Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:And they wonder why people pirate (Score 4, Interesting) 473

It's getting to the consoles now as well. I was fully intent on purchasing Battlefield 3 for PC, but I'd already gone well over my gaming budget due to good Steam deals. Some friends and I went out and rented a copy of BF3 on Xbox 360 instead just to find out that you need to enter a one-time use code that comes with the game to access the multiplayer. I fully understand the used game market hurts the developers; however, would it really have been unreasonable to include a 3-7 day trial for renters like myself.

I'm glad this happened though, after playing the single-player campaign instead I deemed the game not worthy of a purchase. EA had a definite sale with me and managed to mess it up, my how these DRM schemes save them so much money.

Comment Shocking (Score 1) 473

Anyone who thought the idiotic DRM schemes from Ubisoft were really going to stop was delusional. I've been boycotting Ubisoft ever since their "always on Internet connection" DRM for Assassin's Creed 2 was introduced. Once they pulled that move I trashed all my Ubisoft products (of which I had many) and haven't so much as touched a demo from them ever since.

I suggest any of you who like to play your legally purchased games how/when you want to should do the same. And to those of you who say to just go pirate the game, you're simply treating the symptom & not the problem. Let them know that they can't pull these sorts of things or it'll catch on to other developers soon enough (I'm looking at you EA).

Comment Re:just jail brake your phone and make it a hotspo (Score 1) 325

A few friends I know on AT&T used to do that, then they started getting letters from the carrier to cease using the unauthorized thethering application or they'd start getting billed for an upgraded data plan that included tethering in it's cost. It's not exactly difficult to tell PC traffic from smartphone traffic & they're not afraid to do so if it means extra cash for them.

Comment Re:Says you... (Score 1) 473

Grats on your success jd. I'm not quite to marriage point yet, but I met my girlfriend on OkCupid in May of 2009 and we've been great ever since.

The best way to attract girls on these dating sites (other than having a ton of money or looking like a model) is to stand-out from the crowd, hopefully making them laugh in the process. As the article says, most guys on these websites initiate conversations with "hey sexy" or something equally as dull. If you find a girl on the site who's profile catches your eye, open with something referencing something on her profile about something that she likes, and make a joke about it. Don't be overly desperate, don't be too cocky (unless jokingly), and most of all don't be too flattering.

While the above method doesn't work 100% of the time, it's what worked for me. At the time I met my girlfriend, I was talking to several women who were interested in meeting up and I had engaged in some good conversation with. At that point in time I was a chain-smoking, 250lb, unemployed college student without a dollar to his name, so it should be possible for this to work for almost anyone. YMMV

Comment Spoiler Alert: Spear phishing (Score 1) 78

The author makes the flawed assumption that sending someone an e-mail == being able to install a keylogger on their machine. In reality in order to get a keylogger on the machine it requires the recipient being gullible enough to download an attachment being sent to them by a complete stranger (unlikely, but not out of the question). Or alternatively it requires that the hacker crafts some attack that exploits a vulnerability in the e-mail reader of the recipient's choice which now days can be any number of web-clients, Outlook, Thunderbird, or a smartphone e-mail client even. The suggestion that simply having an e-mail address of somebody will allow an attacker to install a keylogger on the targets machine is idiotic at best.

Comment Easy Defense (Score 2) 274

I actually watched this presentation live, and it is definitely worth checking out. Although this is a good presentation, it's not exactly the hack of the century. The guy still hasn't actually found a way around AppArmor yet so this doesn't work with machines with it enabled. Furthermore, the exploit requires local access to the machine AND have a user account already logged in.

I'm sure 99% of you already know how to do this, but if anyone is interested in protecting themselves from this type of attack regardless simply:

1. Open a Nautilus window.
2. Edit -> Preferences. Go to the Media tab.
3. Uncheck the box that is labeled "Browse media when inserted".

Comment Great Progress (Score 4, Insightful) 59

It sounds like this is coming along nicely, this is some truly amazing work that's being done. Unfortunately I think the team is being incredibly optimistic thinking that this treatment might be being used on humans in 5 years. I have no ties to the medical field, but it seems that whenever I hear about an excellent but experimental procedure it ends up staying in the testing phase for a very long time, if not forever, before it's approved for regular use. Hopefully I am wrong.

Comment Re:Duh (Score 1) 561

If this study is in fact correct, then I would imagine part of the reason for the lower IQ could have to do with what else is typical of smokers in the 18-21 age group, partying. I'm not saying that non-smokers don't party but these are the years when many first experience frequent alcohol use, with which usually comes cigarettes since they go so great with a beer. I would say that the cause has to be this, I would imagine that if you were to examine a group of smokers and compare their IQs to that of non-smokers at an older age you would see the gap close or even show no difference. Anecdotal, but I smoked between the ages of 14 and 20, consumption was about a pack a day when I started and had grown to around 2.75 packs a day by the end of it last year. Even as a heavy smoker (but non-party goer) I had a 130 IQ and was pulling all A's in my tech courses at university.

Comment More than just IE (Score 5, Informative) 318

If you bother to RTFA (I must be new here, right?) you'll see that it wasn't JUST an IE zero-day that was used in the attack.

"While we have identified the Internet Explorer vulnerability as one of the vectors of attack in this incident, many of these targeted attacks often involve a cocktail of zero-day vulnerabilities combined with sophisticated social engineering scenarios." - George Kurtz

So IE is partially to blame, but you can't just say that this is MS's fault.

Submission + - Zero-Day Flaw in TLS and SSL (zdnet.co.uk)

FalleStar writes: "Security researchers Marsh Ray and Steve Dispensa unveiled the TLS (Transport Layer Security) flaw on Wednesday, following the disclosure of separate, but similar, security findings. TLS and its predecessor, SSL (Secure Sockets Layer), are typically used by online retailers and banks to provide security for web transactions.

The flaw in the TLS authentication process allows an outsider to hijack a legitimate user's browser session and successfully impersonate the user, the researchers said in a technical paper.

The fault lies in an "authentication gap" in TLS, Ray and Dispensa said. During the cryptographic authentication process, in which a series of electronic handshakes take place between the client and server, there is a loss of continuity in the authentication of the server to the client. This gives an attacker an opening to hijack the data stream, they said."

GUI

Submission + - MythTV theming competition announced (mythtv.org)

zenyu writes: After a year and a half both porting MythTV from Qt3 to Qt4 and porting the UI from Qt to a more themable MythUI the project has released version 0.22 of the PVR. Support for new hardware has been added and a number of small code quality improvements have been made such as reducing polling with the use of PowerTOP.

But the real news is that with this release the project has announced a competition to come up with new themes for the next release. The deadline for theme submissions is February 1st, 2010; with the next MythTV release to follow March, 2010. The top three entries will receive Hauppauge hardware.

Google

Submission + - How Google Uses Linux (lwn.net)

postfail writes: lwn.net coverage of the 2009 Linux Kernel Summit (http://lwn.net/Articles/KernelSummit2009/) includes a recap of a presentation by Google engineers and how they use Linux. According to the article, a team of 30 Google engineers is rebasing to the mainline kernel every 17 months, presently carrying 1208 patches to 2.6.26 and inserting almost 300,000 lines of code; roughly 25% of those patches are backports of newer features.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...