Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Is this Apple or MS? (Score 1) 251

Why yes, you can. http://store.apple.com/us/browse/home/shop_iphone/family/iphone/iphone4s Look below the carriers to "Or get iPhone unlocked and contract-free" They would only work on GSM networks, but still. Before saying something like that you might wanna go to Apple's store and search "unlocked iphone," it is right there.

Comment My Experience at College (Score 1) 582

At my college we started with no controlled Internet for the most part. During my third year in college they implemented a filter that did similar to what the poster's college is doing. Our solution was to spread the word. Our college was primarily funded by donors and one of our strategies was to contact the donors and past alumni to get them to cancel their funds until the issue is resolved. That took care of the problem awfully quickly. The strategy is go for their wallets. We also had that crappy CleanAccess program by Cisco and bandwidth limiting; those two didn't get fixed until the guy in charge was fired.

Comment Re:Unrepresentative sample (Score 1) 122

I also feel that the market of MMOs is under represented, especially considering that none of the MMOs I have ever played are on that list (FF XI, Lineage 2, Ragnarok Online, Dream of Mirror... the list goes on) which means they are only looking at a sample of the market. I know Lineage 2 may not be extremely significant in America but I do know it is one of the more popular MMOs world wide. Of course their sample group is the group that was willing to go with the gamerDNA system.

Comment Hacking? (Score 1) 846

Is it really considered hacking if you are using the password recovery service through Yahoo? The person was using a service built into Yahoo email, he was not hacking by most uses of the word. It bothers me when people consider something like this to be hacking. Hacking is modifying packets, cracking passwords, and looking for security vulnerabilities. This is none of those, it is using something the way it was supposed to be used by a large company, it was just used by someone who happened to put in the right information to the questions. Haven't people ever heard of putting in false information for those questions and remembering that instead of just putting in real information? I swear, some people don't think about security at all...

Slashdot Top Deals

Hackers are just a migratory lifeform with a tropism for computers.

Working...