Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Microsoft Lobby Denies the State of Chile Access To Free Software

Em Adespoton Re:Details? (134 comments)

...not even that. From TFS, you can deduce that the second piece of legislation isn't even contrary, but is just equally beneficial to ALL software instead of being tailored to encourage adoption of free software.

So the summary could be rewritten as: "Free Software Lobby fails to prevent the use of Closed Software in Government and Business."

yesterday
top

Microsoft Lobby Denies the State of Chile Access To Free Software

Em Adespoton Re:Or you could blame Chile's MPs (134 comments)

Plus, just in the summary, two MPs are conflated, and following that, we have the idea being pushed that legislation to promote free software in government is somehow hobbled by more legislation to provide businesses with tax credits to offset software purchase costs?

Last I knew, the Chilean government wasn't a federation of businesses, and the second bill just makes commercial software look more like free software (in terms of purchase/license cost) to businesses.

Seems to me that the second bill could also be used to offset purchase costs of free software that comes with support, making it an extremely lucrative option.

yesterday
top

Tor Browser Security Under Scrutiny

Em Adespoton Re:Findings... (80 comments)

Thanks! This is excellent info. I do think that a Pwn2Own on TBB would be useful either way -- either it's hardened a lot and fares well, thus getting good publicity as a private AND secure browser, or the glaring bugs are fixed, it fails miserably in the P2O, and the visibility is improved that while it may be somewhat anonymous, it is by no means secure, and people pitch in to help fix that. Seems like a win-win to me, as long as donors are footing the prize bill.

yesterday
top

Do Readers Absorb Less On Kindles Than On Paper? Not Necessarily

Em Adespoton Re:Probably has to do with pages. (104 comments)

Studying AND reference is completely different on an e-book than in a textbook. With a textbook, I wrote in the margins, highlighted text, and dog-eared pages, plus used sticky tabs in various places.

With an e-book, you don't have to do most of that, as you can quickly search for anything in the entire book... or for that matter, you can quickly search through your entire collection. Highlighting is more difficult, and linked notes don't have quite the same "physical space memory" triggers due to the lack of unique muscle usage when writing them, plus the lack of being able to see them in-place where you wrote them.

So in summary, what I've found is that physical books are better for actual study, but e-books are far better as reference material. They've been about the same for me for recreational reading, with the exception that an e-book is easier to read almost everywhere, and you can keep a collection with you at all times.

2 days ago
top

Scientists Baffled By Unknown Source of Ozone-Depleting Chemical

Em Adespoton Re:Come on... (291 comments)

It's obvious where it's coming from... China and all those other "cheap labor" part of the world who don't give a damn about the environment.

You know the world has changed when the USA gets listed under "all those other 'cheap labor' parts of the world" and China gets top billing....

2 days ago
top

Scientists Baffled By Unknown Source of Ozone-Depleting Chemical

Em Adespoton Re:Damn cars (291 comments)

All the ozone from the exhaust of cars is the culprit. We just can't make enough ozone. Time to rev the engines.

You'd need to make flying cars lucrative first... ones that could make it all the way to the ozone layer. Down here in the lower levels of the atmosphere, ozone is known as pollution.

2 days ago
top

Tor Browser Security Under Scrutiny

Em Adespoton Re:Findings... (80 comments)

Ah; so they're not saying that they disable ASLR, they're just saying they aren't baking it in (which EMET can do for free).

That makes much more sense if it's the case. I never use TorBrowser on Windows, so I haven't seen how it actually behaves.

2 days ago
top

200GB Blu-ray discs aim to compete with tape in the data centre

Em Adespoton Bitrot? (1 comments)

Are these new discs designed to last longer than 10 years? Tape is great because even if some of the sectors on a chromium oxide tape fail, you can still read back the rest of the data. My experience with optical media is that if the key sectors get damaged, that's it for the entire platter, as the reference index is now gone.

If they've really overcome these obstacles... it's about time. How long until we can get these for home use?

2 days ago
top

Scientists baffled by unknown source of CFCs

Em Adespoton Re:Umm... these chemicals are still in demand and (3 comments)

Indeed...

