Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Pft (Score 5, Insightful) 962

You realize that there's more difference between your average man and your average woman than between your average NFL linebacker and your average man, right? (seriously, compare the stats some time - height, average bench strength, etc). You do realize how commonly women are raped and abused by men, and how they might happen to be more sensitive to the implicit or explicit threats of violence from someone that they're highly unlikely to be able to fight off?

I'm tall, 182 centimeters, and I still once had a guy literally pick me up and carry me back to his apartment when I tried to walk away from him.

Comment Re:Pft (Score 2, Informative) 962

There's a bit of a difference in that one in every four women actually will be raped in their life, and a sizeable percent of those getting those threats already have been.

Yes, men are raped too. About 91% of rape cases are male->female, 8% male->male, 0.8% female->female, and 0.2% female->male. Men are virtually always the perpetrator, but even when the victim is male (not nearly as common, but still way more common than we as a society should accept), the perpetrator is still overwhelmingly likely to be male.

(and if the excuse for the stats is "men aren't as likely to report being raped by a woman because of shame"... so is there no shame for a guy to report being sodomized against his will by a man?)

The basic point is: when you're threatening a violent crime against a person who may well have been a victim of such, and even if they haven't, very likely has friends who have and is more than aware of their vulnerability in this regard, that's taking it to a whole different level.

Comment Re:Pft (Score 4, Insightful) 962

Nice being a straight cis white male when a venue is dominated by other straight cis white males, isn't it?

And just to make clear, the problem of insulting people isn't along the lines of "ching chong chow chee" or whatnot. The problem case is along the lines of:

Scenario 1:

Man: "What does that do? Sorry, I don't know perl."
Crowd: "You don't know perl? Geez, you're stupid."

Scenario 2:

Woman: "What does that do? Sorry, I don't know perl."
Crowd: "Geez, women are stupid."

Comment I use Flashblock (Score 1) 172

Same here. I've routinely had ten tabs of Cracked.com, which is fairly heavy as far as I can tell, fit in half a GB. But then I use Flashblock to keep SWFs from starting automatically on most sites, and I have a few Facebook hostnames blocked in my /etc/hosts.

Comment Some test cases for your Vorbis player (Score 1) 172

Well you have now. Often I've made musical recordings as proofs of concept for posts to web forums related to Dance Dance Revolution and classic NES games. And when these aren't in tracker format, they're in .ogg format. Here are some test cases:

Comment Re:We are wise to this (Score 5, Interesting) 172

If the "malware blocking" is anything like the analogous feature in Internet Explorer (called "SmartScreen"), then it's going to be harder for end users to download and install a newly compiled executable release of an application developed and self-published by an individual, even if that program is distributed under a free software license. IE repeatedly warns users that if an executable is "not commonly downloaded" by other IE users participating in SmartScreen, it should be deleted on sight, especially if the developer hasn't paid protection money to a member of the Authenticode CA cartel.

Submission + - When Google Sells Your Data, It Might Be Illegally Killing Your Phone's Battery

Jason Koebler writes: Personal information about you and your browsing, email, and app-using habits is regularly sent between apps on your Android phone, a potentially illegal practice that could be killing your battery life. A federal judge ruled that the claim, raised in a class action lawsuit against the company, "requires a heavily and inherently fact-bound inquiry."
That means that there's a good chance we're about to get a look into the ins and outs of Google's advertising backbone: what information is shared with who, and when.

Submission + - CNN iPhone App Sends iReporters' Passwords In The Clear (securityledger.com)

chicksdaddy writes: The Security Ledger reports on newly published research from the firm zScaler that reveals CNN's iPhone application — one of the leading mobile news apps — transmits user login session information in clear text. (https://securityledger.com/2014/07/cnn-app-leaks-passwords-of-citizen-reporters/). The security flaw could leave users of the application vulnerable to having their login credential snooped by malicious actors on the same network or connected to the same insecure wifi hotspot. That's particularly bad news if you're one of CNN's iReporters — citizen journalists — who use the app to upload photos, video and other text as they report on breaking news events, zScaler warned in a blog post.

According to a zScaler analysis (http://research.zscaler.com/2014/07/cnn-app-for-iphone.html), CNN's app for iPhone exposes user credentials in the clear both during initial setup of the account and in subsequent mobile sessions. The iPad version of the CNN app is not affected, nor is the CNN mobile application for Android. A spokesman for CNN said the company had a fix ready and was working with Apple to have it approved and released to the iTunes AppStore.

The privacy of journalists' private communications has never been more a risk. Reporters find themselves in the crosshairs of sophisticated hacking crews, often working at the beck and call of anti-democratic regimes. They have infiltrated the networks of newspapers like The New York Times and The Washington Post — often in search of confidential communications between reporters and policy makers or human rights activists. (http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html) Here in the U.S., the Obama Administration is aggressively pursuing Pulitzer Prize winning journalist James Risen of The New York Times in order to uncover the source for a chapter in his book State of War concerning a covert US operation against Iran. (http://www.npr.org/blogs/thetwo-way/2014/06/02/318214947/times-reporter-must-testify-about-source-court-decides)

Submission + - Government Funded TAILS OS Has Zero-Days Exploits (tumblr.com)

Nicola Hahn writes: A recent Forbes article reports that an Internet arms dealer, Exodus Intelligence, has unearthed zero-day exploits in TAILS, Ed Snowden's favorite OS. Exodus plans to disclose the issues to TAILS "in due time." In other words, as the article notes, "That means customers could use the vulnerability however they see fit, possibly for de-anonymising anyone a government considers a target."

And if that weren't bad enough, a close look at TAILS project 2013 income statement reveals that the project, like Tor is funded by Uncle Sam. Granted, jumping to hasty conclusions would be falling prey to guilt-by-association syndrome, but isn't it interesting that several of these alleged anonymity tools are somehow linked to each other and also the United States military?

Comment Re:Free market economy (Score 1) 529

We can have a civilized discussion about government debt without jumping to BS numbers* for total debt can't we?

* Also: Citation needed for the total debt number. Based on your previous citation (which you clearly didn't even read) you're not doing well. Your claiming that, on average, US citizens/business/government carries 12x yearly income in debt?

Comment Re:Real-time communication without JS (Score 1) 194

A novel idea perhaps, but just maybe they should not try to push/throw everything into a webbrowser ?

In some cases, it's either deploy one JavaScript web app or deploy 15 native apps, one for each of 15 platforms. You can get the web app designed, implemented, tested, and deployed before you even become approved as a developer on half of those platforms.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...