Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment AoE anyone? (Score 1) 131

As this is Slashdot, I expected the article to be about an ATA over Ethernet switch that would let you build an array of drives to rival fibre-channel.
Now that would be interesting.

Unfortunately it was just another article meant more for

If I have many OSs and filesystems in my box, I would want to have access to everything from any OS. Linux supports NTFS, Windows supports ext3(after installing a driver).
This mod is pointless. You need 2 drives that you can only use one at a time. The amount of power you save negligible. And you would extend the life of your drives way more if you put on them a fan you got from free from the garbage dump.

Comment Thin Clients Are Overrated. (Score 1) 411

My advice is, do not go with thin clients. If budget is an issue go with Asus Eee boxes or a Shuttle SSF PC. They can come down in price to a level comparable with a thin client. Yet they are poweful enough for school purposes.IF necessary they can act as thin clients anyways.

Some departments yes, will need more powerful computers. The students who will do any work on autocad, photoshop, video editing will need more juice. If you are going with Windows, I doubt you can still license XP. But you can look into Windows FLP (for legacy PCs). If you go this way, one interesting thing you can do is put a Linux box in every class (or every compsci class) with several different distros that students can play around with ( ubuntu desktop, slackware, CentOS server). I am not sure about handing out tablets. Do the students really need mobility. Having a few laptops and tablets(only 10 or 20) that can be borrowed when needed is good,i.e. students working on programming a small robot; but expecting everyone, students, staff and school-board, to take advantage of the opportunity if every student has a tablet is unrealistic.

Comment I'm procrastinating quite a lot so ... (Score 2, Interesting) 292

Apu's quick guide to cyber-anonymity:

Buy laptop with cash.
Buy a tiny 4gb+ usb thumbdrive with it.
Wipe hard-drive using any linux live-cd.
Make 2 or more partitions on the hard drive.
On the last partition setup Windows XP so that authorities have something to work with if they check your computer.
Setup your preferred linux distro on the first partition.
If option is offered encrypt your home directory.
If not use truecrypt and encrypt your entire linux partition. Leave Windows XP naked.

Setup GRUB so that:
-WinXP boots by default
-Grub doesn't show up at all unless desired combination is pressed upon bootup.

Label the linux partition as Recovery or Backup, be creative.
Do all your deemed illegal things on linux, and your "civilized" things on windows.
Use TrueCrypt hidden volumes for storing sensitive information, in case you are extorted.
Use HotspotShield VPN or Ultrasurf proxy for browsing the web.
If you can get a hold of a linux box in europe set-up openvpn with it.

Have a bootable livelinux on your thumbdrive just in case, along with portable truecrypt and stored hidden volumes if necessary.
Don't ever backup the same thing twice.
Use sneakernet or snailmail for sharing information with friends.
GnuPG is your best friend.



Comment Meh... (Score 2, Insightful) 292

If there's one thing that you really can't control today is the flow of information.
Constructing an Orwellian society is impossible because geeks are always going to be many steps ahead.
Sadly though, the mentallity of many governments is still stuck in the past and most politicians have no clue what PGP is.

Comment I'll take you on... (Score 5, Informative) 236

I appreciate your rappin',
Dat win dose's still crapin',
N' all the bloggers yappin',
Then watchin' pr0n n' fappin'.

Looks like Microsoft has grown a pair,
Taken on to torrents outa despair,
Thus the new OS' come to be,
The great Windows 7 conspiracy.
Some say 't looks similar to KDE,
N' other things based on BSD.

But I really dun give a shiz,
'Bout Aero, Aqua OR Compiz.
Just wanna have all my apps,
Run smooth as ass on x86.


Comment Absolutely amazing game but... (Score 1) 79

Its level of addictiveness is next door to crack.
I remember many weekends I've wasted with the previous games in the series. Once clocked in 20hours of continuous play. Looks like I might finally be able to break my record once this gets released.
The good thing though is that Online gameplay is not it's "major" component so you wont be quitting your job/school for this.

