Forgot your password?
typodupeerror

Comment: Computer Gaming Gaming (Score 5, Informative) 82

by Snowgen (#47058029) Attached to: World's First Dedicated Gaming Magazine Is Facing Closure

...the world's first magazine dedicated to gaming...

Okay, I'm being pedantic here, but this is one of my pet peeves. "Computer Gaming" is not Gaming. It is a lesser thing--a subset of the greater whole.

This was not the first gaming magazine-- Games magazine came out in 1977 and The Dragon was in 1976. Both of these magazines were dedicated to gaming (with Games being the more general use of that term).

Don't even get me started on calling computer games RPGs.

+ - Indian space agency prototypes its first crew capsule->

Submitted by sixsigma1978
sixsigma1978 (3554851) writes "India is about to take one small step towards human space flight. Last week the country’s space agency unveiled a prototype of its first crew capsule, a 4-metre-high module designed to carry two people into low Earth orbit.

The Indian Space Research Organisation (ISRO) is planning a test flight for later this year – even though it still awaits government approval and funding for a human space-flight programme. The unpiloted capsule will fly on the maiden launch of a new type of rocket that would otherwise have carried a dummy payload."

Link to Original Source

+ - Tor is building an anonymous instant messenger

Submitted by Anonymous Coward
An anonymous reader writes ""Forget the $16 billion romance between Facebook and WhatsApp. There's a new messaging tool worth watching.

Tor, the team behind the world's leading online anonymity service, is developing a new anonymous instant messenger client, according to documents produced at the Tor 2014 Winter Developers Meeting in Reykjavik, Iceland.""

+ - Quebec language police target store owner's Facebook page->

Submitted by wassomeyob
wassomeyob (3554531) writes "In Canada, the province of Quebec has their Official Language Act of 1974 (aka Bill 22) which makes French their sole official language. It has famously been used to force business owners to modify signage to give French pre-eminance over other languages. Now, the Quebec language police seem to be extending their reach to Facebook.

Eva Cooper owns Delilah in the Parc — a shop in Chelsea, Quebec near the Quebec/Ontario border. She received a letter from the language office telling her to translate everything posted on her store's Facebook page into French."

Link to Original Source

+ - Spy agency intercepts webcam images ..->

Submitted by Anonymous Coward
An anonymous reader writes "Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not."

Link to Original Source

Comment: Re:Not as bad as the reviews made it seem (Score 1) 178

by Snowgen (#46091313) Attached to: IBM's PC Junior Turns 30, Too

True, but a C64 with a floppy drive and monitor would exceed the 1000$ barrier as well.

Citation, please

It just so happens that 1984 was the year that I bought my C=64, and it cost $150. And also (a little later) in 1984, after getting bored of loading Telengard from cassette, and really wanting to play Zork that I bought my 1541 from Toys R' US, for $150. That's $300. I don't recall the monitor prices (I used a used TV i picked up at a flea market), but I believe they were $300-$400.

Comment: Evil App (Score 1) 1

by Snowgen (#46090667) Attached to: Why does Facebook need to read my Text Messages?

Once upon a time I was buying some SLR lenses from a Craigslist posting. Dude and I exchanged some phone calls about the price and condition and setting up the meeting.

About a week later Facebook started suggesting some random name as a connection. The name was vaguely familiar, but I couldn't place it. Then it occurred to the that random suggested connection had the same last name as Dude! Sure enough, it was his son.

The moral of the story is that the Facebook app trolls your call history for connections. That's too evil for my taste, and the app has been removed ever since.

To be fair, the app did ask for permission, but I always said no. But it would keep asking and keep asking and I eventually accidentally touched the wrong response. And while it claimed I could turn that feature off at any time, I never found the preference.

Like I said, I removed the app, and haven't really missed it.

+ - The Linux Backdoor Attempt of 2003

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "Ed Felton writes about an incident, in 2003, in which someone tried to backdoor the Linux kernel. Back in 2003 Linux used a system called BitKeeper to store the master copy of the Linux source code. If a developer wanted to propose a modification to the Linux code, they would submit their proposed change, and it would go through an organized approval process to decide whether the change would be accepted into the master code. But some people didn’t like BitKeeper, so a second copy of the source code was kept so that developers could get the code via another code system called CVS. On November 5, 2003, Larry McAvoy noticed that there was a code change in the CVS copy that did not have a pointer to a record of approval. Investigation showed that the change had never been approved and, stranger yet, that this change did not appear in the primary BitKeeper repository at all. Further investigation determined that someone had apparently broken in electronically to the CVS server and inserted this change.

if ((options == (__WCLONE|__WALL)) && (current->uid = 0))
retval = -EINVAL;

A casual reading by an expert would interpret this as innocuous error-checking code to make wait4 return an error code when wait4 was called in a certain way that was forbidden by the documentation. But a really careful expert reader would notice that, near the end of the first line, it said “= 0” rather than “== 0” so the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words it’s a classic backdoor. We don’t know who it was that made the attempt—and we probably never will. But the attempt didn’t work, because the Linux team was careful enough to notice that that this code was in the CVS repository without having gone through the normal approval process. "Could this have been an NSA attack? Maybe. But there were many others who had the skill and motivation to carry out this attack," writes Felton. "Unless somebody confesses, or a smoking-gun document turns up, we’ll never know.""

+ - Is LinkedIn Creating Phantom Profiles For Children?->

Submitted by jfruh
jfruh (300774) writes "LinkedIn is, according to its terms of service, only for adults. So how did the 12-year-old granddaughter of a friend of tech blogger Dan Tynan end up with a skeletal LinkedIn profile she had no memory of creating? Tynan tried to figure out how such "phantom profiles" can get created, and concluded that it has a lot to do with the very aggressive way LinkedIn will try to extract new customers from the contact lists of users who grant the company access."
Link to Original Source

+ - Deutsche Telekom Moves Email Traffic In-Country in Wake of PRISM->

Submitted by kdryer39
kdryer39 (1210976) writes "Germany's leading telecom provider has announced on Friday that it will only being using German servers to handle any email traffic over it's systems, citing privacy concerns arising from the recent PRISM leak and it's 'public outrage over U.S. spy programs accessing citizens' private messages.' In a related move, DT has also announced that they will be providing email services over SSL to further secure their customers' communications.

Sandro Gaycken, a professor of cyber security at Berlin's Free University, said 'This will make a big difference...Of course the NSA could still break in if they wanted to, but the mass encryption of emails would make it harder and more expensive for them to do so.'"

Link to Original Source

+ - How to Grow a New Head->

Submitted by sciencehabit
sciencehabit (1205606) writes "Cut most species of flatworm in half, and you end up with two flatworms. The front half will grow a new tail and, more impressively, the back half will grow a new head—complete with a fully functioning brain. But a few species of these worms mysteriously lack this ability, at least when it comes to regrowing a head. Now, three teams of researchers have not only zeroed in on the biological reason for this limitation, they've also managed to restore the worms' full regenerative abilities by manipulating a single genetic pathway, reversing a million years of evolution with a single genetic switch."
Link to Original Source

Advertising is a valuable economic factor because it is the cheapest way of selling goods, particularly if the goods are worthless. -- Sinclair Lewis

Working...