Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Lack of torrents is a bad sign (Score 1) 84

I'll let you in on a little secret: As you can see from the Kickstarter page, people who contributed at a certain level and above were granted access to downloadable copies of the entire season -- all fourteen episodes.

However, throughout the entire production and post-production process, Joel has sent out updates to all the Kickstarter backers explaining that, if MST3K proves successful, Netflix may pick it up for another season. But in order for that to happen, Netflix needs to see that the viewing numbers would support such an investment. Therefore, he has firmly but respectfully asked backers not to share their downloadable copies with anyone. Since you claim that no torrents of the season are available, it would appear his request has, so far, been honored.

...Which is, kind of, y'know, what we've been saying the model should be all this time, right? Respect the artist's work and wishes? Well, so far, it looks like that's what's happening, so he can keep doing it.

Comment Re:Oh come on (Score 5, Informative) 606

You are in seriously [sic] need of some perspective.

I *HAVE* perspective, you twit.

I was around when Canter and Siegel "discovered" spamming, and suddenly the burden of deflecting what became billions of unwanted, exploitative, obnoxious emails fell upon the end-users, the people least equipped to deal with it. (And no, spam is by no means a, "solved problem," or a large chunk of Barracuda Networks' business would no longer exist.)

I was around when that chowderhead Brendan Eich kluged JavaScript into Netscape and fscking enabled it by default, even though the massive problems with macro viruses in Microsoft Word in the years prior clearly showed what that would lead to. Now we have scripts being uncritically yanked in from thousands of sources, rampaging around in our browsers looking for any datum they can exploit to our disadvantage.

Mark my words: If BK and its ad agency aren't smacked for this, hard, it will get worse very quickly. Every media source will become an attack vector. And sophists such as you will dryly intone, "Get better security," fully aware that that aphorism will solve nothing.

And lest you think I'm merely a member of the Tinfoil Hat Brigade: I, too, can be a smug shit about this. I have never trusted cookies or JavaScript, keep my browsers thoroughly nerfed, and I use a console-based mail reader. The result is I have only moderate patience for people victimized by advertising, malware, or phishing. The tools are there; they have but to learn how to use them. Don't even cost nothin'. But there is a boundary when you stop being a Clever Clogs for making the other guy's computer unexpectedly go beep and you become an active exploiter and victimizer of the weak and ignorant.

BK crossed that line. They need to be smacked.

Comment Re:Oh come on (Score 1) 606

If you had a gun in your house that went off every time someone on tv said "shoot" would you blame the film maker?

If the filmmaker put "Shoot" in the film with the express intention of making my gun go off -- even after I took affirmative steps to keep it from happening -- then... YES. I would unhesitatingly toss their ass in prison for negligent firearm discharge and/or sue them for everything they've got.

Comment Re:Oh come on (Score 1) 606

ERROR: INVALID REASONING

Sophistry such as yours is what led to this problem. Leaving your front door unlocked does not absolve a thief from stealing or misappropriating your property. While your insurance carrier may have something to say about how much of the loss they'll cover, the fact of the theft is not erased; the thief will still be charged with a crime.

Burger King made unauthorized use of computing resources that did not belong to them. In this respect, they are no different from any other spammer or purveyor of malware, and their act should be regarded in that light. Computer intrusion laws are fairly clear on this point: Only the system's owner gets to decide what constitutes authorized use. Abusing weak security in the name of delivering a fscking TV ad cannot by any reasonable, honest measure be described as authorized, and Burger King's actions both before and after the fact likewise cannot be said to be inadvertent or accidental.

Submission + - Burger King Won't Take Hint; Alters TV Ad to Evade Google's Block (washingtonpost.com) 1

ewhac writes: Earlier this week, Burger King released a broadcast television ad that opened with an actor saying, "Ok, Google: What is The Whopper?" thereby triggering any Google Home device in hearing range to respond to the injected request with the first line from the Whopper's Wikipedia page. Google very properly responded to the injection attack by fingerprinting the sound sample and blocking it from triggering responses. However, it seems Burger King and/or its ad agency are either unwilling or congenitally incapable of getting the hint, and has released an altered version of the ad to evade Google's block. According to spokesperson Dara Schopp, BK regards the ad as a success, as it has increased the brand's "social conversation" on Twitter by some 300%. It seems that Burger King thinks that malware-laden advertising infesting Web pages is a perfectly wonderful idea (in principle, at least), and taken it to the next level by reaching through your TV speakers and directly messing with your digital devices. You may wish to consider alternate vendors for your burger needs.

