Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

The Computer Security Threat From Ultrasonic Networks

REggert In what way is this a "vulnerabilty"? (121 comments)

Given that the machines have to have the acoustic networking software installed on them (requiring already having root access), this is at worst a covert communications channel that could be used to bypass network security controls in order to exfiltrate information from an otherwise secure network. It has no impact on whether machines can be hacked to begin with.

about 3 months ago
top

How Reactive Programming Differs From Procedural Programming

REggert Exploiting ambiguity to latch onto hype (186 comments)

I don't know why people keep submitting this garbage from Espresso Logic, who is just taking advantage of the fact the the term "reactive" has been overloaded to mean different things to exploit the hype surrounding the Reactive Manifesto and related technologies (e.g., Akka, Rx, Node.js, etc.) to push their own, completely unrelated product, which is based on the more traditional (i.e., the one you find in Wikipedia) definition of "Reactive Programming".

"Reactive programming", as defined by the Reactive Manifesto (which is what all the hype is about), is about designing applications that operate in an entirely asynchronous and non-blocking manner, so as to maximize CPU utilization and fully exploit parallelism, and ensure that the system is always responsive to new events (user input, incoming data streams, errors, changes in load, etc.) rather than having resources tied up waiting for external processes (e.g., blocking on I/O). It has nothing to do with "reactive databases".

about 8 months ago
top

Futuristic Highway Will Glow In the Dark For Icy Conditions

REggert Glows for up to 10 hours, huh? (174 comments)

And what are they going to do for the remaining 6 hours of the night during winter?

about a year and a half ago
top

Playstation Controller Runs Syrian Rebel Tank

REggert Re:Not a tank (232 comments)

Dammit! That should have read "had NO anti-tank capabilities".

about 2 years ago
top

Playstation Controller Runs Syrian Rebel Tank

REggert Re:Not a tank (232 comments)

Many early tanks (up through WW2) had anti-tank capabilities (indeed, the first tanks had no reason to have anti-tank capabilities - there were no other tanks to fight against). The main distinguishing features of a tank are its armor (which need not necessarily be very heavy - just enough to deflect small arms fire), its tracks, and the fact that it has some sort of weapon mounted on a turret.

The Panzer I was classified as a light tank but was armed only with MG13 machine guns. The British Vickers Light Tank Mk VI likewise only had .50cal and .303cal machine guns.

about 2 years ago
top

Oracle Proposes New Native JavaScript Engine for OpenJDK

REggert Re:Don't let them patent it! (80 comments)

Rhino runs an interpreter that first compiles JavaScript into its own pseudo-bytecode, and then interprets the pseudo-bytecode. I believe what Oracle is proposing is to compile JavaScript directly into Java bytecode, using the new features of the JVM to handle the dynamic aspects that weren't possible with previous versions of the JVM.

about 2 years ago
top

Opera's Haakon Wium Lie On CSS, Web Standards, and More

REggert Re:CSS and why I never bought into it (107 comments)

document structure != layout

The header and footer are part of the structure of the document.

The fact that they appear at the top and bottom of the screen is part of the layout.

more than 2 years ago
top

Google Announces Google CDN

REggert Re:DDOS protection? (205 comments)

Only if they're targeting you by your DNS name and not your IP address.

more than 3 years ago
top

Company Claims Ownership of Digital Messaging

REggert Re:Prior Art? (325 comments)

Me too! I even still have Pidgin set up to log into it (along with every other account I have), though my ICQ contacts are so old I pretty much never talk to any of them.

more than 3 years ago
top

UN Intervention Begins In Libya

REggert Re:What's the goal of it? (688 comments)

Gadahi/Kadaffy/Qaddafi/whatever did say he declared a ceasefire. Meanwhile, Libyan tanks continued to roll into Benghazi to "disarm to protesters".

more than 3 years ago
top

Oracle Could Reap $1 Million For Sun.com Domain

REggert Jave EE XML Descriptors (183 comments)

If the domain changes hands, that's going to break a lot of XML files containing xsi:schemaLocation attributes and DTD references pointing to documents within http://java.sun.com/xml/ns/j2ee/ .

more than 3 years ago
top

Police Chief Teaches Parents To Keylog Kids

REggert Re:What a tool (505 comments)

You should just put a big banner across the top of the screen that reads: "BIG BROTHER IS WATCHING YOU." The government in 1984 gave full disclosure as well.

