Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Z Machine Makes Progress Toward Nuclear Fusion

REggert Re:Text Adventures (151 comments)

You have been eaten by a gru. Feel better now?

about 4 months ago

The Computer Security Threat From Ultrasonic Networks

REggert In what way is this a "vulnerabilty"? (121 comments)

Given that the machines have to have the acoustic networking software installed on them (requiring already having root access), this is at worst a covert communications channel that could be used to bypass network security controls in order to exfiltrate information from an otherwise secure network. It has no impact on whether machines can be hacked to begin with.

about 8 months ago

How Reactive Programming Differs From Procedural Programming

REggert Exploiting ambiguity to latch onto hype (186 comments)

I don't know why people keep submitting this garbage from Espresso Logic, who is just taking advantage of the fact the the term "reactive" has been overloaded to mean different things to exploit the hype surrounding the Reactive Manifesto and related technologies (e.g., Akka, Rx, Node.js, etc.) to push their own, completely unrelated product, which is based on the more traditional (i.e., the one you find in Wikipedia) definition of "Reactive Programming".

"Reactive programming", as defined by the Reactive Manifesto (which is what all the hype is about), is about designing applications that operate in an entirely asynchronous and non-blocking manner, so as to maximize CPU utilization and fully exploit parallelism, and ensure that the system is always responsive to new events (user input, incoming data streams, errors, changes in load, etc.) rather than having resources tied up waiting for external processes (e.g., blocking on I/O). It has nothing to do with "reactive databases".

1 year,17 days

Futuristic Highway Will Glow In the Dark For Icy Conditions

REggert Glows for up to 10 hours, huh? (174 comments)

And what are they going to do for the remaining 6 hours of the night during winter?

about 2 years ago

Playstation Controller Runs Syrian Rebel Tank

REggert Re:Not a tank (232 comments)

Dammit! That should have read "had NO anti-tank capabilities".

more than 2 years ago

Playstation Controller Runs Syrian Rebel Tank

REggert Re:Not a tank (232 comments)

Many early tanks (up through WW2) had anti-tank capabilities (indeed, the first tanks had no reason to have anti-tank capabilities - there were no other tanks to fight against). The main distinguishing features of a tank are its armor (which need not necessarily be very heavy - just enough to deflect small arms fire), its tracks, and the fact that it has some sort of weapon mounted on a turret.

The Panzer I was classified as a light tank but was armed only with MG13 machine guns. The British Vickers Light Tank Mk VI likewise only had .50cal and .303cal machine guns.

more than 2 years ago

Oracle Proposes New Native JavaScript Engine for OpenJDK

REggert Re:Don't let them patent it! (80 comments)

Rhino runs an interpreter that first compiles JavaScript into its own pseudo-bytecode, and then interprets the pseudo-bytecode. I believe what Oracle is proposing is to compile JavaScript directly into Java bytecode, using the new features of the JVM to handle the dynamic aspects that weren't possible with previous versions of the JVM.

more than 2 years ago

Opera's Haakon Wium Lie On CSS, Web Standards, and More

REggert Re:CSS and why I never bought into it (107 comments)

document structure != layout

The header and footer are part of the structure of the document.

The fact that they appear at the top and bottom of the screen is part of the layout.

more than 3 years ago

Google Announces Google CDN

REggert Re:DDOS protection? (205 comments)

Only if they're targeting you by your DNS name and not your IP address.

more than 3 years ago

Company Claims Ownership of Digital Messaging

REggert Re:Prior Art? (325 comments)

Me too! I even still have Pidgin set up to log into it (along with every other account I have), though my ICQ contacts are so old I pretty much never talk to any of them.

more than 3 years ago

UN Intervention Begins In Libya

REggert Re:What's the goal of it? (688 comments)

Gadahi/Kadaffy/Qaddafi/whatever did say he declared a ceasefire. Meanwhile, Libyan tanks continued to roll into Benghazi to "disarm to protesters".

more than 3 years ago

Oracle Could Reap $1 Million For Sun.com Domain

REggert Jave EE XML Descriptors (183 comments)

If the domain changes hands, that's going to break a lot of XML files containing xsi:schemaLocation attributes and DTD references pointing to documents within http://java.sun.com/xml/ns/j2ee/ .

more than 3 years ago

Police Chief Teaches Parents To Keylog Kids

REggert Re:What a tool (505 comments)

You should just put a big banner across the top of the screen that reads: "BIG BROTHER IS WATCHING YOU." The government in 1984 gave full disclosure as well.

