Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Back for a limited time - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×

Comment Re:3.5mm? (Score 2) 150

"After all, why can't they just redesign the audio socket so it's a couple of millimeters thinner?"

They probably can but then, what would you call an object 1.5mm width and ending on a point? That's a connector no more but a needle. And a needle has two problems: it's fragile and it can hurt. Not such a wise decision for a connector.

Comment Re:Bigger problems (Score 1) 82

"In other words, masking one's origin to make it appear you're part of a different network..."

Sorry no, but no. Masking oneself to look like coming from a different network is -who would imagine, "masquerading". VPN is tunneling so you don't see the multiple hops between your network and the one on the other side of the tunnel so, in fact, it more helps than hinders, the other side to know your real IP address.

Comment Re:Bigger problems (Score 2) 82

"The term VPN has been co-opted by providers that provide VPN and routing services. People pay for this service so that they can mask their true location -- for example, to use video services not available in their country."

Oh, I see now! People got fooled into buying a VPN service when they wanted and anonymizer service.

"Individual users are not using the VPN to connect to each other, but instead to connect to the VPN endpoint, from where their encapsulated packets are routed to the destination website"

And then, the protocol works as designed instead of how an ignoramus thought it worked. Surprise, surprise!

Comment Re:Is that a secret? (Score 1) 82

" This is more about the services offered to show a VPN providers IP vs an ISP rather than a traditional "two distant offices" secure networking."

So what? The expectation is exactly the same: what happens on a node working as ending point for a VPN with regards other networks that node has access to is up to the node, not the VPN.

So if a VPN ends in my computer I'll give for granted all other networks on my computer are visible to the other end unless I'm taking positive steps for that not being the case.

Comment Re: Important to note (Score 1) 416

"you see everything in HDR, hear everything from miles away and just see solutions after solutions to almost every problem."

You *think* you see everything in HDR, you *think* you hear everything from miles away, you *think* you see solutions to almost every problem.

One of my funniest experiences involving LSD is a friend of me taking a dose and telling me -about five hundred times, not an exageration, the real number, he couldn't feel any effect.

Comment Re:If you write SQL injections (Score 1) 64

"As the CIO, I would ask the source code to be extracted from SVN/GIT, and then everyone who touched the last version of ANY file that has dynamic (SQL injection vulnerable) SQL in it be immediately fired."

That's once thing (among alot others) explaining why you'll never be a CIO so, don't worry, you won't have the chance to fire anybody.

Comment Re:Is that a secret? (Score 1) 82

"The "anonymizing" part is that the VPN becomes your IP for that session. "

That's a side effect at most.

"Your entire OS, all apps, web use can only connect via the VPN, no leaking an ISP IP out"

Sorry, but seemingly you don't understand what you are talking about. Once stablished, your Virtual Private Network is a Network just like any other else: you can route it, bridge it, masquerade it... In fact, that's the very goal of a VPN: making two topologically disconnected networks look like connected through a topologically local network (single hop).

"The idea that anyone looking back from the VPN IP can see the users ISP is not the best news."

Well, it isn't even news: that's the exact feature that allows, for instance, to connect two distant offices' networks as if they were one hop away.

Comment Re:Bigger problems (Score 1) 82

"Masking one's origin is often the entire purpose of a VPN, at least from a consumer standpoint."

Uhhh... nope, why should that be the case?

The purpose of a Virtual Private Network is to, well, Virtually making a Private Network, as if it was Local (LAN is another interesting acronim here) over other non-local networks.

And then, the article states " The technique involves a port-forwarding tactic whereby a hacker using the same VPN as its victim can forward traffic through a certain port, which exposes the unsuspecting user's IP address."

The same VPN! Why talking about "unsuspecting users"? The very purpose of a VPN is that those using it can get in touch to begin with!

Comment Re:Duh (Score 1) 737

"For example, in the old days we didn't have desktop environments. We only had window managers. So instead of being able to start Gnome or KDE from the system and receive a login screen, you'd login to your user account from the text terminal, run a script like "startx" that would have your preferred window manager and settings in it, and that would start the X Window System"

Uh... your id is lower enough to be around here by that time, but you don't seem to have been using Unix/Linux back then. XDM was first presented in 1988 and it was certainly part of the X Window System, nothing related to desktop managers (KDE is from 1996 and Gnome from 1997).

"when you wanted a GUI login, you had to run that as a separate app to replace the startx script, which made those use cases really klunky and error-prone."

Funny you say that. I only started to have problems with display managers (i.e.: remote session selection) when systems started to move away from XMD in favour of gdm and kdm.

"And not only was their no common sort of print dialog"

Yes, there was.

"Copy/paste usually only worked for apps that used the basic terminal paste capabilities; apps that had more advanced cut/paste capabilities were generally incompatible with each other"

Just like now. Apps always had access to the X Window buffer; it was non-well-behavioured apps those that didn't work (usually with roots coming out from Unix).

You made a seemingly cogent argument, only one that is not so much tied to historical facts.

Comment Re: I'd be wary of Musk, too (Score 1) 103

"The demand is outstripping their supply. Right now, if they could product 250,000 MS, they would be able to sell it just in America and Europe ALONE."

Quite a faith step given that they managed to sell just 8800 cars in Europe on 2014, with numbers for 2015 that won't be much higher.

About 80% of all these cars were sold in only two countries: Norway and The Netherlands, the only two countries in Europe were these cars are heavily incentivized (they go with above 30% discount at purchase plus a lot of recurring fees avoided).

And you are saying their sales could go from 9000 to 250000? Certainly not impossible, but strongly doubtful.

You have a massage (from the Swedish prime minister).