Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:IPv6 (Score 1) 260

Wrong 'n' epic fail.

'phone numbers == IP addresses. In telephony your number is your identification. On t'internet your IP address is simply that - a number. Your A record is your identification and that does not really care about your IP address.

IPv6 will happen. Just not overnight.

Why did you bother linking that article?

Cheers
Jon

Comment Re:No bubble here. (Score 5, Insightful) 434

The users of FB are the _product_ and not customers. The customers are the advertisers.

Now I think it is unlikely that the number of users is going to increase significantly. Certainly not by say 100%.

So is the amount of advertising revenue going to increase by 100% - I doubt it.

I suggest you apply the term toxic to this beast - you will lose, its well over valued.

Comment Re:Space elevator coming next? (Score 1) 159

Given the length of this thing and its sheer mass, I don't think that the relatively short depth of the sea is likely to make much difference.

Granted that the water will get in the way somewhat. However the construction team that puts up (drops down?) a space elevator link are probably not going to find that a problem.

I suggest that the whole equator is fair game.

Cheers
Jon

Comment Re:Insightful (Score 3, Interesting) 67

Yes, I've seen some classics too.

For a while I actually deliberately allowed stuff from the "Lads from Nigeria" through and put in its own inbox for everyone at the firm to laugh over. I created a second specially trained SA Bayesian classifier in front of the main filter to siphon this stuff off.

It was trained on a hand crafted corpus gleaned from a mailbox of stuff behind a sacrificial Exim daemon on its own connection that strangely runs really slow but not too slow to put off the spammers.

SA can be made to work in very strange ways. Perhaps I ought to get out more ...

Cheers
Jon

Comment Re:But Microsoft doesn't detect spam?! (Score 2) 67

Have you ever tried it (I can't speak for 2010)? The Intelligent Message Filter is dreadful.

You pretty much only get two knobs to turn: 0-10 for either block or quarantine. On the switches front you get to use someone else's service ie DNSBLs or you can (naively) fill in blocked address lists.

That's why have been doing a roaring trade (10 odd years) in tiny Gentoo (VMs nowadays) machines with Exim 'n' Spam Assassin + Clam AV doing the stuff that Exchange just can't.

So yes his Uni probably did cock up the config of Exch but if they turn the knobs up too far he wont see any mail out side of his Junk folder. Catch 22 matey

Cheers
Jon

Comment Re:And in Rugby too (Score 1) 277

Well I played rugby (prop - loose and tight head) for 15 years and I've never thought I was missing something when I watch coverage on TV. I can see exactly what is happening. Also there is plenty of analysis with overhead and "reverse angles" etc.

Nowadays, I can compile my own distro ...

Cheers
Jon

Microsoft

Submission + - Supreme Court rules against Microsoft in i4i case (cnet.com)

Nunavut writes: The U.S. Supreme Court unanimously upheld a lower court ruling today that Microsoft infringed on the patents of a tiny Canadian company, i4i, and required the software giant to pay $290 million. The ruling could have broad implications for the way patent law is applied to technology.
Microsoft

Submission + - Microsoft accomplice of Ben Ali (rue89.com)

jean-guy69 writes: According to an article published by french website Rue 89 and writtend by ReadWriteWeb France's Fabrice Epelboin (coral cache translated version ):

By including the tunisian governemental agency "National Digital Certification Agency" Root CA in 2007 (announcement by NDCA), and by not restricting it to .tn domain, Microsoft effectively allowed tunisian cyberpolice to perform SSL man-in-the-middle attacks against protesters.

The tunisian state succeeded in depriving many cyber-resistant of their Facebook account, essential to the organization of field activities, in gaining acess to their correspondence, with the ability to thwart the actions in progress.

When any government can be given the possibility to create certificates for any domain, isn't HTTPS
security fundamentally broken ?

At least, when such events as in Tunisia happen, should we expect Microsoft to remove the issued Root CA ?

Is this reasonable to leave such a power and such a responsibility to a single private company ? Or should this be at least supervised by some international body ?

Comment Re:Definition of awesome (Score 1) 198

You have succinctly summed up a large part of /. in a beautifully constructed comment.

It gets my vote for comment of $QUITE_A_LONG_TIME

Shame you can't stamp a comment: _classic_ - >10,000 votes gets it into a hall of fame or similar.

Cheers
Jon

PS It was let down only marginally by the line noise at the end.

Slashdot Top Deals

egrep patterns are full regular expressions; it uses a fast deterministic algorithm that sometimes needs exponential space. -- unix manuals

Working...