Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

NY Post Goes App-Only For iPad Users

samzenpus posted more than 3 years ago | from the jumping-through-hoops dept.

Apple 218

bfwebster writes "Browsing the web this morning, I discovered that the New York Post is blocking iPad users from reading its website via Safari. Instead, iPad users must download and use the NY Post App instead. That app previously required a paid subscription (which is one reason I didn't use it); however, the version I downloaded this morning isn't making any demands for payment. Yet."

Sorry! There are no comments related to the filter you selected.

Not to worry... (5, Interesting)

fuzzyfuzzyfungus (1223518) | more than 3 years ago | (#36491886)

Just spoof the user-agent string...

Oh, wait. Sorry. Enjoy the walled garden!

Re:Not to worry... (2)

Superken7 (893292) | more than 3 years ago | (#36491930)

It's not about the walled garden at all. It's more like "there's an app for that". Maybe Safari won't do it, but I'm sure there are a couple browsers out there that can.

While circumventing something as simple as an User-Agent string protection can be, I'm sure it "works" for the majority of people since only the geeks will know or care about how to get around it.

Re:Not to worry... (5, Funny)

ColdWetDog (752185) | more than 3 years ago | (#36491994)

The current headline for the NY Post is "Prolific sperm donors find they have fathered dozens of children". This isn't a walled garden, it's a hydroponics setup for Zombies.

Re:Not to worry... (1)

nospam007 (722110) | more than 3 years ago | (#36492166)

"Prolific sperm donors find they have fathered dozens of children"

That's sorta the point of sperm donation, no?

Re:Not to worry... (2)

ColdWetDog (752185) | more than 3 years ago | (#36492392)

Congratulations. You passed the test!

Re:Not to worry... (2)

nospam007 (722110) | more than 3 years ago | (#36493092)

From your sarcastic tone, I presume that there will be no cake?

Re:Not to worry... (1)

Threni (635302) | more than 3 years ago | (#36493074)

In the UK those children have the legal right to track down their 'parents'. Saying 'fuck off - I want nothing to do with you' dozens of times is going to get really boring.

Re:Not to worry... (0)

Anonymous Coward | more than 3 years ago | (#36493142)

There's an app for that...that you MUST use.

worry... (1, Insightful)

AliasMarlowe (1042386) | more than 3 years ago | (#36491954)

Just spoof the user-agent string...
Oh, wait. Sorry. Enjoy the walled garden!

You can leave a garden (so-called by the owners) as easily as enter it. Since iPad users are prevented from leaving, it could as easily be referred to as a jail by its inmates.
Those who would pay for confinement inside a walled jail must really fear the outside world...

Re:worry... (2)

node 3 (115640) | more than 3 years ago | (#36492632)

You can leave a garden (so-called by the owners) as easily as enter it. Since iPad users are prevented from leaving, it could as easily be referred to as a jail by its inmates.

When iPad users say things like, "I just can't stop using it", that's not what they mean. When you buy an iPad, you are allowed to use other systems, if you so wish.

Those who would pay for confinement inside a walled jail must really fear the outside world...

When you talk like this out in the "real world", don't you ever wonder why people don't take you seriously?

People pay for things they enjoy and that meet their needs. Jails are things that people do not like to be in and are rather unenjoyable. iPads are things people seek out to buy and use, and are quite enjoyable. Well over 20 million of them have been bought to date, all voluntarily.

"can't"? Inaccurate (1, Funny)

SuperKendall (25149) | more than 3 years ago | (#36492836)

You can leave a garden (so-called by the owners) as easily as enter it. Since iPad users are prevented from leaving

But iPad users can leave any time as well. They can if they wish use other browsers that allow manipulation of the user-agent string.

If you are talking about something else, iPad users can always jailbreak. It's not illegal, and does not void the warranty (just to head off the ignorant among you out there that will come back and claim it does).

Those who would pay for confinement inside a walled jail must really fear the outside world...

Those who would fear to enter a well-cared for garden just because the entrance is a little far from the shady benches, must be complete and utter morons, caring only about ideology and nothing about practical matters.

Enjoy your mobile hairshirt!

Re:Not to worry... (1)

Anonymous Coward | more than 3 years ago | (#36491958)

Or install another browser.

Re: Walled Garden (5, Informative)

Anonymous Coward | more than 3 years ago | (#36491972)

Why is it, nobody appears to be aware of iCab Mobile? It's available for the iPhone and iPad.
A full-featured web browser with tabbed browsing, ad blocking and USER-AGENT SPOOFING.
Details on iCab Mobile on iTunes []

Has been available for quite some time.

Re: Walled Garden (-1)

Anonymous Coward | more than 3 years ago | (#36492054)

cause it blows ass, that's why

Re: Walled Garden (3, Insightful)

ColdWetDog (752185) | more than 3 years ago | (#36492356)

Possibly because the intersection of the set of "People who use an iPad and browse dumb sites like the NY Post" and "People who understand what a User-Agent String is" is pretty much a null set.

Re: Walled Garden (1)

Tharsman (1364603) | more than 3 years ago | (#36492720)

Given this is /., I'd say it has more to do with people that make such claims not owning an iOS device. A /. user that has ever touched an iOS device and knows not about this deserves his account be closed and his bitcoin collection taken away.

Re: Walled Garden (-1)

node 3 (115640) | more than 3 years ago | (#36492728)

Good thing you didn't quote his question before you provided your answer, because it was completely non sequitur.

A: "iPad is a walled garden!"
B: "Why don't you seem to know there are other browsers?"
C: "Durr, because iPad owners are stupid!"

If you care about this, you are completely free to work around it. If you don't care about this, you can just use the app. No big deal. I don't see how the end user's knowledge of other browsers has anything to do with whether the iPad is a "walled garden", or whether the NY Post's device detector is circumventable.

After all, if they were doing this on Android (which they just as easily can), you wouldn't be bending over backwards to find a way to call it a "walled garden" or calling Android users too dumb to know how to work around it.

Re: Walled Garden (0)

Anonymous Coward | more than 3 years ago | (#36492556)

Why is it, nobody appears to be aware of iCab Mobile? It's available for the iPhone and iPad. A full-featured web browser with tabbed browsing, ad blocking and USER-AGENT SPOOFING. Details on iCab Mobile on iTunes []

Has been available for quite some time.

Because nobody is willing to pay for a web browser since IE 5 came out in the late 90's?

Re:Not to worry... (2)

thechink (182419) | more than 3 years ago | (#36492070)

Install Atomic Browser on the iPad, it has the ability to change the user agent string.

Re:Not to worry... (-1)

Anonymous Coward | more than 3 years ago | (#36492386)

It has come to my attention that the entire Linux community is a hotbed of so called 'alternative sexuality', which includes anything from hedonistic orgies to homosexuality to paedophilia.

What better way of demonstrating this than by looking at the hidden messages contained within the names of some of Linux's most outspoken advocates:

  • Linus Torvalds [] is an anagram of slit anus or VD 'L,' clearly referring to himself by the first initial.
  • Richard M. Stallman [] , spokespervert for the Gaysex's Not Unusual 'movement' is an anagram of mans cram thrill ad.
  • Alan Cox [] is barely an anagram of anal cox which is just so filthy and unchristian it unnerves me.

