Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Re:unexamined prejudice (Score 1) 271

Feminists do criticise the kind of advert you describe. As someone who wants more men's liberation I criticise it too. Just because it didn't reach your ears or every single article about some other issue doesn't mention it doesn't mean that it doesn't exist, as Google will confirm for you.

Comment: Re:acceptance is the only fair outcome (Score 1) 271

It's true that we need more men's liberation. Like women threw off the old ideas of what the ideal woman was in the 60s, men need to do the same today. Forget all that macho crap about not backing down, not showing emotion or weakness, having to take care of women to feel valued. Don't blame women or get upset because they seem to have freed themselves and you haven't. They are showing you the way to liberation, embrace it.

Comment: Re:Isn't "Chinese Security Vendor" an oxymoron? (Score 1) 61

You are just projecting US thinking onto the Chinese government. They have little interest in turning AV software into a trojan, because they don't want or need to spy on their citizens that way. They have more direct means, and prefer censorship over mass spying because it's cheaper and easier.

Unlike the US, China does have an interest in keeping its citizens safe so doesn't break their security software.

Comment: Re:Broken test? (Score 2) 61

Sure, sometimes keygens are trojans as well, but those are covered under the heading "virus". Most anti-virus software also detects perfectly harmless keygens these days, supposedly to "protect" the user from "accidentally" generating a key and pirating software.

I use some keygens for old software that can't be bought any more. It would be lost to the world without those keygens. I even had keys for some of it, e.g. a Windows 98 serial that was stuck (with a non-removable sticker) to the side of an ancient PC case long ago sent to the dump, and which I now want to install in a VM to play some old games that don't work on Windows 7.

I don't want my AV software deleting those perfectly safe files, thanks. I'm already paranoid enough to run them in a disposable VM anyway.

Comment: Broken test? (Score 3, Insightful) 61

If the test is checking for non-virus files like keygens it sounds like the test is broken. AV software should detect things that are harmful to your computer, not things that software vendors don't like but are otherwise harmless.

I'm not surprised they ship with keygen detection off in China.

+ - Mozilla Begins To Move Towards HTTPS-Only Web

Submitted by jones_supa
jones_supa writes: Mozilla is officially beginning to phase out non-secure HTTP to prefer HTTPS instead. After a robust discussion on the mailing list, the company will boldly start removing capabilities of non-secure web. There are two broad elements of this plan: setting a date after which all new features will be available only to secure websites, and gradually phasing out access to browser features for non-secure websites, especially regarding features that pose risks to users' security and privacy. It should be noted that this plan still allows for usage of the "http" URI scheme for legacy content. With HSTS and the upgrade-insecure-requests CSP attribute, the "http" scheme can be automatically translated to "https" by the browser, and thus run securely. The goal of this effort is also to send a message to the web developer community that they need to be secure. Mozilla expects to make some proposals to the W3C WebAppSec Working Group soon.

Comment: Re:Can't wait to get this installed in my house (Score 1) 498

by AmiMoJo (#49592861) Attached to: Tesla Announces Home Battery System

So if everyone avails themselves of the cheap electricity in the middle of the night to store for use during the day, the excess capacity vanishes and instead we get an actual load needing to be catered for in additional capacity. So the cheap rate would be discontinued due to changes in consumption habits.

Even so, the day time peaks would be significantly flattened if enough people did it to make ending the TOU tariff worth while, so overall costs should be lower. Covering those peaks is extremely expensive.

Comment: Re:Can't wait to get this installed in my house (Score 5, Informative) 498

by AmiMoJo (#49592833) Attached to: Tesla Announces Home Battery System

Tesla give you a 10 year warranty and maintenance contract with the pack, so clearly these things are rated for more than 5.5 years of operation.

Since the warranty is 10 years the MTBF must be significantly longer, to keep the failure rate low. It's interesting that the 10kWh pack is for "backup" while the 7kWh pack is for "daily cycling". I'd guess that the 7kWh pack is physically the same as the 10kWh one, only cycled 30% less to extend battery life.

Realistically they would have to be looking at an average 20+ year lifespan to give you a 10 year warranty and maintain a profitable failure rate.

Comment: Re:Someone going to link one here? (Score 1) 89

by AmiMoJo (#49592193) Attached to: UK High Court Orders Block On Popcorn Time

However, an injunction against a VPN provider where there is clear non-infringing use would seem disproportionate â" which probably means that a mainstream VPN service, used by corporates, is more likely to survive than a service named "usethisvpntoinfringecopyright" or the like.

This is the part I'm most interested in. I use this service mostly to protect my privacy from ISP/GCHQ spying, and to ensure I have a clean, unfettered internet connection. That's the primary purpose of this service, since it doesn't give me access to any private networks or anything like that.

So, the question becomes, does a service that is used to enhance privacy and block spying have enough non-copyright-infringing uses to make a block disproportionate.

Comment: Re:I could go all day on this... (Score 1) 159

by AmiMoJo (#49592109) Attached to: US Switches Air Traffic Control To New Computer System

I'm surprised they were using dynamic memory allocation at all. When you want to create a robust, reliable system like this you normally statically allocate all RAM and don't allow the system to process things outside those limits. That way you don't run the risk of bugs like this happening, or memory leaks, or any number of other issues. It's standard practice for high reliability systems.

"When the going gets tough, the tough get empirical." -- Jon Carroll

Working...