Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Sounds great in theory (Score 1) 407 407

but as Reagan pointed out:
"80 percent of air pollution comes not from chimneys and auto exhaust pipes, but from plants and trees." Presidential candidate Ronald Reagan, in 1979.
"Trees cause more pollution than automobiles do." -- Ronald Reagan, 1981

Comment Re:Frederic Mitterrand ? (Score 1) 151 151

that's actually completely incorrect. there's no suggestion at all of forcible assault or beating, nor has there ever been. read the case documents. they're all available online.

do you think ANYONE, let alone high profile politicians, would support Polanski if he had used violence? do you think his victim would be calling for an end to the witch hunt (as she has for over a decade now) if he'd used violence?

Comment yes/no dialogue when restricted ability first used (Score 1) 279 279

my biggest peeve with the Android security model from day #1 is that this kind of thing is even possible.

every Android application has to be specifically granted a set of permissions on installation, including "able to make phonecalls that cost you money", "able to access the internet", etc. the problem is that the user only ever see this list once, fleetingly, during installation, and as everyone knows, familiarity breeds contempt so after the first couple of apps, most people stop reading the list and just click "yes". even if they read the list, once it's been authorized the application can do anything on its permission list at any time, without user intervention. this opens the gate to applications that can take photos doing so silently while the screen is off, applications that can make phonecalls doing so invisibly and undetectably, applications that can use the internet and use gps phoning home at any time with your exact location, etc. it simply shouldn't be possible.

whenever an application attempts to perform a restricted task, the OS checks that it has been granted the permission to do so and either silently permits the task, or silently disallows it. that's great, but it shouldn't stop there. the first time it's attempted a dialog box should alert the user that "steamy windows is attempting to make a phone call to that can cost you money. do you want to authorize this? yes/no/ [ x ] remember my answer and don't ask me again".

clearly "steamy windows" is going to get a "no and don't let it do it in future response", whereas the user is likely to grant "mywonderSMSclient" indefinite permission.

if there's a reason why this isn't practical, i'd like to know about it.

Comment Re:I actually like this trend... (Score 1) 833 833

Yes, because trolls would never stoop to using fake "real" names.

Well, they'll find it very difficult to do that unless they figure out a way to spoof the same name on their credit card.

You can use the same credit card to create multiple WoW accounts with multiple "real" names... no spoofing is required. No ID check is involved.

Again, the credit card name *does not* need to match the account name.

Comment Re:So essentially... (Score 1) 370 370

  Or you could go with that retard professor and say its because US foreign agrression.

...the "retard professor" (though I have no idea who would fit the bill here...what alleged professors do you hang out with?)

I think he means Noam Chomsky... >_______>

Comment Ian M Banks (Score 1) 392 392

Space opera author Iain M Banks' spaceships (from his various Culture novels) are propelled by "traction fields" which engage with the "energy grid" (sic) underlying the universe. Banks readily admits that this is purest gibberish with no basis in any known science. Perhaps in light of this research he can backtrack and claim to have been describing a form of quantum propulsion all along?

It is better to never have tried anything than to have tried something and failed. - motto of jerks, weenies and losers everywhere