FBI Vaguely Warns of Asterisk Vishing Vulnerability 57

coondoggie writes in to let us know about a fraud alert issued by the FBI's Internet Crime Complaint Center, warning that an unspecified bug in unspecified versions of Asterisk IP PBX software could allow criminals to generate "thousands of vishing telephone calls to consumers within one hour." PC World checked with Digium, developer of Asterisk, and found some puzzlement as to what bug the FBI had in mind. "In March, researchers at Mu Security reported a bug that could allow an attacker to take control of an Asterisk system. Digium wasn't certain what vulnerability the FBI was referencing in its advisory. However John Todd, the company's Asterisk open-source community director, believes that it was probably this March bug. That vulnerability 'basically allowed you to take over the account of one individual,' he said. ... However, the attack described by the FBI would be extremely hard to pull off, Todd said." Update: 12/09 02:54 GMT by KD : Digium has put out a statement on the IC3 warning (further details), confirming that what the FBI had in mind was an old bug and difficult in the extreme to exploit.

The Beginnings of Apple Computer 181

John Burek points out an article written by Stan Veit, former editor-in-chief of Computer Shopper magazine, and one of the first retailers to deal with the fledgling Apple Computer in the late 1970s. Veit describes his introduction to the Apple I and his early interactions with Steve Jobs and Steve Wozniak as they developed their early models. Quoting: "After Woz hooked his haywire rig up to the living-room TV, he turned it on, and there on the screen I saw a crude Breakout game in full color! Now I was really amazed. This was much better than the crude color graphics from the Cromemco Dazzler. ... 'How do you like that?' said Jobs, smiling. 'We're going to dump the Apple I and only work on the Apple II.' 'Steve,' I said, 'if you do that you will never sell another computer. You promised BASIC for the Apple I, and most dealers haven't sold the boards they bought from you. If you come out with an improved Model II they will be stuck. Put it on the back burner until you deliver on your promises.'"

German Gov't Donates 100,000 Images To Wikipedia 113

Raul654 writes "The German Federal Archive has agreed to donate 100,000 images to Wikipedia under the German version of the Creative Commons Attribution Share-Alike License. These pictures cover a period from 1860 to present. This is the largest picture donation ever to Wikipedia, and possibly the largest in the history of the free culture movement." Apparently, this is part of a project which will eventually make 11 million photos available for public use.
The Internet

Spore the Most Pirated Game of 2008 404

TorrentFreak has posted some statistics on the most pirated games of the past year. Leading the list by a large margin is Spore, made infamous even before its release for the draconian DRM attached to the game. It was downloaded through BitTorrent roughly 1.7 million times, with The Sims 2 and Assassin's Creed following at just over a million each. (It's worth noting that Spore came out in September, so that figure is essentially for a mere three months.) GameSetWatch has posted a related piece discussing the countermeasures involved in dealing with piracy. It's the second article in a series about piracy; we discussed the first a couple days ago.

Amazon Fights Piracy Tool, Creators Call It a Parody 268

jamie points out an interesting story which started a few days ago, when a pair of students from the Netherlands released a Firefox add-on which integrated links to the Pirate Bay on Amazon product pages. Customers who had the add-on would see a large "Download 4 Free" button next to items which were also available on the Pirate Bay. The add-on quickly drew notice, and the creators were hit with a take-down notice and threats of litigation from Amazon. Now, the students have removed the add-on, and they are claiming an unusual defense: "'Pirates of the Amazon' was an artistic parody, part of our media research and education at the Media Design M.A. course at the Piet Zwart Institute of the Willem de Kooning Academy Hogeschool Rotterdam, the Netherlands. It was a practical experiment on interface design, information access and currently debated issues in media culture. We were surprised by the attentions and the strong reactions this project received. Ultimately, the value of the project lies in these reactions. It is a ready-made and social sculpture of contemporary internet user culture."

Slashdot Top Deals

"Maintain an awareness for contribution -- to your schedule, your project, our company." -- A Group of Employees