Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Galaxy Tab is the discerning user's choice (Score 1) 524

A standard implies that a specification or protocol is available to 3rd parties which is incorrect.

I still wouldn't necessarily call it a standard, but your assertion that there are no specifications available to 3rd parties is wrong.

http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/swf/pdf/swf_file_format_spec_v10.pdf

Comment Re:report it to the fcc (Score 1) 499

+5 Interesting? really?

FYI, consumer WiFi uses unlicensed radio spectrum, and is subject to FCC "Part 15" rules. http://en.wikipedia.org/wiki/Title_47_CFR_Part_15

This almost always means that the device is required to accept any interference that may be present.

Sorry, you can call the FCC all you like, but I'm quite certain that the nice receptionist that answers the phone will gladly take down your name and number for "someone to call you back" and then promptly toss it in the trash.

Security

Submission + - 700MB of MediaDefender internal emails leaked (torrentfreak.com) 2

qubezz writes: The company MediaDefender which works with the RIAA and MPAA against piracy (setting up fake torrents and trackers and disrupting p2p) had earlier set up a fake internet video download site designed to catch and bust users. They denied the entrapment charges. Now 700MB of internal emails from the company from the last 6 months leaked onto BitTorrent trackers detail their entire plan, how they intended to distance themselves from the fake company they set up, future strategies, and reveal other company information such as logins and passwords, wage negotiations, and numerous other aspect of their internal business! torrentfreak.com details some of the jems!
Security

Submission + - What does your dead man's switch do?

LqdEngineer writes: "How many of the Slashdot crowd use or have used a Dead Man's Switch designed to perform some action if you don't check in for a certain amount of time? Recently, I decided to put one together using MySQL and some Cron jobs, but I wanted to see what others have their Switches set up to do in the event you fail to check in. E-mails to loved ones? Send encryption keys to friends/family? Hate mail to your boss? Has anyone ever been on the receiving end of a Dead Man's e-mail? I can't even imagine how creepy that would feel."

Slashdot Top Deals

Mystics always hope that science will some day overtake them. -- Booth Tarkington

Working...