Carbon tetrachloride (CCl4), which was once used in applications such as dry cleaning and as a fire-extinguishing agent, was regulated in 1987 under the Montreal Protocol along with other chlorofluorocarbons that destroy ozone and contribute to the ozone hole over Antarctica. Parties to the Montreal Protocol reported zero new CCl4 emissions between 2007-2012.

All this really means is that those who aren't party to the protocol have ramped up their emissions, and/or that those party to the protocol aren't reporting what they don't officially know about. I'm not sure how they jump from that to an assumption that CCl4 is being produced naturally and should therefore not be banned. Especially since the ban had a pretty strong correlation with the ozone depletion being halted and recovery starting.

2 days ago
top

Tor Browser Security Under Scrutiny

Em Adespoton Re:Findings... (80 comments)

One question I have is:
They say ASLR is disabled, and then they recommend using the product with EMET. However, if ASLR is disabled, doesn't that mean that EMET won't be compatible? EMET requires a number of features to be handled correctly before it can be used.

Seems to me that what really has to happen (in this order) is:

1) Mozilla fixes jemalloc or just replaces it with something like PartitionAlloc, fixing these issues for ALL variants that depend on it.

2) TorBrowser takes the Firefox code and recompiles the source as a single package for each target platform, and feeds THAT into its reproducable build system, instead of using standard cross-compile methods. No library loads, etc, just build a binary blob + chrome. This should be able to work under ASLR, if they do it right.

3) Fix whatever's left that prevents TorBrowser running alongside EMET. However, I think after 1 and 2 are done, there shouldn't be a problem here. Some of EMET's features are already baked in to OS X, so if the above issues are fixed, OS X should be in a stable state as well.

4) Assuming 1 and 2 are listed as priorities for both OTF and Mozilla, this should be doable by sometime in Jan/Feb 2015. Probably the best route would be to start a kickstarter ending at sometime in Feb to raise money for a pwn2own slot. If they don't make the deadline in tightening things up, pledges are dropped and nobody loses. If they DO make the deadline, they get the funds, and contestants will proceed to punch holes in the browser. Mozilla will also benefit from this attack, and should probably contribute to said kickstarter.

2 days ago
top

Tor Browser Security Under Scrutiny

Em Adespoton Findings... (80 comments)

Address Space Layout Randomization is disabled on Windows and Mac

Due to our use of cross-compilation and non-standard toolchains in our reproducible build system, several hardening features have ended up disabled. We have known about the Windows issues prior to this report, and should have a fix for them soon. However, the MacOS issues are news to us, and appear to require that we build 64 bit versions of the Tor Browser for full support. The parent ticket for all basic hardening issues in Tor Browser is bug #10065.

Participate in Pwn2Own

iSEC recommended that we find a sponsor to fund a Pwn2Own reward for bugs specific to Tor Browser in a semi-hardened configuration. We are very interested in this idea and would love to talk with anyone willing to sponsor us in this competition, but we're not yet certain that our hardening options will have stabilized with enough lead time for the 2015 contest next March.

Test and recommend the Microsoft Enhanced Mitigation Experience Toolkit on Windows

The Microsoft Enhanced Mitigation Experience Toolkit is an optional toolkit that Windows users can run to further harden Tor Browser against exploitation. We've created bug #12820 for this analysis.

Replace the Firefox memory allocator (jemalloc) with ctmalloc/PartitionAlloc

PartitionAlloc is a memory allocator designed by Google specifically to mitigate common heap-based vulnerabilities by hardening free lists, creating partitioned allocation regions, and using guard pages to protect metadata and partitions. Its basic hardening features can be picked up by using it as a simple malloc replacement library (as ctmalloc). Bug #10281 tracks this work.

2 days ago
top

Scientists Find Traces of Sea Plankton On ISS Surface

Em Adespoton Re:Next up, barnacles (116 comments)

They just need to send someone out there to coat the ISS in some toxic chemicals, same as boats. So that the plankton can become resistant to toxic chemicals as well as extreme weather conditions.

2 days ago
top

Scientists Find Traces of Sea Plankton On ISS Surface

Em Adespoton Re:This actually makes perfect sense. (116 comments)

What also makes perfect sense is that the equipment used to do the collection and detection wasn't as clean as they had hoped. I seem to recall this happened with some meteorites at some point. Contamination is always a factor when dealing with microorganisms.

