Become a fan of Slashdot on Facebook


Forgot your password?

Submission + - Slashdot blocked in Switzerland (Possibly other parts of Europe) 1 1

Wattos writes: On my daily commute to work, it is my habit to check several websites for the latest news. Imagine how surprised I was that when was not accessible anymore. Instead I received a 403 Restricted error page. Initially I thought that this would have been a simple mistake by my mobile ISP, so I connected to my home VPN. Slashdot was blocked including many links to websites with vpn services. After connecting to a VPN provider outside of the country (in Poland) slashdot was accessible again.

Comment Re:Wow ... (Score 1) 191 191

You show a good example. Would you still think that this model is better if:

1) The post man can read your mail without you noticing (e.g. the envelope is never damaged)
2) You have to provide your postman with a key to open your locker? The key might additionally fit into your other lockers (e.g. A lot of people reuse their passwords)
3) The postman can easily store copies of all the letters you receive without you knowing
4) The postman travels from your local post office, to a completely different country, where the correspondence may be inspected by the other government at will without you even knowing and then gives you the letter.

Once you consider these points, you might not like that approach unless you completely trust your postman.

Comment Dynamically Typed? (Score 4, Insightful) 153 153

Dynamically Typed with Optional Typing

Thanks, but no thanks, I prefer to stay with statically types languages. I know that the "kewl" kids love dynamically types languages, but it becomes a horror for maintenance. Ill be sticking with UDK in the meantime

Comment Re:Well yes but, (Score 2) 459 459

If you find my key under a rock in my backyard, it is still theft if you break into my house with it and steal things.

The analogy is not really applicable. This is more like writing all your secrets into a notebook and putting it into a library (in a section accessible to everyone). Then you sue the person who found the notebook.

Leaving the data open to any web request is the true crime here. I do not know about the US, but in Europe that would have been a violation against the Data Protection Act.

Comment Why is this even on Slashdot (Score 0) 128 128

From TFA:

Our choice for exploiting this bug is to create a .bat file in the Startup folder of
the user account which will execute our commands injected through +echo at the
next login of the user on the system. There is also an interesting scenario against
dedicated servers by specifying the motd.txt of the game as logfile and launching
the cvarlist command that will dump all the game variables in such file that is
visible to any player who joins the server. Team Fortress 28 is one of the most
played games based on this engine and it’s free-to-play.

They system is already compromised at this point. Why do we need the steam protocol?

Also, for the love of god, please stop calling these people security researchers.

You may call me by my name, Wirth, or by my value, Worth. - Nicklaus Wirth