Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Re:Same answer every time. (Score 2) 178

by tattood (#49001567) Attached to: Ask Slashdot: With Whom Do You Entrust Your Long Term Data?

The person who asked the question doesn't understand how computing works.

... and the person that thinks there is only one answer probably doesn't understand how encryption works. You can put data in "the cloud" and still keep it private.

Exactly. I use Dropbox to sync data between PCs, and I use a TrueCrypt vault (maybe should be changed since TC went away) that I can open from any of the PCs.

Comment: Re:Hey Apple, here's some free consulting (Score 1) 155

by tattood (#48992993) Attached to: Apple Said To Be Working On a Pay TV Service

Ahem... House of Cards (US), Orange is the New Black, Marco Polo... won't find those in the "bargain bin".

Those are all Netflix original programs, so they do not need to pay anyone else for the right to broadcast them. If they were to try and get new episodes of cable TV shows, then they would have to pay the same way that Hulu and Comcast do.

Comment: Re:Only for the first year (Score 4, Informative) 570

by tattood (#48869269) Attached to: Microsoft Reveals Windows 10 Will Be a Free Upgrade

We announced that a free upgrade for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.*

*Hardware and software requirements apply. No additional charge. Feature availability may vary by device. Some editions excluded. More details at http://www.windows.com./

Comment: Re: How can you search data (Score 1) 90

A store offering a subscription arrangement needs to search for upcoming expiration dates so that it can 1. notify each subscriber that the card on file with the store is about to expire and 2. charge the ETF on the last valid day if the subscriber fails to update the card by the expiration date.

Why do the expiration dates need to be encrypted? A thief can't do anything with just the expiration date without also knowing the CC number

Comment: Re:Exploited sites? (Score 2) 119

by tattood (#46546453) Attached to: Some Sites That Blue Coat Blocks Under "Pornography"
This is true. Their website is https://sitereview.bluecoat.co....

Sometimes automated systems make mistakes, and when they do, they are corrected. Get over it and stop whining.

And by the way, all of the sites mentioned have been fixed.

The New Braunfels Republican Women (www.nbrw.com) > Political/Social Advocacy
Weston Community Children's Association (www.wccakids.org) > Charitable Organizations
Rotary Club of Midland, Ontario (www.clubrunner.ca) > Charitable Organizations

Comment: Re:how would it work in the real world? (Score 1) 308

by tattood (#45655007) Attached to: Google's Plan To Kill the Corporate Network

How do you run Windows programs?

The majority of the work that most employees do likely revolves around email or documents/spreadsheets/presentations, all of which have native OSX software.

For the few jobs that require software that only runs on Windows, there is always virtualization, or remote desktop into an MS terminal server.

Comment: Re:LOL wut? (Score 2, Insightful) 188

by tattood (#45231369) Attached to: Online Retailers Cruising Tor To Hunt For Fraudsters

"But it also raises the question of whether targeting anonymity services to hunt out fraudsters could have chilling effects for harmless Tor users trying to protect their privacy online"

Umm.. the user is ordering something using their name, credit card, and address. They are not going to use Tor to protect their anonymity.

That statement was not about normal people using TOR for online purchases. It was about people using TOR to hide their identity when doing things like posting to a controversial website, or whistleblowing. If this software catches on, and websites start using it to block TOR users, then it would make TOR less useful for posting anonymously.

Comment: Re:Sigh (Score 1) 324

by tattood (#44181791) Attached to: USPS Logs All Snail Mail For Law Enforcement

But I didn't give them permission to log anything for such purposes.

I fully expect my government to not violate people's privacy and conduct surveillance on them to stop the evil bogeymen.

Then don't use the USPS. There are plenty of other mail transport services out there, that may or may not do this same tracking, and may or may not provide said tracking to the government upon request.

Comment: Re:How about no (Score 4, Informative) 203

by tattood (#44035035) Attached to: Comcast To Expand Public WiFi Using Home Internet Connections

Security. Properly configured, a router with public-access Wi-Fi should not represent a security risk for those on the router's private and secure network. The technical reasons for this are a bit complicated; read an Open Wireless Movement explanation at openwireless.org.

Service degradation. Those using the slower public portion of a home router typically won't degrade performance on the faster private side. Future routers would speed up public access when the private side isn't being used and give the private network priority if required.

Legal liability. Those who fear being blamed for misuse of their public Wi-Fi signals are said to be protected under a "safe harbor" doctrine akin to that protecting Internet service providers. In other words, they're likely not liable for the mischief of porn purveyors or music pirates.

Freeloading. Fear of freeloaders is misplaced, the Open Wireless Movement believes. "Sharing capacity helps everyone," it says. "If you've ever been without Internet access and needed to check an email, you will remember how useful open networks can be in a pinch."

Comment: Re:Insurance Policy? (Score 4, Interesting) 293

by tattood (#43964437) Attached to: Hacker Releases 1.7TB Treasure Trove of Gaming Info
Sure, the game companies may not want this released, but does the FBI care? If they investigate, and find and arrest the hacker, it's up to the D.A. whether or not to prosecute, not the game companies. This seems like a worthless insurance policy/blackmail, because the people going after him are unaffected by the action of him releasing the encryption key.

Comment: Re:New strategy in criminal law? (Score 1) 192

by tattood (#43844627) Attached to: Jeremy Hammond of LulzSec Pleads Guilty To Stratfor Attack

Why should we encourage crime sprees? If I know I will only get charged with one instance of a crime, I'm going to rob a dozen 7-11s instead of one. You should not be rewarded for committing more crimes.

I don't think that is what is happening. You can certainly get charged with multiple charges of the same crime. It would be like if you robbed a dozen 7/11 stores in a dozen states, but they could only prove that you robbed one. You can either go to trial in 12 states, or take the plea bargain for just one robbery, and save yourself the 11 other trials.

Programmers used to batch environments may find it hard to live without giant listings; we would find it hard to use them. -- D.M. Ritchie