Forgot your password?

Comment: When all you know how to use is a (ban) hammer.... (Score 2) 428

by jazzdude00021 (#48112321) Attached to: BitHammer, the BitTorrent Banhammer

....every problem tends to look like a nail.

If you read poster's GitHub page, he even admits there are better ways to do this than using his program. This program is not an elegant solution. It is the equivalent of using duct tape and plastic wrap to replace a broken car window. Sure, it solves the problem, but it's not a good longterm solution. Best usage case: solve the problem of BitTorrent users hogging the connection until proper QoS is set up.

Comment: Re:Not from what I've seen (Score 1) 248

by jazzdude00021 (#47666149) Attached to: The IPv4 Internet Hiccups

He didn't want to spend the money, and so just complains occasionally about the speed.

For whatever reason, there are more than a few people who will just use old, failing, technology and bitch about it rather than fix the issue.

What do you mean I have to upgrade my Windows XP??? I like my windows the way it is thank you! But hey, can you come fix it for me because it's a little slow???

Comment: Re:Bad media coverage (Score 2) 1330

Wow, like leaving out details much?

Just for reference, the problem isn't that Dan Cathy expressed an unpopular opinion. The problem is that Chik-fil-A's "charity" organization, the WinShape Foundation, has donated millions of dollars to anti-LGBT hate groups. Did Barack or Hillary do that?

No, the problem was that Dan Cathy expressed an unpopular opinion and THEN (and only then) his charity organization came under fire. The liberal-biased media played their part by vilifying him, while the conservative-biased media praised him, and people swore allegiance to one side or the other. Chick-fil-a has no well-known history of corporate bigotry. WinShape may donate to organizations that the liberal-biased media dislike and thus they get branded perpetrators of "hate speech."

The issue here (Hobby Lobby) is similar. One side is trying to accuse Hobby Lobby of being misogynistic etc. in order to vilify them in the court of public opinion. In reality, Hobby Lobby's owners are saying that the Government is mandating they pay for services for themselves and their employees that violate their religious beliefs. The Supreme Court agreed this was wrong and provided a very narrow exemption for them.

In both cases CEO's of major companies are trying to live their religious beliefs in every aspect of their lives including how their corporation acts. In both cases the media tried to vilify them by projecting the worst possible construction on their motives (misogyny, bigotry, hate speech etc.) In both cases the Government acted appropriately by choosing to not dictate their actions or force them to go against their religious beliefs. The result is that everyone from Dan Cathy to Barak Obama are free to use their money in accordance with their personal beliefs without fear of Government intervention. Just because YOU don't like their choice in how they spend it does not justify labeling it as "hate speech." The beauty of this country is that we're allowed to have this debate without fear of Government (or theocratic) censorship.

Comment: Re:People are willing to trust some random softwar (Score 1) 251

then we really can't trust anything except burning brands and pitchforks as tools of political change.

But what if the NSA has bugged the pitchforks in some vast conspiracy with the pitchfork industry? I also heard from [source of dubious credibility] that they were putting a backdoor kill-switch in burning brands. And don't get me started on the homemade devices crowd, they're just [NSA, CIA, FBI, etc.] front men.... wake up sheeple! end sarcasm

Seriously. Either you have to believe that the government secretly runs everything or else you have to admit that something might just be genuinely homegrown and therefore not a government plant. I can't say I know everything about the inner workings of the NSA etc. I can say that if they are as organized and efficient as your average DMV (who are also a government organization with access to massive amounts of computer technology), we're all gunna be just fine.

But hey, that's just my opinion as dictated to me by the chem-trails I inhaled this morning. Now if you'll excuse me I'm off to cash my check from the [insert name of your favorite world-controlling organization here].

Comment: If you think this is long.... (Score 1) 162

by jazzdude00021 (#46698435) Attached to: Judge (Tech) Advice By Results

...try a 4 year degree in education. As a second-year teacher with just BS Ed. (no Masters work yet) this exact problem (optimizing presented information so it is useful and effective to the majority of your audience) is a daily struggle. I like where this is going, but to anyone who thinks this is long, teachers learn this in college and then spend their careers perfecting the methodology - at least those that don't get burned out along the way...

Oh, and he's only dealing with people who WANT the information. Imagine the same scenario but 30/50 want to be anywhere else but hearing the presented information...

Comment: (-1) Flamebait (Score 1) 250

by jazzdude00021 (#46318197) Attached to: Slashdot Asks: Do You Label Your Tech Gear, and If So, How?
Can we mod this whole article (-1) Flamebait and move on? I see enough troll food here to keep them fed for weeks.

Seriously, if you don't know how to label your stuff as yours and/or keep track of it, /. might just be a little too advanced for you. Even so, this is a community that openly discusses stealing copies of Windows and other legally questionable acts. The advice may be good, but we also know how to work around most of the preventions you put in place (and if we don't Google probably does).

But really, the only reason this article should exist on /. is to keep the trolls fed here so they don't interfere with actual insightful comments elsewhere.

