Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:California (Score 1) 398

I think proximity does cause califonicancer. Everywhere I look, there's people here (In Oregon) attempting to make Oregon more like, well, California of all places. Somehow they get tired of Cali, decide fuck it, let's move! And then want the place they move to be just like the place they left.

Ah, well. Maybe someone will develop some kind of cure. I know, we could have a gold colored ribbon! Oregon for the cure!

Comment Re:Three hardware changes? (Score 1) 473

If it's windows 7, why are you even bothering to register/activate it seeing as you're just going to reload from an image? FWIW, I've had my son's computer running win7 pro for 6 months without activating it. (Because he was tending to get viruses from "free game" websites, arg). No usability problems at all. Unless you count MSSE not working a problem. Nothing a reload wouldn't fix anyways.

Comment Re:This is cool, but not revolutionary... (Score 1) 397

Yes, PCs "break". Caps go bad, fans seize (without the owner's knowing), heat sinks become detached.

After repairing computers for 12 years, if you can think of something that's happened to a computer - I've seen it happen. The fact that you have 20 year old working computers doesn't suprise me at all.

I had a gentleman bring in a 486/25 SX (Circa '92 or so). Ran perfectly. No real dust buildup, all original parts. Windows 95 even booted up fine. But I have to tell you, that's a total and complete anomaly. The last time I saw a running 486 was about 10 years ago, and the last time I saw one in that condition was when I was still in high school in the early 90's.

Modern consumer-level computers tend to last about 4 years or so. Heck, even server-grade parts tend to fail with alarming regularity. Honestly, I don't think they're much better than their desktop brethren, just more expensive and oddly enough in more minimal (Re: Cheaper) packaging.

Comment Re:Raiding (Score 1) 175

Not only that, but it's also impossible to PUG heroics in BC. I know, I've camped for hours (Admittedly, as DPS) with my aff lock waiting for someone - anyone - on any server - to also queue for them. It just ain't happening.

So the only way you can reliably get into the BC heroics is via either a specialty guild, or attempting (ROFL) to convince your guild that BC stuff is going to be "fun" when they're grinding to get >5k GS to go do ICC (hahaha, sure..)

Anyways, that's what really ticked me off right before I quit about 8 or so weeks ago. After a week of queueing while grinding quests, I did a grand total of... *1* BC heroic. yay.

Pretty much the only "easy" stuff is crap that you use to level. Even the drops in the instances totally suck, and as far as I can tell, the dungeons only exist so you have something, ANYTHING to do after you've wasted all the time you could grinding rep/quests/etc trying to get into the final heroics/raids.

Blah, sorry.

Comment Re:For those who wonder what Gnome Shell is ... (Score 1) 514

Really? I've been using ubuntu since about 6.04, and I haven't really noticed a dumbing down of the interface. Sure, the default theme's been cleaned up (and changed every damn version), but all the options are still there in System-> Preferences / Administration. The synaptic package manager is still there in 10.10, and the terminal is still included by default, as is aptitude (Or did I install aptitude?).

Anyways, Ubuntu getting easier to use isn't a bad thing. It's not dumbing down, you can still manually do anything you can do in a debian install. It's just not geared towards the hands-on powerusers who want to micromanage their desktop. What's so bad about that? :)

Comment Re:Expectation of Privacy (Score 1) 136

I'm not condoning the actions (or inaction) of people that result in private/personal information being broadcast over wifi.. But, consider that most routers are setup insecure by default AND the people they are targeted to generally are NOT geeks like us, it's reasonable to assume that the people do NOT know that their information is publicly accessible.

I'm not going to put out an analogy, but keep in mind all of yours included someone actively giving out their information.

With these incidents via wifi, the people passively gave it out their information. They likely had no idea until this google thing, and even MORE likely is most people that google got packets from STILL don't know. Why? Because they're not geeks like us, and as such, likely don't even read the stories. Even if they did read the story on what google did, and how badly people's routers are set up, they probably wouldn't think it even applies to them.

Luckily, my first point is getting redressed. I know new linksys routers support a secure setup mechanism, and attempts to set the wep/wpa level to the highest it can and remain compatible with the laptop/device used to set it up. But there's still a long ways to go before the general non-geek populace understands what this jargon means for them.

Crime

Thief Returns Stolen Laptop Contents On USB Stick 352

While it's true that Sweden is responsible for unleashing IKEA and ABBA on humanity, not everything they produce is terrible. Their thieves are some of the most considerate in the world. An unnamed professor at Umeå University received a USB stick with all his data after his laptop was stolen. From the article: "The professor, who teaches at Umeå University in northern Sweden, was devastated when ten years of work stored on his laptop was stolen. But to his surprise, a week after the theft, the entire contents of his laptop were posted to him on a USB stick. 'I am very happy,' the unnamed professor told the local Västerbottens-Kuriren newspaper. 'This story makes me feel hope for humanity.'"

Comment Re:No password WiFi != unsecured (Score 1) 161

No. Technically it is spoofing. Every network adapter has a unique address assigned to it, typically stored in some firmware within the NIC itself. The whole purpose is to make that particular interface globally identifiable.

Now, if you change your NIC's MAC to someone ELSE'S MAC, you are spoofing their MAC. IE, you are pretending that your NIC is in fact someone else's, even though it's not. For the sole purpose of attempting to gain access while masquerading as the other device.

That's pretty much the definition of spoofing. Here's a summary definition or two:

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

Definition of Spoof:

Verb -
* to communicate electronically under a false identity
* to fool by a hoax; play a trick on, esp. one intended to deceive.

So, what you describe is not spoofing? I think so.

Comment Re:British Power Supply (Score 1) 373

Yea, you really should be modded up.

Mythbusters are NOT scientifically going about replicating experiments to try to reproduce conditions. They're trying to sell entertainment, and as often as not get things half assed or totally wrong.

Noone should be using Mythbusters as a gauge to tell if something is possible or not.

Comment Re:Of course... (Score 1) 486

As someone who runs a small ISP, it's really not hard to tell the difference between botnet and P2P activity. Some things to check for. It'd be better as a flowchart, but I'll just make a list:

1) Is it mostly outgoing traffic? P2P does upload, but mostly botnets ONLY upload. So is the traffic lopsided like this?

2) Is it hitting sequential or seemingly random masses of IP blocks (>100 or so)?

3) Is the port fairly uniform or random?

4) Is it TCP or UDP?

Just with those four criteria, and with something like trafshow just to see the connection states RT, you can (with experience) VERY easily discern if large activity is legitimate downloading of movies (Netflix, Hulu, Youtube is ALL download from 1-2 hosts). Bittorrent (Normally synchronous U/D, but even if lopsided, connections tend to be in the reasonable 30-120 or so host connections), or Botnet (Computer is spewing out to massive IP blocks at random, with little/no incoming data on the connection).

* If any of that traffic is with the normal mail ports ( 25, 465, 587, 110, 143, 993, 995) AND you're seeing buttloads of connections, then they're infected.

* If you start seeing totally random things that vaguely resemble portscans (Lots of hosts, same/similar ports, lost of unreachable/ no return packs), they're infected. ... Etc.

This isn't really rocket science, it's fairly easy to setup a IDS to detect this, and warn/slam the brake on this crap. And, as a small ISP, the LAST thing you need is to be shitlisted on a bazillion blacklists, some of which (SORBS especially) are virtually impossible to get off of without being extorted.

As a small ISP, I'd rather lose one customer that can't get their shit together than lose 15 because I didn't terminate that one and got blacklisted.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...