Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Reality vs idealism (Score 1) 290

of course, you can try to rip the display signal short before the tft-panel. But this is much harder to rip than just saving a movie file. you will also need to re-encode it and have some quality loss. It will certainly make ripping much harder.

Comment Re:Reality vs idealism (Score 1, Insightful) 290

no, it can be another way. just think of a trusted media path (using trusted computing and a TPM). Then the TPM chip can negotiate a shared secret between your monitor and the site serving the video. then the whole software can be opensource, just as it can with SSL, and it will always see only the encrypted data. In this way, trusted computing is good for opensource, because there is no need for security by closed source (obscurity) anymore.
The only problem ... every company can use this to sell a minimum only, like pay-per-view business models instead of pay-per-download models. But the problem here is the business model, not the tech.

Comment Re:Step 1 - NEVER close an old email account (Score 1) 295

nope. of course you could say "hey, the guy blocking cookies is here again", but as soon as there a two of them, its hard to distinguish them. if you allow cookies, you get a different fingerprint than everyone else, if the site gives you an id. the more people block tracking, the bigger the anonmous mass gets.

Comment Re:It's the New You (Score 1) 295

But one link between them is easier to erase, and harder to find while its still there. So chances are good, nobody will find the link, if its only a single link.

On the other hand ... if you comment some blog and it demands an e-mail address, just make some up, its never verified. I think for comments and such stuff, accounts/email-addresses should always be optional, only for the case you want some reply from the author or notification about further comments.

Comment Re:The Question is, how is something produced (Score 1) 618

yeah, but the number of clusters is not a power of two, anymore. I think mostly, because when it were possible, the vendors wanted to sell 10 GB instead of 8 or something like this. And when your current tech allows 100 GB on one platter, you may end up using 5 of them (500GB) and not a much bigger drive with 8. So the powers of two find a end, where the previous is too little and the next one is still too high.

Comment The Question is, how is something produced (Score 1) 618

RAM: if they make a bigger module, they usually just double the number of chips on the module -> 2^x. Another reason here is, that you have a nice address, which ends with all zeros (or fills the complete addressfield), when your maximum address is a power of two.
Harddrives: they are produced independend from such considerations, you have like 100 GB, 500GB, 3 TB ... all of them do not fit in a nice 2^x scheme anyway. Thats the reason, they are produced in GB and not in GiB units.

Comment Re:Forget about them (Score 1) 187

nope, you fail hard.
  How do you detect a bad configured SPF? You are getting a mail, from a server listed as "cannot send mail". Now this can happen, when you have perfectly setup SPF and a spammer just spams from his own host ignoring that you're using SPF. Now the target system bounces the spam to your system, saying "hey, spammer-system cannot send mail for you".
You set up SPF, because you WANTED that the spammer-system cannot send mail for you. But you certainly did not want other systems to bounce the rejected mails to you.

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...