Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:I have a better idea (Score 1) 161

What good is that when the only way to buy a locked phone is with a 24 month contract? Surely they don't sell subsidised phones to people unless they enter a contract, otherwise why would they subsidise it? Perhaps they do that in America, but in Australia you must typically enter a 2 year contract.

Comment task bar (Score 1) 528

How's this any different to the existing task bar, which shows a button/tab for each application? Move it up to the top if you want to.

If every app becomes tabbed by the OS, then they are basically re-writing the taskbar.

I think the key feature they are omitting in this article is the ability to *group* apps into different tabbed windows. So that the task bar is used to select the group of apps, then the tab to select the individual app.

Comment Re:***hoe m$ (Score 1) 738

You don't understand how these 'modders' work - they aren't cheating in game. They are just able to play backup discs as well as originals. Most if not all use that feature to pirate games, but this is a separate argument from in-game cheating, which they aren't doing.

Comment Re:What about the banks? (Score 4, Interesting) 422

This can be automated easily enough.

Also, it's trivial to redirect the POST to login.cgi or add an entry to /etc/hosts for bank.com to a different site that just presents a 'failed to login' instead of logging in. Meanwhile your password, security code etc has been sent off to the bad guys machine which does an automated "transfer *.* funds to x" script using these credentials.

It's been done.

Comment Re:VM? (Score 5, Insightful) 422

Because as the author explains in the comments, key loggers can run at the low level device driver level. At this level, it can hook key presses in a VM just as well as the host OS.

It's a pain, because nobody wants to go to the trouble of rebooting twice for the sake of paying a few bills. But it's the only way to be sure of a clean environment, unless your BIOS has been hacked. It's at least one good argument for the trusted platform, TPM, or whatever it is. In theory you could be sure that you are running only un-altered digitally signed executables and nothing else.

Comment Re:Ah...my favorite conspiracy theory. (Score 1) 465

You are confusing a virus with a worm and/or remote exploit.

A virus does still require clicking 'yes' or otherwise running code, but it just piggy-backs on "innocent" programs you pirate from your friends. It still requires running an executable from dubious sources. So it's not necessarily your OS's fault, as you still need to manually execute the non-verified code. Basically, if you choose to run it, then you deserve to get whatever it does.

If it requires no intervention, then it is a worm. Or a trojan that is using a remote exploit.

Either way, the 10% of savvy users are keeping their OS and browser up to date, using a firewall and not running random programs from the pirate bay.

Comment Re:Ah...my favorite conspiracy theory. (Score 3, Insightful) 465

You are implying that these viruses/spyware aren't being installed by people clicking 'Yes' to "Do you want to run setup.exe from codecs.xxx_teens.com" prompts.

This 'hole' will never be closed. The only option is to develop software which scans for and intercepts these installs for people that can't make an informed judgement for themselves. (i.e 90% of computer users).

Comment Re:Reinventing NNTP pre-loading (Score 1) 125

Google reader has "J" and "K" keyboard navigation to go the the next/prev article.

In fact, most online RSS aggregators have keyboard navigation. This is not quite the same as what google flip is however. Being able to see images, page layout and headlines combined on a page and the next/previous pages just out of the corner of your eye is closer to reading a real magazine.

Comment Re:Happened to my Parents (Score 1) 403

It's a bit more involved than that. That's a custom window, not the standard Win32 supplied one.

You'd have to write your own specialised window handler and your code would have to handle treating the window it as "modal over tabs but not quite modal over the entire application, but modal enough to stop executing scripts". It's not a trivial task, and certainly not as trivial as just "adding a checkbox".

Comment weired japanese names (Score -1, Flamebait) 121

Does anyone take these Japanese named ventures seriously?

I see them and automatically skip reading up on them, assuming it's something to appeal to manga/anime loving Japanese culturing loving nerds.

Don't get me wrong, I like Japan, it's people and the tech from there, but am not interested in anime/manga/hentai. Naming anything like this doesn't win you interest from people who aren't interested in this stuff, regardless of what it actually is.

meh.

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...