Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: I used to love Spamhaus (Score 5, Insightful) 170

by LordKaT (#45538555) Attached to: Spamhaus Calls for Fining Operators of Insecure Servers

Honestly, I used to love Spamhaus, but as the years wore on, I got into the IT world, and I had to interact with them I've come to really loathe them. A decent service, I guess, but every single person that is involved with them comes across like a whining child, and I hate ever having to interact with them.

Comment: Good, good ... (Score 3, Informative) 722

by LordKaT (#45244801) Attached to: Google: Our Robot Cars Are Better Drivers Than You

Now go and take this out into New York City on 5th avenue at 5pm ET rush hour during the work week.

No, seriously, I want to see how well this car performs in a city where the posted 40mph speed limit oin the Staten Island Expressway is ignored by the vast majority of cops and motorists, the normal speed is about 70mph or so, and people will rear end you out of spite if you go too slow for them.

Then get me the data on how much less it costs to run this car.

Comment: Just another very trusting person (Score 4, Insightful) 871

by LordKaT (#45059303) Attached to: Bennett Haselton's Response To That "Don't Talk to Cops" Video

The basic problem with this article - and the authors previous articles - is that they assume that law enforcement, judges, and government are morally just entities who will always attempt to enforce laws based on their spirit and not their own personal ambitions.

The reason the fifth amendment exists is not to protect criminals from prosecution - as you ignorantly assume in your first article - but to protect innocent people from prosecution from crimes they didn't commit, a protection that lingers from the days of King George. An individual would be forced to admit their guilt one way or another. If they said they were innocent, and lawyers later proved them incorrect, they would be charged with two crimes. Claim guilt and you get no trial.

This system allowed two charges to be claimed against the perpetrator, who was potentially innocent of the crime but because of policing techniques and lawyers arguments could be found guilty ... and I've yet to see anyone step up and proclaim that policing techniques, no matter how modern, are perfect.

The ability to choose not to speak up for yourself means police are forced to perform their duties as efficiently and honestly (although that's not always the case) as possible. It's also a good opportunity for your lawyer to talk strategy with you and see what the potential outcomes are of an investigation and trial.

Really, all this proves is that samzenpus is a naive little child living in a much larger world where he believes the big government is a protective father, and not an entity of politicians, judges, and LEOs. It's a bad trait of smart people who should know better than this.

Comment: Re:They target Tor via the ISP's (Score 1) 234

by LordKaT (#45037751) Attached to: How The NSA Targets Tor

Yeah, that was probably your problem. Also, keep a check on any torrents you have running - running those at full tilt can consume an ass-load of bandwidth too.

Tor basically asks "how much bandwidth can I use" and then uses it. I have to keep an eye on it because I run a live stream at HD resolutions, and being conscious of my bandwidth usage is priority #1.

Comment: Incorrect title (Score 1, Insightful) 482

by LordKaT (#44498939) Attached to: Chrome's Insane Password Security Strategy

Title should read: "Elliott Kember's Insane Password Security Strategy"

Seriously, why are you storing passwords, at all? Unless you're storing them on in an encrypted space of some kind that requires two-factor authentication you shouldn't be storing passwords at all (and even then I really question your sanity).

"One Architecture, One OS" also translates as "One Egg, One Basket".