Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Don't even try (Score 4, Insightful) 687

Just don't. The people who want to pirate will, no matter what you do. Any DRM would only inconvenience legitimate customers. Just make it easy to buy your software for people who want to do so, and provide something worthwhile for the money (e.g. answer support questions, respond to bug reports, etc.)

Comment DVD players? (Score 3, Insightful) 213

I'm confused. Why would anyone care what a DVD player does or doesn't do, when there's a free, high quality, ad-free version of pretty much anything on the Pirate Bay (and countless other distribution channels) that will play on any device, in any way I want, whenever I want?

They can (somewhat, temporarily) control their own distribution channels. But once it's out in the open, any and all control over these closed channels is moot.

Comment Re:Lessons learned (Score 1) 409

Note: Damn, I only read in the end that you're supposed to provide everything electronically. Spoils half the fun. But the idea is the same - flood them with information that is exactly what they asked for, but completely useless. Also, a carton full of floppies could be considered "electronic"...

Hmm. It says:

You are required to produce all documents, records and data relating to, regarding, or referring to the folliwing:
Journals, documents, records and data stored by JSTOR;

Great! Download every document from there, print it out.

Means of access to JSTOR;

Print the source code of Firefox, Chromium, lynx, and a disassembly of IE (add in any other browsers you feel like).

Computer software capable of making repeated requests for documents, records and data from JSTOR;

Print out wget, curl, httrack, bash, gcc, glibc, python, ruby, whatever.

Add in articles, websites, manuals, reviews, blog posts, mailing list archives and whatever about all of these, as well as every Wikipedia article even remotely related to computers. Because, well, if you don't know how a transistor works, how can you even begin to understand how all this works?

In other words, hand them a literal truckload of paper. And not only have you complied with what they were asking of you, you've done your absolute best to give them all information you have or could procure pertaining to the case.

Problem solved.

Comment Re:Cops too. (Score 1) 409

The only information to give to the police is your lawyer's name. Ideally, let your lawyer tell them that too.

I don't disagree that this is good advice, but how does it work with people who don't happen to have a lawyer on standby? I.e., probably >90% of all people?


Video RSA: Self-Encrypting USB Hard Drives for all Operating Systems (Video) 154

Tim Lord met Jay Kim at the RSA Conference in an Francisco. Kim's background is in manufacturing, but he's got an interest in security that has manifested itself in hardware with an emphasis on ease of use. His company, DataLocker, has come up with a fully cross-platform, driver independent portable system that mates a touch-pad input device with an AES-encrypted drive. It doesn't look much different from typical external USB drives, except for being a little beefier and bulkier than the current average, to account for both a touchpad and the additional electronics for performing encryption and decryption in hardware. Because authentication is done on the face of the drive itself, it can be used with any USB-equipped computer available to the user, and works fine as a bootable device, so you can -- for instance -- run a complete Linux system from it. (For that, though, you might want one of the smaller-capacity, solid-state versions of this drive, for speed.) Kim talked about the drive, and painted a rosy picture of what it's like to be a high-tech entrepreneur in Kansas.

Comment Re:POTS rules (Score 1) 329

Holy space-monkey fucker! You are probably one of the the three people with two digit accounts that still post. I commend you on your dedication.

And have to ask, do you have multiple other accounts for trolling or what not?

I'm sure he does, but he's ashamed to talk about them because of the high UID. Probably 3 digits, maybe even 4.


VLC For Windows 8 Reaches $65,000 Funding Goal On Kickstarter 210

An anonymous reader writes "A Metro version of VLC, the popular free and open-source media player, is coming to Windows 8. On Sunday, the VideoLAN organization reached its funding goal on Kickstarter for its Windows 8-specific app. There are also plans to port it afterwards to Windows Phone 8. The project has now been funded by over 2,500 backers, who have pledged more than the £40,000 ($65,000) goal."

Comment Re:DRM (Score 4, Interesting) 151

Only when you control the kernel/boot loader. I have a feeling that this will be used a lot by vendors to lock you out of your own devices, e.g. Android phones etc.

I'm as paranoid as the next geek, and the idea of secure boot etc. appeals a lot to me if done correctly. As in, if it's MY device, then I get to decide what runs on it, and no one else. But it's a tool, and as such it can be used both for you and against you. There can't be a technical solution, technology is dumb. We need a legal solution, either in the form of regulation or widespread adoption (and enforcement) of the GPLv3.

Uncertain fortune is thoroughly mastered by the equity of the calculation. - Blaise Pascal