Submission + - Inside the Tech Support Scam Ecosystem

Trailrunner7 writes: A team of three doctoral students, looking for insights into the inner workings of tech support scams, spent eight months collecting data on and studying the tactics and infrastructure of the scammers, using a purpose-built tool. What they uncovered is a complex, technically sophisticated ecosystem supported by malvertising and victimizing people around the world.

The study is the first analysis of its kind on tech support scams, and it’s the work of three PhD candidates at Stony Brook University. The team built a custom tool called RoboVic that performed a “systematic analysis of technical support scam pages: identified their techniques, abused infrastructure, and campaigns”. The tool includes a man-in-the-middle proxy that catalogs requests and responses and also will click on pop-up ads, which are key to many tech-support scams.

In their study, the researchers found that the source for many of these scams were “malvertisements”, advertisements on legitimate websites, particularly using ad-based URL shorteners, that advertised for malicious scams. This gives the scammers an opportunity to strike on what would seem like a relatively safe page. Although victims of these scams can be anywhere, the researchers found that 85.4 percentof the IP addresses in these scams were located across different regions of India, with 9.7 percentlocated in the United States and 4.9 percent in Costa Rica. Scammers typically asked users for an average of $291, with prices ranging from $70 to $1,000.

Submission + - New Season of Mystery Science Theater 3000 Premiers on Netflix

ewhac writes: In 1988, comedian Joel Hodgson launched what is possibly one of the silliest ideas for a television show yet conceived: A man and two sentient robots sit in a theater and heckle a bad movie. Improbably, Mystery Science Theater 3000 (MST3K) became a smash success on cable, spawned a feature-length film, and ran for ten official seasons on Comedy Central and The Sci-Fi Channel, its last episode airing on 8 August, 1999. Now, 17 years later, Season 11 of MST3K debuts today on Netflix. A full season has been produced, including a stretch-goal Christmas special, funded by the highest-earning Kickstarter Film & Video campaign to date ($5.76 million) – thousands of contributors are listed in the show’s end credits, spread across all fourteen episodes.

The show remains true to its low-budget roots, relying almost exclusively on models and practical effects, including a very inventive new door sequence. The backstory for the new season is very swiftly established in the opening to Experiment 1101, as Jonah Heston (played by co-producer Jonah Ray) is abducted by the evil mad scientist Kinga Forrester (Felicia Day) and her sidekick Max a/k/a TV’s son of TV’s Frank (Patton Oswalt). Together with Gypsy (Rebecca Hanson), Tom Servo (Baron Vaughn), and Crow (Hampton Yount), Jonah quips his way through a barrage of bad movies, including Reptilicus, Starcrash, The Loves of Hercules, and The Christmas That Almost Wasn’t.

Submission + - Investigation Finds Inmates Built Computers, Hid Them In Prison Ceiling (cbs6albany.com)

An anonymous reader writes: The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Correction's network. Authorities say they were first tipped off to a possible problem in July, when their computer network support team got an alert that a computer "exceeded a daily internet usage threshold." When they checked the login being used, they discovered an employee's credentials were being used on days he wasn't scheduled to work. That's when they tracked down where the connection was coming from and alerted Marion Correctional Institution of a possible problem. Investigators say there was lax supervision at the prison, which gave inmates the ability to build computers from parts, get them through security checks, and hide them in the ceiling. The inmates were also able to run cabling, connecting the computers to the prison's network.

Submission + - Google Ruins the Assistant's Shopping List, Turns It Into a Google Express Ad (arstechnica.com)

