Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Asus Motherboard Box Doubles as PC Case ( 1

itwbennett writes: "Taiwan's Asus has a novel idea to cut down on shipping waste: What if the shipping container became the PC case? That's the idea behind a box the company will begin using to ship one of its Mini ATX motherboards. It holds the motherboard snug for shipping and is constructed so additional components required to make a PC can be added, said Debby Lee, a spokeswoman for the Taipei-based company. An example of the box is showing at this week's Cebit trade show in Hanover, Germany."

Submission + - Anti Geohack Patent? (

Jesterace writes: Recently a new patent by a SONY employee was published on the patent site at It seems it is SONY's answer for Geohot's progress. Take a look here:

"A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key. The hash value of the application verification certificate associated with the second key is then calculated and used with the extracted binding key to extract the first key. The extracted first key is then used to decrypt the encrypted application code."

Comment Re:Well, Opera Mini isn't strictly a browser... (Score 3, Insightful) 292

You are running a software built by said commercial 3rd-party company. They don't need that server in the middle to see all of those things.

So there's no increase in capability if they are malicious. There is an increase in risk if they are incompetent - and do something like cache requests/responses containing that data.

Comment Re:They may have won in the courts.... (Score 2, Interesting) 307

now you have steve watching every single thing you do on his computer, you will pay 130$ for service packs, and good luck getting parts or repair on that mac (which has a very high chance of failure within the first year)

Try using Apple HW instead of just bashing it. There are a lot of MB/MBP out there running MS crap because they are so reliable, and actually run software without machinations. Rating a new version of an OS as a service pack is ludicrous. Maybe you ought to actually use a permissions based OS before you run your keys the next time

Comment Re:Smartest workflow move ....ever! (Score 1) 401

Terrible ideas. Just terrible.


In any event, hiding the dialogs when GIMP loses focus makes a hell of a lot more sense than dialogs that won’t minimize or hide at all. When I want to see the desktop, I want to see it without any stupid unhideable dialogs in the way.

They have made a single window mode available, that's what we're talking about.

I don’t want a single window mode. I want the things I mentioned. Unless I maximize the window, and then perhaps yes a single-window mode would be better than letting the floating palettes overlap the image window.

Slashdot Top Deals

One good reason why computers can do more work than people is that they never have to stop and answer the phone.