Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Google Launches Identity Verification Badge Scheme

CPE1704TKS who cares? (241 comments)

Does anyone actually use Google+? I signed up and then immediately stopped using it. Let them drop my account if they can't verify my identity. Google+ just isn't something I'm interested in, and if they want to enforce rules that I don't want to obey, I just won't use it. If they do that with my email, then I will just move to another service.

more than 3 years ago

Snow Falls On the Most Arid Desert On Earth

CPE1704TKS Re:*Hint* (195 comments)

*Hint* When someone changes their initial theory from something that can be quantified (ie. "global temperature will increase because of man-made greenhouse gases") to something that can't be quantified ("ie. global temperature will get both hotter and colder in different parts of the world") it means they have realized their initial theory was incorrect and they are scrambling to find another theory.

Basically, if you're telling me that the theory of climate change is now "Some places will get hotter and some places will get colder", then there is nothing that can disprove the theory, since, yes, there will be parts of the world that will get hotter and parts that will get colder. It's a meaningless, nonsensical theory at that point.

That's like saying "Greenhouse gasses will cause more humans to die in some locations, and more humans to be born in other locations." I will always be able to point to some areas of the world where the birth rate has increased, and others where the death rate has increased.

more than 3 years ago

Ask Slashdot: How Do I Scrub Pirated Music From My Collection?

CPE1704TKS Strip and replace your ID3 tags (758 comments)

Most illegal mp3s have comments in the ID3 tags. Write a program that goes through and strips all the ID3 tags and replace then with your own. This will also do the trick of modify any MD5 checksums. After that it would be hard to prove anything, unless they isolated the audio data and used that specifically to try to detect exact matches. But then it would be hard to prove anything from that.

more than 3 years ago

LulzSec Teams With Anonymous, In Operation AntiSec

CPE1704TKS I still think that Lulzsec is CIA... (419 comments)

Lulzsec is funny and clever, but they haven't attacked a really big name site. But if they were real hackers, they would have tried to take down Facebook, E-trade, WoW, etc, something to generate an enormous amount of press. Instead, they've attacked small sites, security companies that didn't exist until a few months previous, and they attacked the CIA website. They've generated a lot of light, but not a lot of heat. For someone with their level of coordination, they certainly are trying to get themselves caught by posting on Twitter, going on IRC, leaving voice traces, etc. I don't buy the idea that they are complete nihilists, it's too exhausting.

The only thing I can think of is that these guys really are CIA, and they're trying to get blackhat credibility, in order to infilitrate and take down Anonymous. Sure, there's some collateral damage, but it's for the "greater good", right? My only hope is that I'm wrong, but I doubt it. The fact that they've teamed up with Anonymous after only a couple of months in existence makes me think I'm right.

more than 3 years ago

Friday's Big Swings, Mostly Down, Illustrate Bitcoin Value Volatility

CPE1704TKS $2MM+ worth of nerds just got played (476 comments)

Someone just cashed out a large deposit of bitcoins, and these nerds and bitcoin miners just got played. 3 months ago, this thing was less than $1. Now it was $30? lolz Someone made some good money, and waited for there to be enough liquidity for them to be able to cash out and raped the order book. This is a classic accumulation/distribution (a.k.a pump and dump) pattern where a few buyers suck in a multitude of retail fools by slowing raising the price through accumulation, and then once retail fervor hits, they dump it and get out. It's so stereotypical, it's a cliche, and I guess bitcoin just fell for it as well. I only wish I could short this thing, it's going back to below $1.

more than 3 years ago

Chinese Paper Warns Google May Pay Price For Hacking Claims

CPE1704TKS release the hackers! (165 comments)

We will punish Google's claims of hacking with MORE HACKING!

more than 3 years ago

Ask Slashdot: Is SHA-512 the Way To Go?

CPE1704TKS Rainbow tables? (223 comments)

On a similar note to this, since hashing can be defeated with rainbow tables, does anyone have any authoritative information on the state of rainbow table cracking? I just from a previous post that lulzboat cracked their passwords using rainbow tables, and looking through the password file, the passwords were substantially more complex than what I would use. Are rainbow tables at the state now where using special characters and numbers aren't good enough anymore? How long do we need to make our passwords? Does anyone like Bruce Schneier give guidance on this now?

more than 3 years ago

Adobe Reader X With Sandbox Due In November

CPE1704TKS WTF? Why? It's a READER!!! (110 comments)

This is getting ridiculous! I want Adobe Acrobat to just take a PDF and DISPLAY IT. I didn't sign up for all this bullshit with javascript, adding a service into my already crowded memory space that checks constantly for updates, etc. It's fucking ridiculous!

All it's supposed to be is a way to format a document. Anything more than that, adding all this fucking unnecessary infrastructure/bloatware onto desktop just makes me crazy! The additional fact that it causes viruses makes me really, really close to saying fuck off to acrobat completely.