That said, they are your children, and by extension it's probably your computer as well (or at the very least, your Internet connection), so you're well within your rights to monitor how it is used. It isn't really even necessary to actually do any monitoring. As long as they believe they're being monitored, the effect should be the same.

more than 3 years ago
top

Facebook Opens Up Home Addresses and Phone Numbers

REggert Contact Info Sharing is Optional (459 comments)

If any of you had bothered to read TFA, you'd notice that sharing your address and phone number is entirely optional for the user on a per-app basis. They just split the "Request for Permission" dialog into two options instead of one: 1. Access my basic information (the only option up until now) and 2. Access my contact information. Why anyone would actually choose the second option is beyond me (maybe they anticipate someone developing some sort of app that sends notifications via text messages), but it's not as if they're forcing you to share the information, or even making it likely that you'd accidentally share it.

more than 3 years ago
top

New Tool Blocks Downloads From Malicious Sites

REggert Re:What the fuck (192 comments)

Drive-by downloads are not typically downloaded by your browser (except in the case of exploits targeting vulnerabilities in the browser itself). They are usually downloaded by browser plugins (such as Flash, Adobe Reader, various ActiveX controls, etc.) that contain vulnerabilities that are exploited (either via JavaScript or by specially crafted media files), and the payload of the exploit (the "shellcode") downloads and executes some Trojan EXE. It has absolutely nothing to do with downloads that are initiated by your browser via Java Script (which must always be authorized by the user in all major browsers, generally via a Save/Open/Cancel dialog).

more than 3 years ago
top

Lexmark Sues 24 Companies Over Toner-Cartridge Patents

REggert Re:A nice advertisement... (294 comments)

I bought a Brother printer a few months ago when my Canon printer became irreparably clogged. It has worked quite well for me so far. The ink even comes in individual per-color cartridges.

about 4 years ago
top

YouTube Hit By HTML Injection Vulnerability

REggert Exploits (224 comments)

I wonder how many times this vulnerability was used to deliver malware.

more than 4 years ago
top

Does Your PC Really Need a SysRq Button Anymore?

REggert Re:Print Screen (806 comments)

If you look at the pictures in TFA, you'll note that they've moved Print Screen to share space with the Insert key. To invoke Print Screen instead of Insert, you have to hold down the Fn key.

more than 4 years ago
top

SQL Injection Attack Claims 132,000+

REggert Re:AV Detection (186 comments)

according to TFA:

Malware description

Threatname: Backdoor.Win32.Buzus.croo

Aliases: Trojan-PWS.Win32.Lmir (Ikarus, a-squared); TR/Hijacker.Gen (AntiVir); Trojan/Win32.Buzus.gen (Antiy-AVL); W32/Agent.S.gen!Eldorado (F-Prot, Authentium); Win32:Rootkit-gen (Avast); Generic15.CBGO (AVG); Trojan.Generic.2823971 (BitDefender, GData); Trojan.Buzus.croo (Kaspersky, QuickHeal); Trojan.NtRootKit.2909 (DrWeb); Trj/Buzus.AH (Panda).

That's the trojan that's being installed by the exploits served up by the injected IFRAME. It is not the vulnerability that is allowing the IFRAME to be injected to begin with.

more than 4 years ago
top

Microsoft To Get Malware Bailout In Germany

REggert Re:Too small a staff (226 comments)

ISP contacts customer, says "you appear to have a virus that is doing bad things on the network. Please fix it." or pops a web page with the same message and probably a link to an antivirus solution.

Popping up a web page would be an extraordinarily bad idea, given how many popup/banner ads, malicious web pages, and adware are already out there selling fake antivirus software.

more than 4 years ago

Submissions

top

US Appeals Court: Open source licenses enforceable

REggert REggert writes  |  more than 6 years ago

REggert (823158) writes "InformationWeek reports that the U.S. Court of Appeals for the Federal Circuit has struck down a decision by the U.S. District Court for North Carolina, ruling that open source licenses are enforceable, stating that not only can violators be sued for copyright infringement, but copyright holders of free software can seek monetary damages in such cases, even though they do not charge money for the software itself. According to the ruling, "The lack of money changing hands in open source licensing should not be presumed to mean that there is no economic consideration," and "There are substantial benefits, including economic benefits, to the creation and distribution of copyrighted works under public licenses that range far beyond traditional license royalties.""
Link to Original Source

Journals

REggert has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>