Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:He doesn't need a pardon . . . (Score 1) 231

Simply theorizing the existence of such a set of morals is enough to show that objectively wrong acts exist. However it is not sufficient to judge any specific action. For any given finite set (of moral systems, acts judged by those systems, meta-moral systems by which to judge moral systems, farm animals, etc) a unique ordering is possible with a first (best) and last (worst) element. There exist some number of moral systems in all of existence (some known by humanity, far more not), of those one is best and from it some act is deemed worst. We can offer commentary on the sub set of moral systems known to man, but that doesn't change set theory. I don't claim to have a useful answer just a theoretically correct one.

Submission + - Lulzsec Ties FBI Detroit Phones (

ctrimm writes: "At approximately 1pm EST, Lulzsec tweeted that everyone should call their number (614LULZSEC), for a fun surprise. A couple minutes later the group reports that customer support was going insane. After, the group moved on to World of Warcraft customer support and then to the FBI Detroit office. They are currently taking requests of who to "Phone DDoS" next."

Comment Re:No need to fuss (Score 1) 324

I would just like to second the distaste for control panels and FTP servers. Especially control panels because they encourage people not to understand what they're actually doing and its implications.

That said even without active monitoring it's pretty easy to figure out when a customer machine has been compromised. When the abuse complaints start rolling in about SSH brute force attacks originating from said machine it doesn't take much to figure out that somebody's gotten in to a machine they shouldn't have. Even with all the stealth and cunning in the world it's pretty hard to hide the fact that you're making outbound SSH connections that are ending up in somebody else's auth.log.

Comment Re:Please retain network transparency (Score 1) 640

I have looked forward with dread to the day I'm going to have to fall back to Debian proper because of some stunt pulled by Ubuntu. I've run Debian Stable on a number of servers, and like Stable, that said on the desktop I can't see Stable working to well on the desktop. How does Sid stack up to Gentoo in terms of breaking all the damn time and requiring maintenance, hacks, and demonic sacrifices to keep working day to day? Would Testing with an absurd amount of apt pinning be better?

Also is there some obvious replacement to the PPA system/plethora of third party repositories for running XYZ random application or Foo version 0.99-svn-rightnow-so_new_it_hurts?

Comment Re:Window Buttons (Score 1) 366

Very easily?


So it's a multichoice box somewhere in the GUI then?


The non-easy solution was to modify or make a gconf key. Is that really the easy way of doing it?


Just use Ubuntu Tweak and quit complaining. It's even easier than a dropdown box, you just drag the buttons around, and they change in real time. Before you complain that they're third party, think about the name for one second, the tool for tweaking Ubuntu is named Ubuntu Tweak, what more do you really want.

Comment Re:Does this apply to ALL "obscene" speech? (Score 2, Insightful) 697

Up the ante.

Change step one to:
1) Some particularly radical bastion of liberalism / progressivism (Berkeley, perhaps, or another community with similar values) passes a city ordinance declaring judicial decisions that infringe upon free speech are obscene.

Have them arrest the judges, let them testify: they'll either have to admit guilt, or do a 180 on their own ruling. I very much doubt they will do the former, and the latter should provide sound legal reason as to why the original ruling was incorrect.

Submission + - Linode Clarifies Involvement in Google Hack Claims 2 writes: "In the interest of full disclosure, I am an employee of Linode. As many in the Internet hosting and security communities are aware, extensive media coverage of Chinese hacking activity has implicated the Linode network as being involved. We've released a public statement regarding this matter; essentially, the VPS in question was not under the control of malicious parties."

Comment Re:Forget (e) offtopic, how about (b)? (Score 1) 560

What about any outbound TCP connection? Aren't all outbound connections by definition uninvited.

I'm pretty sure slashdot didn't send me a nice embossed letter say "Please send an HTTP GET request to our fine server at on port 80". Maybe Taco should do that for Verison Customers, hell I'd probably frame something like that.

Comment Re:PackageKit at fault, not Fedora (Score 2, Informative) 502

I'm assuming that PackageKit still requires root to modify shared system areas where the owner is root (e.g. /usr/bin etc.)

No, that's exactly what people are upset about, that any random account logged in to the physical machine can write to /usr/bin, the things that they can write are limited to the contents of signed packages, but that's still a whole lot more than the absolutely nothing they could write under F11. Also all the comments I've seen are about adding packages, but does this also allow removing packages?

Comment Re:Great work! (Score 1) 236

Kinda. The shim itself, which references the kernel headers and is definitely a derivative work, is released under the gpl. The blob, who knows what's in the by it's nature, but my understanding is that it exposes functions that represent hardware capabilities, and little if anything to do with what the OS does with those functions. It's the same set of functions that's exposed by the driver to windows, so hardly OS specific. I'm not sure about the legal status of the combined blob shim, but from a practical stand point it only interacts with kernel functions that aren't exposed as GPL_ONLY. Which is why the binary driver doesn't support KMS, because all the KMS functions are exposed as GPL_ONLY.

Hopefully Nouveau will have working 3d soon, as it's gpl throughout, and already has KMS working.

Comment Re:Great work! (Score 1) 236

No you still don't get it. Please tell us how you can infringe on this:

"2.1.2 Linux/FreeBSD/OpenSolaris Exception. Notwithstanding the foregoing terms of Section 2.1.1, SOFTWARE designed exclusively for use on the Linux or FreeBSD operating systems, or other operating systems derived from the source code to these operating systems, may be copied and redistributed, provided that the binary files thereof are not modified in any way (except for unzipping of compressed files)."[1]

That is the license in question. There is no infringement, they are acting with in the license. There is a reason that the drivers are broken in to binary blobs with a stable abi, the the open source shim the connects that stable abi to the current kernel api.


Comment Re:New Gnome? (Score 1) 419

The big problem of Gnome shell, is that it's not modular. The problem isn't just that the default configuration has one panel, it's that THE configuration has one panel. And it's not even a panel, the menu/top bar is a singular whole unit, the elements can't be moved, removed, or added to. If gnome-shell provided a different default configuration, that wouldn't be a problem, the problem is that gnome-shell is a singular unit, you get all of it or none of it. Also gnome-shell isn't a stand alone application, it's a module/library loaded by the mutter window manager, so if you use a window manager other than mutter, like say compiz, you're left out in the cold. Gnome-shell not playing nice with other window managers isn't a problem as long as gnome-panel is still developed, supported, and packaged, but how long is that going to be?

Comment Re:What were the rootkits? (Score 1) 168

I don't believe that the headers are installed by default, but there are a bunch of packages that depend on it because they use DKMS, such as:
the BCM43xx driver
All the closed video drivers
Virtual box
the LIRC drivers

So while not installed by default, I'd guess they're a pretty common thing to have installed.

Slashdot Top Deals

Riches cover a multitude of woes. -- Menander