Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Copyright laws. (Score 1) 436

Firstly, thank you for your well-worded and intelligent response. Unfortunately, it was the "transmitting copyrighted material over a computer network is not necessarily copyright infringement" part that I was getting at there. Isn't that just making a copy, regardless of what the specific protocol is?

Yeah, technically portions of the network traffic being reproduced on network interfaces between every node in the route would be derived from the copyrighted material. However, if something as trivial as that were considered copyright infringement then anyone who owns any network infrastructure would be guilty of infringing upon everyone else's copyrights. Technically, any electronic device that does anything with copyrighted material has to make copies of some form of it within it's circuitry to function.

I'm not a lawyer and my understanding of copyright law is pretty slim, but I'd imagine there are plenty of persuable instances of copyright infringement that occur all of the time. I frequently see TVs displaying copyrighted content, and hear people playing or singing copyrighted songs, outside of their homes. In the majority of these instances, I would bet that the person responsible is not actually licensed for that public performance by the copyright holder.

Comment Re:Copyright laws. (Score 1) 436

Here's a thought experiment:

If I invent a replicator and make an exact, atom by atom copy (yes, this would be impossible space magic, just go with me here) of something with a copyright on it, is that copyright infringement?

If yes, then how can an exact digital copy of a series of 1's and 0's with a copyright on them not be copyright infringement?

Note: this wasn't really the conclusion I was aiming for... stupid thought experiment...

Both would be copyright infringement. I don't know who said it wouldn't be. It doesn't even have to be an exact duplicate to be copyright infringement. The GP was simply pointing out that copyright infringement is not theft. Theft is when the item is removed from its original owner's possession.

Here's a couple side by side examples:

If you walk into a shop, grab a DVD, and sneak it out without paying for it, then you have committed theft. You have stolen the item from the shop.

If someone goes into the shop and purchases that DVD, creates an ISO of it on their home computer, and sends it to you over the internet, then you have committed copyright infringement. You have infringed upon the rights of whoever holds the copyright over it. They are in control of how copies of the item are allowed to be produced, and you disobeyed them.

Comment Re:Here you go (Score 1) 344

Oh, and another thing; multihoming. If you need multiple IPs, there is NO way to set it up in the GUI. You need to go to the shell prompt to do that, and create your forwarding rules in iptables. If you need to do that, you may as well set up a full-blown PC and forget about WRT altogether.

Why? The hardware cost would be higher, the power consumption would be dramatically higher, it would generate much more noise, and it would require more space. Either way, I'd still be adding a second IP to the external interface and configuring static NAT via a shell.

Generally, people who have multiple public IPs also have someone on staff who configures their equipment for them. That kind of a configuration is also relatively trivial. On the other hand, improving DD-WRT's GUI for QoS/traffic shaping would probably benefit more users. That's something, which is quite a bit more complicated to do from a shell, that could benefit many less-knowledgeable users who use their connection for VoIP and online gaming.

Comment Re:Here you go (Score 1) 344

Why no warranty? I would call Buffalo anyhow, since they actively support DD-WRT financially and make sure their routers are fully compatible.

Where did you hear that? From what I read, it just sounds like they sell two models with support for DD-WRT, and have a third coming out in July. No mention of retroactively providing support older devices that have been reflashed by the consumer to run firmware which it was not designed to officially support.

It might not hurt to try giving Buffalo a call, but don't assume that you're entitled to the same level of support as someone using one of their devices intended to run that firmware. The hardware is different, and was designed to meet different requirements, even if the firmware is still compatible with the cheaper hardware. Don't give them motivation to break that compatibility on their low-end devices in the future.

Comment Re:Translation for the legislative impared. (Score 1) 703

Don't blame the Jews. Also, your data looks scrubbed because "born-again" and "agnostic" isn't an objective denomination, and you are missing religions that represent larger portions of the population as compared with atheists. Why clump agnostic with atheist.

http://www.religioustolerance.org/chr_dira.htm

Those numbers seem to be from a study done in 1999 by an evangelical Christian research organization (Barna Research Group). I doubt any part of the study was intended to paint atheists/agnostics in a favorable light. They do not host it on their website, however they really did get those numbers.

Comment Re:Victimless crimes.. (Score 1) 296

"Why is it that in 2010 we still try to create even more victimless crimes?"

Online gambling is a haven of criminal activity, many of the games are rigged easily, not to mention the hacking of other peoples computers that happens through the software or website to unsuspecting visitors. I know tonne of people who got ripped off through online casino's who had their computers hacked their email passwords stolen and as well as bank/financial data were cleaned out.

It's not that gambling isn't a "victimless crime" it's that online gambling is just so inherently corrupt.

How does that compare to the number of people who had money stolen by someone who obtained their online banking credentials? Or people whose credit card information was stolen and used? Or even people who had debt built up in their name after their identity was stolen?

These are more common than the crime you described. Does that mean we should outlaw online banking, online shopping, or storing personal information on personal computers? That would be much more effective at preventing these common online crimes, as well as many less common scenarios like you described.

Comment Re:Close captioned? (Score 1) 115

#!/usr/bin/env python

import sys
import urllib2

try:
    first, last = [int(x) for x in sys.argv[1:3]]
except:
    print 'usage: %s [first#] [last#]'
    sys.exit(1)
url = 'http://www.c-spanvideo.org/videoLibrary/ajax/ajax-transcript.php?progid=%06i'
headers = {'User-Agent':'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'}
print first
print last
for i in range(first, last + 1):
    print 'Fetching %06i' % i
    data = urllib2.urlopen(urllib2.Request(url % i,None,headers)).read()
    print 'Saving %i bytes' % len(data)
    fileobj = open('cspan_transript%06i.txt' % i, 'w')
    fileobj.write(data)
    fileobj.close()

Slashdot Top Deals

With your bare hands?!?

Working...