Forgot your password?
typodupeerror

Comment: Or, free Mathematica with $35 purchase of a Pi* (Score 2) 99

by strredwolf (#45486467) Attached to: Putting the Wolfram Language (and Mathematica) On Every Raspberry Pi

An offer of over $300 in value! Get yours now!

* Based on purchase of a Model B from direct authorized sellers. Does not include shipping or purchase at authorized resellers. Must be run from a Raspbery Pi computer board. Storage, display, keyboard, mouse, and power supply not included. Model A does not include Ethernet.

+ - Hyperloop's Math just doesn't add up->

Submitted by strredwolf
strredwolf (532) writes "Elon Musk's Hyperloop looks like a winner on the face of things... but if you get down to the details, you'll find that the math just doesn't add up in comparison to California's High Speed Rail. Hyperloop's only 10% capacity of HSR and can't run every 30 seconds safely... and the construction and location details leave much to be desired."
Link to Original Source

Comment: Multimedia's still damaged. (Score 1) 226

by strredwolf (#43487799) Attached to: Debian 7.0 ('Wheezy') Release Planned For 1st Weekend in May

LibAV's a badly forked version that's several revisions behind FFmpeg. Plus, this is Debian -- non-free codecs like H.264 are stripped out and are probably really supported by a seperate non-free repository.

I'd rather strip LibAV out and compile my own version of FFmpeg for faster encodes.

Comment: Levels of escalation (Score 1) 247

1. Open up the compromizing email's headers. Locate the first ISP beyond yours -- 99% of the time it's not there's. Contact THAT company.
2. File a complaint with the FCC. They are getting more active against exploits.
3. Locate your Attorney General's office and ask if there are any state laws against spam. There is one in Maryland that is compatible with CAN SPAM, and has been tested in the courts. If you got one, lawyer up and sue the company -- some companies only respond by judicial inquiry.
4. Blacklist the company publicly.

Comment: There is a reason you are listed. (Score 5, Insightful) 279

by strredwolf (#42386685) Attached to: Ask Slashdot: Dealing With Anti-Spam Service Extortion?

There is a reason you are listed:

* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.

So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.

Thus:

* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.

If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.

Comment: Option/feature removal has been going on since v2 (Score 1) 797

by strredwolf (#35396598) Attached to: GNOME To Lose Minimize, Maximize Buttons

First, half the features in Gnome 1.x go in Gnome 2. Then the steady removal of options and features. Now they're *)!@#( with the window features that are standard on all windowing systems in the major OS's?!?

I'm glad I already moved onto KDE. I couldn't hack Gnome Option/feature Removal Syndrome (GOFRS).

Security

Linux Kernel Exploit Busily Rooting 64-Bit Machines 488

Posted by timothy
from the get-your-patch-on dept.
An anonymous reader writes "Running 64-bit Linux? Haven't updated yet? You're probably being rooted as I type this. CVE-2010-3081, this week's second high-profile local root exploit in the Linux kernel, is compromising machines left and right. Almost all 64-bit machines are affected, and 'Ac1db1tch3z' (classy) published code to let any local user get a root shell. Ac1db1tch3z's exploit is more malicious than usual because it leaves a backdoor behind for itself to exploit later even if the hole is patched. Luckily, there's a tool you can run to see if you've already been exploited, courtesy of security company Ksplice, which beat most of the Linux vendors with a 'rebootless' version of the patch."
Graphics

Wolfenstein Gets Ray Traced 184

Posted by Soulskill
from the ach-mein-framen dept.
An anonymous reader writes "After showcasing Quake Wars: Ray Traced a few years ago, Intel is now showing their latest graphics research project using Wolfenstein game content. The new and cool special effects are actually displayed on a laptop using a cloud-based gaming approach with servers that have an Intel Knights Ferry card (many-core) inside. Their blog post has a video and screenshots."

"The most important thing in a man is not what he knows, but what he is." -- Narciso Yepes

Working...