Forgot your password?
typodupeerror

Comment: Re:It is all software, really (Score 2) 509

by bishopBelloc (#43974895) Attached to: Sony's PS4 To Have Less Stringent DRM Than Microsoft's Xbox One

If it starts out not requiring any internet connection, and you never update it, it won't get any more restrictive.

If I recall, there have been PS3 games that required an update to function, and contained that update on disc. So you could reach a point where you can't play any new games without updating.

No one would force you to install those updates, so technically you're right. But I would consider it just as system killing as forcing an update over the Net.

Comment: Re:Hmm... I have a question. (Score 1) 177

by bishopBelloc (#43678383) Attached to: Watch a Lockheed Martin Laser Destroy a Missile In Flight
I think you missed a video.

There are two on the site and you seem to only be referring to the second one.

FTA:

Last year Lockheed Martin carried out a similar test, but in that case the missile that got destroyed was tethered and moved along a predetermined path. Clearly progress has been made and ADAM can now track a freely moving target.

Check out the second video that appears to be shooting down an untethered missile and is implied to not be following a predetermined path:
http://www.youtube.com/watch?v=kgUnDeED9MM

+ - An open handheld terminal for retail stores?

Submitted by Evil Al
Evil Al (7496) writes "From the ubiquitous Verifone card card terminals to the fancy Apple Store terminals, point-of-sale devices are everywhere. But does anyone know of an *open* terminal (with printer + Wi-Fi), preferably running Linux, that we can use to run a custom application for retail, made by a reputable manufacturer?"
Security

+ - Anonymous Releases 90,000 Military E-Mail Accounts->

Submitted by jjp9999
jjp9999 (2180664) writes "Anonymous Operations posted 90,000 military email addresses and passwords to Pirate Bay on July 11, in what they're calling "Military Meltdown Monday." They obtained the emails while hacking government contracting and consulting firm Booz Allen Hamilton. They hinted at other information obtained during the breach, which they describe as "maps and keys for various other treasure chests buried on the islands of government agencies, federal contractors and shady whitehat companies." The breach comes just days after Anonymous hacked government contractor IRC Federal. Both breaches are linked to the new AntiSec movement, which LulzSec joined forces with shortly before disbanding."
Link to Original Source
Privacy

+ - Groupon Changes TOS, Now Wants Your Location Data->

Submitted by
jfruhlinger
jfruhlinger writes "This past weekend (in the wee hours of Sunday morning, in my case) Groupon sent out an email to its subscribers announcing an update to its terms of service. Dan Tynan takes a look at the new terms, and, to nobody's surprise, finds that subscribers just lost some privacy. The company is rolling out new apps and location-based services — and users' location information is now going to be stored and sold."
Link to Original Source

Comment: Re:There's no right to be anonymous. (Score 1) 172

by bishopBelloc (#36529832) Attached to: How the Web's Relationship With Anonymity Has Changed
Actually we do have a right to anonymity.

Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.

-McIntyre v. Ohio Elections Commission (1995)

Spam

+ - Graphing Internet Interaction to spot Spammers->

Submitted by Gunkerty Jeb
Gunkerty Jeb (1950964) writes "Spammers, it turns out, aren't like everyone else: they have fewer friends. That, according to new research by Microsoft scientists who have developed a new method of distinguishing attacker-created spam email accounts from legitimate ones. The new finding, from researchers Yinglian Xie and Fang Yu of Microsoft is described as Social Graphs for Online Service Security. The two are using studies of legitimate and malicious social networks to spot bogus email accounts that are used to push spam, malware, and otherwise malicious links.

The researchers are analyzing natural social connections between users on the Web that are difficult for attackers or botnets to replicate. Spotting a spammer isn't hard, they say, when you look at his or her patterns of communication."

Link to Original Source
Chrome

+ - The Dark Side of Google Chrome->

Submitted by Anonymous Coward
An anonymous reader writes "There is no browser war. It's a platform war that apparently has already been won as far as HTML5 browsers are concerned. There is an interesting analysis that highlights some of the downsides of Google Chrome surpassing Firefox and becoming the dominant HTML5 browser, including Google's main interest to use Chrome as a tool to lock-in Adsense viewers. The motivation could almost be considered to be sneaky and possibly evil, even if Chrome appears to be generally considered as the fastest progressing browser."
Link to Original Source

"I'm a mean green mother from outer space" -- Audrey II, The Little Shop of Horrors

Working...