Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:WMDs? Chemical weapons? Wait, what? (Score 1) 376

by niado (#48160081) Attached to: Pentagon Reportedly Hushed Up Chemical Weapons Finds In Iraq

Now that I have developed autoimmune disease, which is hereditary, when no fucking one in my family out of 200 people has it. I cannot claim I was exposed to anything, well because it didn't happen. I know good fucking well almost everyone in Baghdad in 2003 was exposed to blood agents in the water. The water tested positive multiple times, but do you here about it anywhere?

If you'll excuse my curiosity - what autoimmune disease have you been diagnosed with, and which blood agents did the water test positive for?

Environmental causes of autoimmune diseases are currently poorly understood.

Comment: Re:Alternative headline (Score 1) 429

by niado (#48131335) Attached to: BitHammer, the BitTorrent Banhammer

The implication is that this tool is written for use by whomever manages the network. Most networks would have a "no bittorrent" rule,

Most games these days use bittorrent, or some similar peer-to-peer system, to perform updates and patches. Any network that has a hard "no bittorrent" rule IMHO is not a usable consumer network.

It depends on the intended use of such a network. Most workplaces would have very limited use for bittorrent among their users, for example, as would a coffee shop that provides the service primarily to facilitate their clientele's most ubiquitous activities - web browsing and email.

Comment: Re:Incredible (Score 1) 429

by niado (#48131291) Attached to: BitHammer, the BitTorrent Banhammer

Except the analogy is flawed. A better analogy would be that, instead of yelling "hey, leave some for the rest of us" (which is what SHOULD be done), this michaelcole has chosen to beat the guy to death with a crowbar. That lands you in prison.

No, you are resorting to extreme hyperbole (as are many other commenters here) by equating the submitters actions with violence. The offender is certainly unharmed in the submitter's case and in the analogy given. An improvement on the analogy would be to, instead of shouting "leave some for the others", place a barrier between the offender's and the food, preventing them from getting any more. The submitter advocates coordination with the network owner on the github readme (though this might not be in good faith). In the analogy, the restauranteur would likely escort such an offender out of their restaurant. The only reason they do not do this in the submitter's situation is that the owners are technologically incapable of doing so.

However, it is on the business owner to stop the abuser, it is not for the other clientele to take aggressive action on their own. The best course of action as a consumer is to go elsewhere. Look, in a functioning society, (or is a smaller sense a social setting), the people involved understand their roles and act accordingly. When society lack these norms, you have chaotic, random behavior, which in the end leads to more problems.

I agree that it is certainly not ideal. However, the situation is not so black-and-white as many here are trying to make it, and definitely shouldn't be equated with violent assault.

Comment: Re:Alternative headline (Score 2) 429

by niado (#48112969) Attached to: BitHammer, the BitTorrent Banhammer

on github the submitter states "After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners."

While the program can be used with the network owner's permission, the fact that it can more easily be used without permission makes it rather dubious.

True, but it is just a tool that can be used irresponsibly, like any other. An interesting comparison would be bittorrent itself.

If this is really a widespread problem afflicting non-technical people trying to run a public wi-fi hotspot, what needs to happen is for router configs to limit the number of connections from a single MAC address by default.

Yes that would be an ideal solution, though it would require manufacturer intervention, which is unlikely at best.

If you've got access to the router via the owner, the most obvious thing to try first is QoS.

I certainly agree. The submitter mentions several technical solutions including QoS on his github page, and says they are better than using his "bithammer" tool. The advantage of his tool is that it does not require much involvement on the part of a non-technical proprietor.

Comment: Re:Incredible (Score 1) 429

by niado (#48112859) Attached to: BitHammer, the BitTorrent Banhammer

Except the analogy is flawed. A better analogy would be that, instead of yelling "hey, leave some for the rest of us" (which is what SHOULD be done), this michaelcole has chosen to beat the guy to death with a crowbar. That lands you in prison.

No, you are resorting to extreme hyperbole (as are many other commenters here) by equating the submitters actions with violence. The offender is certainly unharmed in the submitter's case and in the analogy given. An improvement on the analogy would be to, instead of shouting "leave some for the others", place a barrier between the offender's and the food, preventing them from getting any more.

The submitter advocates coordination with the network owner on the github readme (though this might not be in good faith). In the analogy, the restauranteur would likely escort such an offender out of their restaurant. The only reason they do not do this in the submitter's situation is that the owners are technologically incapable of doing so.

Comment: Re:Alternative headline (Score 5, Informative) 429

by niado (#48112441) Attached to: BitHammer, the BitTorrent Banhammer

As opposed to the bittorrent user(s) who are pushing everyone else out of the way and preventing their access?

Its one thing to do so with permission from the network owners .. its another thing to wade in and beat up on people just so you can get what you want.

Two wrongs do not make a right.

This is not in the summary, but in his readme on github the submitter states "After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners."

The implication is that this tool is written for use by whomever manages the network. Most networks would have a "no bittorrent" rule, if the network owner was savvy enough to know this. The tool is an interesting enforcement mechanism.

Comment: Re:Incredible (Score 1) 429

by niado (#48112359) Attached to: BitHammer, the BitTorrent Banhammer

I'm shocked by some of the replies so far. Some of you are furious because this guy is trying to limit the people who abuse the system?

Imagine you are at a buffet. It's all-you-can-eat but with no instructions or limits on the way to do it. Now imagine there's a few people at the front of the line and they're putting all the food available into buckets, leaving nothing but scraps for everyone else. Would you be pissed at those people or at the one who would stand up and yell "Hey, leave some for the others"?

Excellent analogy. Almost made coffee shoot out my nose.

