Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Sooo .. (Score 1) 127

I've been using the bluetooth trusted device for several days now with a Microsoft Band device and it seems to work pretty well. I generally only need to use my pass code unlock once a day or so. As you said, the idea is that a thief (or border agent or police) can see it as unlocked and leave and it will lock right away when it gets out of BT range. Seems like a decent security usability trade off, but of course it isn't secure enough for everyone. Fortunately we have knobs and levers like this that allow people to customize the settings to ones that are secure enough for their needs, but usable enough as well. I thought about the "on body" detection, but I don't think it will work as well for me as the BT with the Band. It is nice to have the choices though!

Comment Re:Subject to the whims of the masses... (Score 4, Interesting) 225

Well, that just calls for a reputation service so that the flagging gets the appropriate weight. Perhaps that is where meta-modding comes in (to give it a slashdot spin). But at some point, a pattern emerges that can be seen, analyzed, and corrected for when someone mods every story they see about a certain topic as false. I'm betting a company with the kind of data a Facebook or Google has can probably come up with a reputation engine for weighting the flags too that will work - not perfectly - but probably "good enough".

Comment Re:Only 30 Grand? (Score 1) 426

Although range is definitely a big issue, lack of the ability to extend the range (via "charging stations" or "battery swap stations"; something analogous to the common "gas station") is even more the issue. I can get by normally on 200 miles (my commute is 72 miles round trip), but on the odd time I want to say drive to see my daughter at college - 240 miles away - it is a non-starter mostly because I cannot fill up on the route.

Comment Re:Great... (Score 1) 377

Yes, the hard part is getting adoption. Just look how far Google's WebP image format has gotten. Or not gotten. (I'm not talking about their WebM video format which has also not gotten a lot of traction). Looks like they unveiled it in 2010 or before, but nobody has used it as far as I can see.

Comment Re:Or, Apple could be fearful of comoditization (Score 1) 405

That has actually already happened for a lot of people. My daughter has a Nexus 7 tablet that she uses with a keyboard case to take notes in her college classes. Many people will come up and say, "oh, I like your iPad setup". Or "Which iPad is that?". Similarly on radio shows such as Leo Laporte's "The Tech Guy" (which is generally for "normals" - the not so technical folks who need help with tech), callers will often tell Leo that they want advice on picking out an "iPad" when they clearly mean they would like some sort of tablet device. It isn't to the point of Kleenex or Q-Tip, but there are quite a few people out there to whom any tablet device is an "iPad".

Comment Re:Punishes fans? (Score 3, Informative) 216

no one says 'lets not go to the game, it's on tv"

Bzzt! Wrong! Maybe not many folks do, but I sure do. When presented with an opportunity to go I always decline and say that I would rather see it on TV. (Sometimes this has even been with free tickets). At home, there is no a-hole standing up in front of me the whole game. At home, no jackass behind me spills their beer on me. At home, the noise level is very low. At home, I can see the play and can see it from multiple angles with amazing replays. At home, the beer doesn't cost $10. At home, the bathroom is clean and safe and doesn't consist of a long metal trough. At home, I am unlikely to get attacked by some crazy drunk asshole and my car is unlikely to get vandalized. At home, the parking doesn't cost $25. Yeah, I've BEEN to pro football games twice. Never again.

Comment Re:Let's face it ... (Score 2) 33

Well the first step in exploiting IE or other apps on a system in the wild is to bypass EMET. Remember, EMET is a mitigation technology designed to make it harder to exploit a vulnerability in IE, Flash, Acrobat Reader, etc. by adding extra protections. So if you are able to turn EMET off, you can then get back to your normal exploit.

Comment Re:what a stupid article (Score 4, Informative) 174

While your definitions are correct, a lot of drive by downloads happen when you visit otherwise trusted pages - because the ad network servers either got successfully breached or they didn't vet their advertisers well enough (again). For example - go to cnn.com today and view the source of the page. ads.indeed.com, doubleclick.com, etc. All of these ad networks have had serious issues with serving malicious advertisements from time to time. They will allow someone's ad that uses a malware kit attacking all the Java, Flash, Adobe Reader, etc. vulnerabilities that are out there. People shouldn't get drive by downloads just because they visited what should be a trustworthy site. So yes, drive by downloads can and do come from what are supposed to be ads. They are purchased via legitimate ad networks and run on many sites.

Comment Re:You are missing the point (Score 2) 370

It doesn't really matter if it is external or internal. Any time you remove it from a search index you have effectively taken the material down. If people can't find it, it doesn't exist for them. If you remove a book from the card catalog, it can exist in the stacks for years with nobody ever seeing it. Web pages are the same way. If it isn't on the first couple of pages of results on Google, Bing, Duck Duck Go, Yandex, Baidu or whatever - forget it; it no longer exists as far as the world is concerned: they will never see it. Sure you can always send out links to a few people and those people can see it. You can post links on MyTwitFace+ and a few people will see it. But for the vast majority, the index is their view into the internet. Remove it from the index and it ceases to exist for all practical purposes.

Comment Re:The real news (Score 2) 96

I actually got a text message the other day (purporting to be Yahoo - turns out it was them) saying that unusual activity had been seen on my account and they had disabled it until I went to the site on a PC. (I hardly ever use it - so this was a surprise - it is just a catch all for crap sites I may have to sign up for to keep them out of my "real" email). Anyway, I have two factor auth turned on (for Google, MS, and Yahoo) so I was surprised to see this. I guess they used the right password, but couldn't pass the two factor test. Just signing on to my account sent me to a special page saying there was unusual activity and having me input my password and a new password (once only; no "type it twice" thing). The new password had to meet some criteria and their regex or whatever they were using is broken beyond belief. It says it must be between 8 and 32 characters, have upper and lower case, and numbers. However, my old password met most of this already and was 8 chars (it was only missing the upper case character). Adding a "Y" to the end did not pass - because apparently that is not an upper case character. Neither is any other upper case character. It looks like they need all of the character types in the first 8 positions in order to accept it. Very poor coding and design on that page. I finally just had KeePass generate a random PW for me and used that.

I think this is a "score one for two factor" moment - but the poor implementation of the "fix" on Yahoo's part was a turn off.

Comment Re:tl;dr Phonebook? (Score 2, Interesting) 244

Spammers didn't typically scan the phone book and use automated bots to email all the people in it. So although phone books were "databases" they weren't easily accessible with some scripting.

The OP may believe that the Google+ "SPAMagedon" isn't coming - however - I have noticed that, over the last week, I have been added to the "circles" of well over one hundred "accounts". When I click on these, most of them are marketing accounts or sock puppets. Some of the names are clearly marketing: "Angry Birds Lösung 3 Stars Games.J500", "Anime TV and Title Loans Chicago", "Fred's Best Title Loans", etc. Others, when you go look at them, are pretty clearly similar. 10 people have them in circles but they have 5,000+ circled. The posts (if there are any) are just advertisements. Does anybody really think that this was random? I am pretty sure these folks are getting ready to spam using G+. Sure, they will eventually get shut down. But I'd advise people to go change the setting in GMail that allows these folks to send you mail without knowing your gmail account.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...