Comment Re:Courts should punish intentional facilitation (Score 1) 268
Slashcode dropped my sarcasm tags.....
There is an implied eye rolling in the above post.
Slashcode dropped my sarcasm tags.....
There is an implied eye rolling in the above post.
I think there's a 25 or 30 port USB hub up in the new Slashdot Deals section
So if you hit a site that has 5-10 of your "blocked" sites, you have to parse that file each time, for each query. Talk about a waste of resources.
Also, my DNS box is doing more than just serving up dns requests. You still haven't shown me any kind of benchmark. Only your made up numbers and statistics.
Come on... Step up. Show me a single study that compares a million+ line host file against a single dns query for the same item.
As for adding complexity... Yah, I guess it does add some. Things that someone that only knows how to parse a plain text file in notepad might not grasp...
Bring it on! Show me the study!
So your only comeback is that a DNS server uses more power? Really? Is that the best you got?
Still no response to #10. Come on buddy... show me the benchmarks. I want to see the speed difference between parsing a 1,000,000+ text file vs a single dns query.
Take your time.. I'll wait.
Are you sure you're not the lovechild of Bennett Haselton and the Timecube guy?
1.) Secure you vs. known malicious sites/servers (beyond malicious adbanners - see 2 thru 6 below next)
2.) Secure you vs. downed DNS servers aiding reliability
I run my own DNS server.
3.) Secure you vs. DNS redirect poisoned dns servers
See the answer to 2 above
4.) Protect you vs. fastflux using botnet attacks and stop their communications back to their C&C servers
Yup. Don't install shit from unknown sources.
5.) Protect you vs. dynamic dns using botnet attacks and stop their communications back to their C&C servers
See Answer to #2 above.
6.) Protect you vs. domain generation algorithm using botnet attacks and stop their communications back to their C&C servers
Again, see #2
7.) Speed you up for websurfing not only by adblocking but also hardcoding favorite sites
Utterly stupid approach since every decent site used CDNs now.
8.) Get you past a dnsbl you may not agree with
See #2 above
9.) Keep you off dns request logs
See #2 above
10.) Do all of those things and block ads (better than adblock) more efficiently in cpu cycles and memory usage
Show me the benchmarks
11.) Work on ANY webbound application (think stand-alone email programs, for example).
See #2.
12.) Give you direct, easily notepad/texteditor controlled data for all of the above
Hmm. vi on my dns server seems to work fine.
13.) Block out trackers
See #2.
14.) Block spam mails sources
Don't sign up for stupid sites using real email addresses and/or use an email specifically for those sites and blackhole the resulting email.
15.) Block phishing mails sources
Have a little common sense and this isn't an issue.
Debating if I should paste this after every one of your spam posts...
Don't worry. That checkbox doesn't do anything since Dice took over anyways.
I think the problem that you're failing to recognize which the OP stated was that yes, I pointed my browser at a website. What I did not point my browser at is the 14 IFRAME ads and analytics hosted by 15 other 3rd party providers. If a site wants to serve ads, then they should do like I did when I was running a largish (over 1M unique users a day) website. Sell your own ad space. Ad networks who host obtrusive ads need to go away. Unobtrusive stuff like text ads or static stuff I don't really have a problem with.
Really slashdot? 3 minutes between comments, even on different threads?
Hey APK, what's your IP address so I can block all the spam you've been posting? I want to add it to my hosts file.
Anyone else remember when electronics came with circuit diagrams on the inside of the [easily] removable cover? Things didn't require special tools to work on and repair yourself. Oh, and you could actually BUY replacement parts instead of tossing the whole thing in the bin and getting a new one?
This is also why acoustic couplers were invented. Since anything plugged directly into the phone line was "against the law", hackers worked around it. You plugged your phone into the line, and the acoustic coupler into your computer/device, and you placed the telephone handset on the acoustic coupler. You were not actually plugging your device into the phone line, thereby bypassing the "law".
I've found that you can safely replace the L or R sound when speaking Japanese, with a D sound and you'll be close enough.
http://www.planb.ca/how-it-wor...
5 seconds on google.
I actually prefer the way it happens in Japan.
Basically, a single company (NTT) has laid down the infrastructure to every neighborhood. Then, they basically open it up and make it available to anyone who wants to start an ISP. NTT, of course, offers their own ISP, but their ISP portion still has to lease the line from the parent company. Essentially, the ISP pays a set amount per customer that is signed up with the service for the rights to use the backbone. Then, the individual ISPs compete based on services offered. They also compete on price, but most of the prices are within a couple hundred yen of each other (couple dollars).
Each ISP hosts their own authentication servers, email, website, etc... The customer plugs in their username and password to the modem (user@ispname.ext). NTT runs the PPPoE server, but each ISP has their own RADIUS server. So NTT receives a login request from bob@fiber.marley.jp. NTT looks up fiber.marley.jp and makes sure it's a registered ISP. If it's ok, then NTT forwards the radius request to the fiber.marley.jp auth server hosted by the ISP which then authenticates the account and allows or disallows the connection. If the auth goes through, the user is allowed access to the network, ip address is assigned, routing is set to pass them their dns, gateway, etc...
Then you're on the backbone and you can do what you like.
Cool thing is, there's only one network to maintain/upgrade so when NTT upgrades from say, 100Mb/sec fiber to 1Gb/sec fiber, all the ISP has to do is set up a new service and subdomain for auth and the user can use the new service in the method described above..
You can also subscribe to regular phone service, tv service, and they also have a VOD service available.
Anyways, it's a good system and it works great. There's tons of competition and the backbone owner still gets a cut of every connection based on subscriber rates per ISP.
Which is also wrong. The "morning after" pill doesn't abort anything. It tells the body to stop ovulating "immediately" in order to avoid getting pregnant. If she's already ovulated before she takes the pill, it won't work, so it's no more an abortion pill than is aspirin.
And instead of an AC I was expecting a 4 digit UID
"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno