Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Password stealing is easy when you hold it's owner (Score 1) 217 217

It is easy enough to acquire the password when you hold it's owner captive. I am a US citizen and I gave my government my password to my laptop at the Canadian border just so they would let me go to the bathroom. Giving up your facebook credentials would be trivial unless you were very dedicated.

Comment Use a cheap (real) spectrum analyzer (Score 2, Interesting) 499 499

Using the 'Spectrum Analyzer' features built in to most APs and wireless clients will only show you other WiFi traffic not noise (almost always true). Also, they are not very portable. The earlier post about asking you local Ham Radio club is a good idea if there is anyone available and many Hams don't have equipment to listen to 2.4 or 5 GHz. You can search on google and other places for a 'usb wifi spectrum analyzer' for less than $50 that plugs in to your laptop. Be careful and read the specs though as some required that you use them in DOS mode. This will let you look at the actual received power level across the whole spectrum. You can walk around with a laptop until you find the noise source. It is still a steep price to pay for a one time fix. If you are the crafty type you can get a ez430-RF2500 target board for $22 from Texas Instruments. You will need to search for a software load that make it a SA but the are many instructions online. If you don't want to roll your own and get a prebuilt solution you can use the Ubiquiti AirView2 for ~$40. This is a very nice tool. You could even split the cost with your neighbors or pool money or request the person with the noisy device foot the bill for finding it.

Comment Re:Already possible (Score 1) 318 318

The timestamps have been around for a while. At least six months ago I was browsing through the XML data for my character on the armory and noticed a 'Last_On' and 'Last_Update' (not exact names of fields but something similar). From this you could find out when a person was playing. None of this information was displayed anywhere in the armory though.

Comment Re:Apple's activity is criminal here, Palm's is le (Score 1) 656 656

I will refer you to the huge overwhelming percentage of Apple OS software that is "borrowed" from open source.

Who is getting a free ride?

This is a horrible analogy to draw and discredits your argument.

The word borrowed can be used without quotes, as the BSD-style (and other similar licenses) allow for it; don't play silly games. The difference is, that code was FREELY given away for others to use, including Apple. In no way has Apple told anyone "here, fake our USB ID"; in fact, they have an alternate mechanism for allowing third-party devices to access the iTunes library on a customer's computer. Why haven't they gone that route?

Comment Re:I think Microsoft does not get it... (Score 1) 410 410

It isn't that thinking is a burden, it's that thinking could be reserved for, I don't know, complex tasks that have more meaning than getting music onto your portable music player. Please explain to me the advantage of requiring "thinking" to listen to the music you want?

The reward of a thing well done is to have done it. -- Emerson

Working...