Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Where are they making their money? (Score 1) 446

I'm sure that that's what Facebook is doing, but this move doesn't really help with that. If they want to sell your information, wouldn't it make more sense to offer a service that allows you to see any profile regardless of privacy settings (especially if you don't make knowledge of this service widely available to the general public)? Allowing anyone to see more information about everyone else doesn't exactly advance this goal.

Comment Intent (Score 1) 235

Most everyone keeps bringing up legalities like theft, copyright, trademark, plagiarism, etc.but not really evaluating the ethical issues for why these laws exist. I think what is important to look at here is intent. Is the intent to make an homage to a pre-existing work or to simply steal all the hard work and pass it off as your own? Is the intent to improve on the work already done or to simply copy it? D&D ripped off a lot of Tolkein, but it created a new universe and placed it in a new environment (the RPG). Paladium Fantasy rips off a lot of D&D, but puts it in Paladium's own universe with their own RPG system. Warcraft rips off D&D as well, but again, new universe, new environment (video games). I don't consider these "clones." The intent of these games were to take pre-existing content and improve upon it and creatively make it their own.

It's an entirely different story when we're looking back at the old days of Atari / NES. How many Gradius clones were there, for instance? Did these games really improve upon the content of Gradius, or simply take the same gameplay the same concepts and simply change how a few things functioned to make a "different" game? Castlevania clones, SMB clones, Defender clones, they all abounded in the land of 8-bit, because it was easy to do it. We don't see as many clones these days unless we're looking at the mod community, and the majority of those modders are attempting to make an homage to their favorite games within another of their favorite games, with no intent of ever making money off it.

I think modding should be encouraged, as it leads to new and better games. I think using inspired content to branch out into new universes and new genres should also be encouraged. It is the actual lazy turn-a-buck copypasta clone games which should be despised --

-- but without them, we wouldn't have many games on our cell phones...

Comment Re:WoW (Score 1) 125

If the game allowed you to try out different builds without starting over,...

Guild Wars does this. All max weapons of the same type (swords, axes, hammers, bows,etc...) have the same damage level, as all max armor for every class all have the same armor rating. You can change your skills for free as long as you're in an outpost, you can change your secondary class at will (for PvP characters. For PvE characters, you have to pass a certain point in the story line first). You can get to max potential (max level, all attribute points) in 4 hours depending on which campaign you start in (Prophesies is the slowest but has no exclusive classes), or start there on a pvp-only character.

Comment Re:How is SQL involved? (Score 2, Informative) 186

On the server end there is a SQL injection exploit being used to get the malicious code out there.

My point being that you don't need to do a SQL injection to do this.

To prevent a SQL injection, you need to change ' to '' on input from the user that you pass to sql.

To prevent a HTML+script injection, you need to change < to &lt;, > to &gt; & to &amp; etc. on input from the user that render to the browser. The sites in question are not doing this, hence, just stick the code you wish to inject into at comment or some other user field. This has nothing to do with SQL.

Open Source

Linux Kernel 2.6.32 Released 195

diegocg writes "Linus Torvalds has officially released the version 2.6.32 of the Linux kernel. New features include virtualization memory de-duplication, a rewrite of the writeback code faster and more scalable, many important Btrfs improvements and speedups, ATI R600/R700 3D and KMS support and other graphic improvements, a CFQ low latency mode, tracing improvements including a 'perf timechart' tool that tries to be a better bootchart, soft limits in the memory controller, support for the S+Core architecture, support for Intel Moorestown and its new firmware interface, run-time power management support, and many other improvements and new drivers. See the full changelog for more details."

Comment Re:BIOS password (Score 1) 376

I think you've misunderstood. If the computer is shut down, the full-disk encryption will do its job as intended, even if -- as some other replies have suggested -- the HDD is removed and put into another computer. The attack discussed in the article assumes that you've left your computer on (so the HDD is "unlocked") and the attacker has physical access to it. At that point, they can install the hacked bootloader and *then* steal your computer or hard drive. At least I'm assuming they'd steal something at that point, because if they just wanted your data, well... the computer was already on and they already had access to it.

Comment Mostly because... (Score 1) 1

...well, besides the obvious huge sums involved in building expensive stuff and destroying it as fast as possible, there is no clear cut way to really differentiate between offense arms and defensive arms. All the smaller nations would demand they have a right to self defense, which they do, but many/most are not in a position to produce such arms totally internally.

And that's how the argument would go down at the UN.

Now I think that a long range treaty and argument could be made for a gradual total elimination of everything beyond single man portable arms. That would really help to reduce arms to defensive purposes only, but they would have to give up banning land mines then, because that would remain the primary defense of smaller nations getting invaded by numerically larger nations.

Another step would be the UN to reverse the official position that they have that only "the state" should have a 100% monopoly on arms (which they do have right now and is one of *the* reasons so many people in the US are against the US even being a member)). If every man jack out there had mil grade man portable weapons at home (the swiss militia and what was supposed to be the US militia model), for his own defense and for his duty to protect his nation from invasion (barring convicted predators of course), this would also help.

It's the large weapons systems that are the problem, especially "air superiority" and ground attack aircraft along with carriers. They are WAY more used to project force over weaker populations then they are to be used for national self defense purposes, just given our past historical record, especially since ww2 was over. A start with banning tech transfer there might help, but you'd be hard pressed to get any nations who export aircraft to go along with it, just way too much business profit in those sales.

The only thing an individual can do to stop all this warfare nonsense is *not participate* when it comes to the maintenance of the practice of the large offensive weapons systems. Do not go "into service" at all. Do not work or do work for those big arms manufacturers, or even their proxies in the research establishment, such as universities. That would include no involvement with such things as DARPA, even tangentially. Do not hold stock in the companies that profit from it. Avoid banks that "invest" in that business. Along those lines.

And that's hard to do, and why most people won't do it. It takes work and sacrifice to figure that all out and develop workarounds for it. Heck, most people who have stock portfolios hold mutual funds and aren't even doing the minimal due diligence ethically, IMO, required of them, because they don't even know *what* companies they are "invested" in.

Slashdot Top Deals

Why did the Roman Empire collapse? What is the Latin for office automation?

Working...