Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Apple Tells Siri To Stop Recommending Nokia

Aurisor Re:Not just Apple (337 comments)

Compelling arguments can be made for both Firefox and Chrome. This would alarm me more if that weren't the case.

more than 2 years ago

Ask Slashdot: Open Source vs Proprietary GIS Solution?

Aurisor geokit (316 comments)

I worked for a large location-based mobile / web startup. Pretty much every web request dealt with a lat / lng. We used geokit ( http://geokit.rubyforge.org/ ) and it worked great.

20k to move to a completely different platform over one trivial problem is just wrong.

about 3 years ago

The Pirate Bay Co-Founder Starting P2P-DNS

Aurisor Re:Violence is the answer. (309 comments)

Your post advocates a

( ) technical ( ) legislative ( ) market-based (X) vigilante

approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)

( ) Spammers can easily use it to harvest email addresses
( ) Mailing lists and other legitimate email uses would be affected
(X) No one will be able to find the guy or collect the money
( ) It is defenseless against brute force attacks
( ) It will stop spam for two weeks and then we'll be stuck with it
( ) Users of email will not put up with it
( ) Microsoft will not put up with it
(X) The police will not put up with it
( ) Requires too much cooperation from spammers
( ) Requires immediate total cooperation from everybody at once
( ) Many email users cannot afford to lose business or alienate potential employers
( ) Spammers don't care about invalid addresses in their lists
( ) Anyone could anonymously destroy anyone else's career or business

Specifically, your plan fails to account for

(X) Laws expressly prohibiting it
( ) Lack of centrally controlling authority for email
( ) Open relays in foreign countries
( ) Ease of searching tiny alphanumeric address space of all email addresses
( ) Asshats
( ) Jurisdictional problems
( ) Unpopularity of weird new taxes
( ) Public reluctance to accept weird new forms of money
( ) Huge existing software investment in SMTP
( ) Susceptibility of protocols other than SMTP to attack
( ) Willingness of users to install OS patches received by email
( ) Armies of worm riddled broadband-connected Windows boxes
( ) Eternal arms race involved in all filtering approaches
( ) Extreme profitability of spam
( ) Joe jobs and/or identity theft
( ) Technically illiterate politicians
( ) Extreme stupidity on the part of people who do business with spammers
( ) Dishonesty on the part of spammers themselves
( ) Bandwidth costs that are unaffected by client filtering
( ) Outlook

and the following philosophical objections may also apply:

( ) Ideas similar to yours are easy to come up with, yet none have ever
been shown practical
( ) Any scheme based on opt-out is unacceptable
( ) SMTP headers should not be the subject of legislation
( ) Blacklists suck
( ) Whitelists suck
( ) We should be able to talk about Viagra without being censored
( ) Countermeasures should not involve wire fraud or credit card fraud
( ) Countermeasures should not involve sabotage of public networks
( ) Countermeasures must work if phased in gradually
( ) Sending email should be free
( ) Why should we have to trust you and your servers?
( ) Incompatiblity with open source or open source licenses
( ) Feel-good measures do nothing to solve the problem
( ) Temporary/one-time email addresses are cumbersome
( ) I don't want the government reading my email
(X) Killing them that way is not slow and painful enough

Furthermore, this is what I think about you:

( ) Sorry dude, but I don't think it would work.
(X) This is a stupid idea, and you're a stupid person for suggesting it.
( ) Nice try, assh0le! I'm going to find out where you live and burn your
house down!

more than 4 years ago

Interview With the Man Behind WikiLeaks

Aurisor Re:Slashdot Had the Option to Interview Him in Mar (489 comments)

I understand he's a media whore with shady beginnings...

Yeah he really gets off on drawing attention to militaries killing innocent civilians. What a self-centered jerk.

more than 4 years ago

Times Paywall Blocks 90% of Traffic

Aurisor Not that Times (311 comments)

For USians this is quite confusing - I assumed the submitter speaking of the New York Times.

more than 4 years ago

Weird Exoplanet Orbits Could Screw Up Alien Life

Aurisor Re:Life adapts (161 comments)

Wait, there's life in Canada?

more than 4 years ago

What Game Devs Should Learn From EVE

Aurisor Re:Shame (270 comments)

You're entitled to your opinion, but there are a *lot* of us who think that the successful MMOs are a lot of fun. That's why they're successful.

more than 4 years ago

Exam Board Deletes C and PHP From CompSci A-Levels

Aurisor Re:Maybe I'm missing something (663 comments)

If you're not in possession of a solid understanding of computers, or at least in the market, programming is probably not the profession for you.

more than 4 years ago

Can Employer Usurp Copyright On GPL-Derived Work?

Aurisor Re:teach them a lesson (504 comments)

You ought to read the damn summary before you go around telling people what they're wrong about. The GPL only mandates source code disclosure for *EXTERNAL* distribution. There's no indication here that the app was distributed at all, let alone distributed outside the university.

Furthermore, if we assume, as you did, that the software *had* been distributed, the submitter's dilemma is moot since the derived work would be violating the license of the GPL'd libraries upon which the submitter's work is based.