2 days ago
top

YouTube Music Subscription Details Leak

Em Adespoton Re:Are you Kidding Me (71 comments)

I'm sorry you feel that way.

Chrome has definitely become the interface driver; I now find that more and more interfaces are difficult to navigate with poor vision, whether it be eyesight in general, low-light situations, glare situations, etc.

The Chrome UI is definitely different, and sheds a lot of cruft that was just there for legacy's sake, but the result is something that is only really an improvement if you're under 35 and operating in optimal lighting conditions.

Human Interface Design has gone downhill a lot in the last decade, with designers thinking they know better than what came before, instead of learning from it like previous generations did. That doesn't mean that there aren't good new design ideas coming out, just that as a whole, the implementation sucks for the majority of people for the majority of use cases. It attempts to get people to conform to the design instead.

2 days ago
top

Email Is Not Going Anywhere

Em Adespoton Re: Ubiquitous Common Denominator (235 comments)

SMS is tied to a SIM on the back end; to the end user, it just looks like it's linked to the phone number, but in reality it leaves quite a paper trail, indicating which towers it passed through, what the sending and receiving SIMs were, what trunk route was used, etc. This is, in fact, the "metadata" the NSA was/is capturing, and is also required to be stored by the sending and receiving phone providers for some amount of time (can't remember the current time windows).

So yeah; SMS as we use it is designed to look easy and simple to the end users, but that's quite a few degrees removed from the actual SMS activity, which was originally the debug channel that managed the voice channels for cellular phone transmission.

SMS also has the benefit of being signed/encrypted over transport, so there's some verification that what was received matches what was sent -- EMail has none of this without PGP/MIME or the equivalent.

2 days ago
top

Email Is Not Going Anywhere

Em Adespoton Re: Ubiquitous Common Denominator (235 comments)

Email includes identifying information, text messages do not. An arbitrary string of numbers is not a good identifier. If you communicate with the sender frequently they may be in your address book, but a new contact is not.

Huh?

Email includes very little information that cannot be forged, although DKIM and originating IP are useful. SIGNED or encrypted email is much better in this respect; I hope something comes of the Google/Yahoo initiative to make GPG/PGP default.

SMS on the other hand has solid unique identifiers that cannot be easily forged. Of course, this is tied to the SIM and the entry point used to send the message, but those aren't easy to forge.

5 days ago
top

Posting Soccer Goals On Vine Is Illegal, Say England's Premier League

Em Adespoton Re:Is there a barrister in the house? (226 comments)

It's obviously not NFL or CFL; any tutu sewn under their leotards would be immediately obvious to the world. My guess is we're talking Premier League rules football. This kind of makes sense when you think about the artistry behind taking a dive....

about a week ago
top

Swedish Dad Takes Gamer Kids To Warzone

Em Adespoton Re:Gettin All Up In Yo Biznis (417 comments)

This whole story is a tale of over-reaction that only seemed to have occurred, because "oh my god, video games!".

Wanting to expose your children to realities beyond those as depicted by popular media is a thoughtful thing to do. Not so much when it's a swift over-reaction to "OMG VIDEO GAMES!".

And, really, the truth seems more to be "freelance journalist does a freelance journalist thing and uses his kids as fodder for more freelance journalism". What do you figure the odds are he'd be doing this and documenting it if, say, he were a flight mechanic or a plumber and there weren't some other benefit besides that to his children?

You work with the tools you've got. You'll notice, he didn't do "OMG VIDEO GAMES!" but instead did "You guys don't have the whole picture. Let's get some education in you so you can decide what you want to do."

After all, when they got back, he let his kids play the video games. To me it seemed more that he was surprised at the lack of information they were gaining about reality (but thought they were gaining) via the CoD games. Now they'll be playing CoD and he'll be confident that they play it only as a game, as they've been exposed to some of the world's harsh realities.

