Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Three Headers, Not Two (Score 1) 257

> The solution proposed by the author: two headers and error correction code (ECC) in every file."

When there are two possibilities, which one do you chose? Three allows the software to have a vote among the headers, and ignore or correct the loser (assuming that there IS one, of course).

Also, keeping the headers in text, rather than using complicated encoding schemes to save space where it doesn't much matter, is probably a good idea, as well. Semantic sugar is your friend here.

Comment Where's ISO (Score 1) 257

Come on, ISO, where are you? We all need the best (or alternatively, least-worst) glidepath now. When I retired, the argument was all about proprietary formats for formatted text, and this and that. USians seemed to want to take the lead on everything and thereby 'offer' formal Secretariat (and steering). Now there's something worth doing - fixit, folks - and non-proprietary, pretty-please.

Comment Re:SVN etc. (Score 1) 244

All very valid caveats. My core point (which you also addresses) was that using a working copy instead of an export of the files puts tons of extra copies of your files and subversion management data under you don't need for web pages.

I do love the atomicity of your method however, and the trick of exporting from a working copy made my day. Thanks!

Science

"Overwhelming" Evidence For Magnetic Monopoles 256

Thorfinn.au sends along big physics news: magnetic monopoles have been detected at low temperatures in "Dirac strings" within a single crystal of Dysprosium Titanate. Two papers are being published today in the journal Science and two more on arXiv.org, as yet unpublished, provide further evidence. "Theoretical work had shown that monopoles probably exist, and they have been measured indirectly. But the Science papers are the first direct experiments to record the monopole's effects on the spin-ice material. The papers use neutrons to detect atoms in the crystal aligned into long daisy chains. These daisy chains tie each north and south monopole together. Known as 'Dirac strings,' the chains, as well as the existence of monopoles, were predicted in the 1930s by the British theoretical physicist Paul Dirac. Heat measurements in one paper also support the monopole argument. The two, as yet unpublished, papers on arXiv add to the evidence. The first provides additional observations, and the second uses a new technique to determine the magnetic charge of each monopole to be 4.6x10-13 joules per tesla metre. All together, the evidence for magnetic monopoles 'is now overwhelming,' says Steve Bramwell, a materials scientist at University College London and author on one of the Science papers and one of the arXiv papers."

Comment Re:You don't ... (Score 1) 902

I need a "DNS entry" or "config file" or something similarly trivial replaced. It's none of your fucking business why I want it. Just fucking do it.

And changing such "trivial" things as a DNS entry or a config file will never cause any serious problems that the aforementioned IT janitor would have to clean up after, right?

Idle

Submission + - Smile! Urine candid camera!

Anon E. Muss writes: Just because you can put a camera somewhere, doesn't mean you should. Apparently, the Department of Homeland Security Theater doesn't grasp this concept. They've installed video cameras in urinals at Houston's Hobby Airport. At least they weren't sneaky about it — they posted a notice saying "Automatic infrared flush sensors also provide video monitoring for security purposes." (Insert bad joke about bashful bladder syndrome here)

Comment Re:English please? (Score 1) 281

Probably, but personally I have no clue. I'm not actually a Hulu user, or even care enough to do more than read the /. article.

Sorry about that. I was mostly just trying to explain the silliness of hiding the important bits behind "sekrit" code which you don't/can't actually keep secret.

Comment Re:English please? (Score 1) 281

General theory for you:

The web browser displays HTML, which is easily displayable and copyable.

It can also run javascript, a programming language that runs inside the web browser and can easily access the web page you are viewing.

In order to "hide" the HTML they are sending your web browser, they instead encode it and send you a page which only has the encoded version and some javascript.

When the browser runs the javascript, that script decodes the HTML and sticks it in the page.

Net results: using View Source in the web browser only shows the encoded HTML.

Reason why it's stupid: Anyone can run the javascript and decode it. The only people who couldn't get around this with the most trivial of effort wouldn't be using the HTML in ways Hulu disapproved of in the first place. It's kinda like using a European keyboard on a US computer in an attempt to stop people from using it. Anybody who can type can still see the letters on the keys. The people who only used the mouse to control the music player aren't going to be able to do weird stuff with your computer anyway.

Microsoft

Portugal's Vortalgate — No Microsoft, No Bidding 312

An anonymous reader writes "Companies using software other than Microsoft's are unable to bid at many Portuguese public tenders. This is due to the use of Silverlight 2.0 technology by the company, Vortal, contracted to build the e-procurement portal. This situation has triggered a complaint to the European Commission by the Portuguese Open Source Business Association; the case is unofficially known in Portugal as 'Vortalgate.'"
The Internet

Black Hat Presentation Highlights SSL Encryption Flaws 152

nk497 writes "Hackers at the Black Hat conference have shown that SSL encryption isn't as secure as online businesses would like us to think. Independent hacker Moxie Marlinspike showed off several techniques to fool the tech behind the little padlock on your screen. He claimed that by using a real world attack on several secure websites such as PayPal, Gmail, Ticketmaster and Facebook, he garnered 117 email accounts, 16 credit card numbers, seven PayPal logins and 300 other miscellaneous secure logins."

Comment Re:Why not to vote for Obama: (Score 1) 1211

While entertaining, and relevant, this analogy does miss a couple important pieces:

You don't give examples for the income of the drinkers. If the tenth guy makes a million dollars a month and the ninth makes a hundred dollars a month, it changes the perspective.

Also, you're ignoring the scale of costs. If the tenth guy has enough money to buy pretty much all the beer he wants, even AFTER he pays for everybody else's drinks, why is he worried about the bill?

Finally, the risk of having the tenth guy leave is always risk. But if he doesn't help pay the bill, it's the same risk. If the nine guys have to buy cheaper beer or share fewer beers, that's what they can afford. It doesn't change the core idea that the cost should be split equitably, rather than literally equally. That is, you measure the burden based on it's impact to a person, not on some abstract idea.

I let little old ladies on the bus first. Why? because it's harder for them to stand around than it is for me due to the relative ages.

If we were being equal, they'd have to wait like anybody else. I think it's better to be equitable and respect that standing around a little longer is cheap for me and expensive for them.

I suppose the argument that you shouldn't attack rich people for percentage tax breaks because you don't understand how percentages work is a good one, and like I said, I like the analogy, but I feel like it isn't accurate in some important ways.

Privacy

Senator Proposes to Monitor All P2P Traffic for Illegal Files 626

mytrip writes "Senator Joe Biden (D-Del) has proposed an ambitious plan, costing on the order of $1 billion, aimed at curtailing illegal activities via P2P networks. His plan involves utilizing new software to monitor peer-to-peer traffic on an ongoing basis. 'At an afternoon Senate Judiciary subcommittee hearing about child exploitation on the Internet, Sen. Joe Biden (D-Del.) said he was under the impression it's "pretty easy to pick out the person engaged in either transmitting or downloading violent scenes of rape, molestation" simply by looking at file names. He urged use of those techniques by investigators to help nab the most egregious offenders."

Slashdot Top Deals

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...