Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Great... (Score 1) 377

Yes, the hard part is getting adoption. Just look how far Google's WebP image format has gotten. Or not gotten. (I'm not talking about their WebM video format which has also not gotten a lot of traction). Looks like they unveiled it in 2010 or before, but nobody has used it as far as I can see.

Comment Re:Or, Apple could be fearful of comoditization (Score 1) 405

That has actually already happened for a lot of people. My daughter has a Nexus 7 tablet that she uses with a keyboard case to take notes in her college classes. Many people will come up and say, "oh, I like your iPad setup". Or "Which iPad is that?". Similarly on radio shows such as Leo Laporte's "The Tech Guy" (which is generally for "normals" - the not so technical folks who need help with tech), callers will often tell Leo that they want advice on picking out an "iPad" when they clearly mean they would like some sort of tablet device. It isn't to the point of Kleenex or Q-Tip, but there are quite a few people out there to whom any tablet device is an "iPad".

Comment Re:Punishes fans? (Score 3, Informative) 216

no one says 'lets not go to the game, it's on tv"

Bzzt! Wrong! Maybe not many folks do, but I sure do. When presented with an opportunity to go I always decline and say that I would rather see it on TV. (Sometimes this has even been with free tickets). At home, there is no a-hole standing up in front of me the whole game. At home, no jackass behind me spills their beer on me. At home, the noise level is very low. At home, I can see the play and can see it from multiple angles with amazing replays. At home, the beer doesn't cost $10. At home, the bathroom is clean and safe and doesn't consist of a long metal trough. At home, I am unlikely to get attacked by some crazy drunk asshole and my car is unlikely to get vandalized. At home, the parking doesn't cost $25. Yeah, I've BEEN to pro football games twice. Never again.

Comment Re:Let's face it ... (Score 2) 33

Well the first step in exploiting IE or other apps on a system in the wild is to bypass EMET. Remember, EMET is a mitigation technology designed to make it harder to exploit a vulnerability in IE, Flash, Acrobat Reader, etc. by adding extra protections. So if you are able to turn EMET off, you can then get back to your normal exploit.

Comment Re:what a stupid article (Score 4, Informative) 174

While your definitions are correct, a lot of drive by downloads happen when you visit otherwise trusted pages - because the ad network servers either got successfully breached or they didn't vet their advertisers well enough (again). For example - go to cnn.com today and view the source of the page. ads.indeed.com, doubleclick.com, etc. All of these ad networks have had serious issues with serving malicious advertisements from time to time. They will allow someone's ad that uses a malware kit attacking all the Java, Flash, Adobe Reader, etc. vulnerabilities that are out there. People shouldn't get drive by downloads just because they visited what should be a trustworthy site. So yes, drive by downloads can and do come from what are supposed to be ads. They are purchased via legitimate ad networks and run on many sites.

Comment Re:You are missing the point (Score 2) 370

It doesn't really matter if it is external or internal. Any time you remove it from a search index you have effectively taken the material down. If people can't find it, it doesn't exist for them. If you remove a book from the card catalog, it can exist in the stacks for years with nobody ever seeing it. Web pages are the same way. If it isn't on the first couple of pages of results on Google, Bing, Duck Duck Go, Yandex, Baidu or whatever - forget it; it no longer exists as far as the world is concerned: they will never see it. Sure you can always send out links to a few people and those people can see it. You can post links on MyTwitFace+ and a few people will see it. But for the vast majority, the index is their view into the internet. Remove it from the index and it ceases to exist for all practical purposes.