If I had the money to go globe hopping, I'd do this too. As it is, I usually settle for having my family spend time with people who are refugees but moved to MY country. Not as useful in some ways, but moreso in others.

about a week ago
top

Ryan Lackey, Marc Rogers Reveal Inexpensive Tor Router Project At Def Con

Em Adespoton Re:Can't trust the hardware. (38 comments)

Yeah; what I can't figure out is what happened to criminal cases being thrown against public servants proven to be intentionally serving someone other than the public. It's even beyond cronyism, and it seems to have hit all levels of government to one degree or another (excluding the alderman recently arrested for documenting police brutality).

about a week ago
top

Ryan Lackey, Marc Rogers Reveal Inexpensive Tor Router Project At Def Con

Em Adespoton Re:Can't trust the hardware. (38 comments)

Roman roads
Terraced farming
Fracking
Horses
The railroad
The internet

At the heart of most political and social problems, you'll find an issue with a technical solution that obviates the debate.

Of course, such solutions usually open up a whole new universe of political and social problems to be explored.

about a week ago

Submissions

top

Apple now relaying all FaceTime calls due to lost patent dispute

Em Adespoton Em Adespoton writes  |  about a year ago

Em Adespoton (792954) writes "Before the VirnetX case, nearly all FaceTime calls were done through a system of direct communication. Essentially, Apple would verify that both parties had valid FaceTime accounts and then allow their two devices to speak directly to each other over the Internet, without any intermediary or "relay" servers. However, a small number of calls—5 to 10 percent, according to an Apple engineer who testified at trial—were routed through "relay servers."

At the August 15 hearing, a VirnetX lawyer stated that Apple had logged "over half a million calls" complaining about the quality of FaceTime [since disabling direct connections]."

Link to Original Source
top

Facebook to include profile photos in its facial recognition database?

Em Adespoton Em Adespoton writes  |  about a year ago

Em Adespoton (792954) writes "Facebook has published a summary of the updates it's proposing to make to its Data Use Policy and Statement of Rights and Responsibilities which shows a large volume of rewriting.

Most of the changes are minimal, but one area has caught people's attention — photo tagging.

Facebook has highlighted how it plans to use members' profile pictures as an identification tool to allow their friends to tag them in photos.

NakedSecurity's Lee Munson has more details, including comments from Facebook's chief privacy officer Erin Egan on why this is a "good thing"."

Link to Original Source
top

Ivetva ynhapurf Tynff-obggbzrq cynar

Em Adespoton Em Adespoton writes  |  about a year ago

Em Adespoton (792954) writes "Ivetva unf erpragyl perngrq gur grpuabybtl erdhverq gb cebqhpr gur jbeyq’f svefg tynff-obggbzrq cynar. Guvf grpuabybtvpny vaabingvba pbvapvqrf jvgu gur fgneg bs Ivetva Ngynagvp Nvejnlf’ svefg rire qbzrfgvp freivpr gb Fpbgynaq. Gurl ubcr gb gevny gur tynff obggbz grpuabybtl jvgu bgure Ivetva nveyvarf va gvzr naq unir nfxrq bgure Ivetva pbzcnavrf gb fhccbeg guvf vaabingvir gevny naq ynhapu gurve arj qbzrfgvp Fpbggvfu ebhgr."
Link to Original Source
top

The DDoS That Almost Broke the Internet

Em Adespoton Em Adespoton writes  |  about a year ago

Em Adespoton writes "Had any network issues over the last week? CloudFlare, an AnyCast, Anti-DDoS network provider writes, "Our direct peers quickly filtered attack traffic at their edge. This pushed the attack upstream to their direct peers, largely Tier 1 networks. Tier 1 networks don't buy bandwidth from anyone, so the majority of the weight of the attack ended up being carried by them. While we don't have direct visibility into the traffic loads they saw, we have been told by one major Tier 1 provider that they saw more than 300Gbps of attack traffic related to this attack. That would make this attack one of the largest ever reported.""
Link to Original Source
top

Study finds Lost USB keys have 66% chance of malwa

Em Adespoton Em Adespoton writes  |  more than 2 years ago

Em Adespoton writes "Sophos studied 50 USB keys bought at a major transit authority's Lost Property auction.

        The study revealed that two-thirds were infected with malware, and quickly uncovered information about many of the former owners of the devices, their family, friends and colleagues.

        Disturbingly, none of the owners had used any sort of encryption to secure their files against unauthorised snoopers."

