Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: Re:Can you say... (Score 1) 266

by whoever57 (#48648951) Attached to: Judge Rules Drug Maker Cannot Halt Sales of Alzheimer's Medicine

The customer, his doctors and insurance companies would be free to look at the FDA data and decide for themselves what to medicate with.

All this does is move liability for bad drugs to entities less able to defend against bogus claims. No doctor would prescribe anything with a scintilla of risk.

Comment: Re:here's a real-life case to explain criminal int (Score 1) 198

by whoever57 (#48648925) Attached to: Judge: It's OK For Cops To Create Fake Instagram Accounts

Not all 4 legged animals are dogs and I don't think that your reversal of the scenario proves the point.

Can a court really throw out a document, signed by a genuine cop authorizing the person to commit a crime? The cop knowingly signed the document. Isn't this more important than the beliefs of the thief? The thief could explain his belief as "I thought that I was authorized if any one of us was a cop". So, his belief is premised on a factual basis that happened to be unlikely, but true.

Niether your opinion, nor mine matters -- all that matters is what a competant court decides. I wonder if there are any cases where this has actually happened?

Comment: Re:interesting idea. Legally, cops can't generally (Score 1) 198

by whoever57 (#48648115) Attached to: Judge: It's OK For Cops To Create Fake Instagram Accounts

Having a habit of asking all of your criminal buddies to sign such a statement, and signing it yourself claiming that you are a cop, would tend to show that you know it's a sham.

But it's not a sham for the hypothetical real cop. The fact that all the documents signed by non-cops were sham documents isn't important.

Note: don't get your legal advice from /. -- it's likely to be wrong.

Comment: Re:Good luck with that... (Score 1) 153

by MightyMartian (#48647159) Attached to: US Seeks China's Help Against North Korean Cyberattacks

I don't think NK is a satellite state in the usual sense of the word. China certainly shields NK, but its reasoning isn't always clear. NK does act as a major counterbalance to US interests (Japan, South Kore and Taiwan). At the same time, NK seems extremely suspicious of China and some believe that at least part of the reason for the latest purge was to cut out members of the regime with too close a ties to China.

Comment: Re:Sony security: strong or weak? (Score 2) 334

Apparently this critter is so new that by the time we checked, only a few AV companies had caught on to it.

What this shows yet again is that anti-virus scanners are a flawed methodology. There will always be a delay between a virus being released and the signature updates getting to the clients. It's inherent in the concept.

Unfortunately, some early technology journalists were partially responsible for this because, in reviews, they ranked anti-virus products that identified threats by signature higher than ones that identified threats through behaviour -- and this was because signature analysis also provided a name to the threat. In other words, the flawed idea that if you tell the user a name for the threat, you provide better protection than if you just block it. This reinforced the concept of signature analysis and slowed down research of identification of threats based on generic behavioural patterns.

Comment: Re:Which is why (Score 1) 334

I'm assuming that Sony, being a very large multinational company, has a very large Intranet, which means at various points its going to be traversing the open Internet at various points.

Unless you're advocating Sony lay down its own fiber and then turn off its gateway routers....

It appears that PL/I (and its dialects) is, or will be, the most widely used higher level language for systems programming. -- J. Sammet