An anonymous reader writes: The Google Assistant, Google's voice assistant that powers the Google app on Android phones, tablets, and Google Home, has just gotten a major downgrade. In a move reminiscent of all the forced and user-hostile Google+ integrations, Google has gutted the Google Assistant's shopping list functionality in order to turn it into a big advertisement for Google's shopping site, Google Express. The shopping list has been a major feature of the Google Assistant. You can say "Add milk to my shopping list," and the Google Assistant would dutifully store this information somewhere. The shopping list used to live in Google Keep. Keep is Google's primary note-taking app, making it a natural home for the shopping list with lots of useful tools and management options. Now the shopping list lives in Google Express. Express is an online shopping site, and it has no business becoming a dedicated place to store a shopping list that probably has nothing to do with Google's online marketplace. Since Google Express is an online shopping site (and, again, has no business having a note-taking app grafted onto it), the move from Keep to Google Express means the Assistant's shopping list functionality loses the following features: Being able to reorder items with drag and drop.
Reminders; Adding images to the shopping list; Adding voice recordings to the shopping list; Real time collaboration with other users (Express has sharing, but you can't see other people as they type—you have to refresh.); Android Wear integration; Desktop keyboard shortcuts; Checkbox management: deleting all checked items, unchecking all items, hiding checkboxes. Alternatively, the move from Keep to Google Express means the Assistant shopping list gains the following features: Google Express advertising next to every list item; Google Express advertising at the bottom of the page.

Submission + - The Kodi development team wants to be legitimate and bring DRM to the platform. (torrentfreak.com)

pecosdave writes: The XBMC/ Kodi development team has taken a lot of heat over the years, mostly due to third party developers introducing piracy plugins to the platform, then in many cases cheap Android computers are often sold with these plugins pre-installed with the Kodi or XBMC name attached to them. The Kodi team is not happy about this, and has taken the fight to the sellers. The Kodi team is now trying to work with rights holders to introduce DRM and legitimate plugins to the platform. Is this the first step towards creating a true one-stop do it yourself Linux entertainment system?

Submission + - How Google Book Search Got Lost (backchannel.com)

mirandakatz writes: When Google started its Book Search project nearly 15 years ago, it seemed impossibly ambitious: An upstart tech company that had just tamed and organized the vast informational jungle of the web would now extend the reach of its search box into the offline world. It was the company's first real moonshot, aspiring to make all the world's books digitally accessible—and in doing so, somehow produce a phase-shift in human awareness. But between legal battles and a slowly dwindling sense of ambition, Google Books never achieved those great heights, and today, it's settled into a quiet middle age of sourcing quotes and serving up snippets of text from the 25 million-plus tomes in its database. At Backchannel, Scott Rosenberg chronicles the project's rise and fall, writing that "Google employees maintain this is all they ever intended to achieve. Maybe so. But they sure got everyone else’s hopes up."

Submission + - SPAM: Exploit Revealed For Remote Root Access Vulnerability Affecting Many Routers

Orome1 writes: Back in January 2013, researchers from application security services firm DefenseCode unearthed a remote root access vulnerability in the default installation of some Cisco Linksys (now Belkin) routers. The flaw was actually found in Broadcom’s UPnP implementation used in popular routers, and ultimately the researchers extended the list of vulnerable routers to encompass devices manufactured by the likes of ASUS, D-Link, Zyxel, US Robotics, TP-Link, Netgear, and others. Since there were millions of vulnerable devices out there, the researchers refrained from publishing the exploit they created for the flaw, but now, four years later, they’ve released their full research again, and this time they’ve also revealed the exploit.
Link to Original Source

Submission + - Symantec says CIA hacking tools were used in 40 'Longhorn' cyberattacks (betanews.com)

Mark Wilson writes: The CIA's range of hacking tools revealed as part of WikiLeaks' Vault 7 series of leaks have been used to conduct 40 cyberattacks in 16 countries, says Symantec. The security firm alleges that a group known as Longhorn has been using tools that appear to be the very same ones used by the CIA.

While it would be obvious to jump to the conclusion that the CIA was itself responsible for the attacks — and that Longhorn is just a branch of the CIA — Symantec opts for a rather more conservative evaluation of things: "there can be little doubt that Longhorn's activities and the Vault 7 documents are the work of the same group."

In a post on the Symantec Security Response blog, the company provides what it says is the first evidence that the Vault 7 tools have actually been used in cyberattacks or cyberespionage.

Comment Re:A better question to ask (Score 1) 75

"Chad Rigetti, the startup's founder and CEO -- who declined to say whether the company is actually earning any revenue yet." who would also decline to say whether the company is doing proper quantum computing yet.

If he knew how much revenue he was getting, he wouldn't know whether the revenue growth rate was growing or shrinking. How the fark is he supposed to get Series A funding at a good valuation like that? Naw, man, he did it right - assume a given momentum sufficient to get the next round of funding, and who cares about the company's actual market position?

Slashdot Top Deals

The power to destroy a planet is insignificant when compared to the power of the Force. - Darth Vader

Working...