Forgot your password?

Comment: hope all it does is verifies... (Score 1) 75

by pouar (#46328761) Attached to: DARPA Looks To End the Scourge of Counterfeit Computer Gear
...instead of stopping the system if it doesn't verify (kill switch) or sending the results back to headquaters (spying), otherwise it's DRM. As long as the user has full control on what this thing does such as turning it off or changing what server it sends the info to or what it registers as counterfeit and what doesn't then it could be a good thing. But if this is used to lock the user out of his own hardware or prevent him from changing or modifying it then this is going to be a huge problem.

Comment: I prefer the command line and a text editor (Score 1) 627

by pouar (#46328139) Attached to: Does Relying On an IDE Make You a Bad Programmer?
It's actually easier and quicker for me to use than an IDE. I usually use Bash as my shell and Kate as my text editor (Kate is similar to Notepad++ in functionality which is what I used before my switch to GNU/Linux). when I compile projects I either use a simple Makefile or CMake depending on the size of the project. I've done OS detection and resolution with Makefiles before.

Comment: Germany needs to get their copyright laws in order (Score 0) 164

by pouar (#46195821) Attached to: German Domain Registrar Liable For Copyright Infringement
If anyone should be held liable it's, they're the ones ding this. Of course if's content is user generated then isn't liable either. Also aren't torrents similar to links. The content themselves aren't hosted on their servers either but via a bunch of bittorent clients working together, so h33t shouldn't be liable at all.

"I've seen the forgeries I've sent out." -- John F. Haugh II (jfh@rpp386.Dallas.TX.US), about forging net news articles