Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - SourceForge assumes ownership of GIMP For Win, wraps installer in adware (

An anonymous reader writes: It appears that SourceForge is assuming control of all projects that appear "abandoned." In a blog update on their site, they responded saying in part "There has recently been some report that the GIMP-Win project on SourceForge has been hijacked; this project was actually abandoned over 18 months ago, and SourceForge has stepped-in to keep this project current. "

SourceForge is now offering "to establish a program to enable users and developers to help us remove misleading and confusing ads."

Comment This needs to go live. (Score 1) 11

More so than slashdot beta, crud like this is going to sink these once famous brands.

SlashdotMedia needs to post this, include a link to their lame-duck response if need be, and let the discussion go where it may.

It's one thing to keep these brands and sites going past their prime, it's another to *actively* tarnish the brands to extract what ad dollars they have left.

Submission + - Sourceforge staff takes over a user's account and wraps their software installer ( 11

An anonymous reader writes: Sourceforge staff took over the account of the GIMP-for-Windows maintainer claiming it was abandoned and used this opportunity to wrap the installer in crapware. Quoting Ars:

SourceForge, the code repository site owned by Slashdot Media, has apparently seized control of the account hosting GIMP for Windows on the service, according to e-mails and discussions amongst members of the GIMP community—locking out GIMP's lead Windows developer. And now anyone downloading the Windows version of the open source image editing tool from SourceForge gets the software wrapped in an installer replete with advertisements.

Comment How do buy it now? (Score 1) 63

It seems that LORD is in a weird copyright state.

Original developer sold the rights, but the company that holds those rights seems to have gone MIA. It seems he's tried reaching out to them, but they're not responding to him or anyone else, or even new sales. He still has the sources, but legally cannot release them.

All it would take is these guys:

to grant permission, and LORD *COULD* be ported to more modern systems, rather than trying to figure out bizzare ways to emulate a 16bit systems and expose them to the public internet.

(or waiting 70+ years)

Comment Re:Replaceable computer (Score 1) 317

This is not an insurmountable problem -- so long as the 'head' is user-upgradeable, and offers all and any 'modern' connections.

The Interface to the car's electronics has largely been stable. IIRC the CAN/ODB/ODB2 bus are extensible. RS232 has been around since 1962. It would not take much effort to define a simple, *OPEN*, and extensible monitoring + control protocol over any of these connectors, but they seem to not want to.

Comment Re:Cell phones are usually tied to a person (Score 2) 445

Grandstream is good for "cheap" phones of acceptable quality. They just recently announced this:

Although it might sound nice to have the whole interface be a touch screen, I think that the hard-keys for dedicated functions end up improving the usability of the device.

Comment Re:I'd love to ! (Score 1) 601

If I could, I totally would.

This argument doesn't make sense though. Even in public traditionally, there's always been a fairly reasonable expectation of privacy, (despite what the law says) because you expect you can only be heard within earshot of your chat. Only recently that technology is affording the law a means to observe + record these interactions " in public " are we starting to push right up against that definition.

Keep in mind a single email won't be sensitive, but a bunch of emails in aggregate can potentially be. And besides; if you encrypt just that 1 sensitive message in a mass of unencrypted 'less sensitive' messages --- it's going to stick out like a sore thumb, and an attacker (be it lawful or unlawful) will focus all their resources on that 1 message.

I think you're just not paranoid enough.

Slashdot Top Deals

To understand a program you must become both the machine and the program.