Comment: Re:Alternative headline (Score 1) 429

by niado (#48112265) Attached to: BitHammer, the BitTorrent Banhammer

Vigilante beats up on people in order to get public wifi access that he believes is rightfully his

That's what it amounts to. He can't get the access he wants, so he just pushes his way in and takes it.

That's an interesting level of hyperbole you have jumped to. Torrent use can easily render a consumer-grade connection unusable. These torrent users on public wifi are at best irresponsible, and at worst malicious vandals.

The submitter's response to the problem is interesting, and while aggressive is certainly not violent as you've implied.

Comment: Re:Missing in the Summary (Score 4, Informative) 107

by niado (#48006155) Attached to: How Did the 'Berlin Patient' Rid Himself of HIV?

Although the work doesn't provide a definitive answer, it rules out one possible explanation

...that conditioning by itself likely cannot rid the body of the AIDS virus.

No but a significant percentage of Europeans are resistant to HIV. Not sure what the news are here, Germans in general should have 25% chance of fighting off an HIV infection.

You're a bit confused. Some Europeans (between 4% and 16%) carry a mutatation that reduces their likelihood of contracting specific HIV strains. The bone marrow donor mentioned in the summary had two copies of this mutated gene, which is a possible contributor to the "cure".

Comment: Re:another possibility ... (Score 2) 355

by niado (#47770127) Attached to: Ask Slashdot: What To Do About Repeated Internet Overbilling?

If it's not the ATM encapsulation overhead as many others have rightly suggested, have a look at the traffic... I had similar concerns with my ISP... I have a Cisco switch between my local firewall and my cable modem... I set one port to monitor mode (copy all packets to a write-only switch port) and captured all of my internet traffic for a number of months... I then analyzed the .cap file and discovered a ginormous amount of SMB advertisements and arp who-has from other cable customers... For those few months, it was on the order of about 10% of my traffic...

From what the submitter said, all that garbage would be included in his traffic calculations. I would put another vote in for encapsulation.

Your findings are a good illustration of the value of a local firewall between your LAN and the ISP's network. Who knows what kind of icky traffic is rolling around out there.

Comment: Re:String theory is not science! (Score 1) 259

by niado (#47607631) Attached to: The Man Who Invented the 26th Dimension

"String theory is untestable" is one of those easy to remember phrases that keeps you away from a great amount of interesting information:

1) "String theory" is actually a family of related theories that make different predictions, where they're advanced enough to do so 2) They're neither as a class, nor individually, a priori untestable 3) They're theories of high energy physics, so what predictions they do make will be difficult to test on currently existing hardware 4) The mathematical tools to make sense of the theories and make predictions are novel themselves

String theory is at a stage kind of like parachuting early-20th-century physics into the 15th century. It's not relevant at length scales where we can easily make observations, but we don't have the necessary cognative or physical tools to write it off either. Have we been handed relativity, or the aether? We can't say because we're not smart enough yet.

Now, as a matter of expediency I'd argue that any self-respective physicist should dedicate himself to advanced models that are a little closer to home and might act as stepping stones to string theory's energy scales, but since when has any self-respecting scientist been led away from a beautiful hypothesis by pragmatism? Much less a physicist?

If I could give out a "comment of the day" award, this one would win it.

Comment: Re:Speaking as a sysadmin (Score 2) 31

by niado (#47530567) Attached to: Poetry For Sysadmins: Shall I Compare Thee To a Lumbering Bear?

Smaller organisations have not enough servers or users to justify separate staff, so it's not uncommon to see a sysadmin who also does support, or support staff who also admin the couple of servers the office needs.

I would say this situation is not just "not uncommon", but ubiquitous.

I would even say that most people whose job title is some derivative of "system administrator" do at least some end-user or desktop support as part of their day-to-day job duties.

Comment: Re: I am Woman! (Score 1) 590

by niado (#47467047) Attached to: Marvel's New Thor Will Be a Woman

I don't get it how they say that is not Thor as the character but at the same time say that it is Thor as if Thor was some title.

like, I could understand if the plot took Peter Parker down on some road and someone else started saying that he/she was Spiderman. but that marvel would take Peter Parker, say that the plot makes him do something and some woman just starts calling her Peter Parker and that she is now the Peter Parker of the marvel universe..

like, wtf. why not label it as it is apparently in the plot: some woman starts wielding the mjolnir and calling herself Thor.

This is not uncommon among comic book super heroes. There are numerous different persons who assume the identity of particular heroes (and villains). Significant examples include DC's Green Lantern, Robin, Nightwing, Batgirl, and Marvel's Captain America, Bucky, and Iron Patriot. Continuity is famously not a concern among comics outside of individual story arcs, so some of these divergent identities operate in the same fictional universes and some do not.

Comment: Re:Do as they do in job references (Score 1) 424

by niado (#47466291) Attached to: French Blogger Fined For Negative Restaurant Review

Sounds to me like the best thing to do, then, might be to just hang up as soon as you discover they are calling in regards to a job reference. Or is that against the law too?

No. It is generally considered rude, however, and it unnecessary.

And this is not a "reference". This is your prospective employer calling to verify employment. If you provide an individual (even a former boss or owner of a company that you used to work for) as a reference, they can generally say whatever they want. Normally this is only done for those you trust to provide a positive reference.

Many employers will contact previous employers to "verify employment". As AK Marc mentioned, the information they are legally allowed to request and the previous employer is legally allowed to provide is limited. They can verify dates of employment, job title, supervisory status, and whether the individual is eligible for rehire. The last bit can be very significant, and is often the reason that employees give notice and otherwise attempt to leave a company smoothly. Of course, some commit misconduct by providing either positive or negative opinions on the employees job performance or other matters, especially because the people involved (HR personnel or business owners operating in the same locality) often know each other.

If it happens once, it's a bug. If it happens twice, it's a feature. If it happens more than twice, it's a design philosophy.

Working...