Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Congestion by choice; game consoles (Score 2) 628

There are no gatekeepers on the internet.

Except for customers living in areas whose incumbent home ISP has decided to "slow-lane" any traffic that doesn't pay the prioritization toll. See previous stories about Comcast's "congestion by choice".

Anyone can publish anything at any time.

How can someone usefully publish any application at any time for an iOS device without the blessing of Apple, or any application at any time for a game console without the blessing of the console's manufacturer?

That's the old model. It's been discarded.

If the gatekeeper model has "been discarded", then why do iOS and the game consoles still use it? And why haven't end users "discarded" them en masse in favor of Android and living-room gaming PCs? I think I know why: consoles are easy.

What is with the defeatism? The only point to it is to prevent you from reaping the benefits everyone else is enjoying.

I'm trying to figure out the best way to jump in and reap benefits without running the risk of being bankrupted or worse. For example, I don't want to write a song and then get hit with a $150,000 copyright infringement lawsuit for having accidentally recreated something from decades ago.

Comment Copyright trolls (Score 1) 628

I love the freedom of being able to write and publish anything I want without making compromises with money issues.

Not if you have to pay hush money to copyright trolls who claim that your work is a derivative of theirs. And not if a monopolist gatekeeper or a cartel of gatekeepers controls the means of distribution of your art to the public, such as Apple or the major video console makers.

Comment Copyright clause preamble is a dead letter (Score 1) 153

"To promote the progress of science and useful arts" [...] so copyright is constitutional to the extent (and only to the extent) it is designed to satisfy that goal.

The US Supreme Court has consistently deferred to Congress on the question of whether "it is designed to satisfy that goal."

Comment Re:Paywalls; HTTPS proxy (Score 1) 396

It's not a behind paywall, it's a free site.

Sites that do not require payment still need to distinguish between users that have registered and visitors that have not as well as between users, such as for comment sections (are you LordWabbit2 or someone who Firesheeped his session cookie?) or "free reg. req." policies.

What network administrator in his right mind would hand out the root certificate to the HTTPS proxy?

Anyone who wants his users to know they are connecting to the correct proxy. Remember that a root certificate contains only the public key, not the private key.

Comment Re:The Legit Bay (Score 1) 81

Hate copyright? Change the friggin' law.

How is that possible when all major TV news sources that cover candidates for federal office share a corporate parent with one of the members of the MPAA? Fox=Fox, CBS=Paramount, ABC=Disney, NBC=Universal, and CNN=Warner. A candidate for federal office who openly opposes the excesses of what copyright has become will draw smear campaigns from all five of these studios' co-owned news channels.

Comment Re:Definition: Secure systems keep working, no mat (Score 1) 343

SQL injection. My work place had a typical example:
INSERT INTO users SET fname='$fname', lname='$lname';

Apart from the fact that you're mixing UPDATE syntax with INSERT syntax, substitution is perfectly valid so long as each string has been sanitized in the correct manner for a particular database connection (that is, not addslashes()). For the MySQLi client library, it looks like this:

$fname = $db->escape_string($fname);
$lname = $db->escape_string($lname);

Don't get me wrong; it's bad practice to escape manually unless you're using operator IN on a database client library that supports neither array parameters nor named placeholders (such as MySQLi). But code that correctly uses $db->escape_string() (or the equivalent for other languages or database drivers) should be safe from SQL injection, just as code that correctly uses htmlspecialchars() should be safe from script injection.

With Clonebox, if a customer's web server is hacked or otherwise damaged, we can switch it over to a ~read-only mirror. Sure that protects against hackers, and some customers have been hacked and used the protection. More often, customers simply screw up and delete important files or databases.

But how long do you keep these mirrors around, in case there's a screw-up that goes undiscovered for a while?

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...