Follow Slashdot stories on Twitter


Forgot your password?

Comment: Re:Move to a gated community (Score 1) 611

by UnsignedInt32 (#48604159) Attached to: Waze Causing Anger Among LA Residents
I think the spirit of that "Except local traffic" is pretty much for discouraging commercial vehicles (trucks, etc.) from using a corridor of a road for thru-traffic.

This wouldn't work in a typical passenger vehicle case as you have described, but if enough people in the neighborhood are seeing/reporting a number of trucks routinely without making delivery to the area, that would be a different story...

Comment: Re:Point is you would not STOP paying (Score 1) 631

by UnsignedInt32 (#48254229) Attached to: Why CurrentC Will Beat Out Apple Pay
As far as I know, Costco does accept credit cards (actually they don't accept anything else, including cash) at least for my local one.

You will have to validate yourself for the member, which you can use their membership card or Costco AMEX.
If you choose to validate yourself with AMEX, it should give you option whether you want use Costco AMEX or something else.

Comment: Re:Every OS sucks (Score 1) 293

by UnsignedInt32 (#47041803) Attached to: Linux Sucks (Video)
That''s somewhat the conclusion I've reached after I've been hopping between different OS. (Windows, Mac OS, Linux)

So I myself find that Linux is least painful for me, at least for the fact that it doesn't try to hide the details from me. While mileage may vary with the nature of the issue, but it at least it's relativy simple for me to <b>try</b> to address and fix the problem before resorting to complete fresh of the machine.

Comment: Re:Am I misunderstanding this? (Score 1) 56

by UnsignedInt32 (#43657537) Attached to: BitTorrent Sees Sync Users Share Over 1PB of Data
That's the one thing that I love about it.

It reduces onboarding process for the user as simple as typing in the secret. One of the pet peeves I had with most of P2P file synchronization services were that they required registration with the central server. It's much easier directing my peer installing software, then typing in secret instead of "install the software, now go to their website and register, wait for E-mail confirmation, and then confirm your E-mail...what? You can't remember the password you have set?"

Their Windows installer even provides an opportunity to type in the secret right after installation, which makes the cases like above very easy to handle.

Comment: Re:Am I misunderstanding this? (Score 1) 56

by UnsignedInt32 (#43657393) Attached to: BitTorrent Sees Sync Users Share Over 1PB of Data
Actually, the case that was illustrated in the earlier comment can throw things off pretty bad. By inserting a bit at the beginning of the file, it'll pretty much shift the offset of the block for the whole file thereafter invalidating all the blocks, unless the actual data of files are considered. (Which I believe BitTorrent Sync is NOT doing.)

Comment: Re:Am I misunderstanding this? (Score 4, Informative) 56

by UnsignedInt32 (#43648841) Attached to: BitTorrent Sees Sync Users Share Over 1PB of Data
You only share among people with same shared key. So, no, you are not spreading your encrypted file to other people. At 1:1 it's pretty much direct peer-to-peer transfer. If more nodes are participating, then it can leverage distributed transfers from other nodes that may have part of the whole part of a file.

Comment: Re:How can they possibly know that number? (Score 5, Informative) 56

by UnsignedInt32 (#43648753) Attached to: BitTorrent Sees Sync Users Share Over 1PB of Data
As they are using BitTorrent technology, perhaps the metadata would contain size of data (number of blocks) to be transferred. Considering you can choose to NOT use a tracker, and go DHT (or pre-defined host) only, so probably there are some data transfer that are not accounted in this figure.

+ - Dataleak detection that moves files to an employer->

Submitted by
UnsignedInt32 writes: "Japanese security vendor, "NetAgent" released the software solution aimed to detect unauthorized data takeout called Winny Tokubetsu Cyousain 2 (Japanese of "Winny Special Detective 2.") This solution is a set of client and server, and employees run the client in their personal computer at home. The client software searchs through files in employees' personal computer to find the file with matching keywords, which are specified by their employer. What makes this solution controversial is that the client software can be "factory configured" by their employer (but not by employee) to send detected files to the company server, and then deletes those files from employees' computer. Employees then must ask their employer to get back false positive files transferred to company server."
Link to Original Source

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.