That said, they are your children, and by extension it's probably your computer as well (or at the very least, your Internet connection), so you're well within your rights to monitor how it is used. It isn't really even necessary to actually do any monitoring. As long as they believe they're being monitored, the effect should be the same.

more than 3 years ago

Facebook Opens Up Home Addresses and Phone Numbers

REggert Contact Info Sharing is Optional (459 comments)

If any of you had bothered to read TFA, you'd notice that sharing your address and phone number is entirely optional for the user on a per-app basis. They just split the "Request for Permission" dialog into two options instead of one: 1. Access my basic information (the only option up until now) and 2. Access my contact information. Why anyone would actually choose the second option is beyond me (maybe they anticipate someone developing some sort of app that sends notifications via text messages), but it's not as if they're forcing you to share the information, or even making it likely that you'd accidentally share it.

about 4 years ago

New Tool Blocks Downloads From Malicious Sites

REggert Re:What the fuck (192 comments)

Drive-by downloads are not typically downloaded by your browser (except in the case of exploits targeting vulnerabilities in the browser itself). They are usually downloaded by browser plugins (such as Flash, Adobe Reader, various ActiveX controls, etc.) that contain vulnerabilities that are exploited (either via JavaScript or by specially crafted media files), and the payload of the exploit (the "shellcode") downloads and executes some Trojan EXE. It has absolutely nothing to do with downloads that are initiated by your browser via Java Script (which must always be authorized by the user in all major browsers, generally via a Save/Open/Cancel dialog).

more than 4 years ago

Lexmark Sues 24 Companies Over Toner-Cartridge Patents

REggert Re:A nice advertisement... (294 comments)

I bought a Brother printer a few months ago when my Canon printer became irreparably clogged. It has worked quite well for me so far. The ink even comes in individual per-color cartridges.

more than 4 years ago

YouTube Hit By HTML Injection Vulnerability

REggert Exploits (224 comments)

I wonder how many times this vulnerability was used to deliver malware.

more than 4 years ago

Does Your PC Really Need a SysRq Button Anymore?

REggert Re:Print Screen (806 comments)

If you look at the pictures in TFA, you'll note that they've moved Print Screen to share space with the Insert key. To invoke Print Screen instead of Insert, you have to hold down the Fn key.

about 5 years ago

SQL Injection Attack Claims 132,000+

REggert Re:AV Detection (186 comments)

according to TFA:

Malware description

Threatname: Backdoor.Win32.Buzus.croo

Aliases: Trojan-PWS.Win32.Lmir (Ikarus, a-squared); TR/Hijacker.Gen (AntiVir); Trojan/Win32.Buzus.gen (Antiy-AVL); W32/Agent.S.gen!Eldorado (F-Prot, Authentium); Win32:Rootkit-gen (Avast); Generic15.CBGO (AVG); Trojan.Generic.2823971 (BitDefender, GData); Trojan.Buzus.croo (Kaspersky, QuickHeal); Trojan.NtRootKit.2909 (DrWeb); Trj/Buzus.AH (Panda).

That's the trojan that's being installed by the exploits served up by the injected IFRAME. It is not the vulnerability that is allowing the IFRAME to be injected to begin with.

more than 5 years ago



US Appeals Court: Open source licenses enforceable

REggert REggert writes  |  more than 6 years ago

REggert (823158) writes "InformationWeek reports that the U.S. Court of Appeals for the Federal Circuit has struck down a decision by the U.S. District Court for North Carolina, ruling that open source licenses are enforceable, stating that not only can violators be sued for copyright infringement, but copyright holders of free software can seek monetary damages in such cases, even though they do not charge money for the software itself. According to the ruling, "The lack of money changing hands in open source licensing should not be presumed to mean that there is no economic consideration," and "There are substantial benefits, including economic benefits, to the creation and distribution of copyrighted works under public licenses that range far beyond traditional license royalties.""
Link to Original Source


REggert has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?