Link to Original Source
top

Targeted attacks steal credit cards from hospitali

Em Adespoton Em Adespoton writes  |  more than 2 years ago

Em Adespoton writes "SophosLabs, the security research division of Sophos, Inc, has been tracking an increase in targeted attacks against hospitality and educational organizations. Active malware has been discovered that steals credit card data directly from memory for later retrieval by the criminals involved. This activity appears to go back as far as 2009, just like the Stuxnet/Duqu threat."
Link to Original Source
top

Can we fix SSL Certification?

Em Adespoton Em Adespoton writes  |  about 3 years ago

Em Adespoton writes "At DEFCON this year, Moxie Marlinspike gave an excellent presentation entitled "SSL And The Future Of Authenticity." It shows how broken the current SSL certification model is, and proposes a replacement. Naked Security adds to the issue, pointing out that with Moxie's method, does it even matter if you can trust your certificate notaries?
What do you think?"

Link to Original Source
top

Palin's hacker imprisoned, against Judge's wishes

Em Adespoton Em Adespoton writes  |  more than 3 years ago

Em Adespoton writes "It was a computer security story that made headlines around the world, involving the private emails of a woman who could have become Vice President of the United States. And now, it's ended with a young man sent to a federal prison, hundreds of miles from his family home.

David C Kernell, the hacker who broke into Sarah Palin's personal Yahoo email account, is reported to have been sent to jail despite a judge's recommendation that he should not be put behind bars."

Link to Original Source
top

Em Adespoton Em Adespoton writes  |  more than 7 years ago

Em Adespoton writes "Following the recent expose done by CBC's investigative reporting show, '22 Minutes', the Canadian public has become aware of a bill being pushed through parliament to create a national timbit registry.

Gordon Lightfoot, representative of the Assembly of Native Canadians, was said to hold that, "even considering such a bill was ludicrous, as it would destroy the current goodwill and respect painstakingly developed over the last two centuries between the government and native Canadians."

Political Rights Activist Brian Mallroony added that he would sooner "swallow a timbit whole than register it with the government," as such a thing goes against the very basis of the values upon which our country is based.

Others across the nation have commented that they would continue to purchase and distribute timbits without registering them with the government, if such a law came into effect.

"The Canadian Native population has long depended on hunting and gathering in harsh environments in order to survive. Over the centuries, they have perfected their tools to achieve the greatest sustenance with the least amount of effort. Today, these generations of refinement have resulted in traditional Canadian Timbits, which are cheap and relatively easy to produce and yet when used skillfully, can sustain a large tribe.

"The problem is that the use of timbits in Canada has become so widespread that their use is beginning to threaten traditional Canadian food sources. In order to combat this, the Canadian government is considering instituting a Timbit Registry, so that anyone who posesses timbits must register them with the government prior to transporting, using, or selling them.

"This proposed solution is drawing fire from the Canadian native community, who view timbits not only as an integral part of their way of life, but also as a status symbol. They feel that this proposal is purely an attempt to isolate the native Canadian communities by denying them access to timbits for traditional use and social recreation."

Having arrived at a stalemate in the Timbit talks, the government is now asking the international community for their suggestions on how to peacefully nullify the impact of timbits on the environment at large, while reaffirming the native culture that celebrates the timbit as an integral part of day to day life. Please feel free to use this forum to help hammer out the details so we can present the government of Canada with a well thought out, unified statement.

"
top

Em Adespoton Em Adespoton writes  |  more than 6 years ago

Em Adespoton writes "The Globe and Mail and others are reporting that the US Border Patrol and the DHS have announced plans for fully monitored borders between not just the US and Mexico, but also the US and Canada.

"We're looking at making it a guarded border," David Aguilar, chief of the U.S. Border Patrol, told reporters yesterday as the Department of Homeland Security announced plans for a high-tech surveillance system to stop illegal crossings across the borders with Mexico and Canada.

Secretary Chertoff added in his press briefing that "there are some limits — frankly, legal limits because of the procurement rules which come in a very fat book that prohibit my getting into too much detail. So we'll give as much detail as the law allows us to about the specifics. I will say that what we've been looking for is, in particular, proven technology. We want to get high-tech in the very best of the 21st century, but we're not interested in performing science experiments on the border. What we want to do is use tools that have been proven in other contexts to have the ability to perform and to have the durability we need in the border. And so that was a very important guiding principle and what we laid down as our requirement.""

Journals

top

Keep the Government's hands off our Timbits!

