Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Wrong motive (Score 1) 110

I don't know what it is you want, to announce themselves as the lawless ISP or the pirate ISP or anything like that would only be foolish in so many ways.

Why? For the record, the Swedish PirateISP seems to do just fine. Granted, they only offer services to one city currently, but that city has one of the largest Swedish universities, along with all of its student dorms. Honestly, I don't see why it'd be 'foolish' to have a pirate ISP, they are not responsible for their customers. If anything they're sure to get them, being the only company offering 1Gbps/1Gbps fiber connections to households (for $80/month).

Comment Re:Epic Fail? Hardly. (Score 5, Informative) 534

Ok, the PS3 was launched on November 11, 2006. Today's date is December 29, 2010. That means that it took over four years to be broken.

Compared to DVD and Blu-Ray, that is actually pretty darn good.

I was at the presentation in Berlin today. They did bring up this exact point.

Their counter argument was that people don't take into consideration that the console did support homebrew until Sony declared they'd drop that. The argument for that action was they'd save money not having to support it for their then-new PS3 Slim models, which turned out to be bullshit after hackers discovered that the Slim (with some hacking) could actually run the same Linux distros as the PS3 Fat. They then disabled OtherOS on the PS3 Fat, too.

This was 12 months ago (can't cite a source other than the slides), making it take only 12 months of actual effort for it to get cracked, as opposed to other (closed) platforms where the homebrew hacking efforts begin at day 0.

The Internet

Several Link-Spam Architectures Revealed 38

workie writes "Using data derived from website infections, RescueTheWeb.org has found several interesting link-spam architectures. One architecture is where concentric layers of hijacked websites are used to increase the page rank and breadth of reach (within search engine search results) of scam sites. The outer layers link to the inner layers, eventually linking to a site that redirects the user to the scam site. Another architecture involves hijacked sites that redirect the user to fake copies of Google, having the appearance that the visitor is still within Google, but in reality they are on a Google lookalike that contains only nefarious links."

Submission + - U.S. Intelligence planned to destroy WikiLeaks, 18 (wikileaks.org) 3

An anonymous reader writes: This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. ``The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out''. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses ``trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers'', the report recommends ``The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site''. [As two years have passed since the date of the report, with no WikiLeaks' source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that ``Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website''. The report provides further justification by enumerating embarrassing stories broken by WikiLeaks---U.S. equipment expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the Iraqi town of Fallujah and human rights violations at Guantanmo Bay.

Comment Re:Facebook spam? (Score 1) 313

The obvious counter-argument from average (ignorant) Joe is that "well, the criminals encrypting their harddrives shouldn't be regarded as freedom fighters, they should be put into jail, and since I'm not a criminal I don't need to encrypt my stuff"

Comment I wonder... (Score 3, Interesting) 337

... how they're going to stay online. The service itself has to be hosted somewhere where they won't have too much hassle with the constant influx of copyright complaints. The *AA companies will then be able to kill two of birds with one (or the cardinality of the userbase with one stone) by just getting whatever details about IPREDator they need and taking them to court for their illegal downloading. We have to remember: while The Pirate Bay remains legal, the illegal downloading has always been, and I'm very interested in details as to how they keep this service running in any country if they claim responsibility of their users' actions.

Slashdot Top Deals

"Ignorance is the soil in which belief in miracles grows." -- Robert G. Ingersoll

Working...