Comment Re:The real news (Score 2) 96

I actually got a text message the other day (purporting to be Yahoo - turns out it was them) saying that unusual activity had been seen on my account and they had disabled it until I went to the site on a PC. (I hardly ever use it - so this was a surprise - it is just a catch all for crap sites I may have to sign up for to keep them out of my "real" email). Anyway, I have two factor auth turned on (for Google, MS, and Yahoo) so I was surprised to see this. I guess they used the right password, but couldn't pass the two factor test. Just signing on to my account sent me to a special page saying there was unusual activity and having me input my password and a new password (once only; no "type it twice" thing). The new password had to meet some criteria and their regex or whatever they were using is broken beyond belief. It says it must be between 8 and 32 characters, have upper and lower case, and numbers. However, my old password met most of this already and was 8 chars (it was only missing the upper case character). Adding a "Y" to the end did not pass - because apparently that is not an upper case character. Neither is any other upper case character. It looks like they need all of the character types in the first 8 positions in order to accept it. Very poor coding and design on that page. I finally just had KeePass generate a random PW for me and used that.

I think this is a "score one for two factor" moment - but the poor implementation of the "fix" on Yahoo's part was a turn off.

Comment Re:tl;dr Phonebook? (Score 2, Interesting) 244

Spammers didn't typically scan the phone book and use automated bots to email all the people in it. So although phone books were "databases" they weren't easily accessible with some scripting.

The OP may believe that the Google+ "SPAMagedon" isn't coming - however - I have noticed that, over the last week, I have been added to the "circles" of well over one hundred "accounts". When I click on these, most of them are marketing accounts or sock puppets. Some of the names are clearly marketing: "Angry Birds Lösung 3 Stars Games.J500", "Anime TV and Title Loans Chicago", "Fred's Best Title Loans", etc. Others, when you go look at them, are pretty clearly similar. 10 people have them in circles but they have 5,000+ circled. The posts (if there are any) are just advertisements. Does anybody really think that this was random? I am pretty sure these folks are getting ready to spam using G+. Sure, they will eventually get shut down. But I'd advise people to go change the setting in GMail that allows these folks to send you mail without knowing your gmail account.

Comment Re:My password is printed on the side of my router (Score 1) 341

I have two access points as well. House is a two-story, 2,590 square feet. Cable access is at one end of the house and the main router is there as well. At the far end of the house, the signal has to go through several walls, a washer and dryer, and a staircase to get to the Chromecast plugged in behind the TV against the outer wall. It is about 1 bar and I am not about to try to use it like that as it will likely stutter and degrade. So I pulled wire to that end of the house and there is a second router (in simple bridge mode) there. As a bonus, I now have coverage in the upstairs master bedroom / bathroom where there was basically no signal before. BTW, this isn't a single router / brand issue. I have used about 7 or 8 different routers - all sorts of brands from Linksys, Netgear, Buffalo, etc. and they all had the same issue getting to the other end of the house.

Comment Re:How about that rented storage? (Score 1) 239

Interesting point about the "reasonable person". I don't know any of them though. Most people I personally know (aside from my kids, who think like I do) think the meta data collection is OK. They equate it with survey data that is aggregated and anonymous - even though the meta data includes non-anonymous stuff like your phone number. I don't consider them reasonable, but they seem to be in the majority. Generally, if put to a vote, the majority - assuming they aren't apathetic and don't vote - will win and will be considered the reasonable ones. Maybe I am unreasonable? But I sure don't like the NSA collecting all of this info...

Comment Re:All of it (Score 1) 187

I guess the question does come down to "your media". However some of it is in a grey area. For example, I have a bunch of (legal) MP3 files that I personally ripped from CDs (which I still have). So I have these MP3 files and CDs here locally. But, I also have them on Google Music. How does that count? 1/3 cloud? Or, since they are the same files is that "local" and ignore the cloud "copy". We have a ton of DVDs in several racks. Those, of course, are local. As far as movies in the cloud, I never purchased any, but I got a free one here and there - so there are a few. But we watch a TON of Netflix. Those aren't MY media. But I have access. How does that count? I am going to have to say - because of all of that, that I have only those few movies I got free that are cloud only and are supposedly "mine". Compared to the number of DVDs and CDs (and MP3 files) that I have local those few free ones are rounding error making it 100% local. But since I use a lot of Netflix I think of myself as a heavy cloud consumer. Strange, huh?

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...