Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re: Like the 100 mpg carburetor (Score 1, Insightful) 67

Greedy? They are providing FREE Internet to the third world. I hardly consider that greedy.

They developed it as an education and communication tool, allowing access to Wikipedia, Google and Facebook.

That gives them access to knowledge, news, email, chat and other communication tools.

The only other thing I would add is Khan Academy.

Comment: Re:Bullying (Score 1) 183

by ironicsky (#46596095) Attached to: Xbox One Reputation System Penalizes Gamers Who Behave Badly

Use Slashdot's moderation and meta moderation style system. One irate idiot cannot negatively impact the score of a post or a users reputation. Multiple people need to report the same thing for a score to hold, then the meta moderators determine if the score assigned to a post was justified or not.

I assume Microsoft won't allow a single person's review of another user to hold much weight until multiple users are reporting the same thing, Likewise, I assume that users with a good reputation down voting a bad player will have more klout than a user with a bad reputation trying to down vote another user.

Comment: Re:Without her permission? (Score 1) 367

by ironicsky (#46593585) Attached to: Minnesota Teen Wins Settlement After School Takes Facebook Password

As a parent, I will never give my kids school permission to access her cell phone, email accounts, Facebook or any other online account. If they have concern about the content of a post she makes, or a message she may have sent, they can raise the concern with me and I'll deal with it accordingly. If they track her online usage while at school, fine - all organizations do it, they have to from a liability standpoint, but demanding her password? I'll raise hell.

Comment: No, not really (Score 1) 187

by ironicsky (#46482631) Attached to: Google Blurring Distinction Between Ads and Organic Search Results

Yes, they got rid of the pinkish coloured background from top ads, and removed the separator from the side bar. But the ads are still separated by a grey line, have a yellow icon in front of the ad with the word "Ad" in it, and an exclamation mark in a circle beside the ad blocks. If you can't tell they are ads, you aren't paying attention.

Comment: Other Legit Reasons (Score 1) 417

by ironicsky (#46439225) Attached to: School Tricks Pupils Into Installing a Root CA

Our company has three root certificates installed, and I can't find a single MITM on any domains.

There are other legit reasons for issuing internal root certs, such as accessing secure internal resources, like intranets, email, domain authentication, attendance/payroll systems, etc.

Try going to a secure site, like facebook, and check to see if the cert was hijacked, then you know for sure.

Comment: Seem Negligible (Score 0) 155

by ironicsky (#46419131) Attached to: New Mozilla Encoder Improves JPEG Compression

Seems like a negligible improvement. I mean really. With hard drive space plentiful, and bandwidth faster than most users can use at any given moment, saving 20-60Kb on a 1Mb file is like a fart in the wind, even for mobile users.

I'm with the AC in the first post, I use PNG for 90% of my images, since it supports transparency. The file may be slightly bigger, but who cares.

Comment: turn off the car? (Score 1) 664

by ironicsky (#46308127) Attached to: Stack Overflow Could Explain Toyota Vehicles' Unintended Acceleration

I used to have a truck with a sticky gas peddle. As in I pushed it down and it didnt come back up. I quickly learned a secret... when it happened, I turned the truck off, dropped it to neutral, and breaked.

I knew that when I was 16. Why cant people figure that out 15 years later?

Comment: customer service portal (Score 5, Interesting) 236

by ironicsky (#46250461) Attached to: Target's Internal Security Team Warned Management

Years ago I worked for one of the two big American cable companies currently merging. I identified a security flaw in the public facing side of their customer service portal, essentially giving access to all the config files, which contained admin credentials in plain text. I proposed simple solutions, like not allowing directory listings of folders, among others.

They shrugged it off, and to the best of my knowledge, last year the vulnerability was still accesaible

Comment: Great in Theory (Score 3, Interesting) 324

by ironicsky (#45680029) Attached to: Google Cuts Android Privacy Feature, Says Release Was Unintentional

The app is great in theory, but horrible in implementation. I checked out the App Ops functionality and if you don't know what you are doing you can cripple your phone. The problem is it allows you to change the functionality of system apps and core services by denying them access to the device *oops*.

I definitely think this is a needed feature, but it needs to be implemented at installation of apps from the play store. When an app says "We'll need the following permissions" the user should be able to toggle off each one they dont want the app having access to, then use the traditional permissions manager to modify it in the future.. From the App Ops, I learned that Angry Birds accesses your location when you run it. For what user-supporting function? None... There is no reason why it needs access to my location. My Grocery Store locator? That needs access to my location, but not my contacts.

Comment: End of Life for XP in General (Score 2) 257

by ironicsky (#45268483) Attached to: Chrome Will End XP Support in 2015; Firefox Has No Plans To Stop

As of April 8th, 2014, Microsoft is ending all support for their 12 year old operating system. We can't continue to support legacy systems because people refuse to upgrade. There has been THREE full OS versions that have come out since XP. There are people still using Windows 98 and Windows ME, doesn't mean we still provide support for them.

Comment: Network Layer Encryption (Score 2) 216

by ironicsky (#44819589) Attached to: Google's Encryption Plan To Stifle NSA's Dragnet Will Raise the Stakes

I've never understood why encryption isn't already built in to everything we do in modern technology. As far as I am concerned the network card in your computer should generic a one-time public/private key pair for EACH connection it is making or receiving. The public key is transmitted to the other network device which uses it to encrypt the data to get sent back. Once a connection is closed the keys, salts, and other information is destroyed.

It would take a little extra computation on the hardware to make it happen, but the storage requirements for keeping the keys is minimal since each key would, in theory on exist for a few minutes before a connection is closed, and in the case of web traffic, a few seconds.

We could do a way with all sorts of things, like OS level encryption if it was built in by default - or keep it, and add a 2nd level of complexity to the data.

A language that doesn't affect the way you think about programming is not worth knowing.