Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:And clued-in users. . . (Score 1) 67

It is the same old crap, in one breath they talk about downloading a file, ohh ahh scary stuff and in the next they actually talk about reality, file sharing, nothing to do with downloading files and everything to do with uploading. I am not responsible for anything any media company does when distributing content, I watch and ad and watch content and thats it, what they do beyond that is their responsibility.

So not 'Downloading' but uploading and the ass hats are just trying to throw in scary language. A billion web sites containing trillions of bit of copyrighted information, every page and every image on that page and every paragraph of text on that page, all of it subject to copyright laws and what, they claim you the down load are meant to what, verify the legality of all of it, what a load. When they talk file sharing, they are talking about uploading but then again a product like this https://www.cnet.com/au/produc... would technically infringe copyright because it broadcast content upon request.

Comment Re:Define "fit for business" (Score 1) 117

There is one huge problem with that, buried way down in the EULA you still agree to it and so it might not come with telemetry and spying and ads but how exactly are you going to keep that shit out, any patch at any time and M$ can stick it right back in there. Hell, the code is right in there from day one and can be activated with any built in buried config change, which can be done with any patch at any time and your security is done. Now consider how many billions can be garnered with insider trading on switching on telemetry and switching it off again to have a quick look at your financials prior to public release.

Sure you can keep them out at time of install but they can break right back in there with any patch or even any access by the operating they own and control to any of their websites. Do M$ provide tailored upgrades to specific users, yes and those upgrades then do very naughty things (including hacking firmware). There is absolutely nothing you can do to keep them out, except to never connect M$ controlled computers to the internet. Windows 10 has factually proven they can never be trusted.

Comment Re:Another step toward tyeanny (Score 5, Insightful) 243

It is not so much about anonymity in purchases, it is all about control. With a card they do most emphatically control you, you no longer buy stuff, you ask permission to have stuff and that can be denied for what ever reason they choose, in a capitalist society via that card, they can turn you into a non-citizen instantly.

Once you card is blocked you are done, no public transport, all services linked to the card shut down ie no phone calls, no taxi, no food, no drink, you can try walking home.

Via that card, they will be able to control you, your politics, your life and via their cards, your family. It is extremely dangerous stuff, cash in a capitalist society is freedom, no cash and you become a slave, always asking permission from your masters.

Comment Sinkholing, WTF? (Score 3, Interesting) 52

"Sinkholing is an action whereby traffic between infected computers and a criminal infrastructure is redirected to servers controlled by law enforcement authorities and/or an IT security company. "https://www.europol.europa.eu/newsroom/news/%E2%80%98avalanche%E2%80%99-network-dismantled-in-international-cyber-operation. Hey, fuckers, you are meant to fix the end users computers not fucking keep a back door for yourselves, seriously, what the fuck?

Comment Re:Windows phone apps (Score 1) 156

Does windows 10 phone home all the time on the phone like the desktop basically sticking the end user with the cost. Does the windows 10 phone actually make more calls than a typical end user reporting on that end user. Does it make two calls at once, one to the person the actually end user wants to talk to and another to send a copy of that call to the phones actual bosses, M$. Does the always on microphone run the battery down or if you have a desktop and the backend server matches the open mike on the phone to the open mike on the desktop and temporarily stop eaves dropping on the phone.

Comment Re:Anyway... (Score 2) 147

Easiest way to tackle 'a' drone in a combat situation is with another semi-automated drone. Rather than carrying weighty explosive, simply a somewhat armoured drone with steel blades, basically a flying lawnmower (said drone could also target people, flying buzz saw, quite nasty). Set if off in the general direction and let it use sonar for the final attack run, some times it will survive and sometimes it will not but the targeted drone will go down (lighter fabrication due to payload and required range). Many boomerang drones at once, far more problematic (boomerang because they come back for reuse if they do not strike a desired target and detonate).

