Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Vladinator (Score 0) 62854

if I'd had a daughter when I stopped really giving a shit about this place, she'd have eaten cum at least once by now.

probably a son too.

but it's nice to hear from/about people other than Vlad. cheers.

Submission + - Call to Action: Plan an #InstallFreeBSD Event (

An anonymous reader writes: Trollaxor is putting out a call for individuals to organize #installFreeBSD events in their locales. The purpose of these events is to increase awareness of FreeBSD. These events will take place simultaneously the evening of Wednesday, April 1.

Senator Accuses CIA of Snooping On Intelligence Committee Computers 242

An anonymous reader writes "Sen. Feinstein, head of the Senate Intelligence Committee, publicly accused the CIA of inappropriately searching computers used by her committee, violating presidential directives, federal laws and the Fourth Amendment. The computers in question were provided by the CIA at an undisclosed CIA location for use by the members of the intelligence committee. When the committee staff received internal documents the CIA had not officially provided, the agency examined the computers used by the committee and removed the unauthorized documents. The action has been referred to the Justice Department for possible prosecution." There were rumors of such a few weeks ago, and now it's official. Read the transcript of her speech.

Comment Interconnectivity is both opportunity and danger. (Score 3, Interesting) 92

The news of the earlier hack got me thinking about the unique risk/reward of ubiquitous communication and the challenge of computer security to keep pace. Certainly some say the pace of technological innovation is no longer in step with yesterday's, but that almost begs the question. It's truly ironic that modern computing becomes physically smaller as its footprint on our lives looms ever larger with each new year, yet no one disputes that, lately, electronic progress rests solely within the social stratum these days.

We should ask ourselves, however, the rather basic question of whether this seismic shift in the nature of the changes in technology brings with it an impedimentary effect on our lives, or indeed to wonder to the degree technology has ever been pedimentary when it comes right down to it. Yes, it's certainly got its foot in the door, but as with feet and doors it's not always possible to know at the moment of impact whether said foot represents opportunity, doom, or a casualty of a society overeager to shut the door to change.

Certainly the last thing anyone wants is a race to the bottom. Ah, but that's not entirely accurate when one considers the vested interest shoemakers have in most modern day footraces. It suggests that, moving forward, the most important thing to do when evaluating new technology in 2013 may very well be to first identify the shoemakers for that technology. Ask yourself: if I'm already wearing five pairs of socks, do I even need shoes at this point? Odds are, you don't.

Comment Re:If you have a smarter router (Score 1) 505

I don't think it's something that's prepackaged and easy to install, unfortunately. The principle behind it is here, as implemented on OpenBSD.

For hardware, I guess just a small PC with a wireless network adapter and a wired network adapter. Major thing is to make sure everything is compatible with OpenBSD (or Linux as another option, if it looks like the above process can be tweaked to it). Wireless adapters are a pain for compatibility.

It seems to me as I write this that it'd be really neat if the EFF sold ITX-profile routers preconfigured to create open hotspots that route over TOR.

Comment If you have a smarter router (Score 2) 505

Keep in mind that (with a decent router) you can open your Wi-Fi but route all guest connections through TOR transparently. That might be a fair compromise, along with rate-limiting, capping per-session usage, and setting a hard limit for the month if necessary to prevent yourself from going over your own cap on service.

Open Wi-Fi everywhere actually makes me more nervous for the clients than for the servers. People already don't understand security with Wi-Fi, and need to know that any server they're using can observe their traffic if it isn't encrypted. I guess that's already a concern without open Wi-Fi everywhere, though.

Comment Would love to see this go before a jury. (Score 1) 473

Because there are two worlds colliding here in the mind of the average person.

  • The school of thought that the victim is always at least partly responsible for being conned. There's a sense of superiority a lot of people get when they hear about scams where, because they themselves would never fall prey to a scammer, anyone who does is deficient or incautious.

  • Anyone charged with a crime involving a computer for more then Solitaire, porn, and recipe hunting must be guilty.

Slashdot Top Deals

Did you know that for the price of a 280-Z you can buy two Z-80's? -- P.J. Plauger