I'm sure that Eric S. Raymond, composer of the satanic homosexual [] propaganda diatribe The Cathedral and the Bizarre, is probably an anagram of something queer, but we don't need to look that far as we know he's always shoving a gun up some poor little boy's rectum. Update: Eric S. Raymond is actually an anagram for secondary rim and cord in my arse. It just goes to show you that he is indeed queer.

Update the Second: It is also documented that Evil Sicko Gaymond is responsible for a nauseating piece of code called Fetchmail [] , which is obviously sinister sodomite slang for 'Felch Male' -- a disgusting practise. For those not in the know, 'felching' is the act performed by two perverts wherein one sucks their own post-coital ejaculate out of the other's rectum. In fact, it appears that the dirty Linux faggots set out to undermine the good Republican institution of e-mail, turning it into 'e-male.'

As far as Richard 'Master' Stallman goes, that filthy fudge-packer was actually quoted [] on leftist commie propaganda site as saying the following: 'I've been resistant to the pressure to conform in any circumstance,' he says. 'It's about being able to question conventional wisdom,' he asserts. 'I believe in love, but not monogamy,' he says plainly.

And this isn't a made up troll bullshit either! He actually stated this tripe, which makes it obvious that he is trying to politely say that he's a flaming homo [] slut [] !

Speaking about 'flaming,' who better to point out as a filthy chutney ferret than Slashdot's very own self-confessed pederast Jon Katz. Although an obvious deviant anagram cannot be found from his name, he has already confessed, nay boasted of the homosexual [] perversion of corrupting the innocence of young children [] . To quote from the article linked:

'I've got a rare kidney disease,' I told her. 'I have to go to the bathroom a lot. You can come with me if you want, but it takes a while. Is that okay with you? Do you want a note from my doctor?'

Is this why you were touching your penis [] in the cinema, Jon? And letting the other boys touch it too?

We should also point out that Jon Katz refers to himself as 'Slashdot's resident Gasbag.' Is there any more doubt? For those fortunate few who aren't aware of the list of homosexual [] terminology found inside the Linux 'Sauce Code,' a 'Gasbag' is a pervert who gains sexual gratification from having a thin straw inserted into his urethra (or to use the common parlance, 'piss-pipe'), then his homosexual [] lover blows firmly down the straw to inflate his scrotum. This is, of course, when he's not busy violating the dignity and copyright of posters to Slashdot by gathering together their postings and publishing them en masse to further his twisted and manipulative journalistic agenda.

Sick, disgusting antichristian perverts, the lot of them.

In addition, many of the Linux distributions (a 'distribution' is the most common way to spread the faggots' wares) are run by faggot groups. The Slackware [] distro is named after the 'Slack-wear' fags wear to allow easy access to the anus for sexual purposes. Furthermore, Slackware is a close anagram of claw arse, a reference to the homosexual [] practise of anal fisting. The Mandrake [] product is run by a group of French faggot satanists, and is named after the faggot nickname for the vibrator. It was also chosen because it is an anagram for dark amen and ram naked, which is what they do.

Another 'distro,' (abbrieviated as such because it sounds a bit like 'Disco,' which is where homosexuals [] preyed on young boys in the 1970s), is Debian, [] an anagram of in a bed, which could be considered innocent enough (after all, a bed is both where we sleep and pray), until we realise what other names Debian uses to describe their foul wares. 'Woody' is obvious enough, being a term for the erect male penis [] , glistening with pre-cum. But far sicker is the phrase 'Frozen Potato' that they use. This filthy term, again found in the secret homosexual [] 'Sauce Code,' refers to the solo homosexual [] practice of defecating into a clear polythene bag, shaping the turd into a crude approximation of the male phallus, then leaving it in the freezer overnight until it becomes solid. The practitioner then proceeds to push the frozen 'potato' up his own rectum, squeezing it in and out until his tight young balls erupt in a screaming orgasm.

And Red Hat [] is secret homo [] slang for the tip of a penis [] that is soaked in blood from a freshly violated underage ringpiece.

The fags have even invented special tools to aid their faggotry! For example, the 'supermount' tool was devised to allow deeper penetration, which is good for fags because it gives more pressure on the prostate gland. 'Automount' is used, on the other hand, because Linux users are all fat and gay, and need to mount each other [] automatically.

The depths of their depravity can be seen in their use of 'mount points.' These are, plainly speaking, the different points of penetration. The main one is obviously/anus, but there are others. Militant fags even say 'there is no/opt mount point' because for these dirty perverts faggotry is not optional but a way of life.

More evidence is in the fact that Linux users say how much they love `man`, even going so far as to say that all new Linux users (who are in fact just innocent heterosexuals indoctrinated by the gay propaganda) should try out `man`. In no other system do users boast of their frequent recourse to a man.

Other areas of the system also show Linux's inherent gayness. For example, people are often told of the 'FAQ,' but how many innocent heterosexual Windows [] users know what this actually means. The answer is shocking: Faggot Anal Quest: the voyage of discovery for newly converted fags!

Even the title 'Slashdot [] ' originally referred to a homosexual [] practice. Slashdot [] of course refers to the popular gay practice of blood-letting. The Slashbots, of course are those super-zealous homosexuals [] who take this perversion to its extreme by ripping open their anuses, as seen on the site most popular with Slashdot users, the depraved work of Satan, [] .

The editors of Slashdot [] also have homosexual [] names: 'Hemos' is obvious in itself, being one vowel away from 'Homos.' But even more sickening is 'Commander Taco' which sounds a bit like 'Commode in Taco,' filthy gay slang for a pair of spreadeagled buttocks that are caked with excrement [] . (The best form of lubrication, they insist.) Sometimes, these 'Taco Commodes' have special 'Salsa Sauce' (blood from a ruptured rectum) and 'Cheese' (rancid flakes of penis [] discharge) toppings. And to make it even worse, Slashdot [] runs on Apache!

The Apache [] server, whose use among fags is as prevalent as AIDS, is named after homosexual [] activity -- as everyone knows, popular faggot band, the Village People, featured an Apache Indian, and it is for him that this gay program is named.

And that's not forgetting the use of patches in the Linux fag world -- patches are used to make the anus accessible for repeated anal sex even after its rupture by a session of fisting.

To summarise: Linux is gay. 'Slash -- Dot' is the graphical description of the space between a young boy's scrotum and anus. And BeOS [] is for hermaphrodites and disabled 'stumpers.'


What worries me is how much you know about what gay people do. I'm scared I actually read this whole thing. I think this post is a good example of the negative effects of Internet usage on people. This person obviously has no social life anymore and had to result to writing something as stupid as this. And actually take the time to do it too. Although... I think it was satire.. blah.. it's early. -- Anonymous Coward, Slashdot

Well, the only reason I know all about this is because I had the misfortune to read the Linux 'Sauce code' once. Although publicised as the computer code needed to get Linux up and running on a computer (and haven't you always been worried about the phrase 'Monolithic Kernel'?), this foul document is actually a detailed and graphic description of every conceivable degrading perversion known to the human race, as well as a few of the major animal species. It has shocked and disturbed me, to the point of needing to shock and disturb the common man to warn them of the impending homo [] -calypse which threatens to engulf our planet.

