Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment overwhelm the social engineering - flood everybody (Score 1) 262

One strategy would be to flood such sites with scripts that make salacious stories and insert random names and hacked student lists if available. Flood the sites with everyone's name. That is the most direct way to finally convince the low-hanging fruit that the sites have no credibility.

Comment no great mystery - police control codes left open (Score 1) 186

I don't know why anybody hasn't linked the two together, but SMS control codes are how the police get your phone to send your GPS coordinates when making a 911 call. Control codes are also there for turning the mic on and broadcasting the audio -- and who knows what else? (look up "roaming bug" for more info.)

Comment unaccountable responsibility (Score 1) 590

She is a minor. Minor's are protected by child porn laws because they cannot give their consent for sexual activity. So, how can she be accountable for posting what she is unaccountable for appearing in? Either she is a minor deserving protection, or she is an adult who can consent to being photographed. You can't have it both ways!

Comment use protection anyway (Score 1) 390

I don't want to undermine the protest against the general creep of privacy invasion, but this should also be seen as a call to use aliases, TOR, proxy servers, incognito, or the like anytime you search for something potentially sensitive. I like posting under my real name, but I've started posting more political/taboo musings under aliases, which also develop their own reputations. My IP address is still recorded somewhere, but what I'm saying is not so bad. And yes, I know I'm late to the alias game . . . For the more revolutionary stuff that the NSA or the like *might* find interesting one day, I use incognito (TOR). Having a net where I didn't have to do this would be great, but depending on corporations words that they don't record IP addresses, etc., is producing a situation even more dangerous, one in which there is a false sense of security.

Comment 2 NAS units synched (Score 1) 669

You buy/make 2 NAS with RAID 5 or 6. Your friend somewhere far away does the same. One of your NAS's becomes his, and vice versa. You set them up to mirror each other. If your house burns down or the contents get stolen, you buy/make two new NAS and get the data back from your friend. Upgrade in 5 years and continue indefinitely.
Portables

Submission + - 150 dollar laptop - true or scam? (computersweden.idg.se)

An anonymous reader writes: Medison, a small Swedish PC company, claims they will sell a basic Linux-based laptop for only 150 US dollars. But the company has been called in question in blogs, forums, and news articles, because the computer shown on the company's web site seems very similar to a laptop from another producer. Two days ago Medison met the Swedish press to straighten things out.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...