Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Re:Software is not a physical item (Score 1) 510 510

Maybe you can understand it better if it were you selling something.

Suppose you made something intangible and "infinitely reproducible", like an ebook or an android app. You sell it for $20.

Scenario 1:
I give you $20
I get a copy of the product

Scenario 2:
I get a copy of the product

The net difference between these two is that you don't get the $20 yet I still get the product. If I were not a potential customer to begin with (this has been discussed on /. before and I agree with it), then you really didn't lose anything since I was never going to pay anyway. However, if I were a potential customer and I pirated it, it would be the same as me buying it then stealing my $20 back, except you never really got the $20 to begin with. It's obvious that you not getting paid is the same as stealing, how can you disagree?

Comment: commercial? (Score 1) 133 133

Is there something similar available commercially anyone can recommend? We may end up needing to scan large amounts of pdf's to a shared drive somewhere and need the whole thing to be searchable for keywords, but a requirement for that would be a commercial product that has 24x7 support.

Comment: why would he do this (Score 4, Insightful) 698 698

When Manning told Lamo that he leaked a quarter-million classified embassy cables, Lamo contacted the Army, and then met with Army CID investigators and the FBI at a Starbucks near his house in Carmichael, California, where he passed the agents a copy of the chat logs.

If you're going to do something illegal that you don't want anyone to know you did, perhaps you shouldn't tell people about it on the internet. Whether it was the morally right thing to do or not, leaking it anonymously then bragging you were the source makes no sense and is stupid.

Comment: Re:Fall guy (Score 4, Informative) 171 171

The internet runs the BGP routing protocol. It is by design a 'trust' system. You explicitly neighbor with autonomous systems you want to directly connect to and you freely exchange routes. It's possible to filter that routing information if you wanted (both in and out), but because you explicitly connected with them there's a certain level of "I trust anything you tell me, as I you should of me."

New Open Source Intrusion Detector Suricata Released 44 44

richrumble writes "The OISF has released the beta version of the Suricata IDS/IPS engine: The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. This new Engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP, HTTP, TLS, FTP and SMB! ), Gzip Decompression, Fast IP Matching and coming soon hardware acceleration on CUDA and OpenCL GPU cards."

Comment: Re:I think us nerds are doing fine... (Score 1) 453 453

How sad your world must be if that is what gives you a feeling of accomplishment and self worth.

Furthermore you don't even know the circumstances (or seemed to imply you don't) to which he was working there. What if he's just doing his friend a favor by giving him some help on a busy day? What if he lost a bet and had to work there for a few hours? What if he owns or co-owns the place? If you merely saw him there then you know nothing and to assume you are better than him shows how shallow you really are.

Staff meeting in the conference room in %d minutes.