Become a fan of Slashdot on Facebook


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:Fail. (Score 1) 231

driving their SUVs while never driving off-road or hauling cargo or carrying lots of passengers and complaining about the price of gas

Jealous? It's their money and they can spend it anyway they see fit.

You don't like it? Tough. Spend your own money how you see fit.

Do I think the world is full of assholes? Yea. Just don't become one yourself.

Comment Re:Google Found Guilty of Being an American Compan (Score 1) 126

Actually you're wrong. You always had an option to use a different OS. You could even purchase a computer that didn't run Windows.

The courts decided that, since Microsoft had an overwhelming majority share of the desktop market, they should be considered a monopoly. They abused their monopoly by not only preinstalling internet explorer and making it an part of the OS but also by restricting the OEMs ability to preinstall a competing browser as a condition to receive heavily discounted licenses per machine sold.

Despite the actual motives behind Russia decision, the argument used against Google is very similar to the ones made against Microsoft. Google has a large share of the wireless handset market and it is alleged that they require manufacturers to make Google the default search engine. If this is actually the case then I can see why people liken this to the US vs Microsoft case.

Comment Re:Stop the panic! The headline is click bait. (Score 1) 242

That doesn't prohibit modifying the device with such parameters, this prohibits having devices that are even able to be modified, and a device that is merely able to be modified, period, is able to be modified with such parameters.

That actual term is "properly authenticated software". That doesn't mean the firmware can't be modified. It means a method must exist that authenticate the firmware executed on the device. You are implying that it means no modification is allowed, but the FCC purposely waved their hands on the details of who or how the firmware can be authenticated with "the manufacturers may consider applying existing industry standards for strong security and authentication."

Comment Stop the panic! The headline is click bait. (Score 1) 242

The FCC regs linked in the summary above:

An applicant must describe the overall security measures and systems that ensure that:

1. only properly authenticated software is loaded and operating the device; and

2. the device is not easily modified to operate with RF parameters outside of the authorization. The description of the software must address the following questions in the operational description for the device and clearly demonstrate how the device meets the security requirements. While the Commission did not adopt any specific standards, it is suggested that the manufacturers may consider applying existing industry standards for strong security and authentication.

(Usual IANAL applies)

The FCC is only interested in and authorized to prevent RF interference. Basically the FCC wants the manufacturers to put safeguards in place that prevents the device from operating out of its authorized bands and/or cause willful interference to other devices. It didn't ban all firmware modifications. The manufacturer needs to make the radio not operate out of its approved allocations and make a method to ensure that the firmware is modified by authorized individuals using standard authentication methods.

You are free to continue to panic if you desire.

Comment Re:What's the point? (Score 1) 389

The cost of changing all the documents and textbooks that reference that mountain.

Even history textbooks are updated and replaced at regular intervals. More facts are discovered and the textbooks wear out from use. Nothing is forcing anybody into quickly replacing textbooks. It will work itself out.

Teachers can also point out the new name of the mountain. I think they can handle it.

Comment Re:Curious (Score 1) 389

That's fine, but it doesn't belong to the people of Alaska. It's a national asset.

While that is technically true, I'd give more precedence to the Alaskans since it is within their state.

The Ohio delegation has been from both parties.

Of course it was. That just shows how desperate Ohio is for the attention.

Comment Re:Haven't I heard this before? (Score 3, Informative) 113

If you don't have your own router/firewall between your LAN and Comcast's (or anyone else's) cable modem than you are vulnerable.

Want a quick demonstration? Call Comcast with an issue with their builtin router and watch as they are able to reset the passwords on the device and verify that all of the devices on the LAN are able to connect to it.

I kept the Xfinity wireless enabled. I use my own WiFi on my own firewall/router and see the potential of using the WiFi hotspots while traveling as greater than any imagined threats on my LAN.

You cannot have a science without measurement. -- R. W. Hamming