Become a fan of Slashdot on Facebook


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Mid-end? How can the middle by an end? (Score 4, Insightful) 23

I hate really stupid terms and mid-end is really stupid.

You have an array of products and the most expensive and least expensive are hi-end and low end. All the rest are not "end"s. Mid-class or mid-line would work, but let's not start using such an oxymoronic term as "mid-end".

Comment Re:A Master Password.... (Score 4, Interesting) 234

Calling anyone who disagrees, especially when they point out that you are wrong, a "shill" is just the same as any unsupported BS from a presidential candidate. Null content.

Several years ago I had the job of evaluating LastPass for $DAY_JOB. I tested it by capturing the data uploaded to the network and confirmed that it was AES encrypted using my password on my system and the data was all encrypted before leaving my system. the master password was never transmitted in any form that I could find. No traffic was generated to/from any other port or location.

While it is true that things might have changed since then, the server remains open source and you can confirm that it does not ever touch the master password in any form. More importantly, the system is heavily examined on a continuing basis by security researchers and, while vulnerabilities have been found, reported, and fixed, there has never been any question of the master password leaving the client.

With well over 100 unique, random, long passwords, some only used once or twice a year, I really lack other options than a password vault in a world where accounts might need to be accessed from a desktop, two laptops, and two phones running six OSes (2 VMs and one dual boot).

Comment Re:Encryption is for criminals (Score 1) 198

Encryptions is for criminals. Ordinary people don't need military grade encryption to protect themselves. It's primarily used to hide illicit activities from the police and serves no legitimate purpose.

Like it's no big deal if someone steals your trivially encrypted authentication for your bank account and takes all of your money? But let's go big time like they did in Bangladesh and simply steal directly from the banks.

Even FBI director Comey has stated that encryption is essential. He just believes in magic encryption faeries that will decrypt data that hides terrorists and pedophiles from the good guys. (I.e., Those he defines as good guys.)

Comment Re:So in other words it's used and is useful (Score 1) 248

This is really silly. All a barometer needs is either one or two tiny holes (depending on the design of the sensor). The sensor would need to be sealed to the sensor and water tight, of course, but that is required by any sensor they might use. This story is simply an excuse.

I'll guess two possible reasons for this:
1. Force more use of Apple patented and licensed tech for headphones
2. Allow DRM implementation at the headphone jack to further control what can be played on the iPhone

Comment Re:Softare and wording problem (Score 1) 210

Actually, I think their approach is about right. People tend to follow a reasonably consistent schedule. If you plug your phone in every night and more or less nothing happens until 7:00 next morning, then only change to 80% (which is pretty conservative) or 85% (still avoids the levels that cause most of the damage to the lithium mesh) until about 6:30 and then charge to 100% and does the same based on recorded battery use throughout multiple averaged days, you can have a greater capacity when it is needed, but not have the charge above 90% except for short intervals. This would significantly extend battery life while not significantly reducing the usage time of the phone. Better modeling based on not just daily used, but also looking at day of the week would do even better.

I've been wishing laptops would do this for years. IBM and now Lenovo have been doing a far simpler battery life extension technique for years, but, when I have suggested that it would be good if FreeBSD or Linux do this, I've been unable to get much interest from developers and generally been unable to convince them that this would even be a good thing even when providing pointers to papers on research into l-ion battery behavior showing the significant damage keeping a battery at 100% for long periods does.

I saw a video several years ago that showed a photomicrograph recording showing the physical movement of the lithium grid during charge and discharge at or near "full charge" and how over-charging or even fully charging and holding that charge would slowly break down the grid. I put "full charge" in quotation marks because that number is picked by the manufacturer/designer as a trade-off between capacity and life. Wish I had saved a pointer to this. It was pretty dramatic.

Comment Re:It didn't have an off switch before (Score 1) 369

If my router drops all packets to those IP addresses, it does not matter what is hard-coded or what Widows capabilities are short-cicuited. Almost everyone now has a router and all that I have used allow dropping packets to specified destinations. Cheap ones may not.

The issue of Windows changing this is valid, though. I suspect someone (or several of them) will start serving the list of addresses being used. Someone may well already be doing this.

If you use other Microsoft services, though, those will likely break if you do this.

Comment Wow! This is SUPER SECRET! (Not) (Score 1) 368

IME and AMT have been well documented for years. The Wikipedia article has been around since at least 2007 and was flagged by an editor as reading like an Intel ad. It fully describes the basic design and functionality of the system and only varies from the article in that AMT has now been incorporated into the chipset and is no longer a separate chip.

Even that its network connection is independent of the CPU and any filtering is described.

I have been aware of AMT since it was discussed as a way to do an psueudo-console connection on modern systems that lack a serial port in FreeBSD kernel debugging discussions. I suspect that Linux discussions also show how to do this as IT IS NOT SECRET!

I'm not really comfortable about it, but it is very useful, has been designed with security in mind and should be very difficult to suborn, and Intel considers it a feature that is advertised, so IS NOT A SECRET!

Comment Re:Slow them with real traffic (Score 1) 767

The neighborhood associations need to hire someone to drive back and forward on the route at 2.5 mph during peek hours.

At least in California, this will get tickets for obstructing traffic.

The law requires that if you have 5or more cars behind you and yo9u have no cars in front of you that you pull over and allow them to pass. This even applies when you drive the speed limit, but is open and shut at 2.5 MPH. Better check on the laws where you live.

Comment Re:FM radio's last gasp? (Score 1) 340

Aside from data saving, I want to be able to listen to local sports broadcasts. Last night I missed the first half of the basketball game that was broadcast locally because the audio stream was unavailable except with a payment to the NBA for the "season" audio package. I could have streamed the telecast, but that would have severely eaten into my 3Gig of shared data for the month.

Of course, I was being cheap, I guess, but paying to listen to a game that would have been free if I had a radio was really annoying and more so as I know my phone had a perfectly good FM receiver that I could not use.

I had access to the tuner on my old HTC Thunderbolt. A pretty crappy phone, but I found the FM tuner quite nice and missed it a lot after switching to a Galaxy S4 a few years ago.

Slashdot Top Deals

"Pay no attention to the man behind the curtain." -- The Wizard Of Oz