Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Thieves looking to steal metal? lolwut? (Score 1) 132

by jonwil (#49151809) Attached to: Vandalism In Arizona Shuts Down Internet and Phone Service

The answer to fixing this problem is to require scrap metal dealers to be licensed (with strong penalties for anyone who isn't) and to require all transactions to be recorded along with the ID of the seller. Its already done in many jurisdictions for pawn shops (where you need a license to operate one and where sellers have to provide ID when they sell it, why should scrap merchants be any different.

Comment: "Security software..." (Score 1) 208

by jonwil (#49151521) Attached to: Lenovo Saying Goodbye To Bloatware

Whats the bet that the "Security Software" they refer to includes those crappy limited trial versions of software from McAfee and Norton, the stuff that is impossible to uninstall and gives you endless nag screens pushing you to give them money? (nag screens that used to be good at getting idiots to part with their money but now thanks to scams and fake anti-virus products and stuff that all their geek friends keep telling them about are more likely to get those same idiots to assume they are bogus and ignore them)

Those things are some of the worst offenders when it comes to bloatware.

Comment: Re:Why are they using SIMS this way? (Score 1) 155

by jonwil (#49116117) Attached to: NSA, GHCQ Implicated In SIM Encryption Hack

GSM (and GSM cryptography) was developed way back when the smartest thing a cellphone could do was to store a few phone numbers and the hardware grunt the system had was minimal.

Also, when GSM was developed, the various intelligence agencies in the NATO countries deliberately wanted the cryptography to be weak in order to make it easier to hack.

Comment: Re:Time to go back to land lines and cash. (Score 2) 192

by jonwil (#49091873) Attached to: How NSA Spies Stole the Keys To the Encryption Castle

No, time to go to open source verified-by-security-audit strongly-encrypted VoIP (the kind that at the very least will require the spooks to put a lot of effort into cracking it so they cant just vacuum it all up like they do now) and secure anonymous distributed crypto-currencies that the feds cant easily track (and cant seize as part of a "random" roadside stop on the interstate)

Comment: Re:why? (Score 1) 677

by jonwil (#49042569) Attached to: Empirical Study On How C Devs Use Goto In Practice Says "Not Harmful"

I have a fairly large C++ project with a bunch of classes and it makes good use of operator overloading including overloading + and += on string classes, [] on containers and a whole bunch of operators on various kinds of matrices and vectors and stuff.

Our codebase would be much less readable and easy to work with if it wasn't for operator overloading.

Comment: Re:Already legal? (Score 1) 157

by jonwil (#49026975) Attached to: DMCA Exemption Campaign Would Let Fans Run Abandoned Games

The difference is that Samba and Bitkeeper don't use the online servers as part of their anti-piracy solution in the way most of the games do. Its not the reverse engineering of the server protocols as such that's illegal, its the fact that these server clones let you play with pirated copies.

Comment: Re:How often would this work? (Score 1) 157

by jonwil (#49026935) Attached to: DMCA Exemption Campaign Would Let Fans Run Abandoned Games

Generally they dont hard-code IP addresses, just domain names.
And when it comes to the server clones I have seen before (e.g. the GameSpy clones made after the shutdown of that service) people either hacked the clients to point to the new domain names or used hosts files or proxies to intercept requests and point them at the new locations.

Comment: Re:Uh, don't post... (Score 1, Interesting) 135

If you post and set it to "show only to certain people" (or whatever the settings are on your social media outlet of choice) then yes there IS an expectation that people outside the group can't see it.

If a cop is posing as as a teenager or college kid online so they can hang out in chat-rooms and hook pedophiles that's one thing (pedophiles are scum who deserve to be locked away in one of those nasty jails they show on various TV documentaries) but if they are doing it to bust up a few kids having some beers (and presumably harming no-one except themselves) then that's different and shouldn't be allowed.

Comment: Re:The HDMI dongle I want (Score 1) 106

by jonwil (#49002979) Attached to: Kickstarted Firefox OS HDMI Dongle Delayed, DRM Support Being Added

Better yet, why not make a dongle that can pull content directly from the NAS via SAMBA, supports every codec known to man (including the obscure ones) by using something like FFMPEG (with hardware accelerated decoding for the codecs where the hardware can do it) and can be controlled via a normal remote or via an app (one that exists on all the necessary platforms).

As for DRM (which is necessary if you want Netflix etc) just get Adobe to port the same DRM blob being used for Firefox on Windows to the new device and let the blob handle the DRM.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (9) Dammit, little-endian systems *are* more consistent!

Working...