Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Any Application they want to? (Score 1) 267

They don't have standing, as they do not hold any copyrights over that code

Why would they need it? If you go to the shop and buy, for example, a media/dvd/etc. player, which uses GPL code, you're entitled to get the source to the program. If the company doesnt give you the source, you could sue. Or can anyone prove me otherwise?

Comment Re:It's the little things that impress (Score 1, Interesting) 68

If we study really small currents, and develop the technology around it, and bring the "normal" currents (~mA) down (to ~uA), a battery that today lasts 1 day (smartphone under heavy use), will last a 1000 times more (3 years).

Of course, this is true for logical circuits, etc... power used for example for (back)lightning can be brought down only by some level (not even close to uA), where we get close to 100% power->light output.

Comment Re:Read Tesla & Heaviside from 100 years ago (Score 1) 243

Google for "tesla energy transfer atmosphere" or "tesla atmosphere energy" (he said he knew how to collect energy from the atmosphere, and how to transfer it through it.... of course noone listenede, noone believed, and noone wanted to sponsor it.... and of course: "if there are no wires, where are you going to put the elecitrc counters?")

fist link i found and there are more

Comment Owner bricking & selling process (Score 1) 250

Reading the comments, I saw two problems:
1: who can brick it
2: is it really stolen or just sold?

The best solution would be to track ownership online, and that every owner can (temporarily) brick and unbrick his device whenever he wants.
The second problem is dealing with reselling... This could be solved by using a two-part code. The seller would get a "sellers code" from amazon (apple,...), which he would give to the buyer at the time of selling (or even post it on the ebay page). The buyer would have to register the device in his name (as he has to do now), but the device wouldn't work without the sellers code. After the registration and entering the code, the new owner (only him) could un/brick the device whenever he wanted.

Comment Re:Can I ask.. (Score 1) 554

AFAIK Truecrypt can use a 'normal' file as a key. So you can actually use a 700mb file as a key. So.. 1) Burn 700mb of random data on the cd 2) make a HUGE scratch (just one) that destroys the foil on the cd 3) put the cd in a spindle with other cd's and something that could've caused that scratch in between (metal shaving, etc) 4) ??? 5) profit Recovering full 700mb should be hard enough for them too. especially with random data, where they cannot predict the missing data. And with a file so large, the 'missing' part will be large enough to make brute-forcing useless.
Privacy

Submission + - Spyware in BlackBerry updates (Etisalat) (theregister.co.uk)

mulaz writes: "An update pushed out to BlackBerry users on the Etisalat network in the United Arab Emirates appears to contain remotely-triggered spyware that allows the interception of messages and emails, as well as crippling battery life.

Sent out as a WAP Push message, the update installs a Java file that one curious customer decided to take a closer look at, only to discover an application intended to intercept both email and text messages, sending a copy to an Etisalat server without the user being aware of anything beyond a slightly excessive battery drain.

Full story on thregister.co.uk"

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...