Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Wrong motive (Score 1) 110

I don't know what it is you want, to announce themselves as the lawless ISP or the pirate ISP or anything like that would only be foolish in so many ways.

Why? For the record, the Swedish PirateISP seems to do just fine. Granted, they only offer services to one city currently, but that city has one of the largest Swedish universities, along with all of its student dorms. Honestly, I don't see why it'd be 'foolish' to have a pirate ISP, they are not responsible for their customers. If anything they're sure to get them, being the only company offering 1Gbps/1Gbps fiber connections to households (for $80/month).

Comment Re:Epic Fail? Hardly. (Score 5, Informative) 534

Ok, the PS3 was launched on November 11, 2006. Today's date is December 29, 2010. That means that it took over four years to be broken.

Compared to DVD and Blu-Ray, that is actually pretty darn good.

I was at the presentation in Berlin today. They did bring up this exact point.

Their counter argument was that people don't take into consideration that the console did support homebrew until Sony declared they'd drop that. The argument for that action was they'd save money not having to support it for their then-new PS3 Slim models, which turned out to be bullshit after hackers discovered that the Slim (with some hacking) could actually run the same Linux distros as the PS3 Fat. They then disabled OtherOS on the PS3 Fat, too.

This was 12 months ago (can't cite a source other than the slides), making it take only 12 months of actual effort for it to get cracked, as opposed to other (closed) platforms where the homebrew hacking efforts begin at day 0.

The Internet

Several Link-Spam Architectures Revealed 38

workie writes "Using data derived from website infections, has found several interesting link-spam architectures. One architecture is where concentric layers of hijacked websites are used to increase the page rank and breadth of reach (within search engine search results) of scam sites. The outer layers link to the inner layers, eventually linking to a site that redirects the user to the scam site. Another architecture involves hijacked sites that redirect the user to fake copies of Google, having the appearance that the visitor is still within Google, but in reality they are on a Google lookalike that contains only nefarious links."

Submission + - U.S. Intelligence planned to destroy WikiLeaks, 18 ( 3

An anonymous reader writes: This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. ``The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to cannot be ruled out''. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses ``trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers'', the report recommends ``The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Web site''. [As two years have passed since the date of the report, with no WikiLeaks' source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that ``Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the website''. The report provides further justification by enumerating embarrassing stories broken by WikiLeaks---U.S. equipment expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the Iraqi town of Fallujah and human rights violations at Guantanmo Bay.

Comment Re:Facebook spam? (Score 1) 313

The obvious counter-argument from average (ignorant) Joe is that "well, the criminals encrypting their harddrives shouldn't be regarded as freedom fighters, they should be put into jail, and since I'm not a criminal I don't need to encrypt my stuff"

Submission + - Swedish Hackerspace raided by the police ( 4

intedinmamma writes: At 20.45 on Saturday the 28th of November the police raided the social centre Utkanten in Malmö, where the hackerspace Forskningsavdelningen is housed. Twenty officers in full riot gear and ski masks broke into the space, using crowbars. The official reason for the raid was to do a “pub check” because of the suspicion that there was illegal selling of alcohol going on at a punk concert. After the raid the cops confiscated a lot of stuff, being indiscriminate as to whose effects were removed. A lot of equipment from Forskningsavdelningen were taken, and also some personal belongings, even though the hackerspace was unaffiliated with the group arranging the concert downstairs.

Submission + - Swedish hackers in a squat fight eviction ( 4

lekernel writes: The newly opened Abbenay Hackspace in Stockholm has released a call for support in their struggle to keep their space. It was an empty office building until squatters moved in. The discussions with officials have stalled completely and the squatters live under the constant threat of police raids. Abbenay Hackspace is asking people to contact the landlord, and explain why creative spaces such as hackerspaces are important to them. Is there room for hackerspaces in major cities? Or is squatting the only viable strategy for hackerspaces in expensive areas?

Comment I wonder... (Score 3, Interesting) 337

... how they're going to stay online. The service itself has to be hosted somewhere where they won't have too much hassle with the constant influx of copyright complaints. The *AA companies will then be able to kill two of birds with one (or the cardinality of the userbase with one stone) by just getting whatever details about IPREDator they need and taking them to court for their illegal downloading. We have to remember: while The Pirate Bay remains legal, the illegal downloading has always been, and I'm very interested in details as to how they keep this service running in any country if they claim responsibility of their users' actions.
Data Storage

Submission + - DIY Data recovery. 1

jchillerup writes: "The other day my aunt came up to me, terrified because her hard drive was "not working". I inspected the drive and it was clearly a head crash, and to make matters worse it had been running for quite a while afterwards. I tried a commercial program for Windows, GetDataBack, but it wasn't able to recover anything.

I googled a bit to get tips and tricks on lo-fi data recovery methods and read that if you put the drive in the freezer, your chance of getting data out is hightened, so I did that. After all, nothing *bad* can happen to the drive in the freezer (right?).

I'm considering dd_rescue, but before taking the drive out of the freezer, I figured I'd better "Ask Slashdot". Professional data recovery is beyond the budget, unfortunately."

Slashdot Top Deals

A sine curve goes off to infinity, or at least the end of the blackboard. -- Prof. Steiner