Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:I like PF, try PFSense (Score 1) 414

I use pfSense seriously and it's great; however, all it does in regard's to OPs concerns is make the manual configuration easier/prettier. Although you'd be able to use SSH & shell scripts to change config files, that might make a lot of sysadmins (like me) nervous.

Comment Re:The Last Mile (Score 1) 335

It can sometimes be the backbones but it's more often that the Last Mile is the source of bandwidth/latency issues. You can thank our telecoms for not doing The Right Thing(TM) with all of the government subsidization that many telecoms in other countries used to fix the obviously expensive problems.

In the cases where we do pay through the nose for reasonably fast connections, the problem becomes centered around load on servers. You can't stream HD content to 100,000 users from one machine, so there's a point when you need to build out your services to meet the capacity of the network.

Comment Re:Not to be a dick, but . . . (Score 4, Insightful) 208

It's not a matter of what is on the website as much as it is this: many of us see a bleak future when law dictates what sites we can and cannot visit on the internet.

This ruling means that rather than only taking down websites that cause direct harm to a person or a group of people, access to sites can be removed even if they fall within copyright gray areas, where laws and ideas are different all over the world, or where they possibly threaten financial harm (no matter how [un]justified) to large organizations.

It's like taking a magazine off the stands in just one country because it says anti-patriotic things about its leader. or, if you want to go into the realm of content legality, a magazine that tells you how to exploit DNS vulnerabilites (3 cheers for the 2600 periodical).

Comment Typical Microsoft academic pub- why? (Score 1) 102

I'm an academic and I actually have to sift through bullshit like this to get to the real research, and it's quite frustrating.

As usual, they choose to address things readers will find interesting and leave out important details. Here's a few pseudo-equations for you:

PowerRequired(802.11) < Power(3G).
PowerRequired(3G x N phones) >> PowerRequired(One 802.11 AP).
SpeedAndReliability(One 802.11 AP) > SpeedAndReliability(3G x N phones (N < 20 probably)).


And most importantly:
Cost(N tethered phones) >>>>> Any reasonable price.

Here's a tip to Microsoft Research: try doing some research first.

* IAAANR. (I am an annoyed network researcher.)

Comment The best part? A Direct line to RIAA. (Score 1) 358

Ok, I did RTFA, and also some public court documents.

Well, Mr. Steven Marks, representing the "Executive Vice President & General Counsel" of the RIAA has decided to share his email with us, so please everyone, please feel free to send him your thoughts, feeling, etc on the subject of music copyrights, which may include but mot be limited to pictures of feces if you deem it to be appropriate.

SMarks@riaa.com

Comment DTN != Protocol (Score 5, Informative) 69

Several readers sent in an update on DTN, the interplanetary Internet protocol ...

Please stop screwing up the meaning of DTN. Not just /., but everyone writing article about Vint Cerf and "his" interplanetary internet. The acronym stands for Delay Tolerant Network, and is a type of network in which connectivity is ephemeral and a contemporaneous path between two points often doesn't exist at any point in time, necessitating any communication to be tolerant to delay (and/or disruption).

A DTN protocol is one that takes advantage of the ephemeral connectivity of DTNs, usually along the lines of employing the store, carry, and forward approach to getting data from A to B via a time-varying path; e.g. a path exists, just not at any point in time.

What Cerf has done has create a bundle forwarding protocol stack for the Android. It's not as "out there" as you'd think- someone send you data, you carry it, then forward it later. Lots of questions/issues in between as you might imagine.

I think some people like Kevin Fall need to get more credit for their contribution to this area of research.

Disclaimer: I am NOT Kevin Fall but I am a network researcher, specifically in the area of DTNs. No, not the algorithm.

Comment Re:Flowing, but still risky (Score 1) 174

The only thing the Iran regime would need to do [...] would be to setup a lot of TOR nodes and analyze the traffic going through them

This is exactly what TOR was designed to protect against. Even a large scale compromise fails to do two things:

1. Compromise user identity (e.g. originating IP address), and
2. Analyze packets non-discretely (e.g. as streams).

So the most they'd be able to determine is how much traffic is coming from what appear to be other relays, and also that it is encrypted. They probably wouldn't even be able to decrypt a single block of data - it's like solving puzzles within puzzles, where the shapes of the pieces are constantly changing.

Slashdot Top Deals

People will buy anything that's one to a customer.

Working...