Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Cheap Printer? (Score 1) 970

My dirt-cheap Brother DCP-130C came with full cartridges. I guess that's because the fixed costs of producing two lines of ink for the same printers are too high. HP, Epson and Canon sell a lot more printers and ink.

The downside to this printer is that it refuses to print anything, even plain b/w, once one colour cartridge is empty. I fooled it with a piece of black tape.

Comment Re:it's all about screen size (Score 1) 220

"Scrolling the text sideways"? It doesn't sound like you ever tried a decent mobile browser, like Opera Mini. It reflows text and resizes images to fit your little 3 inch window. For a whole lot of sites out there, neat and simple tricks like that work brilliantly.

As for the rise of web apps that the article brings up, that's where a mobile browser like Opera Mini falls short.
Media

AACS Hack Blamed on Bad Player Implementation 272

seriouslywtf writes "The AACS LA, those responsible for the AACS protection used by HD DVD and Blu-ray, has issued a statement claiming that AACS has not been compromised. Instead, they blame the implementation of AACS on specific players and claim that the makers of those players should follow the Compliance and Robustness Rules. 'It's not us, it's them!' This, however, does not appear to be the entire truth. From the Ars Technica article: 'This is an curious accusation because, according to the AACS documentation reviewed by Ars Technica, the AACS specification does not, in fact, account for this attack vector. ... We believe the AACS LA may be able to stop this particular hack. While little is truly known about how effective the key revocation system in AACS is, in theory it should be possible for the AACS LA to identify the players responsible for the breach and prevent later pressings of discs from playing back on those players until they are updated. As such, if the hole can be patched in the players, the leak of volume keys could be limited to essentially what is already on the market. That is, until another hole is found.'"

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...