You must work for the government. Trying to post the most obscene stuff in hopes that slashdot won't be able to continue or something, due to legal woes. If i ever see your ugly face, i'm going to stick my fireplace poker up your ass, after it's nice and hot, to weld shut that nasty gaping hole of yours. -- Anonymous Coward, Slashdot

Doesn't it give you a hard-on to imagine your thick strong poker ramming it's way up my most sacred of sphincters? You're beyond help, my friend, as the only thing you can imagine is the foul penetrative violation of another man. Are you sure you're not Eric Raymond? The government, being populated by limp-wristed liberals, could never stem the sickening tide of homosexual [] child molesting Linux advocacy. Hell, they've given NAMBLA free reign for years!

you really should post this logged in. i wish i could remember jebus's password, cuz i'd give it to you. -- mighty jebus [] , Slashdot

Thank you for your kind words of support. However, this document shall only ever be posted anonymously. This is because the 'Open Sauce' movement is a sham, proposing homoerotic cults of hero worshipping in the name of freedom. I speak for the common man. For any man who prefers the warm, enveloping velvet folds of a woman's vagina [] to the tight puckered ringpiece of a child. These men, being common, decent folk, don't have a say in the political hypocrisy that is Slashdot culture. I am the unknown liberator [] .

ROLF LAMO i hate linux FAGGOTS -- Anonymous Coward, Slashdot

We shouldn't hate them, we should pity them for the misguided fools they are... Fanatical Linux zeal-outs need to be herded into camps for re-education and subsequent rehabilitation into normal heterosexual society. This re-education shall be achieved by forcing them to watch repeats of Baywatch until the very mention of Pamela Anderson [] causes them to fill their pants with healthy heterosexual jism [] .

Actually, that's not at all how scrotal inflation works. I understand it involves injecting sterile saline solution into the scrotum. I've never tried this, but you can read how to do it safely in case you're interested. (Before you moderate this down, ask yourself honestly -- who are the real crazies -- people who do scrotal inflation, or people who pay $1000+ for a game console?) -- double_h [] , Slashdot

Well, it just goes to show that even the holy Linux 'sauce code' is riddled with bugs that need fixing. (The irony of Jon Katz not even being able to inflate his scrotum correctly has not been lost on me.) The Linux pervert elite already acknowledge this, with their queer slogan: 'Given enough arms, all rectums are shallow.' And anyway, the PS2 [] sucks major cock and isn't worth the money. Intellivision forever!

dude did u used to post on msnbc's nt bulletin board now that u are doing anti-gay posts u also need to start in with anti-black stuff too c u in church -- Anonymous Coward, Slashdot

For one thing, whilst Linux is a cavalcade of queer propaganda masquerading as the future of computing, NT [] is used by people who think nothing better of encasing their genitals in quick setting plaster then going to see a really dirty porno film, enjoying the restriction enforced onto them. Remember, a wasted arousal is a sin in the eyes of the Catholic church [] . Clearly, the only god-fearing Christian operating system in existence is CP/M -- The Christian Program Monitor. All computer users should immediately ask their local pastor to install this fine OS onto their systems. It is the only route to salvation.

Secondly, this message is for every man. Computers know no colour. Not only that, but one of the finest websites in the world is maintained by a Black Man [] . Now fuck off you racist donkey felcher.

And don't forget that slashdot was written in Perl, which is just too close to 'Pearl Necklace' for comfort.... oh wait; that's something all you heterosexuals do.... I can't help but wonder how much faster the trolls could do First-Posts on this site if it were redone in PHP... I could hand-type dynamic HTML pages faster than Perl can do them. -- phee [] , Slashdot

Although there is nothing unholy about the fine heterosexual act of ejaculating between a woman's breasts, squirting one's load up towards her neck and chin area, it should be noted that Perl [] (standing for Pansies Entering Rectums Locally) is also close to 'Pearl Monocle,' 'Pearl Nosering,' and the ubiquitous 'Pearl Enema.'

One scary thing about Perl [] is that it contains hidden homosexual [] messages. Take the following code: LWP::Simple -- It looks innocuous enough, doesn't it? But look at the line closely: There are two colons next to each other! As Larry 'Balls to the' Wall would openly admit in the Perl Documentation, Perl was designed from the ground up to indoctrinate it's programmers into performing unnatural sexual acts -- having two colons so closely together is clearly a reference to the perverse sickening act of 'colon kissing,' whereby two homosexual [] queers spread their buttocks wide, pressing their filthy torn sphincters together. They then share small round objects like marbles or golfballs by passing them from one rectum to another using muscle contraction alone. This is also referred to in programming 'circles' as 'Parameter Passing.'

And PHP [] stands for Perverted Homosexual Penetration. Didn't you know?

Thank you for your valuable input on this. I am sure you will be never forgotten. BTW: Did I mention that this could be useful in terraforming Mars? Mars rulaa. -- Eimernase [] , Slashdot

Well, I don't know about terraforming Mars, but I do know that homosexual [] Linux Advocates have been probing Uranus for years.

That's inspiring. Keep up the good work, AC. May God in his wisdom grant you the strength to bring the plain honest truth to this community, and make it pure again. Yours, Cerberus. -- Anonymous Coward, Slashdot

*sniff* That brings a tear to my eye. Thank you once more for your kind support. I have taken faith in the knowledge that I am doing the Good Lord [] 's work, but it is encouraging to know that I am helping out the common man here.

However, I should be cautious about revealing your name 'Cerberus' on such a filthy den of depravity as Slashdot. It is a well known fact that the 'Kerberos' documentation from Microsoft is a detailed manual describing, in intimate, exacting detail, how to sexually penetrate a variety of unwilling canine animals; be they domesticated, wild, or mythical. Slashdot posters have taken great pleasure in illegally spreading this documentation far and wide, treating it as an 'extension' to the Linux 'Sauce Code,' for the sake of 'interoperability.' (The slang term they use for nonconsensual intercourse -- their favourite kind.)

In fact, sick twisted Linux deviants are known to have LAN parties, (Love of Anal Naughtiness, needless to say.), wherein they entice a stray dog, known as the 'Samba Mount,' into their homes. Up to four of these filth-sodden blasphemers against nature take turns to plunge their erect, throbbing, uncircumcised members, conkers-deep, into the rectum, mouth, and other fleshy orifices of the poor animal. Eventually, the 'Samba Mount' collapses due to 'overload,' and needs to be 'rebooted.' (i.e., kicked out into the street, and left to fend for itself.) Many Linux users boast about their 'uptime' in such situations.

Inspiring stuff! If only all trolls were this quality! -- Anonymous Coward, Slashdot

If only indeed. You can help our brave cause by moderating this message up as often as possible. I recommend '+1, Underrated,' as that will protect your precious Karma in Metamoderation [] . Only then can we break through the glass ceiling of Homosexual Slashdot Culture. Is it any wonder that the new version of Slashcode has been christened 'Bender'???

If we can get just one of these postings up to at least '+1,' then it will be archived forever! Others will learn of our struggle, and join with us in our battle for freedom!

It's pathetic you've spent so much time writing this. -- Anonymous Coward, Slashdot

I am compelled to document the foulness and carnal depravity [] that is Linux, in order that we may prepare ourselves for the great holy war that is to follow. It is my solemn duty to peel back the foreskin of ignorance and apply the wire brush of enlightenment.

As with any great open-source project, you need someone asking this question, so I'll do it. When the hell is version 2.0 going to be ready?!?! -- Anonymous Coward, Slashdot

I could make an arrogant, childish comment along the lines of 'Every time someone asks for 2.0, I won't release it for another 24 hours,' but the truth of the matter is that I'm quite nervous of releasing a 'number two,' as I can guarantee some filthy shit-slurping Linux pervert would want to suck it straight out of my anus before I've even had chance to wipe.