It's as if the reading light switch on your car all of a sudden tried to get fancy, by adding motion detection, but then it needed additional layers to prevent it from draining your batteries it turns on because it detects motion on your car, so you're forced to buy tinted windows, etc, and oh yeah, it can somehow unlock the doors and start your car. It's a fucking utility that has taken on a life of it's own and I've really had to at this point.

Actually, after this rant I've decided I'm going to uninstall Acrobat immediately.

more than 4 years ago

Simple Virus For Teaching?

CPE1704TKS DON'T DO IT! You'll get fired (366 comments)

It sounds instructive, but you will probably get fired for lacking good judgement.

There are plenty of stories where teachers do similar things that end up getting them fired. Teaching students how to write viruses, faking a classroom kidnapping, how to plan a terrorist attack, etc.

Teaching your students how to write a virus is a classic case of bad judgement. Your superiors will tell you "What were you thinking?" and you will get let go.

Teach them verbally how viruses are created, but don't assign anything as homework.

more than 4 years ago

Google's CEO Warns Kids Will Have to Change Names to Escape "Cyber Past"

CPE1704TKS give them a very common name (706 comments)

If everyone is called John Smith from New York City, then they won't be able to find anyone. That's likely the best solution, because a cursory search won't come up with your name, or will find duplicate information, and they won't be able to tell one from the other.

more than 4 years ago

China To Close 2,000 Factories In Energy Crackdown

CPE1704TKS I hope you guys know this isn't about energy... (242 comments)

I sincerely hope you guys don't believe they are shutting down 2000 factories because of energy.

They are shutting down the factories because they don't have any orders for them to build things. This is just another example of the Chinese government hiding their data, and making them look better than what they are.

more than 4 years ago

NetApp Threatens Sellers of Appliances Running ZFS

CPE1704TKS Ummm it's their technology (231 comments)

They have a patent on this technology. They deserve the right to not have compete against their own technology. End of story. You can bitch and moan over whether or not patents are fair, but that's not the issue. The issue is that as of this moment, they have a legal patent and they spent years investing and developing their snapshot technology.

Netapp for what it's worth is a decent company, I don't think they would just go out and start a patent war for no reason. I fully support them over Sun and ZFS on this one.

more than 4 years ago

Blizzard Backs Down On Real Names For Forums

CPE1704TKS hope heads roll on this one (432 comments)

I really hope someone's head rolls for this mistake. I'm so tired of companies like Blizzard thinking they can do something stupid like force people to post with their real names.

The executive in Blizzard that tried to force this really doesn't "get it", and needs to be removed from a position of power where they can cause even more harm to the company.

It's exactly like when Intuit enforced DRM and then instantly lost hundreds of millions of dollars and had to kowtow to their users. That was obviously a decision done by a group of people that aren't good enough to make decisions on behalf of a multi-billion dollar company and need to be removed immediately.

more than 4 years ago

Google forces another redesign on users

CPE1704TKS It really does suck (1 comments)

I use news.google.com a lot, I switched over from my.yahoo.com about a year ago, and I found news.google.com to be a really dense source of news that I could quickly scan. Now, I have to scroll far too much and it's not nearly as useful anymore. In addition, the fucking page keeps moving, because when you mouse over an article, it adds some more text which causes it to jump a little. It's really fucking annoying.

I'm not sure what's going on with Google but they are definitely not in tune with what their users want. People want simple and useful, not all this bullshit. Yeah, yeah, I know it's free. But they really are moving away from what made them great, and I think they are forgetting their core users for some reason.

more than 4 years ago

How To Get a Game-Obsessed Teenager Into Coding?

CPE1704TKS gamer != programmer (704 comments)

The best way is to give him a real-world project that will force him to program. Have him make a web site, or set up a web server from home so that his friends can log on over the internet directly to a computer that he controls.

Be aware, though, that it really takes a special mindset to not only enjoy programming but be good at it.

They need to really have a strong sense of order. Attention to detail is required. They need the ability to concentrate very hard and be able to flow chart behavior in their heads.

If they don't possess these skills, they'll find programming intolerable.

I love programming. But when I first started, I thought computers were only good for games. I thought programming was retarded. But by my senior year of college, I took on a project that required assembly level programming of a dsp chip, and that hooked me. I enjoyed the zen-like state I went into when I started programming, and I enjoyed putting code in order. I used to spend lots of time as a kid building snow forts and arranging the best location for my snowballs for a snow fight. It's the same sort of mental pattern I use when I program as well. Now I program at work and in my spare time. I love it.

more than 4 years ago

When Rewriting an App Actually Makes Sense

CPE1704TKS Doesn't sound like a very big project... (289 comments)

A project that starts October 2006 with a deadline of Dec 2006 doesn't sound like a big project. In fact, even including the slippage of 3 months to March 2007, that's not a lot of code complexity we're talking about. I've had a single feature that took more time than 3 months!

