Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:That's a billion people (Score 1) 126

Since GA is based off of Urchin, I assume that they are using something close to it. Urchin works off of a server's access logs. Primarily, it tries to set a cookie that is then used for tracking. The standard practice is to modify the access logs to include that tracking token in the log entry. If no cookie can be set, then it approximates a session based on source IP, user-agent, referrer, time between requests, etc.

I would imagine that most people are being counted multiple times, thus inflating the number considerably.

Comment What are the intention? (Score 2) 61

Some companies get patents for defensive purposes to ensure no one else patents it and uses it against them. I had a serious knee-jerk reaction when my employer sent out an email advertising our patent program. The explanation I got was that we weren't going to be patenting stuff to keep others from doing those things, but to patent them before others do so that we can't be sued. Facebook could be doing just that. In that same email, I was told that the company despises the state of IP and have active lobbying efforts to change things. I felt much better about my employer after hearing all of that.

Comment Re:I'm not giving them my data! (Score 3, Insightful) 396

It sounds like you're not the type of person that is the target of most managed solutions. Cloud products aren't right for everyone and certainly not for every application. Cloud solutions won't ever take the place of bare-metal hardware for folks that need it. I am an operations admin for a cloud product and I have no problem telling customers when their stuff just isn't the right fit for our product. But, what's not right for you, doesn't make it wrong for everyone else.

Hawking Picks Physics Over God For Big Bang 1328

Hugh Pickens writes "The Guardian reports that in his new book, The Grand Design, Professor Stephen Hawking argues that the Big Bang, rather than occurring following the intervention of a divine being, was inevitable due to the law of gravity. 'Because there is a law such as gravity, the universe can and will create itself from nothing. Spontaneous creation is the reason there is something rather than nothing, why the universe exists, why we exist,' Hawking writes. 'It is not necessary to invoke God to light the blue touch paper and set the universe going.' Hawking had previously appeared to accept the role of God in the creation of the universe. Writing in his bestseller A Brief History Of Time in 1988, Hawking wrote: 'If we discover a complete theory, it would be the ultimate triumph of human reason – for then we should know the mind of God.'"

Comment Stop being a douche (Score 5, Insightful) 539

As someone that works in support for a hosting provider, you're the type of customer that irritates me the most. While they shouldn't be rebooting your box to get root access without your consent, you should at least help them help you. Give them an account with limited sudo access to view your logs. If that won't do, then provide them with the necessary logs. If that's not good enough, don't expect support and move your stuff to some place that doesn't provide the level of support you're paying for.

Evidence of Russian Cyberwarfare Against Georgia 316

An anonymous reader writes "In what seems to be a repeat of what happened in July, a few news sites have mentioned that there is evidence of a campaign against Georgia. For example, both the government's and the president's sites are inaccessible, among other official websites. For some analysis, the RBN Exploit blog demonstrates various traceroutes that have failed to several sites. They also claim that the RBN (Russian Business Network cyber-crime organisation) are behind the attacks, and that 'Many of Georgia's internet servers were under external control from late Thursday,' before the actual war began. Finally, according to this Twitter account of someone in Georgia (written in Russian), he claims that 'Russia has blocked access to Georgian websites from within Russia' (rough translation)."

Comment Re:Point out the negative effects (Score 1) 475

It is not likely that enough recipients will take the effort to report the mail to
There are ways to configure a mail server to automatically report messages that are identified as spam to other blacklists.

Is the spamcop blacklist widely used anyway?
Yes. (I work for a large hosting provider and see it among the most commonly used after Spamhaus.)

At most, some individual Bayesian filters may become more sensitive to the name of the company and travel-related spam, although I'm not sure how hotmail/gmail/yahoo exactly deal with user-reported spam.
Again, some client-side utilities can be configured to automatically report spam to blocklists and spam digesting providers (i.e. pyzor).

The submitter works for a travel agency. Plenty of competition; the chance that the potential customer comes to them is small anyway.
But a lost sale is still a lost sale. If would really suck if one of those would have been a repeat business customer wanting to setup contracts.

I'm afraid that, however unethical this spamming would be, the risk of getting in trouble is rather small.
Again, from someone that works at a large hosting provider, you're right. I think the biggest risk is the potential tarnishing of the business image. It sounds like the boss is in the knee-jerk reaction. He needs to have a cool head to gently persuade him and show him the business case for not responding. You have to show him that it makes the whole business look unprofessional and the competitor has already done that to themselves. If these are known customers, it would be better to contact them directly via some other means (such as a phone call). You'll do better to work on your customer relationships than you would to respond in such an impersonal and annoying fashion.
Wireless Networking

Duke Wireless Problem Caused by Cisco, not iPhone 195

jpallas writes "Following up to a previous Slashdot story, it now turns out that the widely reported problems with Duke University's wireless network were not caused by Apple's iPhone. The problem was actually with their Cisco network. Duke's Chief Information Officer praises the work of their technical staff. Does that include the assistant director for communications infrastructure who was quoted as saying, "I don't believe it's a Cisco problem in any way, shape, or form?""
GNU is Not Unix

Submission + - Joomla! GPL Compliance Issues Sparks Upheaval (

jascat writes: "An article at highlights the recent flap with developers of closed-source extensions to the Joomla! Content Management System after Open Source Matters, Inc., the organization created by the Joomla! developers to serve as protector of Joomla! and copyright owner, announced that such extensions violate the GPL.

Joomla! project leader Louis Landry and his colleagues want to protect the project they love. That's why, after two years of allowing proprietary plugins for the open source CMS, the group has decided to ask third-party developers for voluntary compliance with the terms of the GNU General Public License, under which Joomla! is licensed. Those developers are complaining that it's unfair for Joomla! to reverse its position after "a bunch of companies spent millions," according to one developer employed by a company that markets the proprietary extensions. Landry says he and the Joomla! team were wrong to have allowed the exceptions, and a return to compliance is essential in order to legally protect the open nature of Joomla!."


Submission + - Scanning Ajax for XSS Entry Points

An anonymous reader writes: Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application.

Submission + - Robert Adler, co-inventor of TV remote, dead at 93

yroJJory writes: "Hit the mute button for a moment of silence: The co-inventor of the TV remote, Robert Adler, has died. Adler, who won an Emmy Award along with fellow engineer Eugene Polley for the device that made the couch potato possible, died Thursday of heart failure at a Boise nursing home at 93, Zenith Electronics Corp. said Friday.

In his six-decade career with Zenith, Adler was a prolific inventor, earning more than 180 U.S. patents. He was best known for his 1956 Zenith Space Command remote control, which helped make TV a truly sedentary pastime.

In a May 2004 interview with The Associated Press, Adler recalled being among two dozen engineers at Zenith given the mission to find a new way for television viewers to change channels without getting out of their chairs or tripping over a cable.

Adler also was considered a pioneer in SAW technology, or surface acoustic waves, in color television sets and touch screens. The technology has also been used in cellular telephones.

The U.S. Patent and Trademark Office published his most recent patent application, for advances in touch screen technology, on Feb. 1."

Slashdot Top Deals

Executive ability is deciding quickly and getting somebody else to do the work. -- John G. Pollard