Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Australian here with wishful thinking (Score 4, Insightful) 125 125

I would support this if the government:

1. Pursued these companies for company tax, not just make them pass on GST from our pockets.
2. More funding to the ACCC to make these companies actually stick to Australian Consumer Laws (i.e. Sony PSN & Steam)
3. Do something about the price disparity to overseas that can not be reasonably be explained by the tax, shipping, costs to do business in Australia, etc.

But knowing this government, it will just be another hairbrain implementation that hurts anyone who is not a middle/upper-class baby-boomer.

Comment Ultra low usage tier (Score 5, Interesting) 358 358

I like the concept of paying for content to support my usage instead of going through annoying ads, but I don't use Youtube all that often, usually only because someone else has given me a link to something in particular. Those 30 second ads which sometimes lets you skip after 5 seconds and sometimes don't let you skip at all are really annoying. I hope that they give a low-tier option. For example $1 per year which is good for ad-free (or no forced ads) up to 500 videos.

The most important thing is that I hope that the subscription options are compelling enough that someone would WANT to use it over the use of an Adblocker without any Adblocking counter-measures put in place.

If it is successful (for consumers) it would be great if an ad-free pass could be extended across any other websites too that participate, not just Youtube.

I use Adblock because the quality of advertising is too invasive, not because I don't to deprive websites of revenue.

Comment Does Moore's law apply to Tsunamis? (Score 3, Insightful) 197 197

It doesn't matter how big you engineer for, sooner or later something big enough will come along and topple everything. Containing high water levels in nature has been tried many times before and they always fail sooner or later.

Comment They say it is "completely anonymous" (Score 4, Interesting) 268 268

When you activate by phone the IVR states:

"Note: Microsoft Product Activation is completely anonymous; therefore, no personal information is collected. The entire activation process will take about 5 minutes."

Comment Wait a second, this is very interesting. (Score 0) 109 109

If you have a look at the pictures, you can see that it has more than a similarity to the iPad mini than just "rounded corners". It basically looks identical except for the Apple Logo and home button.

Now with this piece of news, it does seem like Foxconn have ripped off the iPad mini design (given their detailed knowledge of the manufacturing process) and are using the "Nokia" (Microsoft) brand to sell it, given that Microsoft have a cross-licensing deal with Apple that lets Microsoft and Apple rip each other off as much as they like.

It seems that Apple can't do a thing about it. They can't even get rid of Samsung components in their devices, how would they ever get away from Foxconn.

Comment I thought this was satire (Score 1) 644 644

And then I realised we are nowhere near April 1. Maybe '10' is going back to year designations... Hang on that was 4 years ago. I can't help but to think that when they pull things like this (eg: 'ME') it is inevitably going to end in disaster, except this time they some actual competition from Google and Apple in the mobile space (which is on the verge of taking over the desktop)

Comment Re:Welcome to your new walled garden (Score 1) 225 225

On both Firefox and Chrome, the efforts to require permission to install an extension can be bypassed if the installer has local access to manually tell the config files that it has been 'approved' even when it has not, and this is quite prevalent.

Of course it's not going to affect technical folk who avoid installation of spyware to begin with, but this is a sensible security step for the masses.

Comment Re:SPF.. (Score 1) 83 83

Currently, all mailing lists implementations break DMARC specs. At first glance it would appear that the Mailing List specs and the DMARC specs are incompatible with each other...

HOWEVER, There IS a way to be compliant with both specs.

The mailing list is just a transport agent of list messages right? Well it can also be the transport agent of how users' actual email addresses are handled, between their real email address and usernames that obfusicates their actual email address.

For example:
* User "Bob Smith" emails TESTLIST@DOMAIN.ORG

* Mailing List implementation on DOMAIN looks up "BOB.SMITH@YAHOO.COM" and determines his username to be "USER-ADF2S89T"

(more friendly usernames like "BOBSMITH-YAHOO" might also be possible if verified/allowed by the list owner, even "BOB.SMITH_AT_YAHOO.COM" could be his username if he has no intention of hiding his email address and is not scared of spam bots)

* Mailing List implementation on DOMAIN rewrites the message FROM and/or SENDER fields to "USER-ADF2S89T@MAILING-LIST-USERS.DOMAIN.ORG" instead of his actual email address

* A mail transport agent is set up on MAILING-LIST-USERS.DOMAIN.ORG to forward any messages that are sent to USER-ADF2S89T to BOB.SMITH@YAHOO.COM so the author/sender are still contactable.

This is compliant with the Mailing List specs because "USER-ADF2S89T@MAILING-LIST-USERS.DOMAIN.ORG" 'belongs' to John Smith (Just in the same way that JOHN.SMITH@YAHOO.COM 'belongs' to him too even though he doesn't own YAHOO.)

This will also have the following benefits:

- Actual email addresses are completely hidden from Spam Bots. This is huge. Mailing Lists are are huge source of email addresses that spam bots like to harvest.

(It may be possible to have a web interface or mailing list -request command to reveal the users' actual email address - using a CAPCHA if the requesting user is not trusted - so users can't hide behind their special address)

- List Managers might like the option for users to be able to update to their new their email address while keeping the same username(s).

(If users are representing their company, companies might like an option - maybe with the use of a TXT record on their domain - not to allow their users to do this so they can't keep 'representing' their company after they lose access to their company email address)

- This way DMARC can be freely implemented by everyone, including the mailing list server itself, so users can't spoof each other when posting to the mailing list, nor can they use their "USER-ADF2S89T@MAILING-LIST-USERS.DOMAIN.ORG" address to send mail 'FROM' this address.

Comment Re:Pretty easy. (Score 1) 374 374

And getting past the PIN? And how useful would an iPhone be without Wi-Fi/Cellular Internet connectivity?

You can't even restore the firmware without it verifying with Apple. Unless it is an old model that can be defeated offline, it would be more valuable for spare parts.

Line Printer paper is strongest at the perforations.