Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:I don't understand how this is 'orchestrating' (Score 3, Interesting) 160

The orchestrating part is where the evidence of the crime (required for the extradition) hasn't been sent to the Canadians yet. They've had 10 months to provide evidence of the crime, but have not been able to produce it. So, the civil case, which was getting close to going to a Jury trial, got settled because the guy got arrested. This is one heck of a coincidence.

Comment Re:The *real* shame in all of this (Score 2) 1122

The Chernobyl reactors are not using the same basic designs as the Fukushima reactors. The biggest difference between the two is the GE Mark I reactors at Fukushima are Boiling Water Recators and use water as a moderator, Chernobyl reactors are RBMK designs and use graphite as a moderator.

Comment Too much thermal compound (Score 1) 501

When iFixit did a tear down of the 2011 MacBook Pro, they found way too much thermal compound applied. I would be willing to bet that this is the primary cause of the crashes. See step 10 from their teardown guide:

Comment Re:It's easy to comply with the GPL (Score 1) 566

The GPL goes beyond just the source code. There are clauses that prevent further restrictions on the licensed use of a program, there are licence grants that allow you to redistribute the binary form of the program (what was downloaded from the app store). You will not be able to do these things, the app store terms of use are going to have further restrictions on acceptable use of a program downloaded from the app store. GPL will be incompatible with the terms of the app store.

Comment Re:someone, please explain this to me (Score 1) 566

It isn't the source code redistribution or availability that is the problem with GPL on an app store.

From GPLv2:
You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form...

The app stores do not allow you to copy and distribute the Program in executable form, since they are wrapped up in DRM layers and I would bet there are also license verbiage that says you are not allowed to copy the apps downloaded from the app store. It is very easy to provide the distribution of source code for an app on the app store, you just point to a file on the internet, a phone number to call or an address to write to asking for the source.

Comment Re:Attack Summary (Score 1) 220

No, collision vulnerabilities are for validating the contents of a file haven't changed using an MD5 hash. The reason you don't use MD5 hashing to store a 1-way hash of a password is that it is an extremely fast algorithm to compute - meaning it takes a lot less time to compute a rainbow table or brute force hashes in order to figure out the password.

In space, no one can hear you fart.