gag order first... (Score 1) 550

The prolem is that it's difficult to allow access to just the top 25 sites when everything goes through CDNs and pages have scripts being pulled in from 30 different sites (if my noscript menu is taller than my screen, I generally question the developers if the site). How do you determine what stuff to allow access to when those top 25 sites require so many other domains to function?

Comment Re:Most of the internet is like that now (Score 1) 467

Well that is my name, because I don't post things on /. that I wouldn't mind having associated with my real identity. I wouldn't even think about posting something even remotely close to the things the people in TFA posted. Do I ever say things on the internet I wouldn't want attached to my name? Sure, but I sure as hell wouldn't attach my real name of all things to it.

I think the scariest part of all of it is that someone could easily just use my name, post bad things, and I'd take the blame for it.

Slashdot Top Deals

Receiving a million dollars tax free will make you feel better than being flat broke and having a stomach ache. -- Dolph Sharp, "I'm O.K., You're Not So Hot"

Working...