Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:But... but? (Score 1) 172

I don't have any problem with the account verification though - it's just a variant of the 2-factor authentication so don't complain too much, it may prevent you from getting your account hijacked.

They do have a Google Authenticator app for your phone. When you log in from a new device it makes you enter a one-time PIN before you get logged in.

Comment Re:Grand opening! (Score 3, Interesting) 97

When you submit a CSR (Cert Signing Request), you generate the private key and keep it private; all you submit to the CA is the public key, which they sign. They never see the private key.

If this were really run by the NSA, they could quite easily create their own signed certificate and install it on a SSL decryption proxy, and then they can SSL man-in-the-middle your website to see what your website is doing. Since the "fake" signed certificate is signed by the same CA that the real one is, nobody would know the difference unless you look at the cert's serial number and fingerprint.

Comment Re: People are claiming a victory where there is n (Score 1) 176

Depends on the State. If police show up sans warrant and try to force entry to your home without probable cause, you can defend the home with deadly force if necessary.

[citation needed]

You really think that you can use deadly force against the sworn police department and not have any ill-effects? I'm betting that the police are better trained in firearm usage than you are and you will likely end up dead if you start a shootout.

Comment Re:Same answer every time. (Score 2) 178

The person who asked the question doesn't understand how computing works.

... and the person that thinks there is only one answer probably doesn't understand how encryption works. You can put data in "the cloud" and still keep it private.

Exactly. I use Dropbox to sync data between PCs, and I use a TrueCrypt vault (maybe should be changed since TC went away) that I can open from any of the PCs.

Comment Re:Hey Apple, here's some free consulting (Score 1) 155

Ahem... House of Cards (US), Orange is the New Black, Marco Polo... won't find those in the "bargain bin".

Those are all Netflix original programs, so they do not need to pay anyone else for the right to broadcast them. If they were to try and get new episodes of cable TV shows, then they would have to pay the same way that Hulu and Comcast do.

Comment Re:Only for the first year (Score 4, Informative) 570


We announced that a free upgrade for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.*

*Hardware and software requirements apply. No additional charge. Feature availability may vary by device. Some editions excluded. More details at

Comment Re: How can you search data (Score 1) 90

A store offering a subscription arrangement needs to search for upcoming expiration dates so that it can 1. notify each subscriber that the card on file with the store is about to expire and 2. charge the ETF on the last valid day if the subscriber fails to update the card by the expiration date.

Why do the expiration dates need to be encrypted? A thief can't do anything with just the expiration date without also knowing the CC number

Comment Re:Exploited sites? (Score 2) 119

This is true. Their website is

Sometimes automated systems make mistakes, and when they do, they are corrected. Get over it and stop whining.

And by the way, all of the sites mentioned have been fixed.

The New Braunfels Republican Women ( > Political/Social Advocacy
Weston Community Children's Association ( > Charitable Organizations
Rotary Club of Midland, Ontario ( > Charitable Organizations

Comment Re:how would it work in the real world? (Score 1) 308

How do you run Windows programs?

The majority of the work that most employees do likely revolves around email or documents/spreadsheets/presentations, all of which have native OSX software.

For the few jobs that require software that only runs on Windows, there is always virtualization, or remote desktop into an MS terminal server.

Comment Re:LOL wut? (Score 2, Insightful) 188

"But it also raises the question of whether targeting anonymity services to hunt out fraudsters could have chilling effects for harmless Tor users trying to protect their privacy online"

Umm.. the user is ordering something using their name, credit card, and address. They are not going to use Tor to protect their anonymity.

That statement was not about normal people using TOR for online purchases. It was about people using TOR to hide their identity when doing things like posting to a controversial website, or whistleblowing. If this software catches on, and websites start using it to block TOR users, then it would make TOR less useful for posting anonymously.

Comment Re:Sigh (Score 1) 324

But I didn't give them permission to log anything for such purposes.

I fully expect my government to not violate people's privacy and conduct surveillance on them to stop the evil bogeymen.

Then don't use the USPS. There are plenty of other mail transport services out there, that may or may not do this same tracking, and may or may not provide said tracking to the government upon request.

Comment Re:How about no (Score 4, Informative) 203


Security. Properly configured, a router with public-access Wi-Fi should not represent a security risk for those on the router's private and secure network. The technical reasons for this are a bit complicated; read an Open Wireless Movement explanation at

Service degradation. Those using the slower public portion of a home router typically won't degrade performance on the faster private side. Future routers would speed up public access when the private side isn't being used and give the private network priority if required.

Legal liability. Those who fear being blamed for misuse of their public Wi-Fi signals are said to be protected under a "safe harbor" doctrine akin to that protecting Internet service providers. In other words, they're likely not liable for the mischief of porn purveyors or music pirates.

Freeloading. Fear of freeloaders is misplaced, the Open Wireless Movement believes. "Sharing capacity helps everyone," it says. "If you've ever been without Internet access and needed to check an email, you will remember how useful open networks can be in a pinch."

The secret of success is sincerity. Once you can fake that, you've got it made. -- Jean Giraudoux