Next time, read a little more carefully before clicking that submit button.

more than 4 years ago

Can Employer Usurp Copyright On GPL-Derived Work?

Aurisor teach them a lesson (504 comments)

So, as I understand it, there are 3 pieces of software here. First are the GPL libraries; let's call them 'A'. Then, you have the software you did as a hobbyist, let's call that 'B'. Finally, you have the work for hire, called 'C'. C depends on B, and B depends on A.

It's clear that they own C, and there's nothing you can do about that. On the other hand, you own B. If you publicly distributed B under the GPL, you are probably screwed here. In that case, there's nothing to distinguish B from A, and your only recourse might be some technicality in the GPL. For example, if you used the GPL v3, you may be able to use the stuff about software patents to prevent your university from using it.

However, if by releasing B under the GPL you mean you just used GPL software and considered it free, you may be able to turn around and teach them a lesson here: assert ownership over B, and demand that they produce written proof otherwise. You could demand that C be open-sourced in return for being allowed to use B.

That being said, though, you were stupid to do closed-source work on your own open-source project. Not only will you have to fight for access to your own work, your knowledge of the closed-source work will probably 'taint' any contributions to the open-source one to such a degree that they could probably claim work you do on it, even if it's off their payroll.

In the future, don't be so trusting of your employer. When I do open-source work for hire, I create a private github account and make the repo publicly available and GPL-licensed from day one. All of my work on the clock is then contributing to an externally owned and operated repo.

Oh, and I get the corporate overlord's approval of open-sourcing the thing in writing.

more than 4 years ago

FBI, DoJ Add 35 Positions For Intellectual Property Battle

Aurisor Re:From a historical perspective (140 comments)

At the end of the day, though, Mitnick-style hacking requires getting into someone else's computer: there's always going to be a pissed off business on the other end of your hacking.

With piracy, though, the only way to know that it has happened is by conducting surveillance on the people who are committing it. You can certainly make life less convenient for the high-profile piracy groups, but the idea of piracy going the way of black hat hacking is pretty ridiculous.

Honestly, I think we're really only one major leap in storage before music piracy starts to become trivial. Assuming MP3 v0's, the record industry is only producing about 80gb worth of music per year. Once you can get 1tb of data on an optical disk, we're talking about an entire decade's music on one CD. What are you going to do, install surveillance software on every computer in the country? Install cameras and look for CDs? Give me a break.

Regardless of what people would like, recorded music is not scarce anymore, and therefore does not have economic value. Sorry!

more than 4 years ago

Extremists Warn South Park Creators Over Muhammad In a Bear Suit

Aurisor Re:"warn"? Are you kidding me? (1131 comments)

I think you misunderstood my point. I was criticizing Slashdot / Fox for not calling the threats and calls for violence out as the reckless behavior that they are.

I actually did see the episode, and found it hilarious.

more than 4 years ago

Extremists Warn South Park Creators Over Muhammad In a Bear Suit

Aurisor Re:Bronze Age? (1131 comments)

Thanks for pointing that out! If you hadn't come along, I might have offended someone!

more than 4 years ago

Extremists Warn South Park Creators Over Muhammad In a Bear Suit

Aurisor "warn"? Are you kidding me? (1131 comments)

"Extremists Warn South Park Creators Over Muhammad in a Bear Suit"

What a total wimp-out of a headline. A 'warning' is when the weatherman says 'it looks icy out today, drive slow.' When someone calls upon the nut-jobs of the world to murder you because you pissed off their bronze-age sky fairy, that's inciting violence, an explicit threat. I'm willing to go pretty far in support of free speech, but this is definitely "fire in a crowded theater" material.

more than 4 years ago

ACTA Draft To Be Made Public Next Week

Aurisor Spoiler (95 comments)

Spoiler: you're not going to like any of it. At all.

more than 4 years ago

How Chat and Youth Are Killing the Meeting

Aurisor This is a *good thing* (205 comments)

I work for a very successful, young company which is run by a very young CEO. On average, I have no meetings at all. We're currently in a huge crunch right now, which means I have 3-minute check-ins at the beginning and the end of the day.

Long meetings have been the butt of jokes for as long as I can remember, and for good reason: they're a giant waste of time, especially for technical people.

This looks very much like one of those articles people will be mocking in 10 years. This really makes Forbes look like they're clinging to the 20th century...how embarrassing.

more than 4 years ago

Why Responsible Vulnerability Disclosure Is Painful and Inefficient

Aurisor Re:Leak it (182 comments)

So leak it first, wait for it to show up somewhere, and *then* contact the vendor and point to the leaked exploit.

Maybe I'm just cynical, having been blown off many times in the past. Generally speaking, the only way to get technical attention is to make non-technical people freak out.

more than 4 years ago

Why Responsible Vulnerability Disclosure Is Painful and Inefficient

Aurisor Leak it (182 comments)

Leak a working exploit anonymously. If a vendor isn't concerned with the security of their users, let them pay the price.

more than 4 years ago

Cold War Warrantless Wiretapping

Aurisor I am (85 comments)

I am Jack's complete lack of surprise.

more than 4 years ago


Aurisor hasn't submitted any stories.


Aurisor has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?