Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:who cares? (Score 1) 101

That's funny, I didn't realize that programs such as Autocad, Autodesk Sketchbook, Pixelmator, Adobe Lightroom, Word, Excel, PowerPoint, Pinnacle Studio, etc. were for consuming content. They seem to be for creating content to me. That isn't even scratching the surface of all the content creation apps that exist for iOS.

Comment Re:FUCK SAKE! It was NEVER anonymous (Score 1) 115

IP address != person

Maybe in less than 1% of cases. All the rest of the time, the only one using the IP address is the person who pays for the internet access.

So it's reasonable anonymous if you consider your identity.

It's only reasonable if you think shoving your head in the sand gives you reasonably anonymity.

Comment Re:Money how? (Score 1) 120

Their product was only "better" because their competitors at the time only had crap products. Not to mention that smartphones were a tiny niche product during the heyday of the BlackBerry. The global sales of smartphones during that time was about 1/20th of what they are now. It's easy to be the biggest fish when the pond is small.

Comment Re:How is their infringment? (Score 1) 268

Unless they are developing on the target tablet then it is...

Unless who is developing on the tablet? And how is one going to actually develop on the tablet? It's basically a fixed function device that only runs a single application. Furthermore, the act of "developing on the target tablet" does not fall under GNOME's mark's goods and services.

Comment Re: There we go again (Score 1) 383

Your initial post in this thread exposed the fact that you don't know what the fuck a hash is, and thus don't know what the fuck you're talking about.

That's weird. My initial post nor the post I responded to said anything about hashes. My initial post was responding to someone talking about using a dictionary attack to get someone's password. I presume you falsely think my "initial post" was the one in response to AC-x which it wasn't. I also very much do know what a hash is. You and him seem to have a reading comprehension problem since you failed to understand my post. The point of my post was to say that, yes, having a password hash which you can use to try to recreate the original password does defeat what I stated, but that is tautological. If you can do an end run around the authentication protections it is no different than, as I said in an analogy, to having someone's PIN to their phone. I never once stated that having a hash was the same as having a plaintext password nor was their any such implication. Him stating that I believed the two were the same is basically a false presumption on his part by failing to understand my analogy.

You should have simply stopped posting, but here you are, digging deeper and deeper, committing more and more errors. You couldn't even quote a post properly.

I only messed up a quote once out of more than a dozen posts. Yeah, I totally don't know how to quote properly. Oh wait, I do.

Do you have an actual argument or just stupid ad homs like AC-x?

Slashdot Top Deals

If you think the system is working, ask someone who's waiting for a prompt.

Working...