Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re: Not the leaks (Score 2) 304

In spite of your love affair with snowden and hated of child fjord, the espionage in most of these cases really is not the real problem. All countries really do do it. And even though it is popular to bash the US they really do put a lot more restraints on themselves than most other countries. Most of this is just convenient political posturing.It is kind of amazing the number of "leaks" from other countries doing the exact same stuff. E.g. the NSA did not spy on EU citizens, their own counties did, and then blamed the NSA.

Comment Re: Not the leaks (Score 1) 304

Snowden may be many things, but a whistle blower he is not. If that is what he is, then he could have stopped at the call metadata and prism. I do not understand how talking about us spinning on foreign governments is any thing but being a traitor. It is hard to take his rants about the US being the worst spying country in the world as he gets handled by the FSB.

Comment Re: Brazil spies on us? (Score 1) 239

If you actually take the time to look at some of the material that has been published and ignore the hype people like greenwald put in to push their point of view rather than report on what is actually there you would actually see a lot more protections and checks than is being reported generally. Also it is amazing how often after some sensational article comes out, when it gets more scrutiny it turns out to not really be all that damming. Probably the most telling thing is that even with people going out of their way to look for evil intent they have so far only shown the possibility of abuse, not the actual large scam systematic abuses everyone worries about. Yes, there appears to be some large scale collection programs, but in today's world it does not seem like there is any way to do intelligence gathering any other way. This is not the 40s where every phone call occurred on its own individually hand switched circuit anymore. And phone calls now are really just a minor part of what is going around.

Comment Re:spin. (Score 1) 523

Do you want those who improperly classified info to be punished, as well?

As that is neither a violation of oaths, nor military code, nor US law, I think the appropriate response is to determine who is at fault and hold them accountable through the normal democratic process.

Actually over classification is a federal crime. The same law that set out the classification levels etc also made it illegal to knowing over classify material simply to keep it out of the public eye. Now that aside I still feel from what I know what Manning did was wrong and he should be punished to the full extent of the law.


Submission + - MS in CE with BS in CS

mtthws writes: I am a Software Engineer with a BS in CS. I have been working as an embedded engineer for the last seven years. I have really enjoyed working with the hardware and want to get more into that side of things. I have been considering going back for my masters in Computer Engineering. I know I will have to do a lot of work to get this to work. I was hoping to get advice from other people who have gone down this road before. Especially on any suggestions on how to handle a full time job and raising twin one year olds while going back to school.

Comment Re:In other words, talent down the drain (Score 1) 136

What do you propose then? Historically defense has been where any number of the innovations we currently take for advantage came from. It is often times extremely hard to value what they produce, especially from highly secretive portions of it, but they are there. The NSA has been working with colleges for years to beef up their security education. Now they probably only get a fraction of the graduates that go through these programs. How do you think the companies that get the remainder feel about getting developers that better understand how to create secure systems and software? How does that benefit the economy? While some of the cyber issues may be over hyped, I do not think to many people will disagree that we can do a hell of a lot better. How often do we hear about companies getting broken into or attacked? I also do not think there is really any group with as enough influence and resources to get us on better footing the the Federal Government. In order for that to happen they have to make a major investment, hence what is going on in this article.

Submission + - suffers from DDoS attack, again ( 2

nmx writes: "The domain registrar is the target of yet another DDoS attack, effectively killing most of its customers' businesses:

"On Friday, November 12th we were hit by a distributed denial of service attack (ddos). We are actively working to mitigate the attack and restore services as soon as possible. Every available resource has been deployed to address this malicious attack."

Even for those customers who host their websites elsewhere, DNS is completely broken for the affected domains."

Comment Re:It comes form scope creep (Score 1) 571

It's one thing to choose how to license your own code; it's quite another to insist that others license their code the same way, simply because it may have some tenuous connection to your code.

I don't think the connection is tenuous. Is the theme intended to be run as part of Wordpess? Yes. Does the theme work without Wordpress? No. Sounds like a derivative work to me.

IMO there is a big difference between coding to an established interface (let's say POSIX) and writing an extension (theme/plugin/whatever) that is intended to run only as part of a specific piece of software (like Wordpress).

If you want to create your own non-GPL blogging software to run your own themes, go for it. If you want to save time by using someone else's work, you have to abide by their rules. I am pretty sure that this definition of derivative work has not been tested in court yet, but it really has nothing to do with the GPL specifically.

PlayStation (Games)

PS3 Hacked? 296

Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."

Comment Re:It's obvious (Score 1) 502

If the patient REALLY wants that head CT, even though it's unnecessary and expensive, what about that one in a million chance that there was really a problem that the doctor missed that the test would have caught? Can you say lawsuit? Over-medicating and over-testing are a big problem, but don't blame the doctors, blame the lawyers and the misguided notion among the public that more treatment is always better.

Slashdot Top Deals

Pound for pound, the amoeba is the most vicious animal on earth.