Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Satellite Images Show Russians Shelling Ukraine

ToasterMonkey Re:Great... (255 comments)

I'll match American propaganda with some Russian propaganda. Please, actually READ IT? Huh? Willya please?

http://21stcenturywire.com/201...

I can't say WHO shot that airliner out of the sky, because there is no CONCLUSIVE evidence yet. But, there's a helluva lot of circumstantial evidence that points at Kiev.

Do you have any idea why Kiev had fighter jets shadowing that airliner? Neither do I, but that's a question that needs to be answered. And, why did Kiev order the airliner to alter it's filed flight plan, flying a couple hundred miles north of the normal flight path?

There are a lot of questions that need to be answered, and I'm pretty sure that some of those answers will be "Well, we've invested so much money into the Ukraine, we can't abandon the plan!"

Meh, that page criticizes made up thunder storms in one paragraph then claims SAM operators would not be able to visually identify a plane that day due to the weather.

The small target window... how is that different for any other AA site anywhere? Anyone can look up at a high altitude flight over their home and do simple mental math how much time one would have to operate one of these things. It's not much.

And the tailing fighter jets I was not previously aware of, only increase the odds in my mind that rebels mistook this for a military plane.

There's spin... and then there's Spin. One possibility is... another real possibility is!!! And something else that could have happened is... retired Russian air force colonel says a fighter jet shot it, and then a BUK was ordered to finish it! Look here, at one possible map, from one source! (those are not my words!)

That thing is just conspiracy theory soup... It was accidentally shot down, period. I can speak with as much authority on this matter as random retired colonel somewhere in Russia. Why it's going from, and I'll leave it at SOMEONE, accidentally shooting it down to claims that it was all complexly orchestrated and done on purpose is just bizarre. Hanlon's razor - it was an accident to shoot down a loaded civilian jetliner. PERIOD.

4 hours ago
top

When Spies and Crime-Fighters Squabble Over How They Spy On You

ToasterMonkey Re:Beating aroud the bush (117 comments)

This article sounds like it is beating around the bush, alluding to but never mentioning the discovery of "Parallel Construction". Its a policy whereby illegal evidence is snuck into court by using it to find other evidence and not informing the courts, defendants and sometimes not even prosecutors where the initial leads came from. An example would be there is a suspected drug runner, NSA intercepts are used to tap his phone & internet communications. They find what they believe is a date and time where the runner will be carrying some drugs in their car, they then have some officers make up an excuse to pull them over and search their car. They conveniently "forget" however to tell anyone outside the law enforcement/intelligence community that their initial lead was based on warrant-less searches. And apparently many have the gall to say that it is a "It's decades old, a bedrock concept.", something tells me that if government agencies have to keep it secret from the courts its almost certainly illegal.

From the perspective of the agency doing the enforcement and helping bring a case to court, what's the difference between this and any other lead that's not directly usable as evidence, such as an anonymous tip? If the evidence is all properly and legally obtained, well I'm not sure this notion of an "illegal" tip is relevant.

Look, I don't know the exact methods used to do parallel construction, but I do see how it can be done legally, and IMO not infringing on your rights. There shouldn't be a distinction between me telling police there's a lot of cars stopping by my neighbors which is WEIRD and me doing the same with positive conformation in my opinion of criminal activity, regardless the particular methods I used to build that confidence. Obviously my confidence is not transitive, and I'd only share what I could, in a manner that protects my ass. The NSA is doing the same I'd imagine, and if you have a problem with THEIR methods, the drug case is not the proper venue to bring it up.

10 hours ago
top

When Spies and Crime-Fighters Squabble Over How They Spy On You

ToasterMonkey Re:What's it going to take? (117 comments)

This is the entire reason that the Department of Homeland Security was created, to bring all intelligence about threats to the United States under one body.

That's not true... The DHS absorbed INS, USCIS, Customs, Border Patrol, Coast Guard, Secret Service, and probably some other notable stuff I'm too lazy to look up. If you need help spotting the theme, it's enforcement.

There may be more collaboration between members of the intelligence community, which DHS is a party to but that's not the reason DHS was created.

10 hours ago
top

Enraged Verizon FiOS Customer Seemingly Demonstrates Netflix Throttling

ToasterMonkey Re:Role reversal (360 comments)

I have to wonder, what would happen if customers were to start throttling the payment of ISP's?
"You will get your payment when you actually fulfil your end of our contract, but not before."