I desperately want to suck your monolithic kernel, you sexy hunk, you. -- Anonymous Coward, Slashdot

I sincerely hope you're Natalie Portman [] .

Dude, nothing on slashdot larger than 3 paragraphs is worth reading. Try to distill the message, whatever it was, and maybe I'll read it. As it is, I have to much open source software to write to waste even 10 seconds of precious time. 10 seconds is all its gonna take M$ to whoop Linux's ass. Vigilence is the price of Free (as in libre -- from the fine, frou frou French language) Software. Hack on fellow geeks, and remember: Friday is Bouillabaisse day except for heathens who do not believe that Jesus died for their sins. Those godless, oil drench, bearded sexist clowns can pull grits from their pantaloons (another fine, fine French word) and eat that. Anyway, try to keep your message focused and concise. For concision is the soul of derision. Way. -- Anonymous Coward, Slashdot

What the fuck?

I've read your gay conspiracy post version 1.3.0 and I must say I'm impressed. In particular, I appreciate how you have managed to squeeze in a healthy dose of the latent homosexuality you gay-bashing homos [] tend to be full of. Thank you again. -- Anonymous Coward, Slashdot

Well bugger me!

ooooh honey. how insecure are you!!! wann a little massage from deare bruci. love you -- Anonymous Coward, Slashdot

Fuck right off!

IMPORTANT: This message needs to be heard (Not HURD [] , which is an acronym for 'Huge Unclean Rectal Dilator') across the whole community, so it has been released into the Public Domain [] . You know, that licence that we all had before those homoerotic crypto-fascists came out with the GPL [] (Gay Penetration License) that is no more than an excuse to see who's got the biggest feces-encrusted [] cock. I would have put this up on Freshmeat [] , but that name is known to be a euphemism for the tight rump of a young boy.

Come to think of it, the whole concept of 'Source Control' unnerves me, because it sounds a bit like 'Sauce Control,' which is a description of the homosexual [] practice of holding the base of the cock shaft tightly upon the point of ejaculation, thus causing a build up of semenal fluid that is only released upon entry into an incision made into the base of the receiver's scrotum. And 'Open Sauce' is the act of ejaculating into another mans face or perhaps a biscuit to be shared later. Obviously, 'Closed Sauce' is the only Christian thing to do, as evidenced by the fact that it is what Cathedrals are all about.

Contributors: (although not to the eternal game of 'soggy biscuit' that open 'sauce' development has become) Anonymous Coward, Anonymous Coward, phee, Anonymous Coward, mighty jebus, Anonymous Coward, Anonymous Coward, double_h, Anonymous Coward, Eimernase, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward. Further contributions are welcome.

Current changes: This version sent to FreeWIPO [] by 'Bring BackATV' as plain text. Reformatted everything, added all links back in (that we could match from the previous version), many new ones (Slashbot bait links). Even more spelling fixed. Who wrote this thing, CmdrTaco himself?

Previous changes: Yet more changes added. Spelling fixed. Feedback added. Explanation of 'distro' system. 'Mount Point' syntax described. More filth regarding `man` and Slashdot. Yet more fucking spelling fixed. 'Fetchmail' uncovered further. More Slashbot baiting. Apache exposed. Distribution licence at foot of document.

ANUX -- A full Linux distribution... Up your ass!

I do it wrong

Laying here in the shadows of my room, I squint up at my love. My Ms. Portman. I am sore and tired after fucking her for eight solid hours. My chapped and aching dick is soaking in grits to relieve the pain. She gets on her knees and starts lapping the grits up out of the bowl. She places her beautiful hands on my penis and starts to lick the grits off my achy piece.
Massaging my nutsack she....


Yanking my dick out of her mouth I throw her to the ground and shove it in to her gaping freshly fisted ass [] .

"OH BIG ASS SPORK!! Fuck my ass, fuck my ass good. DEEPER, my stallion, deeper!! Make a Beowulf cluster of sperm on my back!!"

"Imagine a Beowulf cluster of this baby!"


I continue to hump her alabaster form. Glistening with beads of sweat, she bites her lip in delight as I tear her ass open with my engorged dick.

"Queen Amidala!!" I shreik as I near climax.

She looks up at me and screams, "You are so alive in me, unlike *BSD or VA Software!!! Fill me with seed!! Yes, Yes, Yess!!!!"

"For me you are calling, hhhmmm?"

"YODA?!? What the fuck, can't you see I am using the force here?"

He savagely kicks my Natalie aside, he pulls out his large green penis and impales me...


All your sporkz are belong to the dead homiez!!

                                        GNU GENERAL PUBLIC LICENSE
                                              Version 3, 29 June 2007

  Copyright (C) 2007 Free Software Foundation, Inc. <>
  Everyone is permitted to copy and distribute verbatim copies
  of this license document, but changing it is not allowed.


    The GNU General Public License is a free, copyleft license for
software and other kinds of works.

    The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.

    When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.

    To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.

    For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.

    Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.

    For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.

    Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.

    Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.

    The precise terms and conditions for copying, distribution and
modification follow.

                                              TERMS AND CONDITIONS

    0. Definitions.

    "This License" refers to version 3 of the GNU General Public License.

    "Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.

    "The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.

    To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.

    A "covered work" means either the unmodified Program or a work based
on the Program.

    To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.

    To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.

    An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.

    1. Source Code.

    The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.

    A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.

    The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.

    The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.

    The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding

    The Corresponding Source for a work in source code form is that
same work.

    2. Basic Permissions.

    All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.

    You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.

    Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.

    3. Protecting Users' Legal Rights From Anti-Circumvention Law.

    No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such

    When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.

    4. Conveying Verbatim Copies.

    You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.

    You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.

    5. Conveying Modified Source Versions.

    You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:

        a) The work must carry prominent notices stating that you modified
        it, and giving a relevant date.

        b) The work must carry prominent notices stating that it is
        released under this License and any conditions added under section
        7. This requirement modifies the requirement in section 4 to
        "keep intact all notices".

        c) You must license the entire work, as a whole, under this
        License to anyone who comes into possession of a copy. This
        License will therefore apply, along with any applicable section 7
        additional terms, to the whole of the work, and all its parts,
        regardless of how they are packaged. This License gives no
        permission to license the work in any other way, but it does not
        invalidate such permission if you have separately received it.

        d) If the work has interactive user interfaces, each must display
        Appropriate Legal Notices; however, if the Program has interactive
        interfaces that do not display Appropriate Legal Notices, your
        work need not make them do so.

    A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.

