Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Just a study (Score 3, Insightful) 112

More often than not foods both protect against and cause cancer. Heart disease is more complicated than that. Health is more complicated than that, and the article even mentions it at the end:

Because alcohol carries a risk of liver disease, there are safer ways to lower risk, he says, such as quitting smoking, exercising regularly and eating a healthy diet.

Comment Re:Is this San Francisco "offensive" or the real k (Score 3, Insightful) 231

Why are you objecting to ISIS videos in terms of Trump?

Because the language Google is using sounds like this includes WAY more than just ISIS videos. Words like "derogatory" take on a whole new meaning in Silicon Valley on on college campuses today than they do in red state America. So it's very important to establish EXACTLY whose definitions we're using here and exactly what videos are going to be blacklisted.

Comment Re:Is this San Francisco "offensive" or the real k (Score 5, Interesting) 231

You were going to say that no matter whether it was relevant of not (which it isn't)

It's absolutely relevant if it's true. Youtube is being very cagey about exactly what videos it means here. The meaning of words like "derogatory" vary SIGNIFICANTLY depending on who you're asking.

Comment Re:Nonsense question (Score 1) 409

Speculatively we can say hyperbolically that hypothetically the tree did in tautology fall but when we talk a step back and deconstruct the epistemology and if we address it from a concrete standpoint as opposed to hyperbolic (which proper deconstructionists of course always do) we can't say that the tree didn't not not fall.

Comment Re:The management unit in all intel processors (Score 1) 108

The story talks about UEFI/EFI attacks, which allows access below the OS. I see your point though.
Is there an API that allows you to talk to the ARC (or to reflash it)? How do people program it (surely not jtag; or rather, there must be some way in addition to jtag)?

Comment Re:One more time? (Score 1) 127

somebody will figure out how to pirate the film from their living room with much better quality and have a full resolution torrent up within 3 hours of the film's release.

Even if that happens, pirating weirdly hasn't seemed to cut into the movie studio's profits. So, they probably don't care about that (exception being of course when they're asking for tougher copyright laws).

Comment Re:So, it's not only the Russians that hack, huh! (Score 1) 108

Prior to this, I'd have thought America and especially its government agencies do not hack.

The US has a long history of hacking spying. One of the recent complaints against the NSA is they keep exploits for their own use, instead of finding them and fixing them (thus they potentially leave everyone exposed).

The Stuxnet attack was a difficult one to pull off because they had to go over an air-gap, and attack very expensive equipment (most of us don't have access to that equipment, and can't afford it).

Snowden reported quite a bit of hacking. It's also known that the NSA was monitoring Angela Merkel's phone, presumably through hacking it.

In a very cool hack, the US sent submarines to spy on Soviet underwater cables.

I've read reports that the US had a corporate espionage program in the 80s and 90s, but I can't find any reference to it right now somehow.

Slashdot Top Deals

"Show me a good loser, and I'll show you a loser." -- Vince Lombardi, football coach

Working...