Forgot your password?
typodupeerror

Comment These Aren't Pranks (Score 1) 231

Things these guys do aren't pranks. They seem to get a rise out of scaring people while filming. I bet in most of their videos they don't even stop after the prank is finished and tell the people that they are "pranking" that it is indeed a "prank". Look at the just for laughs pranks, they are more inline with what a prank should be. Pull a joke or a fast one on someone and when your done tell the person and have a good laugh with them about it. Not saying that the Just for laughs pranks all go well and likely not everyone they prank thinks it's as funny as they do. But at least they don't pretend to kidnap or pretend to commit armed robbery, which would generally scare or induce a response from people that is negative.

Comment Re:lamest generation (Score 5, Funny) 243

it saddens me how many times i have argued this point with my parents. earliest memory of it was in grade 8, most recent was about 5 months ago when i tried to warn them about installing a cloud based video system into their house. At least i got to use the line: "what if there is somebody snooping on the non encrypted feed to your house and you guys are fucking in the living room". Sadly being former flower children they got turned on and promptly told me they had something important to attend to and made me leave.

Comment Good luck with that on tech like LTE (Score 1) 339

Good luck with tracking ip's on technology like LTE. IP leases only typically last a few hours. Most ISP's likely aren't going to pay someone to baby sit lease requests and given that these copyright holders preform abuse requests with no set standard for the information it's very hard to script a automated system to handle them.

Submission + - Microsoft brings SQL Server to Linux (betanews.com)

Mark Wilson writes: The new Microsoft has place an increased importance on the cloud, and with other companies following suit, reliance on server solutions has increased. Today the company announces that it is bringing SQL Server to Linux.

Both cloud and on-premises versions will be available, and the news has been welcomed by the likes of Red Hat and Canonical. Although the Linux port of SQL Server is not due to make an appearance until the middle of next year, a private preview version is being available to testers from today.

Comment Re:Passport for domestic flights :/ (Score 1) 408

Well, obviously, it's because terrorists don't target ground public transportation. Duh.

heh, atleast your attacks are by terrorists, ours are just by people that have lost their minds. http://www.cbc.ca/canada/manitoba/story/2009/03/03/mb-li-trial.html worst part is, he'll get off cause he was found not criminally responsible (aka: they send him to a loony bin). Just goes to show you, if your going to comit a crime, make it a crazy one, that way you can argue you didn't know what you were doing at the time.

Comment In my mind, the next step is.... (Score 1) 556

In my mind, the next logical step for me would be start writing letters to my state rep and letters to the FCC. Also, i would consult a lawyer and see if there is anything that i could do legaly to track the spoofers, ie: get nasty with the phone company or request phone bills from the people that are calling her and cross check them (using her number as a reference) and see if there is a way for the phone company to track who is really making the calls. I am not sure if there really is that much you could do with a lawyer, but in any case the lawyer will atleast inform you of your rights in this situation. That little bit of information might lead to the proper solution. Here in Canada, we don't have people spoofing caller id's with other people's phone numbers yet (or atleast i haven't heard of it yet), however telemarketers do often replace their numbers with something like 000-000-0000.I often get phone calls like that.
Databases

Keeping Customer From Accessing My Database? 567

cyteen02 writes "We run a data processing and tracking system for a customer in the UK. We provide a simple Web site where the customer can display the tracking data held in our Oracle database. From these screens they can query based on a combination of 15 different data fields, so it's pretty flexible. We also provide a csv report overnight of the previous day's data processing, which they can load into their own SQL Server database and produce whatever reports they want. Occasionally they also want one-off specific detailed reports, so we write the SQL for that and send them the results in an Excel format spreadsheet. This all ticks along happily. However they have now asked for direct read-only access to our Oracle database, to be able to run ad-hoc queries without consulting us. As a DBA, my heart sinks at the thought of amateurs pawing through my database. Unfortunately, 'because you are stupid' is not considered a valid business reason to reject their request. So can any Slashdotters assist me in building my case to restrict access? Have you experienced a similar situation? Have you had to support this sort of end user access? How would you advice me to keep my customer away from my precious tables?"
Privacy

US Set to Use Spy Satellites on US Citizens 513

duerra writes "A plan to use U.S. spy satellites for domestic security and law-enforcement missions is moving forward after being delayed for months because of privacy and civil liberties concerns. The plan is in the final stage of completion, according to a department official who requested anonymity because the official was not authorized to speak publicly about it. While some internal agencies have had access to spy satellite imagery for purposes such as assisting after a natural disaster, this would be the first time law-enforcement would be able to obtain a warrant and request access to satellite imagery."
The Courts

German Court Convicts Skype For Breaching GPL 309

terber writes "A German court has once again upheld the GPLv2 and convicted Skype (based in Luxembourg) of violating the GPL by selling the Linux-based VoIP phone 'SMCWSKP 100' without proper source code access. (Original is in German, link is a Google translation.) Skype later added a flyer to the phones' packaging giving a URL where the sources could be obtained; but the court found this insufficient and in breach of GPL section 3. The plaintiff was once again Netfilter developer Harald Welte, who runs gpl-violations.org. The decision is available in German at www.ifross.de (Google translation here)."
Security

"DNS Forgery Pharming" Attack Against BIND 9 105

Monley writes "Help Net Security is running a story about a severe flaw in BIND's implementation that allows fraudsters to efficiently predict generated random numbers without the need to control the route between the user and the DNS server. (Here are HTML and PDF versions of the paper.) Using this vulnerability, fraudsters can remotely forge DNS responses and direct users to fraudulent websites, which can steal the user's sign-in credentials and do other mischief. The flaw was discovered by security researcher and Trusteer's CTO, Amit Klein." The ISC has released a patch to BIND 9.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (8) I'm on the committee and I *still* don't know what the hell #pragma is for.

Working...