    6. Conveying Non-Source Forms.

    You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:

        a) Convey the object code in, or embodied in, a physical product
        (including a physical distribution medium), accompanied by the
        Corresponding Source fixed on a durable physical medium
        customarily used for software interchange.

        b) Convey the object code in, or embodied in, a physical product
        (including a physical distribution medium), accompanied by a
        written offer, valid for at least three years and valid for as
        long as you offer spare parts or customer support for that product
        model, to give anyone who possesses the object code either (1) a
        copy of the Corresponding Source for all the software in the
        product that is covered by this License, on a durable physical
        medium customarily used for software interchange, for a price no
        more than your reasonable cost of physically performing this
        conveying of source, or (2) access to copy the
        Corresponding Source from a network server at no charge.

        c) Convey individual copies of the object code with a copy of the
        written offer to provide the Corresponding Source. This
        alternative is allowed only occasionally and noncommercially, and
        only if you received the object code with such an offer, in accord
        with subsection 6b.

        d) Convey the object code by offering access from a designated
        place (gratis or for a charge), and offer equivalent access to the
        Corresponding Source in the same way through the same place at no
        further charge. You need not require recipients to copy the
        Corresponding Source along with the object code. If the place to
        copy the object code is a network server, the Corresponding Source
        may be on a different server (operated by you or a third party)
        that supports equivalent copying facilities, provided you maintain
        clear directions next to the object code saying where to find the
        Corresponding Source. Regardless of what server hosts the
        Corresponding Source, you remain obligated to ensure that it is
        available for as long as needed to satisfy these requirements.

        e) Convey the object code using peer-to-peer transmission, provided
        you inform other peers where the object code and Corresponding
        Source of the work are being offered to the general public at no
        charge under subsection 6d.

    A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.

    A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.

    "Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.

    If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).

    The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.

    Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.

    7. Additional Terms.

    "Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.

    When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.

    Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:

        a) Disclaiming warranty or limiting liability differently from the
        terms of sections 15 and 16 of this License; or

        b) Requiring preservation of specified reasonable legal notices or
        author attributions in that material or in the Appropriate Legal
        Notices displayed by works containing it; or

        c) Prohibiting misrepresentation of the origin of that material, or
        requiring that modified versions of such material be marked in
        reasonable ways as different from the original version; or

        d) Limiting the use for publicity purposes of names of licensors or
        authors of the material; or

        e) Declining to grant rights under trademark law for use of some
        trade names, trademarks, or service marks; or

        f) Requiring indemnification of licensors and authors of that
        material by anyone who conveys the material (or modified versions of
        it) with contractual assumptions of liability to the recipient, for
        any liability that these contractual assumptions directly impose on
        those licensors and authors.

    All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.

    If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.

    Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.

    8. Termination.

    You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).

    However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.

    Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.

    Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.

    9. Acceptance Not Required for Having Copies.

    You are not required to accept this License in order to receive or
run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.

    10. Automatic Licensing of Downstream Recipients.

    Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.

    An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.

    You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.

    11. Patents.

    A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor's "contributor version".

    A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.

    Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.

    In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.

    If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.

    If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.

    A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.

    Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.

    12. No Surrender of Others' Freedom.

    If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.

    13. Use with the GNU Affero General Public License.

    Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.

    14. Revised Versions of this License.

    The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.

    Each version is given a distinguishing version number. If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.

    If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.

    Later license versions may give you additional or different

Re:Not to worry... (5, Informative)

Tharsman (1364603) | more than 3 years ago | (#36492704)

Actually, you can with one of many available browsers in the App Store. With Opera Mini you don't even need to tweak anything, the site just does not seem capable of identifying it as an iPad browser. With Terra, my personal favorite browser (and free) for the iPad, allows me to set a permanent setting to identify as iPad Safari, OSX Safari 5, Internet Explorer 6 or Firerfox 3.6. There are a bunch of others with many different features that Safari does not have, like user agent change, full screen mode, ad blocking, social media integration, themes, bookmark syncing, download managers and built in emailing of files, etc etc.

iOS may be a walled garden, but the walls are nowhere near as tall as some Apple bashers like to think.

Yet ... (-1, Flamebait)

GPLHost-Thomas (1330431) | more than 3 years ago | (#36491888)

Like many, I don't care, and I wont use an iPad or Safari. Why is this important exactly?

Re:Yet ... (1)

Anonymous Coward | more than 3 years ago | (#36491932)

If it's not important to you, ignore it and move on. Why do feel the need to let everyone know you don't care?

I don't comment on the news in your hometown and say I don't care. Since it's not important to me, I don't read it and don't comment.

Re:Yet ... (0)

newcastlejon (1483695) | more than 3 years ago | (#36491934)

Like many, I don't care, and I wont use an iPad or Safari. Why is this important exactly?

Because a lot of people do use i-devices and, incidentally, many of them don't care or indeed know about the GPL.

As for me, I don't care because I don't read NYT; for the moment I'm happy getting my news from Google.

Re:Yet ... (1)

bhima (46039) | more than 3 years ago | (#36492110)

Not the New York Times, the New York Post. It's a Rupert Murdoch, Enquireresque, Gotham City mashup.

Re:Yet ... (2)

Midnight Thunder (17205) | more than 3 years ago | (#36492354)

If it is awkward to read the news, then I'll simply head elsewhere.

Re:Yet ... (0)

Anonymous Coward | more than 3 years ago | (#36491966)

Like many, I don't care, and I wont use an iPad or Safari. Why is this important exactly?

Apple related story.

See, this Apple story that says something sort of negative about Apple will get a HUGE number of postings, boost /.'s numbers, maybe a few advertising clicks (I guess from folks who don't have an ad blocker) or something and then /. can show their bosses that they're pulling some of their weight in their corporate higher achy hierarchy.

It's all about the numbers boys! We'll see this "story" hit Fark and Digg next and in the meantime, Reddit will have a link to getting around this or a question about having sex with a chick on the rag or something instead.

See ya in the funny papers.

Re:Yet ... (0)

Anonymous Coward | more than 3 years ago | (#36492604)


And so it begins... (5, Insightful)

TheMiddleRoad (1153113) | more than 3 years ago | (#36491896)

No, the walled garden got built awhile ago. The moral? Don't buy into walled gardens.

Re:And so it begins... (1)

Tharsman (1364603) | more than 3 years ago | (#36492748)

Or use the store inside the walled garden to get any of the many free browsers that allows user agent spoofing. Better yet, though, stop supporting The New York Post. If you support their asinine business model, you are just asking for your platform of choice to get the same treatment.

Re:And so it begins... (1)

TheMiddleRoad (1153113) | more than 3 years ago | (#36492938)

Connect the dots. Apple and content makers want more control over content distribution. This free and open web we enjoy makes their skin itch.

Re:And so it begins... (1)

Tharsman (1364603) | more than 3 years ago | (#36492984)

Right. That's why they include a web browser, allow other web browsers, insist on supporting HTML5, keep working on increasing the speed of their javascript engine, and keep approving third party web browsers.

It has also even come out that Apple is actually helping Facebook with their "Project Spartan", an HTML5 app distribution that "will compete with Apple's App Store."

Yea, I can see the conspiracy very clearly through all that.

Re:And so it begins... (-1, Flamebait)

node 3 (115640) | more than 3 years ago | (#36492802)

Um... This has absolutely *nothing* to do with the so-called "walled garden". The real moral here is that slashdot nerds will twist anything about Apple to portray them as the bad guys.

Over 200 million people have iOS devices, over 20 million have iPads. If this "walled garden" really existed in the way it seems to in the minds of the local nerd population, you wouldn't expect Apple to be able to sell so many devices. People don't buy them because they are forced to, or because they are stupid. They buy them because they *want* them.

An Industry of Cool (2)

TheMiddleRoad (1153113) | more than 3 years ago | (#36493058)

I'm a former Macintosh worshiper. I subscribed to Guy Kawasaki's email list when he was an official Mac evangelist. I have bought, sold, installed, repaired, played with, tweaked, upgraded, and done just about everything else to a Macintosh from System 6 through OSX. I loved the superior quality, excellent interface, and freedom to play. I loved the sheer geekiness of being a Macintosh person, not a PC person.