From the sounds of it, it doesn't seem like this project really counts. Completely rewriting an app that take 3-6 months is not what I think could be considered a high risk project. The rewrites that I've seen were for much much larger projects and they took years. One ended in success, and the rest were failures.

more than 4 years ago

How To Behave At a Software Company?

CPE1704TKS #1 rule: be a good team member (842 comments)

You need to be someone that the other people on your team want to work with. So, what does that mean?

For me, the #1 thing I try to do is: ask how you can help the team. This is something that not a lot of people do. If you have some extra bandwidth, ask your manager or your coworkers if there is any tasks you can take up that will help your team out. This instantly sets you apart as being not only pro-active, but a great team player as well.

Don't be the team's bitch, but if you're finished your bugs early, go through the buglists of your coworkers, and see if you can pick off any low hanging fruit. Of course, ask them first because they might have already started working on them. But how nice would it be if someone on your team said "Hey I finished a bit early, I think I can fix bug 2431533 for your if you want."

more than 4 years ago

Rough Justice For Terry Childs

CPE1704TKS qual application of justice??? LOL (418 comments)

You've got to be kidding. Do you honestly think you can go back to prior cases and use that to show how something is or isn't a crime?

What matters is how good your lawyer is and what sort of strings they can pull. Obviously, this guy's lawyer wasn't as good as the other guy's lawyer.

The rules that apply to us DO NOT apply to rich people. Stop believing for one second that they do. Look at some black dude that goes to jail for 3 years for stealing bread vs. the Wall Street banksters that steal billions and get multi-million dollar bonuses.

Marc Rich was convicted of tax evasion, and fled to Switzerland. It took $250,000 in donations to Bill Clinton for him to pardon him on his last day in office.

There is no justice, all there is is how much money you have to spend to grease the wheels of the system.

more than 4 years ago

AMD's 12-Core Chip Cuts Software Licensing Costs

CPE1704TKS virtualization and cloud is where it's going (217 comments)

Sure you can get more threads and CPUs for your SQL Server, but eventually it's going to be a cloud like environment where there will be massively partitions, very small databases, each using up 1 virtual CPU. Massive monolithic databases are how things are right now, but in the future, things like CPUs or cores will be foreign concepts.

more than 4 years ago

China's Great Firewall Infects Other Countries

CPE1704TKS hacker attack (178 comments)

Come on, are we really being that stupid? Of course it was a hacker attack. The chances of an IP address "accidentally" being pointed to a Chinese one is remote.

These Chinese hackers (and hackers in general) are getting more and more dangerous. If they hack the DNS servers, we're talking about a massive ability to steal passwords, since https is based on domain name and not IP address. If the DNS is configured to give incorrect DNS information, then we really could get hosed here.

more than 4 years ago



March RSA Hack Hits Lockheed, Remote Systems Breac

CPE1704TKS CPE1704TKS writes  |  more than 3 years ago

CPE1704TKS (995414) writes "I guess we know what the first target of the RSA hackers were now: military secrets. Unfortunately, RSA's complete silence on the matter will only remove any shred of confidence people have in their product.

From the article:

"So how did the hackers do it? It's been speculated that hackers obtained master key files during the March RSA attacks—as implied, a hacker then would be able to penetrate a SecurID-protected network by replicating an individual's exact keys generated by the particular device.""

Link to Original Source

Google Chrome has been hacked

CPE1704TKS CPE1704TKS writes  |  more than 3 years ago

CPE1704TKS (995414) writes "From the site:

"We are (un)happy to announce that we have officially Pwnd Google Chrome and its sandbox.

While Chrome has one of the most secure sandboxes and has always survived the Pwn2Own contest during the last three years, we have now uncovered a reliable way to execute arbitrary code on any installation of Chrome despite its sandbox, ASLR and DEP.""

Link to Original Source

CPE1704TKS CPE1704TKS writes  |  more than 7 years ago

CPE1704TKS (995414) writes "My girlfriend is running into a weird situation. Someone is posing as her and sending her friends on her friendster account messages asking for their IM account names. Some of them have been duped and have even engaged in conversation with this person. What can I do (legally) to determine this person's true identity.

I was able to determine this person's IP address by putting trackers on specific web pages and sent those pages to them to look at. I even set up a fake AIM account and chatted with this person, pretending to be someone who thought she was my gf.

Now what?

I have the person's IP address, and I know the city that they live in, based on it. Is there any way I can narrow down who they are? If people post grey-area or not-so-legal tactics, as a law-abiding citizen, I would never do such a heinous thing, but it would be educational to know what tricks and tips there are out there to figure out who this person is."


CPE1704TKS has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?