You should go review your contract.

yesterday
top

Russian Government Edits Wikipedia On Flight MH17

ToasterMonkey Re:I don't see the problem. (667 comments)

False equivalence.

Sides are not equally wrong, and truth is not somewhere in the middle. There is a very clear wrong side - Russian equipment operated by Russian-sponsored terrorists and/or Russian military misidentifying civilian aircraft and shooting it down. Anything else is intentional misinformation.

"Terrorist" is the wrong word, it's obvious from the intercepts this was a tactical error on someone's part.

Terrorism isn't defined by actions so much as the reason. For the love of Jebus, it has a well understood meaning folks, look it up.

about a week ago
top

US House of Representatives Votes To Cut Funding To NSA

ToasterMonkey Re:Just a note (164 comments)

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized" Frankly, warrantless wiretapping IS illegal, per the US Constitution.

The per the US Constitution part is debatable, nothing you quoted makes it so.

http://en.wikipedia.org/wiki/K...

I agree with Justice Black, that the Fourth Amendment was not intended to protect your privacy. It was intended to prevent the government from physically intruding on your life. It would have been worded to include eavesdropping if it was meant to be. IMO, if you want privacy protections you need specific laws or new amendments.
If you read the Fourth as some kind of generic privacy protection then how can police interview your neighbors about what they saw or heard happen in your house? It does't make sense. Evidence exclusion rules make more sense for general privacy protection. Laws against gaining knowledge in itself are moronic, in my opinion.

I think most people here would agree the "reasonable expectation" test is fishy.
If you close a phone booth door WARRANT, but open NO WARRANT. Extrapolating from THAT logic lets us say... well you let Google not only index your email but thoroughly analyze them, AND you don't encrypt... soo.....

The Supreme Court did us a favor, but it wasn't the right thing to do. This isn't the privacy protection you want.

about a month ago
top

How Secret Partners Expand NSA's Surveillance Dragnet

ToasterMonkey Re:Why, New Zealand, WHY? (63 comments)

I've been to NZ.. it's a wonderful place. Beautiful, raw, remarkable in all of its unique features. It's also pretty fucking empty with more sheep than people. There isn't a threat within 5,000 miles unless Australia turns Taliban. The worst thing they need to look out for is Chinese fishing poachers emptying their seas.

In all seriousness, please, kiwis, tell me why you have a //spy agency//?! Enjoy the wonderful land you live in and leave the stupids to the rest of the world.

... because they're on an island and have to trade with other countries? Non-military intelligence isn't around just to foil movie-like terrrrist plots, but nobody makes movies about the boring stuff.

about a month ago
top

Was Watch Dogs For PC Handicapped On Purpose?

ToasterMonkey Re:Problem solved! (215 comments)

I just buy all of their games once a year for $2.99 on Steam and then never play them.

Me too, lorem ipsum, undoing mods.

about a month ago
top

Apple, Google Vying For Mobile Game Exclusivity

ToasterMonkey Re:Too bad it sucked (52 comments)

Mod parent up. This is the reason I've stopped playing games almost entirely -- I am sick of being nickel-and-dimed to death.

This sounds like going to a cheap theater and complaining the experience sucks and concession stand prices are high.

One option is to go to a theater that does't suck, and pass on the concession stand.

Neither of these will be cheap AND good. Shocker.

about 3 months ago
top

Linux Developers Consider On-Screen QR Codes For Kernel Panics

ToasterMonkey Re:Wish other OSs did this... (175 comments)

Anything's an improvement over:
"My computer froze."
"What happened?"
"It put some message on the screen."
"What did it say?"
"Something about an error."
"What error?"
"I dunno. It had some numbers and letters and stuff."

"Show me!"
"I already rebooted it."

Personally I would rather have a more sophisticated crash dump system, like other OSs, because whatever is going to fit in a QR code isn't going to help much unless you're looking up known issues in an enterprise Linux vendor's bug database. That's assuming they can cram a stack trace into QR codes, AAAAND you have a problem that leaves a predictable stack trace.

I don't remember the last time I had a Solaris system crash that didn't leave a dump (try not to giggle). It would have be be way back pre-ZFS, on a janky server without a dump partition. I'm also reading that Windows saves memory dumps to the page file going back to XP.

You go into the average Linux environment and even if it's not a "paid support is for wusses" camp, you are _EXTREMELY_ unlikely to have anything of value to send to support. Maybe your hawt X86 firmware will have logged an issue! ROFL.