Then Apple opened their stores, squeezed out the independents, and began creating tied-down, lowest-common-denominator devices that were more style than substance. To quote Lester Bangs, Apple turned computers into an "industry of cool."

Screw Apple, screw the Macintosh, screw the iPhone, screw the iPad, and most of all, screw Steve Jobs. Screw the walled garden. Screw the NY Post. Screw them all. Give me tweakable, fun, unrestricted technology or get the fuck out of my face.

Resistance is futile (5, Funny)

arcite (661011) | more than 3 years ago | (#36491902)

So all the smartest people in the world (Apple Users) will now be the best informed. ;)

Re:Resistance is futile (1)

Anonymous Coward | more than 3 years ago | (#36491952)

Best informed? The NYPost?

Re:Resistance is futile (1)

Anonymous Coward | more than 3 years ago | (#36492024)


Re:Resistance is futile (0, Troll)

Anonymous Coward | more than 3 years ago | (#36491998)

Well, less badly informed. I don't understand how the Post exists. If someone is smart enough to have achieved literacy, that alone should prove them too smart to read the Post. It's like if People magazine got The National Enquirer pregnant, the Enquirer boozed and coked it up for a few months and one drunken night fell down the stairs and out popped the Post.

Re:Resistance is futile (1)

nomadic (141991) | more than 3 years ago | (#36492706)

There's an old joke -- "I buy Hustler to hide the New York Post behind"

Re:Resistance is futile (1)

node 3 (115640) | more than 3 years ago | (#36492874)

So all the smartest people in the world (Apple Users) will now be the best informed. ;)

Well, the status of "smartest" and worst informed user population has already been taken...

ha! (0)

Anonymous Coward | more than 3 years ago | (#36491910)

that's some bull!!!

Alternate browsers available (5, Informative)

thomasdz (178114) | more than 3 years ago | (#36491928)

even within the "walled garden", there are other browsers available which will let you spoof the user-agent string.
I use the "Atomic" web browser on my iPad and iPod Touch

Re:Alternate browsers available (4, Insightful)

Raenex (947668) | more than 3 years ago | (#36491980)

even within the "walled garden", there are other browsers available which will let you spoof the user-agent string.

For now. Apple has a history of booting apps that work around restrictions.

Re:Alternate browsers available (1)

Culture20 (968837) | more than 3 years ago | (#36492154)

Apple has a history of booting apps that work around restrictions.

Especially restrictions set for the benefit of third parties (usually phone service providers).

Re:Alternate browsers available (1)

node 3 (115640) | more than 3 years ago | (#36492924)

Apple has a history of booting apps that work around restrictions.

Especially restrictions set for the benefit of third parties (usually phone service providers).

Beyond things that have to do with network restrictions and the one example where congress gave Apple shit over DUI checkpoint apps (both of which are reasonable actions on Apple's part, and completely irrelevant to the topic at hand), care to list any examples? And it would be especially helpful if they were in any way pertinent to the topic at hand.

Re:Alternate browsers available (0)

Anonymous Coward | more than 3 years ago | (#36492168)

There are still loads of sites on the net that are coded for IE and tell you in no uncertain terms that you should be using IE.
That is why I don't think Apple will stop you spoofing the browser user-agent string. It is one of the most widespread 'fixes' to browser problems.

Re:Alternate browsers available (1)

Tharsman (1364603) | more than 3 years ago | (#36492786)

What Apple defined restriction is this "working around"? All these browsers use a documented WebKit control API to do their user agent spoofing.

Re:Alternate browsers available (1)

Raenex (947668) | more than 3 years ago | (#36492898)

What Apple defined restriction is this "working around"?

By Apple? Currently none, as far as I know. The restriction is being imposed by the NY Post. However, Apple may decide it's something they want to support, since they love the app model.

All these browsers use a documented WebKit control API to do their user agent spoofing.

Using documented APIs hasn't stopped Apple from banning apps before.

Re:Alternate browsers available (1)

node 3 (115640) | more than 3 years ago | (#36492896)

even within the "walled garden", there are other browsers available which will let you spoof the user-agent string.

For now. Apple has a history of booting apps that work around restrictions.

You still seem to have a problem separating fantasy from reality. There's absolutely no reason to think Apple is going to boot other browsers for allowing this beyond nerd paranoid fantasy about how Apple is some sort of despotic iron-fisted overlord.

Re:Alternate browsers available (4, Interesting)

assertation (1255714) | more than 3 years ago | (#36492234)

I think the point was that people who use other systems don't have to keep reading about alternative software, hacks and jailbreaks to do what other people do. No disrespect.

Re:Alternate browsers available (2)

priceslasher (2102064) | more than 3 years ago | (#36492388)

I thought the point was - the more you abuse your customers the higher value they will ascribe to your services. Texbook cognitive dissonance, next you will have to insert your newscorp cd or something.

Re:Alternate browsers available (1)

node 3 (115640) | more than 3 years ago | (#36493010)

No, the point here is obvious: slashdot nerds will bend over backwards to make anything about Apple fit their irrational hatred of Apple and the notion of some sort of offensive "walled garden". You are correct, however, in citing "cognitive dissonance", you've just applied it to the wrong target.

Re:Alternate browsers available (1)

Tharsman (1364603) | more than 3 years ago | (#36492808)

The alternative browsers need no jailbreaks or hacks. They are readily available in the app store, there is almost always one the top 25.

What the new york post is doing here will propagate. It wont be long until they do the same to Android users and force them to pay for some Android app.

The true story here is not one about iPads, iOS or Apple. The story here is one about pay-walls and stupid news media conglomerates insisting on setting any roadblock they can in the way of the imminent death of printed newspapers.

Re:Alternate browsers available (0)

node 3 (115640) | more than 3 years ago | (#36492980)

I think the point was that people who use other systems don't have to keep reading about alternative software, hacks and jailbreaks to do what other people do. No disrespect.

Nice try. This isn't a "hack" or "jailbreak". Lumping in proper third-party software with these sorts of things to try and paint iOS as a bad system is dishonest.

There's nothing inherent to Android (or other systems) that prevents the NY Post from doing the same on it. Well, other than the fact that the market for Android tablets is microscopic. But the NY Post could just as easily detect you are on an Android tablet, and direct you to download their app.

It's amazing, Apple gets the slashdot nerds all riled up by having a "closed" app store, and they get the very same nerds riled up by offering third party apps that give users the freedom to work around things like this. There's a word for fanatics who twist everything to fit their own preferences, logic, rationality, and consistency be damned. I can't quite think of it...

Don't worry, I'm sure someone will use it in a response to me somewhere on this site before the day is out.

Re:Alternate browsers available? for how long? (1)

aeoo (568706) | more than 3 years ago | (#36492310)

even within the "walled garden", there are other browsers available which will let you spoof the user-agent string.
I use the "Atomic" web browser on my iPad and iPod Touch

For how long will "Atomic" remain available?

Re:Alternate browsers available? for how long? (1)

schnikies79 (788746) | more than 3 years ago | (#36492934)

For the forseable future. It's been in app store for a couple years. They are using an official, apple documented, API to spoof the string.

No harm, no foul.

Re:Alternate browsers available? for how long? (1)

aeoo (568706) | more than 3 years ago | (#36493084)

For the forseable future.

I have no such confidence in Apple.

