Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Ham Radio? (Score 2) 177

Note that if you want to legally build RF electronics for experimentation that's a very good reason to have a ham license even if talking to people isn't your thing. For example if you want to experiment with 2.4GHz WiFi at power levels much higher than what's allowed for general public use...

Comment Re:NOT A BATTERY (Score 1) 230

Note, I completely agree about the first part of what you said. When describing any kind of portable energy storage to the general public it probably makes the most sense to refer to it as a battery. I disagree about the second part though, I would still argue that if there are multiple small capacitors it's correct to call it a "battery of capacitors" or perhaps a "capacitor based battery" in technical publications.

Comment Re:NOT A BATTERY (Score 1) 230

I beg to differ, chemical energy is not required. See the Oxford English Dictionary...

battery, n.
Etymology: French batterie (13th cent.) ‘beating, battering, a group of cannon’, etc. (= Provençal bataria , Spanish batería , Italian battería ), battre to beat: see -ery suffix.

1. The action of beating or battering. ...
3. The beating of drums; sometimes a particular kind of drum-beat, perhaps that giving the signal for an assault.
4. A number of pieces of artillery placed in juxtaposition for combined action; in Military use, the smallest division of artillery for tactical purposes ...
III. A combination of simple instruments, usually to produce a compound instrument of increased power; applied originally with a reference to the discharge of electricity from such a combination.
III. 9. Electr. An apparatus consisting of a number of Leyden jars so connected that they may be charged and discharged simultaneously.
III. 10. Galvanism. An apparatus consisting of a series of cells, each containing the essentials for producing voltaic electricity, connected together. Also used of any such apparatus for producing voltaic electricity, whether of one cell or more.
III. 11. Optics. A combined series of lenses or prisms.
III. 13. a. Used gen. for a collection of similar pieces of apparatus grouped together as a set

Comment Re:NOT A BATTERY (Score 4, Informative) 230

Note that TFS states that "The high-powered battery is packed with supercapacitors..." see the definition for battery responsible for why we call groups of electrochemical cells batteries... "a set of units of equipment, typically when connected together" which is based on the traditional usage for artillery batteries. So if there are multiple supercapacitors working together it's absolutely correct to call it a battery (specifically a battery of supercapacitors, instead of a battery of electrochemical cells). Note that I doubt that the author was actually thinking along these lines when they wrote the piece, but I would argue it could still be correct.

Comment Re:This stuff drives me nuts (Score 1) 166

It would have to be more than just key based, the private key also has to be encrypted forcing the user to enter a passphrase before the key can be used. Otherwise someone with access to the system could just steal the private key file... Essentially Filezilla asking users to store passwords and then not encrypting them is the same as a program requiring an unencrypted SSH private key.

Comment Re:Or just use MythTV (Score 1) 49

B) Where is any information on this web based export? All I can find is some references to using the old TiVO Desktop software which is horrendous and painful if you do this very often and is still subject to the same CCI restrictions as MythTV would be.

F) $150/yr for guide data is ridiculous. The TCO on this product is horrible. The upfront costs may be slightly less than my MythTV setup but I've had the same HDHR Prime MythTV setup for going on 6 years now, with no signs of it stopping so that would be $850 so far just in fees, plus the original hardware purchase.

There is no doubt that the TiVO is better than the cable company DVR systems, those are really terrible. What I asked for though was someone to show something better than MythTV since the GP was basically making the argument MythTV was useless anyway. I don't think that's been done yet.

Comment Re:Or just use MythTV (Score 2) 49

This. I switched my backend off Mythbuntu some time ago (once it became feasible to install reasonably recent copies of MythTV in other ways). But on frontends I really just want something that takes little time to configure and connects to the backend, very much appliance like so I've stuck with Mythbuntu. My suspician is that there is a pretty small minority of people running separate backends and frontends though so that's a pretty small audience. It really is ideal though, my frontends do seem to crash, stop responding to IR, etc. occasionally and need reboots. It's definitely nice to have the recording work being done in a rock solid VM so it is not interrupted by reboots.

Comment Re:Or just use MythTV (Score 4, Informative) 49

What hardware systems are as capable as MythTV and as cost effective (ongoing subscription costs)? Even just for TV DVR capability, which is all I use Myth for, I haven't found one yet.

A) Cable card support
B) Ability to save and edit recordings (exportable, DRM free recordings)
C) Automatic commercial skip (this works incredibly well on MythTV)
D) Ability to schedule recordings over a web interface
E) All of the standard DVR features

Comment Re:This stuff drives me nuts (Score 4, Insightful) 166

A) I would guess Filezilla is used much more as an SFTP and FTPS client (is there a better one on Windows?) than as an FTP client.

B & C could apply to SSH clients such as PuTTY as well, so we should stop using that?

If we only implemented security enhancements when they were perfect solutions we wouldn't implement very much security. Usually there is a balancing act between usability, security, and cost. In this case there seems to be very little usability impact on encrypting the password store so why not do it?

All that said I'm pretty particular about what software can hold passwords of mine so I've always typed them in to Filezilla on an as needed basis, seems as if that was a good idea.

Comment Re:Yes please (Score 1) 304

Sometimes. I generally favor an open legislative process and there is no doubt that a good bit of political shenanigans happens at the last minute. On the other hand, there are a good number of things I can think of where a 72 hour waiting period might be inappropriate such as disaster relief and other time sensitive bills typically handled swiftly by all parties involved.

Comment Re:Solution? (Score 1) 135

Actually, in cases like this it would make it worse. This is not the DoS of your youth with spoofed IP addresses. This is millions of bots making seemingly legitimate requests simultaneously. With UDP DNS requests are a single packet. With TCP you get a SYN, SYN ACK, and SYN before you even get to the part where you're making the query...that would dramatically multiply the number of packets for each query from each bot, or for that matter on a regular day from a legitimate user meaning the connections would just be that much closer to being flooded all the time.

Comment Re:First lesson (Score 1) 135

Except that in reality the way it works is that each customer of an ISP is assigned a network block of IPs. If you find that customer is spamming you could block the entire network block. This is effectively the same thing as blocking the single IPv4 address assigned to a customer. The spammer would either need a new block of addresses from the ISP or a new ISP, effectively the same situation you have now with IPv4.

Comment Re:First lesson (Score 1) 135

+1 There is so much undeserved hate for IPv6 because people haven't taken the time to understand it.

NAT is not a security solution. If you would put a NAT device between your network and the Internet you can put a firewall between your network and the Internet. Yes, someone could potentially learn a small amount about your internal topology, well if you call being able to identify possible subnets withing your network learning about the topology, but the little they can learn is of dubious use. You still have no idea how most of those subnets are connected to each other (if you disable ICMP at your firewall or otherwise block tracerouting of your network from the Internet you can even prevent more) and even if you did please explain what substantial advantage an attacker has knowing how subnets are connected? If they're going that far it's an APT attack against your organization directly and you're probably done for because they will likely just trick someone inside the organization into installing malware on the network allowing them inside access and you'd have the same problems on IPv4.

Most of the rest of the list sounds like whining about more things you would have liked to have seen done, not things that are actually worse in IPv6 compared with IPv4.

Slashdot Top Deals

The difficult we do today; the impossible takes a little longer.