Reboot and hope for the best :\

about 4 months ago
top

The 3D Economy — What Happens When Everyone Prints Their Own Shoes?

ToasterMonkey Re:Like photo printers (400 comments)

Remember how photo printers put photo shops out of business?

Well, yes. I haven't seen any photo shops lately. "1 Hour Photo" is dead. Kinkos has photo printers, and so do the local CVS and Walgreens, but they're not used much. Nobody has an in-store film processor any more. Palo Alto still has Keeble and Shugat, a high end photo equipment store with pro darkroom services. Redwood City has some wedding-photographer types and some commercial printers. That's about it.

It wasn't the photo printers, it was the digital cameras, it was the keeping them on a computer instead, mailing a CD, emailing, and texting them that did these places in.

Lack of demand... same reason people aren't buying printers so much anymore.
Why own a printer and buy ink when you can just bring your sd card to a Walmart and have them print for you?

Even after people stop wanting nice shoes, Walmart is going to have a nicer, more efficient shoe printer than you will, unless you are a shoe retailer yourself.

about 4 months ago
top

Spinoffs From Spyland: How Some NSA Technology Is Making Its Way Into Industry

ToasterMonkey Re:Time for a code review? (44 comments)

In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

When a /. post conflating Apache Foundation and Apache HTTP Server gets moderated up highly "Insightful", a hacker dies.

Nobody has ever thought of scouring httpd, the "The Number One HTTP Server On The Internet", the most common application you'll find exposed directly to the Internet, for back doors or security vulnerabilities. No, nobody never thought of that, thanks for your insightful comment.

about 4 months ago
top

Plan 9 From Bell Labs Operating System Now Available Under GPLv2

ToasterMonkey Re:On Debian that's allready done. (223 comments)

If you have daemons that keep falling over and needing restart, you're already at the hack stage.

What do you mean IF, it just happens from time to time for a variety of reasons. This is an incredibly basic problem in multiprocess systems.
It's like saying IF your computer crashes and needs to be restarted... in a datacenter, it's a matter of WHEN.

In both cases, absent an expected, non-rectified reason for them to crash, the immediate action for a human operator is... try restarting it.

If the dependancies are programmatically declared (a Good Thing in itself), we can automate this. It's not a hack, because machines are NEVER perfect. The "recoverable" error rate adds up when you tie bunches of them together. So does the "non-recoverable" rate... so why not do what we can to address it? This is why we put things like Xeons and ECC memory in data centers, it's the only way to scale out the number of machines, and ultimately processes.

about 5 months ago
top

Is Whitelisting the Answer To the Rise In Data Breaches?

ToasterMonkey Re:Already Possible (195 comments)

Newer versions of Linux can already do this. Using the integrity measurement architecture, module signing, and Secure Boot it's possible to have a system where almost any change is detected. I'm currently trying to get it all working on my machine right now, but it's slow going. Here's hoping that distros start shipping with this set up by default. http://lwn.net/Articles/488906...

A shorter term security measure that more users/Distributions should take is making the root partition read only. I know Android already does this, but it really does help. Something that I would really like to see is an easy to use per application firewall. Cgroups mean that I don't even have to worry about it just spawning a child process. Yes, I want to play this game in wine. No, I don't want it to access the internet. No, wine refuses to run it as a different user, much less one with lower privileges.

Take it from a former Solaris admin, difficult to maintain over-engineering is not the answer. It will fail, and users will hate you.

Question of the day: Why are single user smartphone OSs better at segregating processes than server OSs in the first place? Even while using basic UNIX features to do it?

These classic UNIX systems kind of need to roll over and fall into their graves already. I mean look at what you get with VMWare ESX, then look at iOS/Android, then look at say.. a RHEL-type classic UNIX server.

Where is a modern datacenter OS with the flexibility, availability, resource accounting, process separation of ESX, and the developer friendly frameworks and "It's The Apps Stupid" focus like iOS or Android?

Well, it's not with Linux...

about 6 months ago
top

Snowden Used Software Scraper, Say NSA Officials

ToasterMonkey Re:Stunning. (227 comments)

There's zero reason to believe the NSA's version of this and every reason to believe Snowden's

Why?

Because, so far, every single thing that Snowden has said has turned out to be true when cross-checked. And, so far, every NSA official spokesperson has been caught repeatedly lying.