Re:Alternate browsers available? for how long? (1)

node 3 (115640) | more than 3 years ago | (#36493014)

even within the "walled garden", there are other browsers available which will let you spoof the user-agent string.
I use the "Atomic" web browser on my iPad and iPod Touch

For how long will "Atomic" remain available?

Um, for as long as the developer wishes it to be? What makes you (and far too many nerds here) think otherwise?

Re:Alternate browsers available? for how long? (1)

aeoo (568706) | more than 3 years ago | (#36493078)

What makes you (and far too many nerds here) think otherwise?

Apple has proven by its actions that it has no commitment to freedom. Apple changed its App market policies often, and done so for the better only when responding to immense public pressure and doing damage control. I think Apple's track record speaks for itself.

Why bother? (1)

Anonymous Coward | more than 3 years ago | (#36491950)

The iPad is fully capable of displaying typical web sites, why create the additional overhead of superfluous software?

Re:Why bother? (1)

McGuirk (1189283) | more than 3 years ago | (#36492092)

Ever heard of a marketing department?

Re:Why bother? (1)

LynnwoodRooster (966895) | more than 3 years ago | (#36492602)

Now if only there was a way to put advertisements and in-page marketing... Maybe Google should get on that! /s

heh (2)

Osgeld (1900440) | more than 3 years ago | (#36492022)

safari and ipad ... do you also have a target painted on your back?

Re:heh (1)

sribe (304414) | more than 3 years ago | (#36492194)

safari and ipad ... do you also have a target painted on your back?

You ignorant twit, that's the international symbol of the Red Cross [] ;-)

Blaming the wrong people (5, Insightful)

Calos (2281322) | more than 3 years ago | (#36492066)

All the posts thus far are taking shots at Apple. That seems really misguided. It's the NY Post that is restricting people from accessing the same content over the same internet, simply because of the device. They're the ones making you download an app to get the content you want, probably allowing them to get higher-profit ads. This isn't Apple's fault, for not letting you spoof the user agent string. No one should ever have to spoof a user agent. All it should be used for is to tell the server what you're running so it can serve you better. The NY Post is using it to ignore the fact that you have a perfectly functioning and capable client in order to suit their desires. I know that in the tech world, we often jump to tech solutions to problems. But that doesn't fix anything, really, nor for most users. The target of ire here should be the NY Post and their abuse of internet standards and openness. The focus should be on getting them to behave better, to set a precedent so others don't do the same thing. A work-around that will help the 1% of us tech users is insignificant. OT: New poster here. How do I add linebreaks in my posts? Simple carriage returns seem to get eaten.

Re:Blaming the wrong people (2)

Calos (2281322) | more than 3 years ago | (#36492102)

And just to clarify - I don't like Apple's ecosystem and I wouldn't buy into it, because I like to tinker. Most people don't. Sometimes I lost sight of that fact, posting on and reading tech websites. But it comes rushing back when talking to family members and friends with technology problems. They don't know how things work, they don't care, and they don't want to have to mess with it. To many, what Apple offers is attractive for precisely that reason. And because of that, I can't, in good faith, claim that Apple is good or bad for what they do - it really all depends on your needs.

Re:Blaming the wrong people (2)

hackertourist (2202674) | more than 3 years ago | (#36492140)

OT: Select 'Plain old text' instead of 'HTML Formatted'. You can still use HTML tags, but CRs don't get filtered out.

Re:Blaming the wrong people (2)

Calos (2281322) | more than 3 years ago | (#36492206)

Awesome. Thanks.

Re:Blaming the wrong people (1)

Osgeld (1900440) | more than 3 years ago | (#36492410)

apple markets and pushes their app technology like rabid dogs, your stupid, not with it, or a Luddite if you do not have it as an Apple brand App... so yea I kind of blame apple

Re:Blaming the wrong people (4, Insightful)

UnknowingFool (672806) | more than 3 years ago | (#36492480)

And if the NY Post did the same thing with mobile IE so that you had to buy the WP 7 app and subscription it's all MS' fault too. If it did the same thing with Android browsers, it's all Google's fault?

Re:Blaming the wrong people (1)

Calos (2281322) | more than 3 years ago | (#36492828)

A much more eloquent and concise response than my own. This exactly captures it.

Re:Blaming the wrong people (1)

Osgeld (1900440) | more than 3 years ago | (#36493018)

I said I kind of blame apple, not it was entirely their fault, so reading comprehension = fail

is it purely the fault of an addict that they are hooked? or does the makers and sellers have a big chunk of influence? This would not even be an article unless there was huge marketing pressure for companies to make apps, no matter how retarded

and where is that pressure coming from?

Re:Blaming the wrong people (1)

Calos (2281322) | more than 3 years ago | (#36492500)

Can you explain your thought process to me, beginning to end? I don't see how this is the connection people are making, I really don't. Sure, with the iPad, companies feel pressure to be "hip" and offer their content in a native app. But this has nothing to do with an app. It has to do with NYP purposefully denying anyone on an iPad not using the app. That is the sole decision of the NYP. All of these new device ecosystems in the mobile world bring new avenues for media consumption. All Apple (and others) have done is open up new possibilities. It is the media providers that decide to restrict you to just one.

Re:Blaming the wrong people (1)

GlassHeart (579618) | more than 3 years ago | (#36492778)

Can you explain your thought process to me, beginning to end?

Allow me. Start with the core assumption that Apple users are sheep, who are unwilling or unable to think for themselves. Thus, they are defenseless against Apple's powerful marketing, much like unarmed civilians against an attacking army. As the invading army must then take responsibility for the safety of the civilians, so must Apple provide the most ideologically-pure (open source, Free, etc.) products to its sheep. Any mishap is therefore Apple's fault, because the users are so utterly helpless.

Yes, at the core of this thought process is an insult, because they just can't think of any reason that an intelligent person would buy an Apple product after considering alternatives.

Re:Blaming the wrong people (1)

Calos (2281322) | more than 3 years ago | (#36492876)

At first your response seemed callous, but the more I think about it, the more I like it - if I amend it to "some Apple users."

It's because the thought process does not start with an insult - it starts with two. First, that some Apple people are sheep; second, that anti-Apple people expect unreasonable things of Apple.

So in the end, we have that extremists on either side are foolish. I guess I'd just hoped that Slashdot could be more mature. Maybe it is, and its just that those that shout the loudest are often the most biased, drowning out the more reasonable commons.

Re:Blaming the wrong people (1)

node 3 (115640) | more than 3 years ago | (#36493028)

You blame Apple... for something the NY Post has done entirely on its own?

Re:Blaming the wrong people (1)

Osgeld (1900440) | more than 3 years ago | (#36493060)

fucking read! I said I kind of blame apple due to their pressuring the app market like rabid dogs, its like killing the junkie and letting the pusher walk away ... they both play equal parts

Re:Blaming the wrong people (1)

Shihar (153932) | more than 3 years ago | (#36492840)

People are taking shots at Apple because who the hell reads the NY Post? If one newspaper does this, who cares? The bigger issue the WHY this newspaper was able to do this. The answer is Apple's 'walled garden' approach. The Apple alternative browser market is a wasteland due to people being rightfully terrified of Apple's response. Apple doesn't play nice with people that offer competing functionality. This is the same company that pulled a camera app that let you use the volume key as the shoot button because it violated what Apple declared the volume key is used for, and then pulled them again when they removed the functionality, but allowed people to download a mod on their website to put it back. If you live in Apple's little walled garden, you don't fuck with Apple or you get treated like a weed. Android's browser market on the other hand is fast, bloody, and diverse. Further, the OS plays nicely with alternative browsers doesn't care if you use them.