Em Adespoton Em Adespoton writes  |  more than 7 years ago Following the recent expose done by CBC's investigative reporting show, '22 Minutes', the Canadian public has become aware of a bill being pushed through parliament to create a national timbit registry.

Gordon Lightfoot, representative of the Assembly of Native Canadians, was said to hold that, "even considering such a bill was ludicrous, as it would destroy the current goodwill and respect painstakingly developed over the last two centuries between the government and native Canadians."

Political Rights Activist Brian Mallroony added that he would sooner "swallow a timbit whole than register it with the government," as such a thing goes against the very basis of the values upon which our country is based.

Others across the nation have commented that they would continue to purchase and distribute timbits without registering them with the government, if such a law came into effect.

"The Canadian Native population has long depended on hunting and gathering in harsh environments in order to survive. Over the centuries, they have perfected their tools to achieve the greatest sustenance with the least amount of effort. Today, these generations of refinement have resulted in traditional Canadian Timbits, which are cheap and relatively easy to produce and yet when used skillfully, can sustain a large tribe.

"The problem is that the use of timbits in Canada has become so widespread that their use is beginning to threaten traditional Canadian food sources. In order to combat this, the Canadian government is considering instituting a Timbit Registry, so that anyone who posesses timbits must register them with the government prior to transporting, using, or selling them.

"This proposed solution is drawing fire from the Canadian native community, who view timbits not only as an integral part of their way of life, but also as a status symbol. They feel that this proposal is purely an attempt to isolate the native Canadian communities by denying them access to timbits for traditional use and social recreation."

Having arrived at a stalemate in the Timbit talks, the government is now asking the international community for their suggestions on how to peacefully nullify the impact of timbits on the environment at large, while reaffirming the native culture that celebrates the timbit as an integral part of day to day life. Please feel free to use this forum to help hammer out the details so we can present the government of Canada with a well thought out, unified statement.

top

JHL Continued... 0.0.56 Onward.

Em Adespoton Em Adespoton writes  |  more than 9 years ago Current version: JHL Available Here!.

JHL, the Java Hotline Client.
Slashdot archived my previous entry, so here's a new one. You can find the previous one here.

Send someone an e-mail with this link!

There's an official jhl website now, so these slashlogs aren't really needed anymore. If you have bugs to report, leave them as comments for the version release you find the bugs in. For feature requests, leave them in the comments of the version you're currently using. Be sure to note if it's a BUG REPORT or FEATURE REQUEST at the top of the comment.

For those who can't be bothered with the official site:

Here's some documentation for JHL as it stands now, since some things can be a bit confusing.

JHL is a Java Hotline Client first and foremost, although it also does rudimentary IRC, and looks to handle AIM chat in the future. There is very little built-in documentation, and its main audience is experienced hotline users who want a more powerful client to use, want to get rid of the spyware that is the official client, and/or want a uniform client that works on all the unixes (including Linux and MacOS X) as well as MS Windows. JHL is currently a closed-source beta, but once electron feels he has made it feature complete, and stable it will be released as open source.
Why not release it as open source now? For obvious reasons -- projects which do not start as open source which are released under a FOSS license too early tend to fizzle and die. Plus, electron wants to clean up his code before others can look at it and critique it ;)

All the following is true as of version 0.1.

First off, the AIM client hasn't been designed yet. It doesn't do anything.

Second, the IRC client is REALLY buggy -- a lot of things will lock up the entire monolithic app if you try them.

Now on to the Hotline client:

There is now a way to save settings files.

In order to create new bookmarks, you enter your connection settings in the connect dialog, and click the save button to save a new connect file.

The preferences save in the current session when you click the save button at the bottom of the preferences pane, and to make them load on startup, click the "Save to file (defaults)" button.

One other quirk is that you can't do some things by double clicking -- for example, download files -- and this is considered by some to be a good thing. However, some double click features are being added -- you can now double-click in the user list to send a message.

On to the description of the interface:

The little hand above the userlist is an ignore hand; click it while someone is selected to ignore them, click again for their chat to start showing up again.

Nicknames can be tab completed in chat; just start typing someone's nickname, hit tab, and it will autocomplete.

