Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re: My first program was a text adventure (Score 1) 98

Do you remember what your first text adventure was called and what it was about? I wrote one in high-school in GW-BASIC called "Attack of the Bagels From Outer Space" that featured a comedic alien invasion inspired by the books by Douglas Adams and Daniel M. Pinkwater.

Comment Re: That was typical (Score 1) 98

This too was my early programming experience. Typing code from books or magazines, then debugging it when it doesn't work. Then when I got it working, modifying it and getting it to do new things. Skills, I might add, I still use today especially when downloading and modifying open source code.

Comment Re:Torrents != pirating (Score 3, Informative) 117

If you read the article, the New Statesmen themselves refer to it as "pirated" (in quotes). While one could pay money for the Magazine, those who can read Mandarin can get it for free using pirating methods where the print version will most likely not see the light of day due to state censorship. They are using this technique as its well known "the internet routes around censorship"
GUI

Submission + - more OpenGL IDE magic in squeak smalltalk (youtube.com)

An anonymous reader writes: The integration of a mature integrated development environment with 3D graphics has all sorts of implications.

Comment Re:BOf in Java? (Score 2) 134

If you took time to read TFA you may have come across this little tidbit.

"One of the oldest techniques in the attacker's virtual arsenal, buffer overflows remain a problem. In December, Microsoft identified 2.6 million possible attacks that could be waged using a stack-based buffer overflow in the JRE (Java Runtime Engine)".

Comment Re:How long? It was several years ago. (Score 1) 406

Well a gentleman's agreement between corporations are lubricated with money. Between a government and a company? I assure you Uncle Sam would appeal to patriotism and expect one to lay back and take it while thinking of their country with nothing more to ease the experience. Probably even given threats as to what would happen if one did not cooperate.

Comment How long will it be? (Score 3, Insightful) 406

Now albeit through anonymous sources that government powers are developing malware, how will it be either through legislation, treaty or "gentleman's agreement" that anti-virus software manufacturers will have to look the other way for certain payloads? Is this already happening? Certainly the Third Amendment tells us we don't have to use our homes to quarter soldiers, but will the government use its citizenry's hard drives and bandwidth to host a weapon?

Comment Is it just me or? (Score 1) 280

Does the line: "car security systems will begin have a real impact to every day use if a thief can simply walk up to your car and drive it away." seem to imply car thievery is a new thing? Thieves have been stealing cars since you had to hand crank the engine. Sure the techniques in 1911 were different from the techniques in 2011 but this is a a bit hysterical isn't it? Criminals are always getting better than security which leads to better security which leads to more cunning thieves, like any living system, it will continue to evolve.

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...