I'm not saying that Android is better than iOS. It is different, and this is one of the differences. The 'it always works this way' approach that Apple takes means that the NY Post can make it so that the way it is going to work for now on is you have to use their horrid little app. If you don't care or don't understand this new sphere of technology, iOS is going to do you well. I would give my mom or grandfather an iOS device. For myself and all of my younger and more tech savvy friends, we sport Android devices with custom ROMs. Different folks, different strokes.

It's a Murdoch property (1)

Nimey (114278) | more than 3 years ago | (#36492134)

so reading it is an own-goal anyway.

I'd imagine the reason is so
a) they can track you better, or
b) actually, that's probably about it.

one more reason not to buy an ipad (1)

drolli (522659) | more than 3 years ago | (#36492142)

i like the *choice* on how to access something.

Not NY Times (0)

Anonymous Coward | more than 3 years ago | (#36492148)

The article should have clarified New York Times (the better one) is a different newspaper.


You read the New York Post!?! (1)

alcmaeon (684971) | more than 3 years ago | (#36492158)

The "walled garden" is the least of your problems.

NY Post (5, Informative)

circletimessquare (444983) | more than 3 years ago | (#36492174)

part of rupert murdoch's IQ lowering propaganda empire

and no, this isn't a swipe at conservativism, it's actually a swipe at china's power:

The Post has been criticized since the beginning of Murdoch's ownership for sensationalism, blatant advocacy and conservative bias. In 1980, the Columbia Journalism Review opined that "the New York Post is no longer merely a journalistic problem. It is a social problem – a force for evil."[31]
Perhaps the most serious allegation against the Post is that it is willing to contort its news coverage to suit Murdoch's business needs, in particular that the paper has avoided reporting anything that is unflattering to the government of the People's Republic of China, where Murdoch has invested heavily in satellite television.[32]
Ian Spiegelman, a former reporter for the paper's Page Six gossip column who had been fired by the paper in 2004,[33] said in a statement for a lawsuit against the paper that in 2001 he was ordered to kill an item on Page Six about a Chinese diplomat and a strip club because it would have "angered the Communist regime and endangered Murdoch’s broadcast privileges." []

or the power of Saudi Arabia, take your pick:

WASHINGTON—Accuracy in Media (AIM) is urging a full inquiry into a report that a Saudi billionaire caused the Fox News Channel (FNC) to dramatically alter its coverage of the Muslim riots in France after he called the network to complain. The Saudi billionaire, Al-waleed bin Talal, is a friend of News Corporation chairman Rupert Murdoch and controls an influential number of voting shares in the company.

“This report underscores the danger of giving foreign interests a significant financial stake in U.S. media companies,” declared Cliff Kincaid, editor of Accuracy in Media.

The controversial comments came at an Arab media conference featuring representatives of Time magazine, USA Today, PBS, The Wall Street Journal, and other news organizations. The conference and the Saudi Prince’s growing influence in News Corporation are among the subjects of a new December-A AIM Report that has just been posted at the AIM website ( The report raises the specter of Arab money influencing News Corporation and other U.S. media companies. []

do yourself a favor and stop reading the NY Post. it is a tool of a man who is evil immoral corporate influence incarnate

I don't know any iPad users who can read. (-1)

Anonymous Coward | more than 3 years ago | (#36492216)

The only people I know who own them at the niggers who steal them from the white fags. After they're done pounding whitey in the ass they steal his iPad and run off. That's the price white fags pay for loving big black cocks. This sort of shit doesn't happen to Android owners. We're not dick smoking faggots.

FirstWorldProblems? (0)

Anonymous Coward | more than 3 years ago | (#36492262)

Is this Reddit and FirstWorldProblems? Who cares about your iPad emotional roller-coaster story?

Downside (0)

Anonymous Coward | more than 3 years ago | (#36492296)

The downside is you still have to read the NY Post.

Restricted devices... (1)

Bert64 (520050) | more than 3 years ago | (#36492312)

Not good if your using an ipad/iphone in a work environment where they've decided to block you from installing arbitrary apps...

Good for lining bird houses (1)

STratoHAKster (30309) | more than 3 years ago | (#36492342)

This might be interesting if it weren't for the fact that the content of New York Post's online edition is worth far less than the paper it's printed on (which is zero).

Why read the Post? (1)

Nimey (114278) | more than 3 years ago | (#36492352)

It's even lower-quality than most Murdoch properties, and seems to be an American version of the UK's Sun tabloid: []

Bad Precedent (1)

meerling (1487879) | more than 3 years ago | (#36492484)

Imagine if lots of sites started requiring their own custom apps. Pretty soon your device (computer, ijunk, etc) would be filled with just that garbage, and the browser would be relegated to homebrew and marginal sites.

Bad idea, even worse than the ten billion toolbars that everyone already wants you to load into your browser. (I immediately delete any toolbar, they are unwanted, unnecessary, and very annoying.)

Re:Bad Precedent (0)

Anonymous Coward | more than 3 years ago | (#36492712)

Perhaps those sites would just die.

"the version I downloaded this morning " (1)

mapkinase (958129) | more than 3 years ago | (#36492510)

For science, right?

whoa dude (1)

nomadic (141991) | more than 3 years ago | (#36492534)

You are publicly admitting, on a highly-trafficked public web site, that you read the New York Post?

Apps: the New Bubble (1)

LynnwoodRooster (966895) | more than 3 years ago | (#36492592)

What's the point? Why not just do a rich website and support ALL your consumers with a single source - the ubiquitous web page?

Use Opera (0)

Anonymous Coward | more than 3 years ago | (#36492678)

Enough said.

A move against iOS5 features? (2)

leenks (906881) | more than 3 years ago | (#36492844)

To me this reads like it is meant as a move against Apple over the reader feature that is built into the upcoming iOS5 (which works surprisingly well).

Lack of understanding of the web (1)

93 Escort Wagon (326346) | more than 3 years ago | (#36492966)

The people making these decisions are idiots. This isn't accomplishing anything they couldn't already do on their website - they can require subscriptions, put up a paywall, and so on. Moving the content to an app doesn't fundamentally change anything.

If the business model didn't work with the web version, it will fail with the app version. The problem isn't in how the content is being offered - it's either a problem with the content itself, or with the business model behind it.

Peak freedom (1)

shutdown -p now (807394) | more than 3 years ago | (#36492996)

With stories like these - and NYTimes are not the only ones who do it, I've seen some other websites where you get a very minimal mobile version which tells you to install the app for any "advanced" operation - it seems to me sometimes that the last few years were some kind of a "peak freedom" on the Net, and we're going downhill now.

Consider the history. Back in the day there were provider-specific networks like Compuserve and AOL. Then we moved onto the Internet, but it became browser specific very quickly; most people here doubtlessly remember "designed for IE" labels on websites, and those who are a bit older might also remember "designed for NN". It took us over a decade to get to the point where any random website is highly likely to display correctly in any random web browser - and now that we're finally here, we have companies deliberately ditching that openness. Sad.

It's the NY Post? (1)

mat catastrophe (105256) | more than 3 years ago | (#36493102)

This just means you can move up to a better paper. You should thank them.
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?