Once you start using absolutes, we're past the point where every single thing you want to believe is true, and every single thing you don't is a lie.

Consider that.

about 6 months ago
top

Snowden Used Software Scraper, Say NSA Officials

ToasterMonkey Re:How Many More NSA Employees? (227 comments)

Now the question is, how many other NSA contractors / staff / moles / spies have been doing the same thing, without Snowden's intention to disclose their behavior?

Is this some variation of "If a tree falls in the woods, and nobody is around to hear it, and it hits a mime, does anyone care?"

about 6 months ago
top

Snowden Used Software Scraper, Say NSA Officials

ToasterMonkey Re:Wow... (227 comments)

Knock me over with a feather, spooks. You fucking hired people to build what is probably the largest collection of signals intelligence scraping systems on the planet, targeted at a wide variety of differently structured systems. Why would you even consider, except as a last resort, the notion that you are dealing with a bunch of noobs?

Someone made a comment that the collection was automated and you read all THIS from it? To the people in the position to know the volume of data taken, the fact it was automated is obvious.

Do you think it isn't?

Do you feel good attacking that straw man?

about 6 months ago
top

Schiller Says Apple Is the Last PC Maker From the Mac Era, Forgets About HP

ToasterMonkey The title is wrong (474 comments)

The quote is

"Every company that made computers when we started the Mac, they're all gone, we're the only one left. We're still doing it, and growing faster than the rest of the PC industry because of that willingness to reinvent ourselves over and over." said Philip Schiller, Apple's senior vice president of worldwide marketing

As far as making personal computers before Apple and still doing it, I think it's a stretch to count HP because of a calculator, and I'm not even counting HP's attempt to get out of the PC market recently. The HP-150 that came out after they started working on the Mac... is that even in the same ballgame as the 1984 Mac, I don't think so.

Apple started on the Mac in 1980 from what I can tell.

The nitpicking is really skewing his point - HP is ALSO still around because they've had to reinvent themselves over and over.

about 6 months ago
top

What Would It Cost To Build a Windows Version of the Pricey New Mac Pro?

ToasterMonkey Re:Why is this a surprise? (804 comments)

The Mac tax has always been about the actual parts they use and that there are cheaper alternatives. For this comparison, they try to match the parts exactly. That of course is going to cost more because you are paying 3rd party markup prices while Apple is being direct from the manufacturer. The article even admits that you can buy things like a different video card that is equivalent for half the price. The question isn't if you can make the exact same system (or as close as possible) for cheaper but whether you can make an equivalent system for cheaper, and the answer to that is almost always yes.

So, you could build a battle tank or an F1 car with cheaper alternative parts, like.. the engine and wheels off my old Mustang. No matter how much hand waving you do, the scrap metal I bolt on the side is not the same as reactive armor.

If you need the uptime assurance that Xeon, ECC, FireGL whatever provide, then using desktop grade components is not the same thing, and you aren't fooling anybody actually in the market for those things.

about 7 months ago
top

What Would It Cost To Build a Windows Version of the Pricey New Mac Pro?

ToasterMonkey Re:Hard to believe (804 comments)

Yeah, quite. The base Mac Pro actually turns out to be fairly reasonably priced for the combination of components inside, but - and this is important - there is essentially no reason to get that combination of components unless you have no other choice because you're buying a Mac. For instance, they're paying out quite a bit of extra money in order to fit everything into a smaller case, even though that'd actually be a downside for many customers. Also, most of the professional applications out there that use GPU acceleration can only make use of a single GPU, so the second $3400 GPU will be sitting completely idle for most Mac Pro buyers. What's more, as the article mentions many apps run better on NVidia GPUs anyway. Also, how many of the GPU-accelerated apps can also make full use of a 12-core CPU?

Whoa, I thought you were going to say something about the Xeon and ECC memory. What exactly is highly unusual about the video card and number of cores?

This thing is built with server grade equipment, so my wild guess is that means they intended it to have very long uptime, and again, what's highly unusual about that in a high end workstation?

Look, we don't all need to drive tanks to work, but some do. The rest of us don't need to play the "I could build a tank for less, but without the turbine engine, armor, or tracks" game. Well, you can do that, but they are just going to be laughed at by the people that drive tanks, and what else matters...

about 7 months ago

Submissions

ToasterMonkey hasn't submitted any stories.

Journals

ToasterMonkey has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...