Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:It's GPL v2 (Score 1) 3

Ok GPLv2, I considered this and this is the way I am leaning. But just to be sure, I'm kinda thinking I would like to offer subscriptions and retain ownership... Mind you that I am not greedy, just trying to figure out a way to monetize my coding efforts... Comments? Thanks

Comment Re:Underestimation? (Score 4, Interesting) 585

I almost agree... I dual boot win7 and Ubuntu and there is still no comparison. I get more work done while in win7...as soon as (insert your fav brand of Linux) can properly install my video, network, sound drivers without a glitch... I'm all there... as for pirating... Give me what I want to watch...when I want to watch it, otherwise...your business model sucks...

Comment When I need a robust business solution... (Score 1) 275

Many years ago, I would look to others to provide a software or development solution. For many years now, my train of thought is, if you want a solution... Make it yourself... This is /* and the /* way, this is where I learned to code... Trial and error it my have been but, At my age the thinking was, I can Teach Myself, And I did... So if you need a business solution, Learn to code. /* has many resources for the beginner... My Business Solution... Do It Yourself... The feeling of getting it right is well worth it...

Submission + - SPAM: no deposit casinos

phildixon20 writes: "You can find a number of the on the internet gambling internet sites that supply exciting presents to its players, where the player gets to play without spending even a penny from his own pocket. All through the globe these offers though are exactly the same but are becoming named within the internet terms by distinctive names."
Link to Original Source

Submission + - Surveillance Company Says It Sent Fake iTunes, Fla (wsj.com)

IDOXLR8 writes: "The Wall Street Journal unveiled on Saturday the “Surveillance Catalog” – an online database containing highlights from surveillance industry marketing documents. Gamma International UK Ltd. touts its ability to send a fake iTunes update that can infect computers with surveillance software, according to one of the company’s marketing videos."

When Telemarketers Harass Telecoms Companies 234

farnz writes "Andrews & Arnold, a small telecoms company in the UK, have recently been hit with an outbreak of illegal junk calls. Unlike larger firms, they've come up with an innovative response — assign 4 million numbers to play recordings to the telemarketers, put them on the UK's Do-Not-Call list and see what happens. Thus far, the record is over 3 minutes before a telemarketer works out what's going on." The sound quality (and the satisfying humor) of the recording gets better as it goes on.

Submission + - Pirate Party to host The Pirate Bay in parliament (piratpartiet.se) 1

m94mni writes: The Swedish Pirate Party has announced today that they will host The Pirate Bay from inside the Swedish parliament, should they gain enough votes (4%) in the elections on September 19. The party plans to take advantage of parliamentary immunity to protect information freedom from being abused be the entertainment industry.

NASA Gives Mars Rover Extra Smarts 116

coondoggie writes "NASA today said it upgraded the software controlling its Mars Rover Opportunity to let it make its own decisions about what items like rocks and interesting red planet formations to focus its cameras on. The new system, which NASA uploaded over the past few months, is called Autonomous Exploration for Gathering Increased Science, or AEGIS and it lets Opportunity's computer examine images that the rover takes with its wide-angle navigation camera after a drive, and recognize rocks that meet specified criteria, such as rounded shape or light color. It can then center its narrower-angle panoramic camera on the chosen target and take multiple images through color filters, NASA stated."

A Second Lessig Fair-Use Video Is Suppressed By WMG 187

Bios_Hakr points out an ironic use of the DMCA: for the second time, a video tutorial on fair use that Larry Lessig uploaded to YouTube has been muzzled. This time the sound has been pulled from the video; last time the video was taken off of YouTube. (Video and sound for the new "webside chat" can be experienced together on BlipTV.) Both times, Warner Music Group was the party holding copyright on a song that Lessig used in an unarguably fair-use manner. TechDirt is careful not to assume that an actual DMCA takedown notice was issued, on the likelihood that Google's automatic copyright-violation detectors did the deed. "The unintended consequences of asking tool providers [e.g., Google] to judge what is and what is not copyright infringement lead to tremendous problems with companies shooting first and asking questions later. They are silencing speech, on the threat that it might infringe on copyright. This is backwards. We live in a country that is supposed to cherish free speech, not stifle it in case it harms the business model of a company. We live in a country that is supposed to encourage the free expression of ideas — not lock it up and take it down because one company doesn't know how to adapt its business model. We should never be silencing videos because they might infringe on copyright."

New "Spear Phishing" Attacks Target IT Admins 134

snydeq writes "A new breed of 'spear phishing' aimed at IT admins is making the rounds. The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses. The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider. 'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate — especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares. Certainly fodder for some bone-headed mistakes on the part of admins, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.'"
User Journal

Journal Journal: Marketing to myself but nobody else?

Recently I came into some money that I could afford to invest so, being a coder I had visions of grandeur and decided to make a dream come true. I had been testing out some php/mysql code and decided to buy the real thing from someone else and start a website. Well, here is where the problem lies, making the code changes was the easy part, setting up a merchant gateway was easy. The thing that I have discovered is that I have no idea of how to create traffic, advertising I guess you might cal


Submission + - DIY: Defending Against A DDoS Attack (darkreading.com)

IDOXLR8 writes: "There's no way to prevent a distributed denial-of-service (DDoS) attack, but there are some do-it-yourself techniques and strategies for fighting back and minimizing its impact.

DDoS victims can "tarpit," or force the attacking bot to drastically scale back its payload, enlist the help of the botnet hunter community, or even get help to wrest control of the botnet. Joe Stewart, a researcher with SecureWorks' Counter Threat Unit, says these self-defense techniques are little known or used today by victims of DDoS attacks, but they offer an alternative to purchasing a commercial DDoS product or service and working with ISPs to try to stop an attack."

Hardware Hacking

DIY 1980s "Non-Von" Supercomputer 135

Brietech writes "Ever wanted to own your own supercomputer? This guy recreated a 31-processor SIMD supercomputer from the early 1980s called the 'Non-Von 1' in an FPGA. It uses a 'Non-Von Neumann' architecture, and was intended for extremely fast database searches and artificial intelligence applications. Full-scale models were intended to have more than a million processors. It's a cool project for those interested in 'alternative' computer architectures, and yes, full source code (Verilog) is available, along with a python library to program it with." Hope the WIPO patent has expired.

Slashdot Top Deals

No amount of careful planning will ever replace dumb luck.