Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment My home-built system. (Score 1) 825

My place got robbed in June 2009. I've taken several measures to prevent it from happening again. The robbery was pulled off by breaking a hole through a lexane window, climbing in, and unlocking the back door. I think they put a little kid through the hole in the back window because it was a tiny hole to queeze through and they stole a few toys I had lying around along with my electronics.

Low-tech security:

Renter's insurance. I wish I had that before the first robbery.

I chained my computer and my TV to the radiator. The chain is actually very well hidden, so it doesn't look too awful. The chain on my computer goes in through a PCI slot to a giant padlock, so if they wanted my computer they'd have to either tear apart the case, cut the lock, or take apart my computer piece by piece. The chain is pretty darn thick... I couldn't cut it with bolt cutters and it took about 5 minutes to get through with a grinder.

I put a protector over my door lock, and bars over my back windows where the break-in happened. Lexane is nice, but it looked like glass. It doesn't deter people from trying to break in, it just stops them once they try. And when it's fastened to a crappy wooden windowframe, the frame just gets torn out. The bars are attached directly to the brick

Oh, and I got a dog.

I also tell my neighbors when I'm leaving because they noticed my back door was open and my window was smashed for 36 hours before telling my landlord about it.

High-tech security:

I wrote a home security system using VB.net and PHP. The VB application runs on my home computer, and has a camera that looks down my hall. If it detects motion, it takes a picture, posts it online to my PHP script, which sends a text message to my phone with a link to the image. Then, the VB application plays a really loud alarm sound.

If you're interested in using my system for yourself, send my username a gmail and I'll hook you up with a download. I warn you, though, it's fairly customized for me and might not work on your computer.

Comment No kidding (Score 4, Informative) 125

I am the lead engineer for one of the largest providers for mobile coupon systems in the country. My company is known for havng the most robust and flexible couponing system out there.
This story is sensationalist as heck.
Of COURSE there's a lot of information in those coupons. Each one is unique. Therefore, each one can be tracked back to the user who received it. We have access to any information they've sent in (most common is name, age, and zip code, in addition to their phone and carrier, and their phone model if they went through a mobile website). What we don't do is sell data or phone numbers. Nor do we do reverse lookups or spamming. Stores can save any information they want about their users, such as what they've bought, or their number of 'loyalty points' and stuff like that. A SOAP request can pull down that information to their cash registers, and the cashier can update and add new information.
It's very similar to when the cashiers ask you for your phone number. The difference is that with coupons or rewards systems, people have an incentive to actually provide the info.

Comment Lefty or symmetrical mice (Score 2, Interesting) 246

Do other lefties feel a bit left out? Only two of the mice listed were symmetrical. As a left-handed PC gamer, it seems impossible for me to find a high-quality mouse that comfortably fits my hand. Especially mice with 5+ buttons.

This problem is often exacerbated by games like Fallout 3, in which bethesda felt the need to perma-bind numpad 7 (strafe left for us southpaws) to the 'Stop the game and open windows live' command. Is there no money in making a mirror version for those of us with a recessive gene or two?

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...