Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Beating Comcast (now without iptables!) (

The author writes: "A number of solutions exist to Comcast's spurious reset message attack on bittorrent. However, these solutions demand iptable wizardry and super-user permissions. I have a simple way of circumventing TCP reset flag censorship: a TCP-over-UDP tunnel with user-level TCP stacks. Importantly, it only needs end-users to upgrade their torrent client. Unfortunately, it can't be finished now because I'm swamped finishing my Thesis instead. I've prepared a short document outlining the solution, and I have the hardest part already implemented as a library. All that's left is a Bittorrent developer (or perhaps Comcast subscriber) to read this and decide whether its worth lending a hand.

For the record, I don't use Comcast, but I object to violating the venerable TCP Protocol:
"As a general rule, reset (RST) must be sent whenever a segment arrives which apparently is not intended for the current connection. A reset must not be sent if it is not clear that this is the case." Using resets to censor connections deemed unfit by an ISP is not a specified use."

PC Games (Games)

Submission + - Microtransactions coming to Spore?

Goldberg's Pants writes: In a conference call, the CEO of Electronic Arts has indicated if Spore is a success then in a year or so they may "monetize body parts, plant parts, car parts, planets — as a way to generate incremental revenue off an install base of several million active users." Couple this with the inevitably copy protection debacle that will ensue around release time, and Spore is looking less attractive with each passing week.
The Internet

Submission + - What's in your RSS Feeds? 2

oncehour writes: I'm looking to broaden my horizons in terms of news, industry information, and just generally good to know stuff. I've found a lot of great blogs and websites over the years but I'm wondering what Slashdotters read regularly? What's in your RSS feeds?

Submission + - How to keep the Sales dept from selling vaporware?

An anonymous reader writes: My organization creates software for corporations and professionals. We have a set up establish products, i.e., we are absolutely not a consulting firm. However, the sales department is extremely aggressive. One of two things happens:
  1. Sales sells something that does not exist, or a "vision"
  2. Sales sells a proof of concept, experiment, alpha version, etc.
It's almost like internal espionage; somehow they find out what's new, then sign a contract to deliver it. This type of behavior is allowable in the organization, so there's no adequate business solution. I know I'm not the only one that lives in a world like this. So for those of you who share that world with me: how you protect research and development efforts? How do you encourage advancement and creativity without committing to productizing it? What type of positive reinforcement can one provide to engineers to discourage leaking R&D info?

Submission + - Linux Network Access per User 1

Anonymous Coward writes: "I'd like to offer shell access to my users, but have been surprised at the lack of restrictions that I can place on them. Disk space quotas are trivial. But what about bandwidth quotas? What about allowing listening but not outgoing sockets, or perhaps the other way around? Disallowing net access for certain groups? I've found no way to do these things, and the 'ports over 1024' restriction for regular users simply doesn't cut it these days.

I should think that my users could be allowed to run their own server programs if so desired without being allowed to run rampant. It seems that I can either block >1024 incoming at the firewall, or let it be abused.

What would you do?"

Submission + - Algorithm That Seemlesly Patches Holes in Images (

Beetle B. writes: "From the site:

'What can you do with a million images? In this paper we present a new image completion algorithm powered by a huge database of photographs gathered from the Web. The algorithm patches up holes in images by finding similar image regions in the database that are not only seamless but also semantically valid. Our chief insight is that while the space of images is effectively infinite, the space of semantically differentiable scenes is actually not that large. For many image completion tasks we are able to find similar scenes which contain image fragments that will convincingly complete the image. Our algorithm is entirely data-driven, requiring no annotations or labelling by the user. Unlike existing image completion methods, our algorithm can generate a diverse set of image completions and we allow users to select among them. We demonstrate the superiority of our algorithm over existing image completion approaches.'

English translation: The algorithm replaces arbitrarily shaped blank areas in an image with portions of images from a huge catalog in a totally seamless manner."

Slashdot Top Deals

I'm a Lisp variable -- bind me!