In the file tab, refresh refreshes the subcontents of the currently selected item; folder counts belong to the parent item, and you can not upload to a selected file; you must select the folder you wish to upload to first

There is a hotline 1.2.3-compatible folder download/upload feature. Select a folder, and it will download/upload all files in that folder.
NOTE: it will NOT download subfolders or their contents.

As an additional note to downloading, double clicking does not work. To download, you must select the file/folder(s) to download, and then either click the download button or right click and select download from the contextual menu.

For Windows users, do the following to create a shortcut that's launchable from the start menu:

select the jar file and create a shortcut

get the properties of the shortcut, and replace the Target line with

C:\WINDOWS\system32\javaw.exe -jar jhl.jar

change name and custom icon as desired.

All other hidden and unobvious features are left to the user to discover at this time; maybe I'll make another update sometime.

Finally, my requests:

Red highlighting on the chat/transfer tabs when new stuff is available. For chat, it would be new chat, for the transfers tab, it would be new items in queue and transfer finished (removed from queue).

top

Odd Spam

Em Adespoton Em Adespoton writes  |  more than 9 years ago Here's an odd Spam I just got in my inbox; what do you think their scam could be?

Dear Fellow Internet Surfer;

I just want to share something that just BLEW ME AWAY when I first saw this a few weeks ago.

DON'T worry, This one doesn't cost a penny. Just a moment of your time.

Everything below is ABSOLUTELY FREE and actually has the potential to be one of the greatest Affiliate marketing opportunities EVER offered, possibly even bigger than EBay and Amazon!

100% FREE 4 LIFE INTERNET CONNECTION!!!! No contract to sign, No start-up costs and No monthly fees either!!!

How would you like to have High-Speed Internet Access for FREE? What do you think about giving away FREE BROADBAND worldwide and GETTING PAID for it again and again?!? Hundreds of MILLIONS of people worldwide will potentially be flocking to this service once they learn it really exists. And all that is needed is a simple phone-line.

And beyond that this company provides it's affiliates (free of charge) the most amazing marketing support program I have ever seen. Free to Join and Free to use.

DO NOT HESITATE on this folks , there is ABSOLUTELY NO RISK. It's going to be like the great Gold Rush of the old west! This company offers you some AMAZING income potential. You will not believe it if you just take the time to read through the site.

Facts:

-Easy to install and very simple to use

-Available anywhere in the world

-Works with your existing ISP

-A software download so there is NO need for new hardware

-FOUR times the speed of normal broadband

-Compatible with any type of phone line

-Works with any PC or MAC of the lowest specification believable

-Compatible with old 9,600kbps modems upwards to the most recent modems.

-Guaranteed to provide a minimum of 2MB internet speed and that's SUPER FAST!!

-Coming very soon worldwide OCT 1 2004, It just pre-launched a month ago!!

Again DO NOT HESITATE ,there is NO COST OR MONTHLY FEES, EVER!!

If you would like to receive more information, please write to:

dwabiz1@hotmail.com (write "SEND INFO" in the subject field)

Regards,

The Dwabiz1 Group

note: if you wish to unsubscribe to future mailings, please write: dwabiz1@hotmail.com and put "REMOVE ME" in the subject field and I will immediately delete you from my list.

top

JHL Feature Requests

Em Adespoton Em Adespoton writes  |  more than 10 years ago Grab JHL here.

This journal entry got archived, so go here to continue the discussion.

Also, emulation.net has moved to a new URL until the DNS issues can be resolved. The current domain rental expires in 2009, so it probably won't be usable again for some time unless a miracle happens.

top

Sad but True... Trolling works on Slashdot.

Em Adespoton Em Adespoton writes  |  more than 10 years ago Well, I just thought I'd do an experiment, and post an unsubstantiated troll in a fairly new article: http://slashdot.org/comments.pl?sid=114223&cid=9677047

As you can see, it is still the case that people tend to give points to posts that match their own "common sense" opinion, rather than posts that actually bring something new to the discussion, like facts, references, new ways of thinking, etc.

The sad thing is, people responded to my post in an informed manner, and many have been fully ignored, even though their points are much more valid than my unsubstantiated comment.

Because of this, I guess I'll continue to read slashdot at the +1 level; the +3 and higher posts aren't worth looking at (I hope someone noticed the obvious about this sentence).

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>