Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Which is the bigger crime? (Score 1) 212

Does the IRS even legitimately call non-businesses on the phone?

For the adamantly small sample size of the two people I know of with issues on their taxes or back taxes owed, the first step was getting papers by certified mail.
For one of those two cases, who I'm pretty sure was actually trying to pull something and ignored those letters, they sent an agent to his home that brought along a uniformed sheriff, I'm sure both with plenty of identification of who they were.

Even if no red flags like gift cards were involved in the call, they would still need to send paperwork showing what you owed and why (which is generally what comes with the information required to make payment)

It's mind boggling such scams could work.

Comment Re:Hacked executables are hacked?!?!?! (Score 1) 67

And at this point I tried struggling through the first paragraph in your first link, and I really want to ask: WTF, taxes? Really?

Is that some complex analogy you're making to an argument I didn't bring up or mention?
You may want to find another example that isn't so boring and obviously baseless. I couldn't even get past the first paragraph so really don't get the point you intended to make.

I also didn't mention taxes let alone claim we don't owe them. Is that what you think?
Personally I pay my taxes in full and on time, and don't run my own business so no potentially questionable deductions (or any deductions)

I happen to both love living in society and have grown very dependent upon it.
I may not agree with each and every little thing the govt spends that money on, but similar to my employer may or may not agree with what I spend my paycheck on, not paying at all is not the right way to go about it.

Back on the actual topic, are you trying to claim that because most things downloaded off torrent sites are not legal to be there somehow means people don't still do it?
Are you claiming *I* do it?

Sorry to repeat myself but WTF?

Comment Re:Hacked executables are hacked?!?!?! (Score 1) 67

Ok fair enough, "impossible" was a poor choice of words.

However is it provably not what they are doing. In Google search for "Bing torrent [some game or pirated app]", and note you do not get the same warning even though the result contains the same SHA1 hash.
So that is clearly not what is triggering it.
The actual malware they scan for isn't in the SHA1 so that is clearly not what is triggering it.

The only likely place a malware signature would match is in the ads.
A more unlikely place would be if the site itself was hacked and changed to serve up malware directly too of course.

As for legality, I made no such claim so I'm not sure why you'd mention it or insult me over it.
We are talking about malware detection here, which is purely technical.
Of course uploading something under another persons copyright is illegal.

Comment Re:Hacked executables are hacked?!?!?! (Score 2) 67

Pirate Bay has categories "Applications" and "Games" (aka executables). It seems most of these are supposedly hacked to get around the licensing check.

Chrome may be indicating that some of these hacked executables are ... wait for it ... HACKED!

That wouldn't be possible, since there are no executables on the pirate bay to download.

Those pages have only an SHA1 hash, which is all that's required to get the needed magnet link into your bittorrent client.
Any potential infected executables would be coming in over your bittorrent client, and would be completely invisible to your web browser.

That said, the site does use an ad network, which many of the smaller ad networks are known to deliver malware via javascript and such.
Malware containing ads are certainly delivered through the browser, and are a legit infection method to be blocked.

NoScript or a similar extension would provide full protection in such a case.
AdBlock I would like to think would also block the maware containing ads, but these days that's less assured and I don't feel like going there to verify that.

Comment Re:Hubris, pride comes before a fall (Score 1) 292

You'd be wrong on at least the first part. I don't know of anyone who uses a dock at all. Even back when Apple gave them away for free, most people threw them in a drawer and never used them. :-)

Actually I had a dock for my car which was pretty nice.
It connected to the cigarette lighter for power, and had a bendy arm up to the dock part.

Of course that was back in the iphone 3 and 4 eras which used the 30 pin connector.
This let the phone charge through the connector from the car, as well as had analog audio out pins which the dock used so it could be wired into the car stereo system, all with no extra wires to connect into the phone itself.

Together with some cydia software to expand the function of the phones volume rocker to control music playback, it was a pretty decent setup for in the car that didn't require upgrading/replacing the factory stereo.
(I could hit vol up then down for next track, down then up for previous track, and both up and down for pause/play - meaning I didn't have to look down taking my eyes off the road for those functions)

However if you mean only those large blocky at-home-only docks, no I've never had one of those either.

Comment Re:Decommissioning servers (Score 1) 569

I still disagree with you.

When I decommission a hard drive, best practices state you wipe the entire hard drive.

You don't go and delete specific files like exchanges .EDS data store files and your web browser cache only.

In fact the way BleachBit deletes data, even though recovery of emails on these drives would be impossible, the windows SAM file remains undeleted and in perfect operating condition along with the entire OS.

I could easily extract password hashes from those untouched files and brute force them.
There could be many other files left littered around the HD that would provide or point to other authentication credentials, not to mention all the saved passwords in the windows password store and all the applications that do it on their own.

No, wiping the entire hard drive with something like DBAN is the only way to properly decommission a hard drive if you are concerned it may leave your possession (selling or disposal doesn't matter)

BleachBit is absolutely nothing like a paper shredder. It is more like using a black marker to redact lines printed on those papers and then leaving the entire stack of paper out so anyone can still read the rest and see there is text redacted.

Shredding the whole paper would plausibly be proper disposal. Marking out lines while keeping the paper is not.

Comment Re: "Millions of dollars"? (Score 4, Informative) 110

They arrested this guy because he had a server located somewhere in the USA. The same way they went after Kim Dotcom.

KAT had all their servers located in Canada-America and Sweden-America, while Kim Dotcom had his servers located in America-America.