+ - New near-global interactive map for understand flood risk and surface water flow->

Submitted by Anonymous Coward
An anonymous reader writes "Using computations on the massive near-global SRTM surface model from NASA, the map lets you query watersheds, interactively set the sea-level and flood the world (North America at 500m increase in sea-level), or play around with river thresholds on a global or regional scale (computed rivers around NYC/NJ). It can be used to get an understanding for the watersheds and water flow paths in your local neighborhood, do you know where rain (or pollutants) that falls in your backyard end up? The map is freely available to the public."
Link to Original Source

+ - Environmental Report Raises Pressure on Obama to Approve Keystone Pipeline

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "Reuters reports that pressure on President Obama to approve the Keystone XL pipeline increased on Friday after a State Department report played down the impact it would have on climate change, irking environmentalists and delighting proponents of the project. The long-awaited environmental impact statement concludes that the Keystone XL pipeline would not substantially worsen carbon pollution, leaving an opening for Obama to approve the politically divisive project as it appears to indicate that the project could pass the criteria Obama set forth in a speech last summer when he said he would approve the 1,700-mile pipeline if it would not “significantly exacerbate” the problem of greenhouse gas emissions. The oil industry applauded the review. “After five years and five environmental reviews, time and time again the Department of State analysis has shown that the pipeline is safe for the environment,” says Cindy Schild, the senior manager of refining and oil sands programs at the American Petroleum Institute, which lobbies for the oil industry. Environmentalists say they are dismayed at some of the report’s conclusions and disputed its objectivity, and add that the report also offers Obama reasons to reject the pipeline. The report concludes that the process used for producing the oil — by extracting what are called tar sands or oil sands from the Alberta forest — creates about 17 percent more greenhouse gas emissions than traditional oil (PDF). But the report concludes that this heavily polluting oil will still be brought to market. Energy companies are already moving the oil out of Canada by rail. “At the end of the day, there’s a consensus among most energy experts that the oil will get shipped to market no matter what,” says Robert McNally. “It’s less important than I think it was perceived to be a year ago, both politically and on oil markets.”"

Comment: Re:Things that don't need to be connected to the i (Score 1) 96

by jazzdude00021 (#43304135) Attached to: Wi-Fi Enabled Digital Cameras Easily Exploitable

So at a sports event, a photographer might have one down behind the goal with a wide-angle lens, another pointing at the other goal, etc. etc. etc. - all uploading to the photo agency for up-to-the-moment imagery. Newspapers needed things soon, the internet needs it now.

Still decidedly embarrassing if they are so easily compromised, of course.

And now all I have to do is put myself somewhere in range of the remote controlled cameras, find an exploit, publish their photograph first and take credit for it. Much faster and easier than actually doing all the work.

I see where this technology is potentially very useful, but just like compromised "smart meters" and other "smart" appliances, cameras don't need to be a part of the "internet of things" unless you're cool with someone potentially watching everything you do with it.

The Military

+ - America's B-2 Stealth Bomber over South Korea - North Korea Beware->

Submitted by Anonymous Coward
An anonymous reader writes "Well for all of North Korea's talk, the United States seems to be one who can actually back up its words with deeds.

The US recently flew two B-2 Stealth bombers from Missouri all the way to South Korea to take part in military exercises.
In a statement from United States Forces Korea: "The B-2 bomber is an important element of America's enduring and robust extended deterrence capability in the Asia-Pacific region.”

At the bottom of the statement there was also a nice factsheet detailing all the capabilities of the B-2. It seems the US does not need to make threats, the fact sheet should do nicely."

Link to Original Source

+ - Google Releases Street View Images From Fukushima Ghost Town->

Submitted by
mdsolar writes "Google Inc. (GOOG) today released images taken by its Street View service from the town of Namie, Japan, inside the zone that was evacuated after the Fukushima nuclear disaster in March 2011.

Google, operator of the world’s biggest Web search engine, entered Namie this month at the invitation of the town’s mayor, Tamotsu Baba, and produced the 360-degree imagery for the Google Maps and Google Earth services, it said in an e-mailed statement.

All of Namie’s 21,000 residents were forced to flee after the March 2011 earthquake and tsunami crippled the Fukushima Dai-Ichi nuclear plant, about 8 kilometers (5 miles) from the town, causing the world’s worst nuclear accident after Chernobyl. Baba asked Mountain View, California-based Google to map the town to create a permanent record of its state two years after the evacuation, he said in a Google blog post."

Link to Original Source

+ - U.S. and Russia--Not China--Lead List of Malicious Hosting Providers->

Submitted by Trailrunner7
Trailrunner7 (1100399) writes "China has become the go-to bogeyman behind every cyber attack or malware campaign, but if you're looking for the most malicious hosting providers on the Web, you won't find any of the top 10 in China. In fact, the United States and Russia have many more bad hosting providers in the top 20 than China does.

Those statistics, compiled in Host Exploit's quarterly World Hosts Report, are somewhat surprising, although they don't paint the full picture of the attack landscape. The malicious activity that Host Exploit tracks generally comprises malware hosting, botnet C&C hosting and the like, and does not necessarily include command-and-control servers for targeted attacks or the like. Still, the data the organizations compiled shows that the hosting of malicious servers is not a localized problem, it's a global one.

One other interesting data point is the appearance of Amazon in the top 10 list of providers hosting the highest concentration of infected Web sites. These are the kind of sites used in drive-by download attacks and to deliver exploits from exploit packs. Amazon, with more than two million IPs, ranks fourth in the list of providers hosting infected sites. Also on that list is Google, which comes in at number seven. The top spot belongs to, a Russian hosting provider."

Link to Original Source

Is a person who blows up banks an econoclast?