Tackling 'a' boomerang drone in any more modern battle field will be totally unrealistic, as sending out say, 10 times as many as required to complete target destruction, to ensure some get through would be the norm, what the heck, you can bring back say 60% to 80% of them and automatically disarm them and send them out again, once they have been rearmed.

Being a combatant on a drone dominated battlefield means nothing but being a short life target, praying they run out of drones before you do, with the defending side having a great advantage in that regard ie defence structures housing tens of thousands of drones (relatively safe whilst they are locked up inside and indescribably dangerous when released all at once, why not, if you win, you can automatically recover all drones that failed to achieve their targets and were not destroyed).

They whole idea is to stop playing war by ensuring psychopaths no longer gain positions of governance or influence, rather than coming up with more and more stupid ways of killing each other.

Comment Re:Change the law (Score 1) 1424

Keep in mind the election is decided upon a state by state basis. So he won the most states. It is not a national vote but a state by state vote and you would be denying the residents of each state their democratic right to vote for whom their state chooses. It is a tyranny of the majority thing, even doing away with the electoral college and going with preferential voting it would still be an electoral region by electoral region vote and who won the most regions wins the vote regardless of final numbers.

Keep in mind this prevents corrupt politicians from favouring more populous regions and riding rough shod over less populous regions. So winning regions still trumps (tee hee) over the total number of votes.

Comment Re:Trademarks protect purchasers, not sellers (Score 1) 72

Not it is not, when associated with marketing it is but when associated with reality it is not. Look no further than the sneaker market, there was a company the spent more money on advertising than they do on making their shoes, spent big with sporting knob heads, you know they type, "it's not lying, it's acting". Now the way you get tell fakes from the genuine product is because they were made better and lasted longer than the genuine product and they people publicly demonstrated that quality difference or lack there of in the genuine product, company name was ree-something not that popular any more, I think the name ended in bok and they got bought out.

Comment Re:Trademarks protect purchasers, not sellers (Score 1) 72

From an end user point of view, they should only target misrepresented products if those products are of worse quality than the falsely advertised products. The law should protect the quality of the product and not the quality of the bullshit advertising associated with the all to many genuinely 'bad' products with genuinely false advertising claims ;).

Comment Re:Poorly written (Score 1) 27

So it would seem the NSA's excuse of choice is to be a toddler, we didn't do it, Russia did (it has been pretty noticeable for a while). So much so, they have to intersperse it with, we didn't do it, China did. When ever they are asked to prove their claim in court the always claim national security (they can not prove how Russia and China did it with out proving how they did it to Russia and China and that Russia and China are just retaliating). How about a treaty to stop doing, nope, nuh uh, they don't want that, pervy little bastards still want to feed their ego and sense of power and control over everyone else by getting and hoarding everyone's secrets. Little rat bags never grew out of their childish behaviour, we all knew and disliked them for it when they were young and oh look, they are still hard at it, tugging away at their own bits, getting all hot and bothered spying on everyone else (I bet if they had showers in NSA buildings the floors would be sticky, eww).

Comment Re:A pity, but not a surprise (Score 1) 95

I see you understand very little of society and the principles of caring and sharing. You give nothing away for free, you are simply repaying those who have repayed others, when a task is freely shared. Your write reviews for 'free' to pay for reviews you read for 'free' and that likely saved you quite a sum of money in buying some shitty product that got the bad review it deserved. See, that's how it works, you are simply sharing, get it, sharing in the task of eliminating bad products from the market, a very worth while investment, see that, right there. You are not reviewing for free but simply investing time and capital into the reviewing marketing and the return is not buying a crap product you end up having to replace with another crap product, which you replace with another crap product, and maybe just maybe finally then getting a reasonable product (that my buffoonish friend is the return on your investment, avoiding that).

Slashdot Top Deals

Real programmers don't write in BASIC. Actually, no programmers write in BASIC after reaching puberty.

Working...