While it's been obvious from legal history over the past couple years that Canada and Sweden operate under American law only now, many people are not yet used to that and incorrectly assume those are other countries with their own laws.

That confusion is what lead the parent poster to ask their question. It's just your explanation is equally as confusing of an explanation as it implies the servers were located within the old traditional US borders when that is obviously an incorrect statement.

Instead you should have explained that the servers located in Canada are fully held under US law as if they were located somewhere in the USA.

Comment Re:Hyper-linking was invented in the 60's .... (Score 1) 70

3-4 years prior to RoboBoard was a system called FirstClass (originally macintosh only) that was started to be a groupware 'learning management system' but was heavily utilized as BBS software as well.

It provided email and forums (even with fidonet support, although mainly via 3rd party software as FCs remained pretty lacking), voice/fax, file transfer, etc and the protocol was multithreaded so you could be doing all of those things at the same time, and all over a 1200 baud modem.

It was primary used with a GUI client, although had options in the server to provide a crappy text interface for dialup users in a terminal app. This text interface had nothing on wwiv but did at least provide a simple way to download the mac or windows GUI client for the advanced features.

They later added appletalk networking and finally tcp/ip as well in the early 90s, but by 94/95 the BBS era was pretty well dead and everyone moved on to the Internet.

At least around these parts the transition was a fairly obvious one.
First you offered a BBS.
Then you offered a BBS with Internet.
Then you offered Internet with a BBS.
Finally you just offered Internet.

Between Eternal September in '93 and the web just being invented shortly before, that is when Internet usage exploded and was the beginning of the end for the entire BBS world.

Comment Re:The console advantage. (Score 1) 86

Because there were a ton of 2600 machines out there that would not be compatible, while the 5200 was compatible with 2600 games.

Just a tech-nit, but it was actually the 7800 that was the "next gen" 2600 that had backwards compatibility with games and utilized the same controllers.

The 5200 was a totally different and unique beast that wasn't forward or backward compatible with anything, used completely different shaped cartridges, and a different controller protocol and connector (it was analog input with a keypad of buttons and the new pause from the controller function)

Comment Re:Uh, no (Score 1) 250

We cannot create intelligent machines with personalities of humans.

What you claim is impossible is a thing we humans do many thousands of times every single day.

It's called having babies. You are not a special snowflake, your body is just a machine made of billions of cells working together in a very (Very) complex system.
The fact we do not fully understand that complex system does not change the nature of what it is.

The question isn't if it is possible to do the thing we do multiple times a day.

The question is only one of engineering, if we can learn the knowledge and ability to gain much more control over the existing process we have for making intelligent machines, in order to build more resilient and stronger components to the machines we are.

However traveling faster than light speed currently really does look like it is a physical impossibility.
Which presents yet another significant obstacle we would need to work within the limits of, and you may very well be correct that the traveling fast enough problem turns out to be insurmountable.
(Which would be very sad indeed, but unfortunately that currently appears to be the case.)

Comment Re:true (Score 4, Informative) 368

With RealVNC - can I remote into a machine which is still at the bios / boot stage?

Yup, AMT can provide remote access when the system is in any of its sleep states from s0 (fully on) down to s5 (powered off), so long as the system is plugged in and has power available.

You will see the whole BIOS bootup sequence, including seeing and able to send the usual interrupt keys like del or F9 or whatever to get to BIOS setup.

I've had some older HP workstations be a little funky between the BIOS setup and the OS taking using the GPU. Generally I'll see a screen flash and get disconnected, after which VNC reconnects immediately and all is well again.
Newer HPs we have haven't done this that I recall, nor have the Dells or my home built franken-pc so guessing it's a fixed bug with older AMT versions?

In fact one of the main purposes of ME is to change the power state, meaning you can turn the main system on or off or reboot it just from there.

That's how I re-image a remote system after a hard drive failure.

I have someone on-site power off the system and replace the hard drive with a new one, then let me know.
I then connect to the remote system via ME/AMT and setup a dvd-rom redirect to an ISO image on my PC, start the AMT VNC server and connect to it from my PC, lock the remote systems keyboard so anyone local can't over-type me, and then instruct the remote system to power on.

Then during boot if the remote system gets stupid and tries to boot from the new blank HD and stops, I can issue a reboot command and use the F11 boot menu from the BIOS to point it to the DVD drive. Usually that part just works though (like I said, all related to the older HPs)

Once the linux image boots and runs clonezilla, it's just an [enter]-[yes]-[yes] away from writing the backup image back to the new HD.

You can of course point to an OS install media instead and do that manually, I just tend to try and avoid that for installers using a mouse, since over remote links that can suck pretty bad. Over LAN it seems nice and responsive however.

Once done I do a normal "shutdown -h now", disable the DVD drive redirect, and power the system back on. Once I see the windows loading screen I'll disconnect VNC and shut down the VNC server in the AMT, and logout of the https interface.

Since I let AMT piggyback on the host MAC and IP, it basically intercepts any tcp ports it is using instead of passing that info up the stack to the OS.
I don't leave VNC running in the AMT just in case the host OS needs to run a VNC server on the default port for any reason - plus nothing good can really come from leaving it running when not needed.

ME uses https over port 16993, which isn't likely to be used on the OS (or if so, too bad for that app I guess)
If you already have RealVNC and a Core i7 at home to play with, boot the i7 and hit control-p where you normally would hit delete or a function key, and you'll be in the ME setup menu.
You can enable both ME and AMT (they are separate sub-systems) and play around.

Slashdot Top Deals

"Aww, if you make me cry anymore, you'll fog up my helmet." -- "Visionaries" cartoon